
From nobody Fri Apr  1 15:56:00 2016
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 80CF712D6CC for <sfc@ietfa.amsl.com>; Fri,  1 Apr 2016 15:55:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.931
X-Spam-Level: 
X-Spam-Status: No, score=-6.931 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JDyCW9wx9h90 for <sfc@ietfa.amsl.com>; Fri,  1 Apr 2016 15:55:56 -0700 (PDT)
Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by ietfa.amsl.com (Postfix) with ESMTP id A267912D68E for <sfc@ietf.org>; Fri,  1 Apr 2016 15:55:56 -0700 (PDT)
Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga103.jf.intel.com with ESMTP; 01 Apr 2016 15:55:56 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.24,428,1455004800"; d="scan'208";a="923736326"
Received: from orsmsx108.amr.corp.intel.com ([10.22.240.6]) by orsmga001.jf.intel.com with ESMTP; 01 Apr 2016 15:55:56 -0700
Received: from orsmsx111.amr.corp.intel.com (10.22.240.12) by ORSMSX108.amr.corp.intel.com (10.22.240.6) with Microsoft SMTP Server (TLS) id 14.3.248.2; Fri, 1 Apr 2016 15:55:55 -0700
Received: from orsmsx114.amr.corp.intel.com ([169.254.8.18]) by ORSMSX111.amr.corp.intel.com ([169.254.12.9]) with mapi id 14.03.0248.002; Fri, 1 Apr 2016 15:55:55 -0700
From: "Elzur, Uri" <uri.elzur@intel.com>
To: Sunil Vallamkonda <sunilvk@f5.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Dave Dolson <ddolson@sandvine.com>, "Bottorff, Paul" <paul.bottorff@hpe.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] SFC Metadata: Comments regarding draft-vallamkonda-sfc-metadata-model-00.txt
Thread-Index: AdGJ9+sCFkM+vCX4TPSmWI6TIKwl2QAVDRsAAA6aG/D//4/2AIAAMFYAgADrQYCAAAP0AIAAc1kw//+YKACAAAXRgIAAAi8AgAB1FkD//ZlyQA==
Date: Fri, 1 Apr 2016 22:55:55 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B8995858932536C@ORSMSX114.amr.corp.intel.com>
References: <f30a2d02487a4945b87869ac7d34cd0d@SEAEXCHMBX06.olympus.F5Net.com> <56FB0D84.9050602@joelhalpern.com> <ec4b483426a34789b10227671c83b13b@SEAEXCHMBX06.olympus.F5Net.com> <56FB1186.7070807@joelhalpern.com> <E8355113905631478EFF04F5AA706E9830EF2BAA@wtl-exchp-2.sandvine.com> <TU4PR84MB01597DDE9CF78A2C0C97139CFE980@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <56FC02BC.8060203@joelhalpern.com> <880ca7e35d334ab48898aa4c78984ac1@SEAEXCHMBX06.olympus.F5Net.com> <56FC0C62.1050200@joelhalpern.com> <E8355113905631478EFF04F5AA706E9830EF69C6@wtl-exchp-2.sandvine.com> <56FC1318.6070703@joelhalpern.com> <fe112a5133844f43b66ac28bfee50b3a@SEAEXCHMBX06.olympus.F5Net.com>
In-Reply-To: <fe112a5133844f43b66ac28bfee50b3a@SEAEXCHMBX06.olympus.F5Net.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiNDk2NjBlMjYtN2Y2NC00ZTVlLWJkNTctOTg0MWU4ZmI4NGE5IiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX0lDIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE1LjkuNi42IiwiVHJ1c3RlZExhYmVsSGFzaCI6IkttRWl5K3BaZlA0aEFpK29qbXVkU3lZU3plUjZrcUgxaTQ4QmxtM1czcGs9In0=
x-ctpclassification: CTP_IC
x-originating-ip: [10.22.254.139]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/q1J3a2rlOsgI4HK4oj5LrlTRjig>
Subject: Re: [sfc] SFC Metadata: Comments regarding draft-vallamkonda-sfc-metadata-model-00.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2016 22:55:59 -0000

Sunil

To advance your point, it may be of advantage, IMHO, if you provide a concr=
ete example of what metadata can be shared, and requires interoperability a=
mong vendors, in a specific example e.g. FW LB NAT (or choose your favorite=
). Notice some proposed directions in your draft.

The thread reads very theoretical and suggests limited value for inter vend=
or interaction. Seems like you wish to counter it. A specific example may h=
elp bring the conversation down to ground level.=20

Thx

Uri ("Oo-Ree")
C: 949-378-7568

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Sunil Vallamkonda
Sent: Wednesday, March 30, 2016 11:04 AM
To: Joel M. Halpern <jmh@joelhalpern.com>; Dave Dolson <ddolson@sandvine.co=
m>; Bottorff, Paul <paul.bottorff@hpe.com>; sfc@ietf.org
Subject: Re: [sfc] SFC Metadata: Comments regarding draft-vallamkonda-sfc-m=
etadata-model-00.txt

Joel,

Good point, we are not trying to enumerate all the possible algorithmic beh=
aviors.
Yes, the proposal addresses both vendor and standardized metadata, where la=
tter could be a flavor of former.
In below MD-2, ignoring all metadata is a simple implementation, though wit=
h limited capabilities. However in all elements the sender and receiver nee=
d to co-ordinate metadata in a dynamic and scalable way to take intelligent=
 actions.=20

Re: #1: Is there a definite limitation in framework for metadata to be same=
 for all packets ? It should not limit or mandate either way.
Re: #2: If there is no need for receiver to understand the semantics across=
 vendors and products and releases, I do not believe  it would be a scalabl=
e solution. The code semantics and actions need to be aware by elements for=
 metadata, without which we might well use only 'reserved' part of header o=
r just treat MD-2 as a 'reserved' header itself, IMHO.

Again to clarify, the intent and focus is have the ability to understand an=
d extend metadata semantics for deployment. The goal is not to enumerate ev=
ery possible situation but to provide semantics to customize and support al=
gorithmic and other situations as individual case may be.

=20
Thanks,
Sunil

-----Original Message-----
From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
Sent: Wednesday, March 30, 2016 10:56 AM
To: Dave Dolson <ddolson@sandvine.com>; Sunil Vallamkonda <sunilvk@f5.com>;=
 Bottorff, Paul <paul.bottorff@hpe.com>; sfc@ietf.org
Subject: Re: [sfc] SFC Metadata: Comments regarding draft-vallamkonda-sfc-m=
etadata-model-00.txt

In terms of copied information, control tells the SF what to copy.  It does=
 not matter what the granularity is.

Given that "flow" does not have a consistent meaning (sometimes it means 5-=
tuple, sometimes it means other things) trying to define control instructio=
ns at other granularities than packet gets us into algorithmic behaviors.  =
And I do not think we want to try to enumerate all of the "supported" algor=
ithmic behaviors.

Similarly, if the information is not the same as that from the prompting pa=
cket, we are again finding ourselves getting into algorithmic instructions =
(maybe you complement this field, or add 100 to that field, or bounce the t=
hird field off the roof.)

If we neeed algorithmic behavior, it seems to me that the SF has to know wh=
at it is doing.  It can not rely on control to tell it.  Yes, this places s=
ome limits on generality of inserting metadata in produced packets.  I woul=
d be interested in improvement, but I have not seen one.

Yours,
Joel

On 3/30/16 1:47 PM, Dave Dolson wrote:
> Joel,
> I'd like to examine this point of yours:
>> 2) Metadata to be copied from a prompting packet.  This would seem to=20
>> be provided by control as a list of type codes, with no need to=20
>> understand semantics.
>
> Yes, I think control should provide information about different type code=
s.
> But we believe there *is* some requirement to understand certain semantic=
s.
> E.g.,
> - is the metadata about the packet, about the flow or about the source or=
 destination end-point?
> - is the metadata important enough to add to new packets, or is it option=
al?
> - is the metadata direction-specific, or can the value be cloned from a r=
equest to a response?
>
> If we don't address different types of semantics, I think we need to=20
> agree there is only one type that works in all cases, or that certain=20
> types should not be used in an opaque manner, or that certain types shoul=
d not be used with service functions that need to inject packets.
>
>
> Personally, I think that per-packet opaque metadata is problematic and pr=
obably to be avoided.
> E.g., a metadata that is checksum of the packet.
> If this is opaque to a function, the function may modify the packet or=20
> clone the metadata from one packet to another without being able to updat=
e it.
>
> -Dave
>
>
> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Wednesday, March 30, 2016 1:27 PM
> To: Sunil Vallamkonda; Bottorff, Paul; Dave Dolson; sfc@ietf.org
> Subject: Re: [sfc] SFC Metadata: Comments regarding=20
> draft-vallamkonda-sfc-metadata-model-00.txt
>
> I think you are mixing two concepts.
> There is vendor metadata and standardized metadata.
>
> I do not think anything in the framework I have seen will make vendor=20
> metadata interoperate without coordination between vendors.
>
> And as far as I can tell, there is nothing needed from the framework=20
> to make standard metadata interoperate.
>
> That leaves the corner case of experimental or developmental metadata.
> Experiments almost always need coordiantion.
>
> If we are talking about MD-2, it seems to me that SF and SFF will=20
> simply ignore any metadata that they do not understand.  In the common=20
> case, SFF will ignore all metadata entirely.
>
> You have raised the question of what metadata shoudl go on packets=20
> originated by service functions.  This seems to be a complex question,=20
> that is not helped by the framework.  As far as I can tell, I can see=20
> the following cases:
> 1) Metadata about the SF originating the packet.  This is common=20
> across all packets, and can be provided to the SF by control means in=20
> an opaque blob.
> 2) Metadata to be copied from a prompting packet.  This would seem to=20
> be provided by control as a list of type codes, with no need to=20
> understand semantics.
> 3) Metadata derived algorithmically from information available to the=20
> service function.  This is hard.  I do not see how the framework helps=20
> here at all.  Is it needed?
>
> Yours,
> Joel
>
> On 3/30/16 1:06 PM, Sunil Vallamkonda wrote:
>> When metadata is exchanged between SFFs, SFs, SFCs, it begs to the quest=
ions of interpretations. Without a framework for opaque metadata, the ambig=
uity between vendor products in service chain makes it incompatible unless =
the resolution is hardcoded across of releases and platforms, and vendor sp=
ecific information encoded.  The flexibility and ability for metadata to be=
 interoperable and scale are benefits that are much needed for rapid deploy=
ments and adoption.
>>
>>
>> Thanks,
>> Sunil
>>
>> -----Original Message-----
>> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
>> Sent: Wednesday, March 30, 2016 9:46 AM
>> To: Bottorff, Paul <paul.bottorff@hpe.com>; Dave Dolson=20
>> <ddolson@sandvine.com>; Sunil Vallamkonda <sunilvk@f5.com>;=20
>> sfc@ietf.org
>> Subject: Re: [sfc] SFC Metadata: Comments regarding=20
>> draft-vallamkonda-sfc-metadata-model-00.txt
>>
>> I don't see why we would specify which metadata is of interest to a spec=
ific SF.  It is up to the SF what it is interested in, not up to service ch=
aining to control that.
>> As for preserving forwarding addresses, while I see value in doing so fo=
r some transports, I don't see how SFC can mandate that since it is a trans=
port dependent behavior.
>>
>> Yours,
>> Joel
>>
>> On 3/30/16 12:31 PM, Bottorff, Paul wrote:
>>> Hi Dave and Joel:
>>>
>>> IMHO the most important thing to standardize is how an SFs couple to a =
chain. We are already implying that it would be desirable for SFs to pass b=
oth chain forwarding addresses and meta-data from ingress to egress (proxy =
forwarding always comes with a cost), however this alone does not provide e=
nough guidance for SF network interfacing. We also have issues like how for=
warding reversals are indicated at L4-Higher SFs and what meta-data is opaq=
ue and what is for SF consumption.
>>>
>>> Cheers,
>>>
>>> Paul
>>>
>>> -----Original Message-----
>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
>>> Sent: Tuesday, March 29, 2016 7:30 PM
>>> To: Joel Halpern Direct <jmh.direct@joelhalpern.com>; Sunil=20
>>> Vallamkonda <sunilvk@f5.com>; Joel M. Halpern <jmh@joelhalpern.com>;=20
>>> sfc@ietf.org
>>> Subject: Re: [sfc] SFC Metadata: Comments regarding=20
>>> draft-vallamkonda-sfc-metadata-model-00.txt
>>>
>>> Joel,
>>> Consider a Service Function that needs to inject a packet, such as=20
>>> articulated in https://tools.ietf.org/html/draft-penno-sfc-packet-02
>>> The question arises, what metadata should be put in the NSH header of a=
n injected packet?
>>>
>>> Without some kind of rigorous description of a type of metadata, I don'=
t know how to program the Service Function to do it properly.
>>>
>>> The alternative is to hard-code each service function with the supporte=
d types of metadata.
>>> This wouldn't allow a function to handle metadata it wasn't programmed =
for.
>>>
>>>
>>> So unless there is some easier way of understanding this, there seems t=
o be a gap in specifying Service Function behaviour.
>>> This is one thing we're trying to figure out.
>>>
>>>
>>> -Dave
>>>
>>>
>>>
>>> -----Original Message-----
>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel Halpern=20
>>> Direct
>>> Sent: Tuesday, March 29, 2016 7:37 PM
>>> To: Sunil Vallamkonda; Joel M. Halpern; sfc@ietf.org
>>> Subject: Re: [sfc] SFC Metadata: Comments regarding=20
>>> draft-vallamkonda-sfc-metadata-model-00.txt
>>>
>>> It may help to see some use cases.
>>>
>>> But it sounds, at best, like a specific control plane solution to some =
set of problems.
>>> Specific control plane solutions, as distinct from descriptions of requ=
irements, are out of scope for the working group.
>>>
>>> Yours,
>>> Joel
>>>
>>> On 3/29/16 7:32 PM, Sunil Vallamkonda wrote:
>>>> The focus is ability for vendor compatibility and extensibility in SF =
eco-system without hardcoding and human guessing.
>>>> The categorization and rest may or may not be a fallout of this.  With=
out such a framework, it makes interpretations harder across implementation=
s. This would be normal case rather than exception, IMHO. The goal is not t=
o standardize any vendor data, but provide a framework to promote vendor co=
mpatibility and extensibility across systems.  As a clarification we can wa=
lk through use cases to understand the benefits.
>>>>
>>>>
>>>> Thank you,
>>>> Sunil.
>>>>
>>>> -----Original Message-----
>>>> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
>>>> Sent: Tuesday, March 29, 2016 4:20 PM
>>>> To: Sunil Vallamkonda <sunilvk@f5.com>; sfc@ietf.org
>>>> Subject: Re: [sfc] SFC Metadata: Comments regarding=20
>>>> draft-vallamkonda-sfc-metadata-model-00.txt
>>>>
>>>> I am sorry.  I don't see the value in this.
>>>>
>>>> Trying to categorize metadata does not seem to help anything.
>>>> Trying to standardize a descriptive langauge for metadata seems to imp=
ly something that can consume such a language.  I can not imagine anything =
that can usefully consume this.
>>>>
>>>> I can understand how a human being would use a registry (which we have=
 to have) to know what T codes are defined, and where to find descriptions =
of their meaning.
>>>> But that meaning description is going to be in English.  A file that t=
ells me that value 17 is the Dragaeran Corporate type code for Houses does =
not tell me anything.
>>>>
>>>> The only corner case for the YANG is if my system has some understandi=
ng of the semantics of various pieces of metadata, but wants to know what c=
ode is associated with a particular usage.
>>>> The problem is that we have mutliple different protocols that may want=
 to provide that information, so all that SFC can define is that the contro=
l system must include a way to provide that information.
>>>>
>>>> Given that much of the metadata is not vendor specific, the structure =
seems very odd.
>>>> ANd it seems likely that any vendor specific metadata will need the se=
mantics to already be known, since we can not standardize that.
>>>>
>>>> Yours in puzzlement,
>>>> Joel
>>>>
>>>> On 3/29/16 6:33 PM, Sunil Vallamkonda wrote:
>>>>> Metadata is a vital element of SFC and thus NFV.
>>>>>
>>>>> Additionally,  interoperability and vendor support challenges need=20
>>>>> to be addressed in a scalable and adaptable way for rapid deployment.
>>>>>
>>>>> In January we uploaded draft-vallamkonda-sfc-metadata-model-00,
>>>>> which proposes terminology for talking about metadata in an extensibl=
e fashion.
>>>>>
>>>>> If there are no objections, we'd like to start pushing this=20
>>>>> terminology into drafts about NSH and the control-plane.
>>>>>
>>>>> Please let us know what you think.
>>>>>
>>>>> Thank you,
>>>>>
>>>>> Sunil.
>>>>>
>>>>> =3D=3D
>>>>>
>>>>> A new version of I-D, draft-vallamkonda-sfc-metadata-model-00.txt
>>>>>
>>>>> has been successfully submitted by Sunil Vallamkonda and posted to=20
>>>>> the IETF repository.
>>>>>
>>>>> Name:                 draft-vallamkonda-sfc-metadata-model
>>>>>
>>>>> Revision:            00
>>>>>
>>>>> Title:                    Information Model for SFC Metadata
>>>>>
>>>>> Document date:              2016-01-28
>>>>>
>>>>> Group:                Individual Submission
>>>>>
>>>>> Pages:                 9
>>>>>
>>>>> URL:
>>>>> https://www.ietf.org/internet-drafts/draft-vallamkonda-sfc-metadat
>>>>> a-
>>>>> m
>>>>> o
>>>>> del-00.txt
>>>>>
>>>>> Status:
>>>>> https://datatracker.ietf.org/doc/draft-vallamkonda-sfc-metadata-mo
>>>>> de
>>>>> l
>>>>> /
>>>>>
>>>>> Htmlized:
>>>>> https://tools.ietf.org/html/draft-vallamkonda-sfc-metadata-model-0
>>>>> 0
>>>>>
>>>>> Abstract:
>>>>>
>>>>>         Various types of metadata are applicable to Service=20
>>>>> Function Chaining
>>>>>
>>>>>         (SFC).  A Service Function (SF) needs information about=20
>>>>> all metadata
>>>>>
>>>>>         passing through it.  The metadata could be used to convey
>>>>>
>>>>>         preprocessing information about the packet by other nodes=20
>>>>> and an SF
>>>>>
>>>>>         can attach post processing information as deemed necessary.
>>>>>
>>>>>         The purpose of this document is to rigorously define the=20
>>>>> classes of
>>>>>
>>>>>         metadata and provide a vocabulary and information model for m=
etadata.
>>>>>
>>>>>         Each item of metadata refers to a subject, examples of=20
>>>>> which are IP
>>>>>
>>>>>         endpoint, flow or individual packet.
>>>>>
>>>>> Please note that it may take a couple of minutes from the time of=20
>>>>> submission until the htmlized version and diff are available at=20
>>>>> tools.ietf.org.
>>>>>
>>>>> The IETF Secretariat
>>>>>
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Sun Apr  3 16:19:31 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ADEB212D17E for <sfc@ietfa.amsl.com>; Sun,  3 Apr 2016 16:19:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 73oZKxfLrocE for <sfc@ietfa.amsl.com>; Sun,  3 Apr 2016 16:19:26 -0700 (PDT)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) by ietfa.amsl.com (Postfix) with ESMTP id 5742C12D0DE for <sfc@ietf.org>; Sun,  3 Apr 2016 16:19:26 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by wtl-exchp-1.sandvine.com ([::1]) with mapi id 14.03.0195.001; Sun, 3 Apr 2016 19:19:25 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "Elzur, Uri" <uri.elzur@intel.com>, Sunil Vallamkonda <sunilvk@f5.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "Bottorff, Paul" <paul.bottorff@hpe.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] SFC Metadata: Comments regarding draft-vallamkonda-sfc-metadata-model-00.txt
Thread-Index: AdGJ9+sCFkM+vCX4TPSmWI6TIKwl2QAOw8gAAAB1HwAAACPDAAAD636gAB+Hd4AAAH6DAAAAtJoAAAC7dQAACBKFAP//x2sAgAACVwCAA3Y7gP/9HGug
Date: Sun, 3 Apr 2016 23:19:23 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830EFFC53@wtl-exchp-2.sandvine.com>
References: <f30a2d02487a4945b87869ac7d34cd0d@SEAEXCHMBX06.olympus.F5Net.com> <56FB0D84.9050602@joelhalpern.com> <ec4b483426a34789b10227671c83b13b@SEAEXCHMBX06.olympus.F5Net.com> <56FB1186.7070807@joelhalpern.com> <E8355113905631478EFF04F5AA706E9830EF2BAA@wtl-exchp-2.sandvine.com> <TU4PR84MB01597DDE9CF78A2C0C97139CFE980@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <56FC02BC.8060203@joelhalpern.com> <880ca7e35d334ab48898aa4c78984ac1@SEAEXCHMBX06.olympus.F5Net.com> <56FC0C62.1050200@joelhalpern.com> <E8355113905631478EFF04F5AA706E9830EF69C6@wtl-exchp-2.sandvine.com> <56FC1318.6070703@joelhalpern.com> <fe112a5133844f43b66ac28bfee50b3a@SEAEXCHMBX06.olympus.F5Net.com> <7E05C330D7FD6D4FAD0728C46B8995858932536C@ORSMSX114.amr.corp.intel.com>
In-Reply-To: <7E05C330D7FD6D4FAD0728C46B8995858932536C@ORSMSX114.amr.corp.intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [190.111.246.156]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/2YvBakDgJ_hjY-BGvgWdcTTUDIs>
Subject: Re: [sfc] SFC Metadata: Comments regarding draft-vallamkonda-sfc-metadata-model-00.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Apr 2016 23:19:29 -0000

On a related note, draft-penno-sfc-packet discusses how to inject
packets, with a section on metadata. I have proposed the following
replacement section 7, adding these specific classes of metadata,
with examples:
1- Service-Path-Invariant Metadata
2- Service-Path-Default Metadata
3- Bidirectional Clonable Metadata
4- Unidirectional Clonable Metadata-=20
5- Service-Function-Mastered Metadata
6- Metadata from Reclassification

I believe draft-vallamkonda-sfc-metadata-model is useful in modeling
metadata.

Proposal for draft-penno-sfc-packet:
-----------------------------
7.  Metadata

   A crucial consideration when generating a packet is which metadata
   should be included in the context headers.  In some scenarios if the
   metadata is not present the packet will not reach its intended
   destination.  Although one could think of many different ways to
   convey this information, we believe the solution should be simple and
   require little or no new Service Function functionality.

   We assume that a Service Function normally needs to know the
   semantics of the context headers in order to perform its functions.
   But clearly knowing the semantics of the metadata is not enough.  The
   issue is that although the SF knows the semantics of the metadata
   when it receives a packet, it might not be able to generate or
   retrieve the correct metadata values to insert in the context headers
   when generating a packet.  It is usually the classifier that inserts
   the initial metadata in the context headers.

7.1.  Service-Path-Invariant Metadata
=09
   In order to solve this problem we propose the notion of service-path-
   invariant metadata.  This is metadata that is the same for all
   packets traversing a certain path.  For example, if all packets
   exiting a service-path need to be routed to a certain VPN, the VPN id
   would be a path-invariant metadata.

   To implement this, the controller needs to configure appropriate
   fixed values of the metadata present in the context headers for each
   path identifier in each Service Function that needs to inject
   packets.  The Service Function must store this information so that
   when the Service Function generates a packet it can insert the
   minimum required metadata for a packet to reach its destination.

   A disadvantage to path-invariant metadata is that it is a type of
   metadata that adds no information beyond the information available in
   the path identifier itself.  The corollary is that if different
   metadata is required, a different service paths must be created.

7.2.  Service-Path-Default Metadata

   We also propose the notion of service-path-default metadata.  This is
   metadata that could vary for different packets on a path but has a
   default value acceptable for any packet injected onto a certain path.
   For example, metadata might indicate a quality-of-service (QoS)
   treatment, and an operator considers it acceptable for injected
   packets to have a default QoS treatment.  It might also be considered
   acceptable to not send a particular type of metadata.

   To implement this, the controller configures appropriate default
   metadata values for each path identifier in Service Functions that
   need to inject packets.  The controller may also indicate a
   particular type may be omitted.  The Service Function must store this
   information so that it can insert the minimum required metadata for a
   packet to reach its destination.

   The disadvantage of this approach is that it relies on the assumption
   that there is a meaningful default metadata value, which may not
   exist.

7.3.  Bidirectional Clonable Metadata

   Some types of metadata may use values applicable to both directions
   of traffic.  An example is routing domain, for which an identifier
   indicates a private network such that the value is the same for both
   directions of traffic and may be copied from one packet to another.

   To implement this, the controller must indicate to each Service
   Function that a particular metadata type is bidirectional-clonable.
   The Service Function can therefore clone the metadata value from one
   packet to a new packet that it creates, even in the reverse
   direction.  For this type, it is also considered safe to save a copy
   of metadata for the transport flow.  (E.g., to retransmit a TCP
   packet using metadata cloned from another TCP packet of the same
   connection.)

   Note that the Service Function need not know the meaning of the
   metadata; it just needs to know it is safe to clone in this manner.

7.4.  Unidirectional Clonable Metadata

   Some types of metadata may use values applicable to only one
   direction of traffic, but a value may be cloned from one packet to
   another in the same direction.  An example is a destination
   identifier, in which meatadata indicates a network egress point.
   Another example is metadata indicating a property of either the
   source or destination end-point of the packet.

   To implement this, the controller must indicate to each Service
   Function that a particular metadata type is unidirectional-clonable.
   A transport-layer-stateful Service Function can therefore save away
   metadata values that it has witnessed.  An injected packet can
   therefore be assigned a clone of metadata taken from an earlier
   packet going in the same direction.  For example, a Service Function
   can send a TCP packet using metadata cloned from another TCP packet
   of the same connection and direction.

   Note that the Service Function need not know the meaning of the
   metadata; it just needs to know it is safe to clone in this manner.

   A disadvantage of unidirectional clonable metadata is that a device
   cannot respond to a packet unless it has previously witnessed a
   packet for the same connection in the opposite direction.  For
   example, a firewall cannot respond to the first packet of a
   connection (since both directions have not been witnessed).  However,
   having seen a full hand-shake, a cache or optimizing proxy can inject
   or retransmit packets.

7.5.  Service-Function-Mastered Metadata

   The easiest case to reason about is a type of metadata for which the
   Service Function can provide the appropriate values: specifically the
   metadata that it would be responsible for inserting for all packets
   as part of packet processing.  We can assume this is configured by
   Service-Function-Specific methods.

7.6.  Metadata from Reclassification

   Finally, if the packet needs crucial metadata values that cannot be
   supplied by the methods above then a reclassification is needed.
   This reclassification would need to be done by the classifier that
   would normally process packets in the reverse path or a SFF that had
   the same rules and capabilities.  Ideally the first SFF that
   processes the generated packet.



-----Original Message-----
From: Elzur, Uri [mailto:uri.elzur@intel.com]=20
Sent: Friday, April 01, 2016 7:56 PM
To: Sunil Vallamkonda; Joel M. Halpern; Dave Dolson; Bottorff, Paul; sfc@ie=
tf.org
Subject: RE: [sfc] SFC Metadata: Comments regarding draft-vallamkonda-sfc-m=
etadata-model-00.txt

Sunil

To advance your point, it may be of advantage, IMHO, if you provide a concr=
ete example of what metadata can be shared, and requires interoperability a=
mong vendors, in a specific example e.g. FW LB NAT (or choose your favorite=
). Notice some proposed directions in your draft.

The thread reads very theoretical and suggests limited value for inter vend=
or interaction. Seems like you wish to counter it. A specific example may h=
elp bring the conversation down to ground level.=20

Thx

Uri ("Oo-Ree")
C: 949-378-7568

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Sunil Vallamkonda
Sent: Wednesday, March 30, 2016 11:04 AM
To: Joel M. Halpern <jmh@joelhalpern.com>; Dave Dolson <ddolson@sandvine.co=
m>; Bottorff, Paul <paul.bottorff@hpe.com>; sfc@ietf.org
Subject: Re: [sfc] SFC Metadata: Comments regarding draft-vallamkonda-sfc-m=
etadata-model-00.txt

Joel,

Good point, we are not trying to enumerate all the possible algorithmic beh=
aviors.
Yes, the proposal addresses both vendor and standardized metadata, where la=
tter could be a flavor of former.
In below MD-2, ignoring all metadata is a simple implementation, though wit=
h limited capabilities. However in all elements the sender and receiver nee=
d to co-ordinate metadata in a dynamic and scalable way to take intelligent=
 actions.=20

Re: #1: Is there a definite limitation in framework for metadata to be same=
 for all packets ? It should not limit or mandate either way.
Re: #2: If there is no need for receiver to understand the semantics across=
 vendors and products and releases, I do not believe  it would be a scalabl=
e solution. The code semantics and actions need to be aware by elements for=
 metadata, without which we might well use only 'reserved' part of header o=
r just treat MD-2 as a 'reserved' header itself, IMHO.

Again to clarify, the intent and focus is have the ability to understand an=
d extend metadata semantics for deployment. The goal is not to enumerate ev=
ery possible situation but to provide semantics to customize and support al=
gorithmic and other situations as individual case may be.

=20
Thanks,
Sunil

-----Original Message-----
From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
Sent: Wednesday, March 30, 2016 10:56 AM
To: Dave Dolson <ddolson@sandvine.com>; Sunil Vallamkonda <sunilvk@f5.com>;=
 Bottorff, Paul <paul.bottorff@hpe.com>; sfc@ietf.org
Subject: Re: [sfc] SFC Metadata: Comments regarding draft-vallamkonda-sfc-m=
etadata-model-00.txt

In terms of copied information, control tells the SF what to copy.  It does=
 not matter what the granularity is.

Given that "flow" does not have a consistent meaning (sometimes it means 5-=
tuple, sometimes it means other things) trying to define control instructio=
ns at other granularities than packet gets us into algorithmic behaviors.  =
And I do not think we want to try to enumerate all of the "supported" algor=
ithmic behaviors.

Similarly, if the information is not the same as that from the prompting pa=
cket, we are again finding ourselves getting into algorithmic instructions =
(maybe you complement this field, or add 100 to that field, or bounce the t=
hird field off the roof.)

If we neeed algorithmic behavior, it seems to me that the SF has to know wh=
at it is doing.  It can not rely on control to tell it.  Yes, this places s=
ome limits on generality of inserting metadata in produced packets.  I woul=
d be interested in improvement, but I have not seen one.

Yours,
Joel

On 3/30/16 1:47 PM, Dave Dolson wrote:
> Joel,
> I'd like to examine this point of yours:
>> 2) Metadata to be copied from a prompting packet.  This would seem to=20
>> be provided by control as a list of type codes, with no need to=20
>> understand semantics.
>
> Yes, I think control should provide information about different type code=
s.
> But we believe there *is* some requirement to understand certain semantic=
s.
> E.g.,
> - is the metadata about the packet, about the flow or about the source or=
 destination end-point?
> - is the metadata important enough to add to new packets, or is it option=
al?
> - is the metadata direction-specific, or can the value be cloned from a r=
equest to a response?
>
> If we don't address different types of semantics, I think we need to=20
> agree there is only one type that works in all cases, or that certain=20
> types should not be used in an opaque manner, or that certain types shoul=
d not be used with service functions that need to inject packets.
>
>
> Personally, I think that per-packet opaque metadata is problematic and pr=
obably to be avoided.
> E.g., a metadata that is checksum of the packet.
> If this is opaque to a function, the function may modify the packet or=20
> clone the metadata from one packet to another without being able to updat=
e it.
>
> -Dave
>
>
> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Wednesday, March 30, 2016 1:27 PM
> To: Sunil Vallamkonda; Bottorff, Paul; Dave Dolson; sfc@ietf.org
> Subject: Re: [sfc] SFC Metadata: Comments regarding=20
> draft-vallamkonda-sfc-metadata-model-00.txt
>
> I think you are mixing two concepts.
> There is vendor metadata and standardized metadata.
>
> I do not think anything in the framework I have seen will make vendor=20
> metadata interoperate without coordination between vendors.
>
> And as far as I can tell, there is nothing needed from the framework=20
> to make standard metadata interoperate.
>
> That leaves the corner case of experimental or developmental metadata.
> Experiments almost always need coordiantion.
>
> If we are talking about MD-2, it seems to me that SF and SFF will=20
> simply ignore any metadata that they do not understand.  In the common=20
> case, SFF will ignore all metadata entirely.
>
> You have raised the question of what metadata shoudl go on packets=20
> originated by service functions.  This seems to be a complex question,=20
> that is not helped by the framework.  As far as I can tell, I can see=20
> the following cases:
> 1) Metadata about the SF originating the packet.  This is common=20
> across all packets, and can be provided to the SF by control means in=20
> an opaque blob.
> 2) Metadata to be copied from a prompting packet.  This would seem to=20
> be provided by control as a list of type codes, with no need to=20
> understand semantics.
> 3) Metadata derived algorithmically from information available to the=20
> service function.  This is hard.  I do not see how the framework helps=20
> here at all.  Is it needed?
>
> Yours,
> Joel
>
> On 3/30/16 1:06 PM, Sunil Vallamkonda wrote:
>> When metadata is exchanged between SFFs, SFs, SFCs, it begs to the quest=
ions of interpretations. Without a framework for opaque metadata, the ambig=
uity between vendor products in service chain makes it incompatible unless =
the resolution is hardcoded across of releases and platforms, and vendor sp=
ecific information encoded.  The flexibility and ability for metadata to be=
 interoperable and scale are benefits that are much needed for rapid deploy=
ments and adoption.
>>
>>
>> Thanks,
>> Sunil
>>
>> -----Original Message-----
>> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
>> Sent: Wednesday, March 30, 2016 9:46 AM
>> To: Bottorff, Paul <paul.bottorff@hpe.com>; Dave Dolson=20
>> <ddolson@sandvine.com>; Sunil Vallamkonda <sunilvk@f5.com>;=20
>> sfc@ietf.org
>> Subject: Re: [sfc] SFC Metadata: Comments regarding=20
>> draft-vallamkonda-sfc-metadata-model-00.txt
>>
>> I don't see why we would specify which metadata is of interest to a spec=
ific SF.  It is up to the SF what it is interested in, not up to service ch=
aining to control that.
>> As for preserving forwarding addresses, while I see value in doing so fo=
r some transports, I don't see how SFC can mandate that since it is a trans=
port dependent behavior.
>>
>> Yours,
>> Joel
>>
>> On 3/30/16 12:31 PM, Bottorff, Paul wrote:
>>> Hi Dave and Joel:
>>>
>>> IMHO the most important thing to standardize is how an SFs couple to a =
chain. We are already implying that it would be desirable for SFs to pass b=
oth chain forwarding addresses and meta-data from ingress to egress (proxy =
forwarding always comes with a cost), however this alone does not provide e=
nough guidance for SF network interfacing. We also have issues like how for=
warding reversals are indicated at L4-Higher SFs and what meta-data is opaq=
ue and what is for SF consumption.
>>>
>>> Cheers,
>>>
>>> Paul
>>>
>>> -----Original Message-----
>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
>>> Sent: Tuesday, March 29, 2016 7:30 PM
>>> To: Joel Halpern Direct <jmh.direct@joelhalpern.com>; Sunil=20
>>> Vallamkonda <sunilvk@f5.com>; Joel M. Halpern <jmh@joelhalpern.com>;=20
>>> sfc@ietf.org
>>> Subject: Re: [sfc] SFC Metadata: Comments regarding=20
>>> draft-vallamkonda-sfc-metadata-model-00.txt
>>>
>>> Joel,
>>> Consider a Service Function that needs to inject a packet, such as=20
>>> articulated in https://tools.ietf.org/html/draft-penno-sfc-packet-02
>>> The question arises, what metadata should be put in the NSH header of a=
n injected packet?
>>>
>>> Without some kind of rigorous description of a type of metadata, I don'=
t know how to program the Service Function to do it properly.
>>>
>>> The alternative is to hard-code each service function with the supporte=
d types of metadata.
>>> This wouldn't allow a function to handle metadata it wasn't programmed =
for.
>>>
>>>
>>> So unless there is some easier way of understanding this, there seems t=
o be a gap in specifying Service Function behaviour.
>>> This is one thing we're trying to figure out.
>>>
>>>
>>> -Dave
>>>
>>>
>>>
>>> -----Original Message-----
>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel Halpern=20
>>> Direct
>>> Sent: Tuesday, March 29, 2016 7:37 PM
>>> To: Sunil Vallamkonda; Joel M. Halpern; sfc@ietf.org
>>> Subject: Re: [sfc] SFC Metadata: Comments regarding=20
>>> draft-vallamkonda-sfc-metadata-model-00.txt
>>>
>>> It may help to see some use cases.
>>>
>>> But it sounds, at best, like a specific control plane solution to some =
set of problems.
>>> Specific control plane solutions, as distinct from descriptions of requ=
irements, are out of scope for the working group.
>>>
>>> Yours,
>>> Joel
>>>
>>> On 3/29/16 7:32 PM, Sunil Vallamkonda wrote:
>>>> The focus is ability for vendor compatibility and extensibility in SF =
eco-system without hardcoding and human guessing.
>>>> The categorization and rest may or may not be a fallout of this.  With=
out such a framework, it makes interpretations harder across implementation=
s. This would be normal case rather than exception, IMHO. The goal is not t=
o standardize any vendor data, but provide a framework to promote vendor co=
mpatibility and extensibility across systems.  As a clarification we can wa=
lk through use cases to understand the benefits.
>>>>
>>>>
>>>> Thank you,
>>>> Sunil.
>>>>
>>>> -----Original Message-----
>>>> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
>>>> Sent: Tuesday, March 29, 2016 4:20 PM
>>>> To: Sunil Vallamkonda <sunilvk@f5.com>; sfc@ietf.org
>>>> Subject: Re: [sfc] SFC Metadata: Comments regarding=20
>>>> draft-vallamkonda-sfc-metadata-model-00.txt
>>>>
>>>> I am sorry.  I don't see the value in this.
>>>>
>>>> Trying to categorize metadata does not seem to help anything.
>>>> Trying to standardize a descriptive langauge for metadata seems to imp=
ly something that can consume such a language.  I can not imagine anything =
that can usefully consume this.
>>>>
>>>> I can understand how a human being would use a registry (which we have=
 to have) to know what T codes are defined, and where to find descriptions =
of their meaning.
>>>> But that meaning description is going to be in English.  A file that t=
ells me that value 17 is the Dragaeran Corporate type code for Houses does =
not tell me anything.
>>>>
>>>> The only corner case for the YANG is if my system has some understandi=
ng of the semantics of various pieces of metadata, but wants to know what c=
ode is associated with a particular usage.
>>>> The problem is that we have mutliple different protocols that may want=
 to provide that information, so all that SFC can define is that the contro=
l system must include a way to provide that information.
>>>>
>>>> Given that much of the metadata is not vendor specific, the structure =
seems very odd.
>>>> ANd it seems likely that any vendor specific metadata will need the se=
mantics to already be known, since we can not standardize that.
>>>>
>>>> Yours in puzzlement,
>>>> Joel
>>>>
>>>> On 3/29/16 6:33 PM, Sunil Vallamkonda wrote:
>>>>> Metadata is a vital element of SFC and thus NFV.
>>>>>
>>>>> Additionally,  interoperability and vendor support challenges need=20
>>>>> to be addressed in a scalable and adaptable way for rapid deployment.
>>>>>
>>>>> In January we uploaded draft-vallamkonda-sfc-metadata-model-00,
>>>>> which proposes terminology for talking about metadata in an extensibl=
e fashion.
>>>>>
>>>>> If there are no objections, we'd like to start pushing this=20
>>>>> terminology into drafts about NSH and the control-plane.
>>>>>
>>>>> Please let us know what you think.
>>>>>
>>>>> Thank you,
>>>>>
>>>>> Sunil.
>>>>>
>>>>> =3D=3D
>>>>>
>>>>> A new version of I-D, draft-vallamkonda-sfc-metadata-model-00.txt
>>>>>
>>>>> has been successfully submitted by Sunil Vallamkonda and posted to=20
>>>>> the IETF repository.
>>>>>
>>>>> Name:                 draft-vallamkonda-sfc-metadata-model
>>>>>
>>>>> Revision:            00
>>>>>
>>>>> Title:                    Information Model for SFC Metadata
>>>>>
>>>>> Document date:              2016-01-28
>>>>>
>>>>> Group:                Individual Submission
>>>>>
>>>>> Pages:                 9
>>>>>
>>>>> URL:
>>>>> https://www.ietf.org/internet-drafts/draft-vallamkonda-sfc-metadat
>>>>> a-
>>>>> m
>>>>> o
>>>>> del-00.txt
>>>>>
>>>>> Status:
>>>>> https://datatracker.ietf.org/doc/draft-vallamkonda-sfc-metadata-mo
>>>>> de
>>>>> l
>>>>> /
>>>>>
>>>>> Htmlized:
>>>>> https://tools.ietf.org/html/draft-vallamkonda-sfc-metadata-model-0
>>>>> 0
>>>>>
>>>>> Abstract:
>>>>>
>>>>>         Various types of metadata are applicable to Service=20
>>>>> Function Chaining
>>>>>
>>>>>         (SFC).  A Service Function (SF) needs information about=20
>>>>> all metadata
>>>>>
>>>>>         passing through it.  The metadata could be used to convey
>>>>>
>>>>>         preprocessing information about the packet by other nodes=20
>>>>> and an SF
>>>>>
>>>>>         can attach post processing information as deemed necessary.
>>>>>
>>>>>         The purpose of this document is to rigorously define the=20
>>>>> classes of
>>>>>
>>>>>         metadata and provide a vocabulary and information model for m=
etadata.
>>>>>
>>>>>         Each item of metadata refers to a subject, examples of=20
>>>>> which are IP
>>>>>
>>>>>         endpoint, flow or individual packet.
>>>>>
>>>>> Please note that it may take a couple of minutes from the time of=20
>>>>> submission until the htmlized version and diff are available at=20
>>>>> tools.ietf.org.
>>>>>
>>>>> The IETF Secretariat
>>>>>
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Mon Apr  4 08:00:14 2016
Return-Path: <daniel.migault@ericsson.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7BD8D12D7AA for <sfc@ietfa.amsl.com>; Mon,  4 Apr 2016 07:59:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.191
X-Spam-Level: 
X-Spam-Status: No, score=-4.191 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NpPaP11vO0gD for <sfc@ietfa.amsl.com>; Mon,  4 Apr 2016 07:59:46 -0700 (PDT)
Received: from usplmg21.ericsson.net (usplmg21.ericsson.net [198.24.6.65]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CA16B12D7C9 for <sfc@ietf.org>; Mon,  4 Apr 2016 07:58:47 -0700 (PDT)
X-AuditID: c6180641-f79fa6d0000057a9-c7-57028101ba1a
Received: from EUSAAHC003.ericsson.se (Unknown_Domain [147.117.188.81]) by usplmg21.ericsson.net (Symantec Mail Security) with SMTP id 17.DD.22441.10182075; Mon,  4 Apr 2016 16:58:09 +0200 (CEST)
Received: from EUSAAMB107.ericsson.se ([147.117.188.124]) by EUSAAHC003.ericsson.se ([147.117.188.81]) with mapi id 14.03.0248.002; Mon, 4 Apr 2016 10:58:45 -0400
From: Daniel Migault <daniel.migault@ericsson.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: New Version Notification for draft-mglt-sfc-security-environment-req-01.txt
Thread-Index: AQHRjnsqrfEUvmWtq06JyrlQ7ydOJJ952XBw
Date: Mon, 4 Apr 2016 14:58:43 +0000
Message-ID: <2DD56D786E600F45AC6BDE7DA4E8A8C11223EA52@eusaamb107.ericsson.se>
References: <20160404140616.15654.90886.idtracker@ietfa.amsl.com>
In-Reply-To: <20160404140616.15654.90886.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [147.117.188.11]
Content-Type: multipart/alternative; boundary="_000_2DD56D786E600F45AC6BDE7DA4E8A8C11223EA52eusaamb107erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprEIsWRmVeSWpSXmKPExsUyuXRPoC5jI1O4walb5hYXO+eyWTx5sJXd gcnjx7/vbB5LlvxkCmCK4rJJSc3JLEst0rdL4Mp4u3YtS8Gpgoq7a/kaGI/kdjFyckgImEgs bu9mhLDFJC7cW8/WxcjFISRwlFGia1Y/C4SzjFHi6PdGdpAqNgEjibZD/WC2iICixLmXE1hA bGYBd4mN/2+xgdjCAlESd9rWsUHUREu8OdTJBGEbSaz+eQwsziKgIjHl4k6wXl4BX4kf02aD xYUEHCXmzpwDVs8p4CTxcPYdsDgj0HXfT61hgtglLnHryXwmiKsFJJbsOc8MYYtKvHz8jxXC VpL4+Hs+O0R9vkTH189QuwQlTs58wjKBUXQWklGzkJTNQlI2i5EDKK4psX6XPkSJosSU7ofs ELaGROucuezI4gsY2VcxcpQWF+TkphsZbmIExtQxCTbHHYx7ez0PMQpwMCrx8C44xRguxJpY VlyZe4hRgoNZSYT3Ux1TuBBvSmJlVWpRfnxRaU5q8SFGaQ4WJXFe78h/YUIC6YklqdmpqQWp RTBZJg5OqQZG9ZlswnM+9KqdlbLqSP7DJ3fA44PDsmex3oFcAW/3m85g1I+8eubf0T1SJqaP A25v91m0hWfHsdzAKNerFq2ubJ+PTrs2pa1r1odJKmvPFIleNLQIjX5T+vJXwBl75qwv5y1F 3pxd/Ouef+ycNWvCHzZd+NFzcuWv5VsZCqIzOlwbM0p8QiQ0lViKMxINtZiLihMBtQSylqUC AAA=
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/HdyKDJb02VKnpwoTyJQxjYSpOAA>
Cc: "sfc-sec-team@external.cisco.com" <sfc-sec-team@external.cisco.com>
Subject: [sfc] FW: New Version Notification for draft-mglt-sfc-security-environment-req-01.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Apr 2016 14:59:50 -0000

--_000_2DD56D786E600F45AC6BDE7DA4E8A8C11223EA52eusaamb107erics_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_2DD56D786E600F45AC6BDE7DA4E8A8C11223EA52eusaamb107erics_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_2DD56D786E600F45AC6BDE7DA4E8A8C11223EA52eusaamb107erics_--


From nobody Mon Apr  4 13:09:25 2016
Return-Path: <gregory.mirsky@ericsson.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2675D12D84B; Mon,  4 Apr 2016 13:09:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tvIqW5OuejUy; Mon,  4 Apr 2016 13:09:08 -0700 (PDT)
Received: from usplmg21.ericsson.net (usplmg21.ericsson.net [198.24.6.65]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3ECF212D867; Mon,  4 Apr 2016 13:09:08 -0700 (PDT)
X-AuditID: c6180641-f79fa6d0000057a9-4e-5702c9bdda88
Received: from EUSAAHC005.ericsson.se (Unknown_Domain [147.117.188.87]) by usplmg21.ericsson.net (Symantec Mail Security) with SMTP id EB.E0.22441.DB9C2075; Mon,  4 Apr 2016 22:08:30 +0200 (CEST)
Received: from EUSAAMB103.ericsson.se ([147.117.188.120]) by EUSAAHC005.ericsson.se ([147.117.188.87]) with mapi id 14.03.0248.002; Mon, 4 Apr 2016 16:09:06 -0400
From: Gregory Mirsky <gregory.mirsky@ericsson.com>
To: "BIER (bier@ietf.org)" <bier@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "nvo3@ietf.org" <nvo3@ietf.org>, "rtg-ooam-dt@ietf.org" <rtg-ooam-dt@ietf.org>, "rtgwg@ietf.org" <rtgwg@ietf.org>
Thread-Topic: Comments to OOAM Requirements draft from Ron Bonica
Thread-Index: AdGOoAAttrV3Hsn3QLugH0bP01WoGA==
Date: Mon, 4 Apr 2016 20:09:06 +0000
Message-ID: <7347100B5761DC41A166AC17F22DF11221A3CB8F@eusaamb103.ericsson.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [147.117.188.12]
Content-Type: multipart/mixed; boundary="_004_7347100B5761DC41A166AC17F22DF11221A3CB8Feusaamb103erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrBIsWRmVeSWpSXmKPExsUyuXRPuO6+k0zhBjsWcVksnbGHyeLpfEmL A98dLP617mW1uPDmN7PFkwdb2R3YPJYs+cnkcb3pKnsAUxSXTUpqTmZZapG+XQJXRtvmdpaC niamiq0vz7I0MJ74wdjFyMkhIWAi0Xz+DAuELSZx4d56ti5GLg4hgaOMEt87FzBBOMsYJf5+ 2sMEUsUmYCTxYmMPO0hCROAAo8SKvavYQBLMAvoSb5t/go0SFrCRuLW6FaxBRMBRYvK2s4wQ tp7Ej8sv2EFsFgEViS1n3wLZHBy8Ar4SK76ng4QZga74fmoNE8RIcYlbT+YzQVwnIvHw4mk2 CFtU4uXjf6wQtpLEnNfXmCHqMyWmdD8Dq+EVEJQ4OfMJywRG4VlIRs1CUjYLSRlEPF/i9oLV zBC2jsSC3Z/YIGxtiWULXzPD2GcOPGZCFecAssMk5myMhAh7SLy+8J9xFjCEmAUuM0q8//ET ao4i0N6H7AsYeVYxcpQWF+TkphsZbmIExvExCTbHHYx7ez0PMQpwMCrx8C44xRguxJpYVlyZ e4hRBaj10YbVFxilWPLy81KVRHh3H2UKF+JNSaysSi3Kjy8qzUktPsQozcGiJM7rHfkvTEgg PbEkNTs1tSC1CCbLxMEp1cBoEiPA/jm4Xz321Meu2p06d94w39988UqWau6/S7pzHRmEPdSn KRq5SV+YeSt4vYxdveODhJxjDbtFdxSm/5ZsMXlQyrWh5cAi3kWHl1rH1PUe6JqfftF66c10 9aS1Ozeqeh08dojH0+lr/UunmU1RZ/vk50Rsf+V/5tz07XJyDckqKwxXC21RYinOSDTUYi4q TgQAy/ZBD+sCAAA=
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/eXHHKv4LZSWh7ezZ95Os2_wy-YI>
Cc: "rbonica@juniper.net" <rbonica@juniper.net>
Subject: [sfc] Comments to OOAM Requirements draft from Ron Bonica
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Apr 2016 20:09:12 -0000

--_004_7347100B5761DC41A166AC17F22DF11221A3CB8Feusaamb103erics_
Content-Type: multipart/alternative;
	boundary="_000_7347100B5761DC41A166AC17F22DF11221A3CB8Feusaamb103erics_"

--_000_7347100B5761DC41A166AC17F22DF11221A3CB8Feusaamb103erics_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Dear All,
Ron reviewed the Overlay OAM Requirements<https://tools.ietf.org/html/draft=
-ooamdt-rtgwg-ooam-requirement-00> draft and shared his comments under RB> =
tag. The attached copy has my responses in under GIM> tag as well. We invit=
e members of BIER, NVO3, SCC and RTG WGs to join in the discussion. Appreci=
ate you review, comments on OOAM Requirements draft and OAM for Overlay Net=
works: Gap Analysis.

                Regards,
                                Greg

--_000_7347100B5761DC41A166AC17F22DF11221A3CB8Feusaamb103erics_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Dear All,<o:p></o:p></p>
<p class=3D"MsoNormal">Ron reviewed the <a href=3D"https://tools.ietf.org/h=
tml/draft-ooamdt-rtgwg-ooam-requirement-00">
Overlay OAM Requirements</a> draft and shared his comments under RB&gt; tag=
. The attached copy has my responses in under GIM&gt; tag as well. We invit=
e members of BIER, NVO3, SCC and RTG WGs to join in the discussion. Appreci=
ate you review, comments on OOAM Requirements
 draft and OAM for Overlay Networks: Gap Analysis.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Regards,<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Greg<o:p></o:p>=
</p>
</div>
</body>
</html>

--_000_7347100B5761DC41A166AC17F22DF11221A3CB8Feusaamb103erics_--

--_004_7347100B5761DC41A166AC17F22DF11221A3CB8Feusaamb103erics_
Content-Type: text/plain;
	name="draft-ooamdt-rtgwg-ooam-requirement-00-ron-greg.txt"
Content-Description: draft-ooamdt-rtgwg-ooam-requirement-00-ron-greg.txt
Content-Disposition: attachment;
	filename="draft-ooamdt-rtgwg-ooam-requirement-00-ron-greg.txt"; size=21115;
	creation-date="Sun, 03 Apr 2016 16:24:27 GMT";
	modification-date="Sun, 03 Apr 2016 16:38:57 GMT"
Content-Transfer-Encoding: base64
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--_004_7347100B5761DC41A166AC17F22DF11221A3CB8Feusaamb103erics_--


From nobody Tue Apr  5 06:37:57 2016
Return-Path: <ju1738@att.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B45EA12D724 for <sfc@ietfa.amsl.com>; Mon,  4 Apr 2016 16:20:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r308GVN1t1Uw for <sfc@ietfa.amsl.com>; Mon,  4 Apr 2016 16:20:03 -0700 (PDT)
Received: from mx0a-00191d01.pphosted.com (mx0a-00191d01.pphosted.com [67.231.149.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C66CC12D126 for <sfc@ietf.org>; Mon,  4 Apr 2016 16:20:02 -0700 (PDT)
Received: from pps.filterd (m0049287.ppops.net [127.0.0.1]) by m0049287.ppops.net-00191d01. (8.15.0.59/8.15.0.59) with SMTP id u34JhcxU022897; Mon, 4 Apr 2016 15:45:03 -0400
Received: from alpi155.enaf.aldc.att.com (sbcsmtp7.sbc.com [144.160.229.24]) by m0049287.ppops.net-00191d01. with ESMTP id 223wk1j1ss-1 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);  Mon, 04 Apr 2016 15:45:01 -0400
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id u34JiupY023792; Mon, 4 Apr 2016 15:44:58 -0400
Received: from mlpi407.sfdc.sbc.com (mlpi407.sfdc.sbc.com [130.9.128.239]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id u34Jikc1023632 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 4 Apr 2016 15:44:50 -0400
Received: from MISOUT7MSGHUBAA.ITServices.sbc.com (MISOUT7MSGHUBAA.itservices.sbc.com [130.9.129.145]) by mlpi407.sfdc.sbc.com (RSA Interceptor); Mon, 4 Apr 2016 19:44:33 GMT
Received: from MISOUT7MSGUSRCD.ITServices.sbc.com ([169.254.4.181]) by MISOUT7MSGHUBAA.ITServices.sbc.com ([130.9.129.145]) with mapi id 14.03.0248.002; Mon, 4 Apr 2016 15:44:33 -0400
From: "UTTARO, JAMES" <ju1738@att.com>
To: Xuxiaohu <xuxiaohu@huawei.com>, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Thread-Topic: [sfc] [GRAYMAIL] Re: Adding an NSH.next-header type of NSH
Thread-Index: AQHRgGIWkanorO4w3UWxkHFtF58Aq59dP1yAgAF9ZiCABNXngIABJ6ZAgABDfACAAU4y8IAUAxgg
Date: Mon, 4 Apr 2016 19:44:32 +0000
Message-ID: <B17A6910EEDD1F45980687268941550F135EF925@MISOUT7MSGUSRCD.ITServices.sbc.com>
References: <E8355113905631478EFF04F5AA706E9830EC999B@wtl-exchp-2.sandvine.com> <56E68706.7090505@gmail.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D76CB4B@MBX021-W3-CA-2.exch021.domain.local> <TU4PR84MB0159958D81B6E6403AA5E589FE880@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <D30DA4B4.934A6%andrew.dolganow@alcatel-lucent.com> <B17A6910EEDD1F45980687268941550F135E305A@MISOUT7MSGUSRCD.ITServices.sbc.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D5331C8@NKGEML515-MBX.china.huawei.com> <E8355113905631478EFF04F5AA706E9830ED43D0@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D76DD42@MBX021-W3-CA-2.exch021.domain.local> <B17A6910EEDD1F45980687268941550F135E36D7@MISOUT7MSGUSRCD.ITServices.sbc.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D76EE8A@MBX021-W3-CA-2.exch021.domain.local> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D5337B6@NKGEML515-MBX.china.huawei.com> <B17A6910EEDD1F45980687268941550F135E3FB5@MISOUT7MSGUSRCD.ITServices.sbc.com> <56EACDC7.7060000@gmail.com> <56EACF91.6070703@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D533D68@NKGEML515-MBX.china.huawei.com> <D3159608.49136%jguichar@cisco.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D534964@NKGEML515-MBX.china.huawei.com> <EA4174BD-7054-47F1-8A74-B8E6E04A8246@cisco.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D534D9F@NKGEML515-MBX.china.huawei.com>
In-Reply-To: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D534D9F@NKGEML515-MBX.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.70.207.74]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-RSA-Inspected: yes
X-RSA-Classifications: DAM Allow Patterns, public
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2016-04-04_08:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1601100000 definitions=main-1604040283
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/AYiwUa7haqHMshOHJx9XLsstkpw>
X-Mailman-Approved-At: Tue, 05 Apr 2016 06:37:53 -0700
Cc: Ron Parker <Ron_Parker@affirmednetworks.com>, "sfc@ietf.org" <sfc@ietf.org>, "EXT Bottorff,  Paul" <paul.bottorff@hpe.com>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, "Dolganow, Andrew \(Nokia - SG\)" <andrew.dolganow@nokia.com>, "ao.ting@zte.com.cn" <ao.ting@zte.com.cn>, Stewart Bryant <stewart.bryant@gmail.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Dave Dolson <ddolson@sandvine.com>
Subject: Re: [sfc] [GRAYMAIL] Re: Adding an NSH.next-header type of NSH
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Apr 2016 23:20:06 -0000

U28sIEkgZm91bmQgdGltZSB0byByZWFkIHRoZSBOU0ggZHJhZnQgaW4gaXRzIGVudGlyZXR5LiBB
IGZldyBzdWdnZXN0aW9uczoNCg0KSWRlbnRpZnkgc3BlY2lmaWMgdXNlIGNhc2VzIHRoYXQgcmVx
dWlyZSBOU0ggU2VjIDIuMiBsaXN0cyA3IGJyb2FkIGFyZWFzIHRoYXQgYXJlIHRvbyBoaWdoIGxl
dmVsLiANCg0KIEV4YW1wbGVzDQoNCkJ1bGxldCAyICJTZXJ2aWNlIENoYWluIENvbnN0cnVjdGlv
biIgY2l0ZXMgdGhlIG5vdGlvbiB0aGF0IG1vc3QgY2hhaW5zIGFyZSBidWlsdCB0aHJvdWdoIG1h
bnVhbCBjb25maWcgd2hpY2ggaXMgc2xvdyBhbmQgZXJyb3IgcHJvbmUuIFdvdWxkIGEgcHJvY2Vz
cyB0aGF0IHJlbGllcyBvbiBhIGNvbnRyb2xsZXIgdG8gY29uZmlndXJlIHRoZXNlIGNoYWlucyBj
b3JyZWN0IHRoaXMgZGVmaWNpZW5jeSBvciBjYW4gaXQgb25seSBiZSBmaXhlZCB3aXRoIE5TSC4N
Cg0KQnVsbGV0IDQgIlBlciBTZXJ2aWNlIChyZSkgQ2xhc3NpZmljYXRpb24iICBIb3cgbmVlZGVk
IGlzIHRoaXMgPyBXaGF0IHBlcmNlbnRhZ2Ugb2YgY2hhaW5zIHdpbGwgcmVxdWlyZSBpdD8gTW9y
ZSBzcGVjaWZpYyBleGFtcGxlcywgd2hhdCBhcmUgdGhlIGFsdGVybmF0aXZlcyBzdWNoIGFzIHRo
ZSBub3QgcmVkaXJlY3QgdGhlIHRvIGEgbmV3IGNoYWluIGJ1dCB0YWtlIHRlcm1pbmFsIGFjdGlv
biB0aGVyZSBvciBzZW5kIHRvIGEgY2VudHJhbGl6ZWQgY29udHJvbGxlciAuLi4uDQoNCkJ1bGxl
dCA2ICJMaW1pdGVkIEVuZC10by1FbmQgU2VydmljZSBWaXNpYmlsaXR5IiAgQSBiaXQgY29uZnVz
ZWQgaGVyZS4gRG8gd2UgYW50aWNpcGF0ZSBjaGFpbnMgc3Bhbm5pbmcgbXVsdGlwbGUgZGF0YSBj
ZW50ZXJzPyBUaGlzIHdvdWxkIHNlZW0gdG8gcmVxdWlyZSBxdWl0ZSBhIGJpdCBvZiBlZmZvcnQg
Zm9yIHRoZSB0cmFuc3BvcnQgbGF5ZXIgaS5lIE1QTFMuDQogDQpJTU8gdGhpcyBlbnRpcmUgc2Vj
dGlvbiBuZWVkcyB0byBiZSBtYWRlIGZvciBtb3JlIHNwZWNpZmljLiBZb3UgbWF5IGNvbnNpZGVy
IHB1bGxpbmcgaXQgb3V0IGludG8gYSByZXFzL3VzZSBjYXNlIGRyYWZ0Lg0KDQpTZWMgMi4zIGlk
ZW50aWZpZXMgaG93IGFsbCBvZiB0aGUgaXNzdWVzIGluIFNlYyAyLjIgYXJlIGFtZWxpb3JhdGVk
LiBOZWVkIGEgYmV0dGVyIGRlZmluaXRpb24gb2YgU2VjIDIuMiBwcmlvciB0byBhc3NpZ25pbmcg
dGhlIE5TSCByZW1lZHkgaW4gU2VjIDIuMw0KDQpBbHRob3VnaCBJIHJlYWQgdGhlIHJlc3Qgb2Yg
dGhlIGRvY3VtZW50IEkgd2lsbCBub3QgY29tbWVudCBhcyB0aGUgZHJpdmVycyBmb3IgdGhpcyBu
ZXcgZGF0YSBwbGFuZSBlbmNhcCBpcyBub3QgY2xlYXIgdG8gbWUuIEhhdmUgeW91IHJlYWNoZWQg
b3V0IHRvIHRoZSBXR3MgdGhhdCBkZWFsIHdpdGggZGF0YSBwbGFuZSBlbmNhcCB0byBzZWUgaWYg
dGhleSBjYW4gbWVldCB0aGUgcmVxcz8NCg0KSXQgd291bGQgYmUgdXNlZnVsIHRvIHNlZSBhIG1h
dHJpeCBvZiBkYXRhIHBsYW5lIGVuY2FwcyBjdXJyZW50bHkgaW4gdXNlIGFuZCB3aGF0IGZ1bmN0
aW9ucyByZXF1aXJlZCBieSBTRkMgYXJlIHN1cHBvcnRlZC4gVGhpcyBtYXkgbGVhZCB0byBhIHNv
bHV0aW9uIHRoYXQgZG9lcyBub3QgY3JlYXRlIGEgbmV3IGRhdGEgZW5jYXAgYnV0IGV4dGVuZHMg
b25lIG9mIHRoZSBjdXJyZW50IHNldC4NCg0KSWYgdGhlIG5vdGlvbiBoZXJlIGlzIHRvIGFic3Ry
YWN0IGRhdGEgcGxhbmUgZW5jYXAgYXMgdGhlcmUgYXJlIHRvbyBtYW55LCB0aGVuIGl0IG1heSBi
ZSBiZXN0IHRvIHBpY2sgdGhlIG9uZSB0aGF0IG1vc3Qgc2F0aXNmaWVzIHRoZSBTRkMgbmVlZCBh
bmQgcHV0IGEgc3Rha2UgaW4gdGhlIGdyb3VuZC4gDQoNCkppbSBVdHRhcm8NCg0KDQoiVGhpcyBl
bWFpbCBhbmQgYW55IGZpbGVzIHRyYW5zbWl0dGVkIHdpdGggaXQgYXJlIEFUJlQgcHJvcGVydHks
IGFyZSBjb25maWRlbnRpYWwsIGFuZCBhcmUgaW50ZW5kZWQgc29sZWx5IGZvciB0aGUgdXNlIG9m
IHRoZSBpbmRpdmlkdWFsIG9yIGVudGl0eSB0byB3aG9tIHRoaXMgZW1haWwgaXMgYWRkcmVzc2Vk
LiBJZiB5b3UgYXJlIG5vdCBvbmUgb2YgdGhlIG5hbWVkIHJlY2lwaWVudChzKSBvciBvdGhlcndp
c2UgaGF2ZSByZWFzb24gdG8gYmVsaWV2ZSB0aGF0IHlvdSBoYXZlIHJlY2VpdmVkIHRoaXMgbWVz
c2FnZSBpbiBlcnJvciwgcGxlYXNlIG5vdGlmeSB0aGUgc2VuZGVyIGFuZCBkZWxldGUgdGhpcyBt
ZXNzYWdlIGltbWVkaWF0ZWx5IGZyb20geW91ciBjb21wdXRlci4gQW55IG90aGVyIHVzZSwgcmV0
ZW50aW9uLCBkaXNzZW1pbmF0aW9uLCBmb3J3YXJkaW5nLCBwcmludGluZywgb3IgY29weWluZyBv
ZiB0aGlzIGVtYWlsIGlzIHN0cmljdGx5IHByb2hpYml0ZWQuIg0KDQoNCi0tLS0tT3JpZ2luYWwg
TWVzc2FnZS0tLS0tDQpGcm9tOiBYdXhpYW9odSBbbWFpbHRvOnh1eGlhb2h1QGh1YXdlaS5jb21d
IA0KU2VudDogVHVlc2RheSwgTWFyY2ggMjIsIDIwMTYgOTo1OSBQTQ0KVG86IENhcmxvcyBQaWdu
YXRhcm8gKGNwaWduYXRhKSA8Y3BpZ25hdGFAY2lzY28uY29tPg0KQ2M6IEppbSBHdWljaGFyZCAo
amd1aWNoYXIpIDxqZ3VpY2hhckBjaXNjby5jb20+OyBKb2VsIE0uIEhhbHBlcm4gPGptaEBqb2Vs
aGFscGVybi5jb20+OyBTdGV3YXJ0IEJyeWFudCA8c3Rld2FydC5icnlhbnRAZ21haWwuY29tPjsg
VVRUQVJPLCBKQU1FUyA8anUxNzM4QGF0dC5jb20+OyBSb24gUGFya2VyIDxSb25fUGFya2VyQGFm
ZmlybWVkbmV0d29ya3MuY29tPjsgRGF2ZSBEb2xzb24gPGRkb2xzb25Ac2FuZHZpbmUuY29tPjsg
RG9sZ2Fub3csIEFuZHJldyAoTm9raWEgLSBTRykgPGFuZHJldy5kb2xnYW5vd0Bub2tpYS5jb20+
OyBFWFQgQm90dG9yZmYsIFBhdWwgPHBhdWwuYm90dG9yZmZAaHBlLmNvbT47IGFvLnRpbmdAenRl
LmNvbS5jbjsgc2ZjQGlldGYub3JnDQpTdWJqZWN0OiBSRTogW3NmY10gW0dSQVlNQUlMXSBSZTog
QWRkaW5nIGFuIE5TSC5uZXh0LWhlYWRlciB0eXBlIG9mIE5TSA0KDQoNCg0KPiAtLS0tLU9yaWdp
bmFsIE1lc3NhZ2UtLS0tLQ0KPiBGcm9tOiBDYXJsb3MgUGlnbmF0YXJvIChjcGlnbmF0YSkgW21h
aWx0bzpjcGlnbmF0YUBjaXNjby5jb21dDQo+IFNlbnQ6IFR1ZXNkYXksIE1hcmNoIDIyLCAyMDE2
IDk6NTQgUE0NCj4gVG86IFh1eGlhb2h1DQo+IENjOiBKaW0gR3VpY2hhcmQgKGpndWljaGFyKTsg
Sm9lbCBNLiBIYWxwZXJuOyBTdGV3YXJ0IEJyeWFudDsgVVRUQVJPLCBKQU1FUzsNCj4gUm9uIFBh
cmtlcjsgRGF2ZSBEb2xzb247IERvbGdhbm93LCBBbmRyZXcgKE5va2lhIC0gU0cpOyBFWFQgQm90
dG9yZmYsIFBhdWw7DQo+IGFvLnRpbmdAenRlLmNvbS5jbjsgc2ZjQGlldGYub3JnDQo+IFN1Ympl
Y3Q6IFJlOiBbc2ZjXSBbR1JBWU1BSUxdIFJlOiBBZGRpbmcgYW4gTlNILm5leHQtaGVhZGVyIHR5
cGUgb2YgTlNIDQo+IA0KPiANCj4gPiBPbiBNYXIgMjEsIDIwMTYsIGF0IDk6NTYgUE0sIFh1eGlh
b2h1IDx4dXhpYW9odUBodWF3ZWkuY29tPiB3cm90ZToNCj4gPg0KPiA+DQo+ID4NCj4gPj4gLS0t
LS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCj4gPj4gRnJvbTogSmltIEd1aWNoYXJkIChqZ3VpY2hh
cikgW21haWx0bzpqZ3VpY2hhckBjaXNjby5jb21dDQo+ID4+IFNlbnQ6IFR1ZXNkYXksIE1hcmNo
IDIyLCAyMDE2IDEyOjE1IEFNDQo+ID4+IFRvOiBYdXhpYW9odTsgSm9lbCBNLiBIYWxwZXJuOyBT
dGV3YXJ0IEJyeWFudDsgVVRUQVJPLCBKQU1FUzsgUm9uDQo+ID4+IFBhcmtlcjsgRGF2ZSBEb2xz
b247IERvbGdhbm93LCBBbmRyZXcgKE5va2lhIC0gU0cpOyBFWFQgQm90dG9yZmYsDQo+ID4+IFBh
dWw7IGFvLnRpbmdAenRlLmNvbS5jbg0KPiA+PiBDYzogc2ZjQGlldGYub3JnDQo+ID4+IFN1Ympl
Y3Q6IFJlOiBbc2ZjXSBbR1JBWU1BSUxdIFJlOiBBZGRpbmcgYW4gTlNILm5leHQtaGVhZGVyIHR5
cGUgb2YNCj4gPj4gTlNIDQo+ID4+DQo+ID4+Pg0KPiA+Pj4NCj4gPj4+DQo+ID4+Pj4gU28gZXZl
biBpZiB3ZSBoYWQgd2FudGVkIHRvIHVzZSBhIGxhYmVsIHN0YWNrIGZvciBwYXRoDQo+ID4+Pj4g
aWRlbnRpZmljYXRpb24sIGFzIGZhciBhcyBJICBjYW4gdGVsbCB3ZSB3b3VsZCBzdGlsbCBuZWVk
IGEgaGVhZGVyDQo+ID4+Pj4gdG8gY2FycnkgdGhlIG1ldGFkYXRhLg0KPiA+Pj4NCj4gPj4+IFll
cy4gSG93ZXZlciwgaWYgbWV0YWRhdGEgaXMgbm90IGEgbWFuZGF0b3J5IGNvbXBvbmVudCBpbiBh
bnkNCj4gPj4+IHNlcnZpY2UgY2hhaW4sIGl0J2QgYmV0dGVyIHRvIGRlY291cGxlIHRoZSBwYXRo
IGlkZW50aWZpY2F0aW9uDQo+ID4+PiBoZWFkZXIgZnJvbSB0aGUgbWV0YWRhdGEgaGVhZGVyLCBJ
TUhPLg0KPiA+Pg0KPiA+PiBJbiB3aGljaCBjYXNlIHlvdSBjYW4gdXNlIE1ELXR5cGUgMiB3aXRo
IGxlbmd0aCBzZXQgdG8gMHgyLg0KPiA+DQo+ID4gV2hhdCBhYm91dCBpZiB3ZSBqdXN0IHdhbnQg
dGhlIE5TSCB0byBhY3QgYXMgYSBtZXRhZGF0YSBjb250YWluZXI/DQo+ID4NCj4gDQo+IGh0dHBz
Oi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9yZmM3NjY1DQo+IA0KPiAgICBTRkMgRW5jYXBzdWxhdGlv
bjogIFRoZSBTRkMgZW5jYXBzdWxhdGlvbiBwcm92aWRlcywgYXQgYSBtaW5pbXVtLCBTRlANCj4g
ICAgICAgICBpZGVudGlmaWNhdGlvbiwgYW5kIGlzIHVzZWQgYnkgdGhlIFNGQy1hd2FyZSBmdW5j
dGlvbnMsIHN1Y2ggYXMNCj4gICAgICAgICB0aGUgU0ZGIGFuZCBTRkMtYXdhcmUgU0ZzLiAgVGhl
IFNGQyBlbmNhcHN1bGF0aW9uIGlzIG5vdCB1c2VkDQo+ICAgICAgICAgZm9yIG5ldHdvcmsgcGFj
a2V0IGZvcndhcmRpbmcuICBJbiBhZGRpdGlvbiB0byBTRlANCj4gICAgICAgICBpZGVudGlmaWNh
dGlvbiwgdGhlIFNGQyBlbmNhcHN1bGF0aW9uIGNhcnJpZXMgbWV0YWRhdGEgaW5jbHVkaW5nDQo+
ICAgICAgICAgZGF0YS1wbGFuZSBjb250ZXh0IGluZm9ybWF0aW9uLg0KDQpNeSBwb2ludCBpczog
d2hlbiB0aGUgU0ZQIGlkZW50aWZpY2F0aW9uIGNvdWxkIGJlIGltcGxlbWVudGVkIGJ5IHVzaW5n
IGEgZ2l2ZW4gZXhpc3RpbmcgZm9yd2FyZGluZyBwYXJhZGlnbSwgd2hhdCB3ZSByZWFsbHkgbmVl
ZCB0byBpbnZlbnQgaXMganVzdCBhIG1ldGFkYXRhIGNvbnRhaW5lci4NCg0KQmVzdCByZWdhcmRz
LA0KWGlhb2h1DQoNCj4g4oCUIENhcmxvcy4NCj4gDQo+ID4gQmVzdCByZWdhcmRzLA0KPiA+IFhp
YW9odQ0KPiA+DQo+ID4+IEppbQ0KPiA+Pg0KPiA+Pj4NCj4gPj4+DQo+ID4+Pj4gQW5kIHRoYXQg
bWVhbnMgdGhhdCBhbnl0aGluZyB0aGF0IG5lZWRlZCB0aGUgbWV0YWRhdGEgb3IgaW5uZXINCj4g
Pj4+PiBwYWNrZXQgd291bGQgIGhhdmUgdG8gcGFyc2UgdGhlIGxhYmVsIHN0YWNrLg0KPiA+Pj4+
IEF0IHdoaWNoIHBvaW50IC4uLg0KPiA+Pj4NCj4gPj4+IEF0IHRoZSBib3R0b20gb2YgdGhlIGxh
YmVsIHN0YWNrLg0KPiA+Pj4NCj4gPj4+IEJlc3QgcmVnYXJkcywNCj4gPj4+IFhpYW9odQ0KPiA+
Pj4NCj4gPj4+DQo+ID4+Pj4gWW91cnMsDQo+ID4+Pj4gSm9lbA0KPiA+Pj4+DQo+ID4+Pj4gT24g
My8xNy8xNiAxMTozMSBBTSwgU3Rld2FydCBCcnlhbnQgd3JvdGU6DQo+ID4+Pj4+IFllcywgdGhl
IE1QTFMgbGFiZWwgc2hvdWxkIGJlIHNlZW4gYXMgYW4gaW5zdHJ1Y3Rpb24gLSB3aGljaCBpcw0K
PiA+Pj4+PiBleGFjdGx5IHdoYXQgaXQgaXMsIGFuZCBhbHdheXMgaGFzIGJlZW4uDQo+ID4+Pj4+
DQo+ID4+Pj4+IFlvdSBjYW4gdHJpdmlhbGx5IGNhcnJ5IE1QTFMgb3ZlciBJUC4NCj4gPj4+Pj4N
Cj4gPj4+Pj4gV2UgZG8gY2FycnkgTVBMUyBvdmVyIEV0aGVybmV0Lg0KPiA+Pj4+Pg0KPiA+Pj4+
PiBJbiB0aGUgYWJvdmUgY2FzZXMgTVBMUyBpcyB0aGUgaW5zdHJ1Y3Rpb24sIGFuZCBJUCBhbmQg
RXRoZXJuZXQNCj4gPj4+Pj4gYXJlIHRoZSBwb2ludCB0byBwb2ludCB0cmFuc3BvcnRzLg0KPiA+
Pj4+Pg0KPiA+Pj4+PiBXaGF0IGlzIG1vcmUgaW50ZXJlc3RpbmcgaXMgaG93IHdlIGNhcnJ5IHRo
ZSBtZXRhZGF0YSwgc2luY2UgdGhlcmUNCj4gPj4+Pj4gbWF5IG5lZWQgdG8gYmUgc2V2ZXJhbCBp
bnN0YW5jZXMgb2YgdGhlIG1ldGFkYXRhIGluIHRoZSBwYWNrZXQuDQo+ID4+Pj4+DQo+ID4+Pj4+
IFN0ZXdhcnQNCj4gPj4+Pj4NCj4gPj4+Pj4gT24gMTcvMDMvMjAxNiAxMjozMCwgVVRUQVJPLCBK
QU1FUyB3cm90ZToNCj4gPj4+Pj4+DQo+ID4+Pj4+PiAqL1JvbiwvKg0KPiA+Pj4+Pj4NCj4gPj4+
Pj4+ICovLyoNCj4gPj4+Pj4+DQo+ID4+Pj4+PiAqL0hhdmUgbm90IGJlZW4gZm9sbG93aW5nIHRo
ZSBTRkMgV0cgdGhhdCBjbG9zZWx5IGR1ZSB0byBvdGhlcg0KPiA+Pj4+Pj4gbW9yZSBwcmVzc2lu
ZyBuZWVkcyBmb3IgbXkgbmV0d29yay4gVGhhdCBiZWluZyBzYWlkLCBpdCB3b3VsZA0KPiA+Pj4+
Pj4gc2VlbSB0aGF0IGFuIE1QTFMgbGFiZWwgY291bGQgYmUgdXNlZCBhcyB0aGUgYmFzaXMgZm9y
IHdoYXQgeW91DQo+ID4+Pj4+PiBhcmUgbG9va2luZyBmb3IgYW4gdGh1cyBjb3VsZCBiZSBhcHBs
aWVkIHRvIGFsbCBuZXR3b3JrIHR5cGVzLg0KPiA+Pj4+Pj4gVXNpbmcgdGhlIE1QTFMgbGFiZWwg
Zm9ybWF0IGRvZXMgbm90IGZvcmNlIHlvdSB0byBoYXZlIGFuIE1QTFMNCj4gPj4+Pj4+IGVuYWJs
ZWQgbmV0d29yayBhbGwgdGhhdCBpcyBuZWVkZWQgaXMgdGhlIHJlcXVpcmVkIGluZm8gdG8gYmUN
Cj4gPj4+Pj4+IHBvcHVsYXRlZCBpbiB0aGUgbGFiZWwuIEl0IHNlZW1zIHRoYXQgdGhlIGFyZ3Vt
ZW50IGlzIGZvcg0KPiA+Pj4+Pj4gaW5kZXBlbmRlbmNlIG9mIG5ldHdvcmsgdGh1cyBpbnZlbnRp
bmcgYSBuZXcgbGFiZWwgaXMgYmFzZWQgb24gYW4NCj4gPj4+Pj4+IGFzc3VtcHRpb24gdGhhdCB1
c2luZyBNUExTIGxhYmVscyBpbXBvc2VzIGFuIE1QTFMgY29udHJvbCBwbGFuZS4NCj4gPj4+Pj4+
IElzIHRoYXQgcmlnaHQ/LyoNCj4gPj4+Pj4+DQo+ID4+Pj4+PiAqLy8qDQo+ID4+Pj4+Pg0KPiA+
Pj4+Pj4gKi9KaW0gVXR0YXJvLyoNCj4gPj4+Pj4+DQo+ID4+Pj4+PiAqLy8qDQo+ID4+Pj4+Pg0K
PiA+Pj4+Pj4gIi9UaGlzIGVtYWlsIGFuZCBhbnkgZmlsZXMgdHJhbnNtaXR0ZWQgd2l0aCBpdCBh
cmUgQVQmVCBwcm9wZXJ0eSwNCj4gPj4+Pj4+IGFyZSBjb25maWRlbnRpYWwsIGFuZCBhcmUgaW50
ZW5kZWQgc29sZWx5IGZvciB0aGUgdXNlIG9mIHRoZQ0KPiA+Pj4+Pj4gaW5kaXZpZHVhbCBvciBl
bnRpdHkgdG8gd2hvbSB0aGlzIGVtYWlsIGlzIGFkZHJlc3NlZC4gSWYgeW91IGFyZQ0KPiA+Pj4+
Pj4gbm90IG9uZSBvZiB0aGUgbmFtZWQgcmVjaXBpZW50KHMpIG9yIG90aGVyd2lzZSBoYXZlIHJl
YXNvbiB0bw0KPiA+Pj4+Pj4gYmVsaWV2ZSB0aGF0IHlvdSBoYXZlIHJlY2VpdmVkIHRoaXMgbWVz
c2FnZSBpbiBlcnJvciwgcGxlYXNlDQo+ID4+Pj4+PiBub3RpZnkgdGhlIHNlbmRlciBhbmQgZGVs
ZXRlIHRoaXMgbWVzc2FnZSBpbW1lZGlhdGVseSBmcm9tIHlvdXINCj4gPj4+Pj4+IGNvbXB1dGVy
LiBBbnkgb3RoZXIgdXNlLCByZXRlbnRpb24sIGRpc3NlbWluYXRpb24sIGZvcndhcmRpbmcsDQo+
ID4+Pj4+PiBwcmludGluZywgb3IgY29weWluZyBvZiB0aGlzIGVtYWlsIGlzIHN0cmljdGx5IHBy
b2hpYml0ZWQvLiIqLy8qDQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4gKkZyb206Klh1eGlhb2h1IFttYWls
dG86eHV4aWFvaHVAaHVhd2VpLmNvbV0NCj4gPj4+Pj4+ICpTZW50OiogVGh1cnNkYXksIE1hcmNo
IDE3LCAyMDE2IDM6NDcgQU0NCj4gPj4+Pj4+ICpUbzoqIFJvbiBQYXJrZXIgPFJvbl9QYXJrZXJA
YWZmaXJtZWRuZXR3b3Jrcy5jb20+OyBVVFRBUk8sDQo+ID4+IEpBTUVTDQo+ID4+Pj4+PiA8anUx
NzM4QGF0dC5jb20+OyBEYXZlIERvbHNvbiA8ZGRvbHNvbkBzYW5kdmluZS5jb20+Ow0KPiBEb2xn
YW5vdywNCj4gPj4+Pj4+IEFuZHJldyAoTm9raWEgLSBTRykgPGFuZHJldy5kb2xnYW5vd0Bub2tp
YS5jb20+OyBFWFQgQm90dG9yZmYsDQo+ID4+Pj4+PiBQYXVsIDxwYXVsLmJvdHRvcmZmQGhwZS5j
b20+OyBTdGV3YXJ0IEJyeWFudA0KPiA+Pj4+Pj4gPHN0ZXdhcnQuYnJ5YW50QGdtYWlsLmNvbT47
IGFvLnRpbmdAenRlLmNvbS5jbg0KPiA+Pj4+Pj4gKkNjOiogc2ZjQGlldGYub3JnDQo+ID4+Pj4+
PiAqU3ViamVjdDoqIFJFOiBbc2ZjXSBbR1JBWU1BSUxdIFJlOiBBZGRpbmcgYW4gTlNILm5leHQt
aGVhZGVyDQo+ID4+Pj4+PiB0eXBlIG9mIE5TSA0KPiA+Pj4+Pj4NCj4gPj4+Pj4+IFJvbiwNCj4g
Pj4+Pj4+DQo+ID4+Pj4+PiBUaGUgU0ZDIGFwcHJvYWNoIG9mIGVuY29kaW5nIHRoZSBTRlAgaW5m
b3JtYXRpb24gYnkgYW4gTVBMUyBsYWJlbA0KPiA+Pj4+Pj4gc3RhY2sgY2FuIG1lZXQgdGhlIHRy
YW5zcG9ydC1pbmRlcGVuZGVuY3kgcmVxdWlyZW1lbnQgdmVyeSB3ZWxsLg0KPiA+Pj4+Pj4NCj4g
Pj4+Pj4+IEJlc3QgcmVnYXJkcywNCj4gPj4+Pj4+DQo+ID4+Pj4+PiBYaWFvaHUNCj4gPj4+Pj4+
DQo+ID4+Pj4+PiAqRnJvbToqUm9uIFBhcmtlciBbbWFpbHRvOlJvbl9QYXJrZXJAYWZmaXJtZWRu
ZXR3b3Jrcy5jb21dDQo+ID4+Pj4+PiAqU2VudDoqIFdlZG5lc2RheSwgTWFyY2ggMTYsIDIwMTYg
MTE6MjAgUE0NCj4gPj4+Pj4+ICpUbzoqIFVUVEFSTywgSkFNRVM7IERhdmUgRG9sc29uOyBYdXhp
YW9odTsgRG9sZ2Fub3csIEFuZHJldw0KPiA+Pj4+Pj4gKE5va2lhIC0gU0cpOyBFWFQgQm90dG9y
ZmYsIFBhdWw7IFN0ZXdhcnQgQnJ5YW50Ow0KPiA+Pj4+Pj4gYW8udGluZ0B6dGUuY29tLmNuIDxt
YWlsdG86YW8udGluZ0B6dGUuY29tLmNuPg0KPiA+Pj4+Pj4gKkNjOiogc2ZjQGlldGYub3JnIDxt
YWlsdG86c2ZjQGlldGYub3JnPg0KPiA+Pj4+Pj4gKlN1YmplY3Q6KiBSRTogW3NmY10gW0dSQVlN
QUlMXSBSZTogQWRkaW5nIGFuIE5TSC5uZXh0LWhlYWRlcg0KPiA+Pj4+Pj4gdHlwZSBvZiBOU0gN
Cj4gPj4+Pj4+DQo+ID4+Pj4+PiBKYW1lcywNCj4gPj4+Pj4+DQo+ID4+Pj4+PiBJIGNhbuKAmXQg
c3BlYWsgZm9yIHRoZSBlbnRpcmUgZ3JvdXAsIG15IHVuZGVyc3RhbmRpbmcgb2YgdGhlDQo+ID4+
Pj4+PiBkZWNpc2lvbiBub3QgdG8gc3RhbmRhcmRpemUgb24gTVBMUyBhcyB0aGUgZm9yd2FyZGlu
ZyBwYXJhZGlnbQ0KPiA+Pj4+Pj4gd2FzIHRvIG1ha2UgU0ZDIGJyb2FkZXIgc3VjaCB0aGF0IGl0
IGNvdWxkIHV0aWxpemUgTUFDIGJhc2VkDQo+ID4+Pj4+PiBuZXR3b3JrcywgSVAgYmFzZWQgbmV0
d29ya3MsIGFuZCBJUC1vdmVyLU1QTFMgYmFzZWQgbmV0d29ya3MuDQo+ID4+Pj4+Pg0KPiA+Pj4+
Pj4gUm9uDQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4gKkZyb206KlVUVEFSTywgSkFNRVMgW21haWx0bzpq
dTE3MzhAYXR0LmNvbV0NCj4gPj4+Pj4+ICpTZW50OiogV2VkbmVzZGF5LCBNYXJjaCAxNiwgMjAx
NiAxMToxMSBBTQ0KPiA+Pj4+Pj4gKlRvOiogUm9uIFBhcmtlciA8Um9uX1BhcmtlckBhZmZpcm1l
ZG5ldHdvcmtzLmNvbQ0KPiA+Pj4+Pj4gPG1haWx0bzpSb25fUGFya2VyQGFmZmlybWVkbmV0d29y
a3MuY29tPj47IERhdmUgRG9sc29uDQo+ID4+Pj4+PiA8ZGRvbHNvbkBzYW5kdmluZS5jb20gPG1h
aWx0bzpkZG9sc29uQHNhbmR2aW5lLmNvbT4+OyBYdXhpYW9odQ0KPiA+Pj4+Pj4gPHh1eGlhb2h1
QGh1YXdlaS5jb20gPG1haWx0bzp4dXhpYW9odUBodWF3ZWkuY29tPj47IERvbGdhbm93LA0KPiA+
Pj4+IEFuZHJldw0KPiA+Pj4+Pj4gKE5va2lhIC0gU0cpDQo+ID4+Pj4+Pg0KPiA+PiA8PG1haWx0
bzphbmRyZXcuZG9sZ2Fub3dAbm9raWEuY29tPmFuZHJldy5kb2xnYW5vd0Bub2tpYS5jb20+Ow0K
PiA+Pj4+IEVYVA0KPiA+Pj4+Pj4gQm90dG9yZmYsIFBhdWwgPHBhdWwuYm90dG9yZmZAaHBlLmNv
bQ0KPiA+Pj4+Pj4gPG1haWx0bzpwYXVsLmJvdHRvcmZmQGhwZS5jb20+PjsgU3Rld2FydCBCcnlh
bnQNCj4gPj4+Pj4+IDxzdGV3YXJ0LmJyeWFudEBnbWFpbC5jb20gPG1haWx0bzpzdGV3YXJ0LmJy
eWFudEBnbWFpbC5jb20+PjsNCj4gPj4+Pj4+IGFvLnRpbmdAenRlLmNvbS5jbiA8bWFpbHRvOmFv
LnRpbmdAenRlLmNvbS5jbj4NCj4gPj4+Pj4+ICpDYzoqIHNmY0BpZXRmLm9yZyA8bWFpbHRvOnNm
Y0BpZXRmLm9yZz4NCj4gPj4+Pj4+ICpTdWJqZWN0OiogUkU6IFtzZmNdIFtHUkFZTUFJTF0gUmU6
IEFkZGluZyBhbiBOU0gubmV4dC1oZWFkZXINCj4gPj4+Pj4+IHR5cGUgb2YgTlNIDQo+ID4+Pj4+
Pg0KPiA+Pj4+Pj4gKi9Db21tZW50cyBJbi1MaW5lLyoNCj4gPj4+Pj4+DQo+ID4+Pj4+PiAqLy8q
DQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4gKi9KaW0gVXR0YXJvLyoNCj4gPj4+Pj4+DQo+ID4+Pj4+PiAq
Ly8qDQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4gIi9UaGlzIGVtYWlsIGFuZCBhbnkgZmlsZXMgdHJhbnNt
aXR0ZWQgd2l0aCBpdCBhcmUgQVQmVCBwcm9wZXJ0eSwNCj4gPj4+Pj4+IGFyZSBjb25maWRlbnRp
YWwsIGFuZCBhcmUgaW50ZW5kZWQgc29sZWx5IGZvciB0aGUgdXNlIG9mIHRoZQ0KPiA+Pj4+Pj4g
aW5kaXZpZHVhbCBvciBlbnRpdHkgdG8gd2hvbSB0aGlzIGVtYWlsIGlzIGFkZHJlc3NlZC4gSWYg
eW91IGFyZQ0KPiA+Pj4+Pj4gbm90IG9uZSBvZiB0aGUgbmFtZWQgcmVjaXBpZW50KHMpIG9yIG90
aGVyd2lzZSBoYXZlIHJlYXNvbiB0bw0KPiA+Pj4+Pj4gYmVsaWV2ZSB0aGF0IHlvdSBoYXZlIHJl
Y2VpdmVkIHRoaXMgbWVzc2FnZSBpbiBlcnJvciwgcGxlYXNlDQo+ID4+Pj4+PiBub3RpZnkgdGhl
IHNlbmRlciBhbmQgZGVsZXRlIHRoaXMgbWVzc2FnZSBpbW1lZGlhdGVseSBmcm9tIHlvdXINCj4g
Pj4+Pj4+IGNvbXB1dGVyLiBBbnkgb3RoZXIgdXNlLCByZXRlbnRpb24sIGRpc3NlbWluYXRpb24s
IGZvcndhcmRpbmcsDQo+ID4+Pj4+PiBwcmludGluZywgb3IgY29weWluZyBvZiB0aGlzIGVtYWls
IGlzIHN0cmljdGx5IHByb2hpYml0ZWQvLiIqLy8qDQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4gKkZyb206
KlJvbiBQYXJrZXIgW21haWx0bzpSb25fUGFya2VyQGFmZmlybWVkbmV0d29ya3MuY29tXQ0KPiA+
Pj4+Pj4gKlNlbnQ6KiBXZWRuZXNkYXksIE1hcmNoIDE2LCAyMDE2IDEwOjAxIEFNDQo+ID4+Pj4+
PiAqVG86KiBEYXZlIERvbHNvbiA8ZGRvbHNvbkBzYW5kdmluZS5jb20NCj4gPj4+Pj4+IDxtYWls
dG86ZGRvbHNvbkBzYW5kdmluZS5jb20+PjsgWHV4aWFvaHUgPHh1eGlhb2h1QGh1YXdlaS5jb20N
Cj4gPj4+Pj4+IDxtYWlsdG86eHV4aWFvaHVAaHVhd2VpLmNvbT4+OyBVVFRBUk8sIEpBTUVTIDxq
dTE3MzhAYXR0LmNvbQ0KPiA+Pj4+Pj4gPG1haWx0bzpqdTE3MzhAYXR0LmNvbT4+OyBEb2xnYW5v
dywgQW5kcmV3IChOb2tpYSAtIFNHKQ0KPiA+Pj4+Pj4NCj4gPj4gPDxtYWlsdG86YW5kcmV3LmRv
bGdhbm93QG5va2lhLmNvbT5hbmRyZXcuZG9sZ2Fub3dAbm9raWEuY29tPjsNCj4gPj4+PiBFWFQN
Cj4gPj4+Pj4+IEJvdHRvcmZmLCBQYXVsIDxwYXVsLmJvdHRvcmZmQGhwZS5jb20NCj4gPj4+Pj4+
IDxtYWlsdG86cGF1bC5ib3R0b3JmZkBocGUuY29tPj47IFN0ZXdhcnQgQnJ5YW50DQo+ID4+Pj4+
PiA8c3Rld2FydC5icnlhbnRAZ21haWwuY29tIDxtYWlsdG86c3Rld2FydC5icnlhbnRAZ21haWwu
Y29tPj47DQo+ID4+Pj4+PiBhby50aW5nQHp0ZS5jb20uY24gPG1haWx0bzphby50aW5nQHp0ZS5j
b20uY24+DQo+ID4+Pj4+PiAqQ2M6KiBzZmNAaWV0Zi5vcmcgPG1haWx0bzpzZmNAaWV0Zi5vcmc+
DQo+ID4+Pj4+PiAqU3ViamVjdDoqIFJFOiBbc2ZjXSBbR1JBWU1BSUxdIFJlOiBBZGRpbmcgYW4g
TlNILm5leHQtaGVhZGVyDQo+ID4+Pj4+PiB0eXBlIG9mIE5TSA0KPiA+Pj4+Pj4NCj4gPj4+Pj4+
IE15IHJlY29sbGVjdGlvbiBvZiB0aGUgZGlzY3Vzc2lvbiBhbmQgYW5hbHlzaXMgb2YgTVBMUyBm
b3J3YXJkaW5nDQo+ID4+Pj4+PiB0byBzdXBwb3J0IFNGQyB3YXMgbm90IG9yaWVudGVkIGFyb3Vu
ZCBoaWVyYXJjaGljYWwgU0ZDIGRvbWFpbnMuDQo+ID4+Pj4+PiBJbnN0ZWFkLCBJIHRob3VnaHQg
dGhlIGRpc2N1c3Npb24gd2FzIGFyb3VuZCBhbiBNUExTIGxhYmVsIHBlciBTRg0KPiA+Pj4+Pj4g
aW5zdGFuY2Ugc28gdGhhdCB0aGUgc3RhY2sgb2YgTVBMUyBsYWJlbHMgcHJvdmlkZWQgdGhlIGZ1
bGwgU0ZQL1JTUA0KPiA+Pj4+Pj4gZGVzY3JpcHRpb24uICAgIEFuIGVsZWdhbnQgYXBwcm9hY2gs
IGZvciBzdXJlLCBidXQgbm90IG9uZSBhZG9wdGVkIGJ5DQo+ID4+Pj4+PiB0aGUgV0cuDQo+ID4+
Pj4+Pg0KPiA+Pj4+Pj4gKi9bSmltIFU+XSBXYXMgdGhpcyBkZWNpc2lvbiBiYXNlZCBvbiB0aGUg
bm90aW9uIHRoYXQgYWxsIGZhYnJpY3MNCj4gPj4+Pj4+IGFyZSBJUCBvbmx5Pz8gSU1PIHRoZSBt
b2RlbCBvZiBhbGwgRENzIGJlaW5nIGxhcmdlIGFuZCBJUCBvbmx5IGlzDQo+ID4+Pj4+PiBub3Qg
YSBjb3JyZWN0IGFzc3VtcHRpb24uLyoNCj4gPj4+Pj4+DQo+ID4+Pj4+PiBUaGUgY3VycmVudCBk
aXNjdXNzaW9uIG9mIE1QTFMgaXMgbW9yZSBvZiB0aGUgaGllcmFyY2hpY2FsIG5hdHVyZQ0KPiA+
Pj4+Pj4g4oCTIGEgc3RhY2sgb2YgbGFiZWxzIGluIHRoZSBnZW5lcmFsIGNhc2UgcmVwcmVzZW50
cyBhIHNldCBvZiBuZXN0ZWQgTFNQcy4NCj4gPj4+Pj4+IEZvciBTRkMsIHRoZSBkaXNjdXNzaW9u
IGlzIHRoYXQgYSBzdGFjayBvZiBOU0ggcmVwcmVzZW50cyBhIHN0YWNrDQo+ID4+Pj4+PiBvZiBw
ZXItU0ZDLWRvbWFpbiBTRlBzLiBCdXQgYW4gaW5kaXZpZHVhbCBOU0ggZG9lcyBub3QNCj4gPj4+
Pj4+IHNlbGYtZGVzY3JpYmUgdGhlIFNGUC9SU1AgYXQgaXRzIG93biBkb21haW4gbGV2ZWwsIHJl
bHlpbmcNCj4gPj4+Pj4+IGluc3RlYWQgb24gYSBmbGF0IGlkZW50aWZpZXIgKFNGUCBJRCkgdGhh
dCBpcyB1c2VkIHRvIGxvb2t1cCB0aGUgZnVsbA0KPiBTRlAvUlNQLg0KPiA+Pj4+Pj4NCj4gPj4+
Pj4+IFJvbg0KPiA+Pj4+Pj4NCj4gPj4+Pj4+ICpGcm9tOipEYXZlIERvbHNvbiBbbWFpbHRvOmRk
b2xzb25Ac2FuZHZpbmUuY29tXQ0KPiA+Pj4+Pj4gKlNlbnQ6KiBXZWRuZXNkYXksIE1hcmNoIDE2
LCAyMDE2IDk6NDggQU0NCj4gPj4+Pj4+ICpUbzoqIFh1eGlhb2h1IDx4dXhpYW9odUBodWF3ZWku
Y29tDQo+ID4+IDxtYWlsdG86eHV4aWFvaHVAaHVhd2VpLmNvbT4+Ow0KPiA+Pj4+Pj4gVVRUQVJP
LCBKQU1FUyA8anUxNzM4QGF0dC5jb20gPG1haWx0bzpqdTE3MzhAYXR0LmNvbT4+Ow0KPiA+PiBE
b2xnYW5vdywNCj4gPj4+Pj4+IEFuZHJldyAoTm9raWEgLSBTRykNCj4gPj4+Pj4+DQo+ID4+IDw8
bWFpbHRvOmFuZHJldy5kb2xnYW5vd0Bub2tpYS5jb20+YW5kcmV3LmRvbGdhbm93QG5va2lhLmNv
bT47DQo+ID4+Pj4gRVhUDQo+ID4+Pj4+PiBCb3R0b3JmZiwgUGF1bCA8cGF1bC5ib3R0b3JmZkBo
cGUuY29tDQo+ID4+Pj4+PiA8bWFpbHRvOnBhdWwuYm90dG9yZmZAaHBlLmNvbT4+OyBSb24gUGFy
a2VyDQo+ID4+Pj4+PiA8Um9uX1BhcmtlckBhZmZpcm1lZG5ldHdvcmtzLmNvbQ0KPiA+Pj4+Pj4g
PG1haWx0bzpSb25fUGFya2VyQGFmZmlybWVkbmV0d29ya3MuY29tPj47IFN0ZXdhcnQgQnJ5YW50
DQo+ID4+Pj4+PiA8c3Rld2FydC5icnlhbnRAZ21haWwuY29tIDxtYWlsdG86c3Rld2FydC5icnlh
bnRAZ21haWwuY29tPj47DQo+ID4+Pj4+PiBhby50aW5nQHp0ZS5jb20uY24gPG1haWx0bzphby50
aW5nQHp0ZS5jb20uY24+DQo+ID4+Pj4+PiAqQ2M6KiBzZmNAaWV0Zi5vcmcgPG1haWx0bzpzZmNA
aWV0Zi5vcmc+DQo+ID4+Pj4+PiAqU3ViamVjdDoqIFJFOiBbc2ZjXSBbR1JBWU1BSUxdIFJlOiBB
ZGRpbmcgYW4gTlNILm5leHQtaGVhZGVyDQo+ID4+Pj4+PiB0eXBlIG9mIE5TSA0KPiA+Pj4+Pj4N
Cj4gPj4+Pj4+IFJlY2FsbCB0aGF0IGRyYWZ0LWhvbW1hLXNmYy1mb3J3YXJkaW5nLW1ldGhvZHMt
YW5hbHlzaXMgY29tcGFyZXMNCj4gPj4+Pj4+IHRoZSBkaWZmZXJlbnQgYXBwcm9hY2hlcy4NCj4g
Pj4+Pj4+DQo+ID4+Pj4+PiA8aHR0cHM6Ly90b29scy5pZXRmLm9yZy9odG1sL2RyYWZ0LWhvbW1h
LXNmYy1mb3J3YXJkaW5nLW1ldGhvZHMtYQ0KPiA+Pj4+Pj4gbg0KPiA+Pj4+Pj4gYWx5DQo+ID4+
Pj4+PiBzaXMtMDU+aHR0cHM6Ly90b29scy5pZXRmLm9yZy9odG1sL2RyYWZ0LWhvbW1hLXNmYy1m
b3J3YXJkaW5nLW1ldA0KPiA+Pj4+Pj4gc2lzLTA1PmgNCj4gPj4+Pj4+IHNpcy0wNT5vZHMNCj4g
Pj4+Pj4+IC1hbmFseXNpcy0wNQ0KPiA+Pj4+Pj4NCj4gPj4+Pj4+IFRoZSBNUExTIGFwcHJvYWNo
IGZhbGxzIGludG8gdGhlIGNhdGVnb3J5IGRpc2N1c3NlZCBpbiBzZWN0aW9uDQo+ID4+Pj4+PiAz
LjEuMiwg4oCcTWV0aG9kIDI6IEZvcndhcmRpbmcgd2l0aCBTdGFja2VkIEhlYWRlcnPigJ0sDQo+
ID4+Pj4+Pg0KPiA+Pj4+Pj4gd2hlcmVhcyB0aGUgTlNIIGFwcHJvYWNoIGZhbGxzIGludG8gc2Vj
dGlvbiAzLjEuMywg4oCcTWV0aG9kMzoNCj4gPj4+Pj4+IEZvcndhcmRpbmcgYmFzZWQgb24gU2Vy
dmljZSBDaGFpbiBJZGVudGlmaWVyc+KAnS4NCj4gPj4+Pj4+DQo+ID4+Pj4+PiBTZWN0aW9uIDQg
YW5hbHl6ZXMgdGhlIGRpZmZlcmVudCBtZXRob2RzLCB3aXRoIHByb3MgYW5kIGNvbnMgZm9yDQo+
ID4+Pj4+PiBhbGwgb2YgdGhlIGFwcHJvYWNoZXMuDQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4gLURhdmUN
Cj4gPj4+Pj4+DQo+ID4+Pj4+PiAqRnJvbToqc2ZjIFttYWlsdG86c2ZjLWJvdW5jZXNAaWV0Zi5v
cmddICpPbiBCZWhhbGYgT2YgKlh1eGlhb2h1DQo+ID4+Pj4+PiAqU2VudDoqIFR1ZXNkYXksIE1h
cmNoIDE1LCAyMDE2IDg6MjEgUE0NCj4gPj4+Pj4+ICpUbzoqIFVUVEFSTywgSkFNRVM7IERvbGdh
bm93LCBBbmRyZXcgKE5va2lhIC0gU0cpOyBFWFQgQm90dG9yZmYsDQo+ID4+Pj4+PiBQYXVsOyBS
b24gUGFya2VyOyBTdGV3YXJ0IEJyeWFudDsgYW8udGluZ0B6dGUuY29tLmNuDQo+ID4+Pj4+PiA8
bWFpbHRvOmFvLnRpbmdAenRlLmNvbS5jbj4NCj4gPj4+Pj4+ICpDYzoqIHNmY0BpZXRmLm9yZyA8
bWFpbHRvOnNmY0BpZXRmLm9yZz4NCj4gPj4+Pj4+ICpTdWJqZWN0OiogUmU6IFtzZmNdIFtHUkFZ
TUFJTF0gUmU6IEFkZGluZyBhbiBOU0gubmV4dC1oZWFkZXINCj4gPj4+Pj4+IHR5cGUgb2YgTlNI
DQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4gV2hlbiBhcHBseWluZyBhIHBhcnRpY3VsYXIgU0ZDIChpLmUu
LCBhbiBvcmRlcmVkIGxpc3Qgb2YgU0ZzKSB0bw0KPiA+Pj4+Pj4gdGhlIHNlbGVjdGVkIHRyYWZm
aWMsIHRoZSB0cmFmZmljIG5lZWRzIHRvIGJlIHN0ZWVyZWQgdGhyb3VnaCB0aGUNCj4gPj4+Pj4+
IGNvcnJlc3BvbmRpbmcgU0ZQIChpLmUuLCBhbiBvcmRlcmVkIGxpc3Qgb2YgU0ZGcyBhbmQgU0Zz
KSBpbiB0aGUNCj4gPj4+Pj4+IFNGQy1lbmFibGVkIG5ldHdvcmsuIE1QTFMtU1BSSU5HIGlzIGEg
cGFydGljdWxhciBNUExTIHNvdXJjZQ0KPiA+Pj4+Pj4gcm91dGluZyBwYXJhZGlnbSB3aGVyZSB0
aGUgZXhwbGljaXQgcGF0aCBpbmZvcm1hdGlvbiAoaS5lLiwgYW4NCj4gPj4+Pj4+IG9yZGVyZWQg
bGlzdCBvZiBleHBsaWNpdCBob3BzKSBpcyBlbmNvZGVkIGFzIGEgbGFiZWwgc3RhY2sgKGkuZS4s
DQo+ID4+Pj4+PiBhbiBvcmRlcmVkIGxpc3Qgb2YgbGFiZWxzIHdpdGggZWFjaCBpbmRpY2F0aW5n
IGEgcGFydGljdWxhcg0KPiA+Pj4+Pj4gZXhwbGljaXQgaG9wKSBhbmQgdGhlbiBwaWdneWJhY2tl
ZCBvbiB0aGUgc291cmNlIHJvdXRlZCBwYWNrZXRzLg0KPiA+Pj4+Pj4gVGhlIE1QTFMtU1BSSU5H
IHBhcmFkaWdtIGNhbiBiZSBlYXNpbHkgbGV2ZXJhZ2VkIHRvIHN0ZWVyIHRoZQ0KPiA+Pj4+Pj4g
c2VsZWN0ZWQgdHJhZmZpYyB0aHJvdWdoIGEgcGFydGljdWxhciBTRlAgYnkgZW5jb2RpbmcgdGhl
IFNGUA0KPiA+Pj4+Pj4gaW5mb3JtYXRpb24gYXMgYW4gTVBMUyBsYWJlbCBzdGFjayAoaS5lLiwg
YW4gb3JkZXJlZCBsaXN0IG9mDQo+ID4+Pj4+PiBsYWJlbHMgd2l0aCBlYWNoIGluZGljYXRpbmcg
YSBwYXJ0aWN1bGFyDQo+ID4+Pj4gU0ZGIG9yIFNGKS4NCj4gPj4+Pj4+IEluIHRoaXMgd2F5LCBT
RkZzIGNvdWxkIGJlIGltcGxlbWVudGVkIG9uIGV4aXN0aW5nIE1QTFMgc3dpdGNoZXMNCj4gPj4+
Pj4+IHdpdGhvdXQgYW55IGNoYW5nZSB0byB0aGUgZGF0YS1wbGFuZSBwcm92aWRlZCB0aGF0IFNG
cyBhcmUNCj4gPj4+Pj4+IGNhcGFibGUgb2YgcmVjb2duaXppbmcgTVBMUyBwYWNrZXRzLiAgQXMg
cG9pbnRlZCBvdXQgYnkgc29tZWJvZHkNCj4gPj4+Pj4+IGVsc2UsIGl04oCZcyBtdWNoIHN0cmFp
Z2h0Zm9yd2FyZCB0byBzdXBwb3J0IHRoZSBzdGFjayBvZiBTRkMNCj4gPj4+Pj4+IGVuY2Fwc3Vs
YXRpb25zIGlmIHRoZSBTRkMgZW5jYXBzdWxhdGlvbiBpcyBpbXBsZW1lbnRlZCBpbiB0aGUNCj4g
Pj4+Pj4+IGZvcm0gb2YgYW4NCj4gPj4gTVBMUyBsYWJlbCBzdGFjay4NCj4gPj4+Pj4+DQo+ID4+
Pj4+PiBCZXN0IHJlZ2FyZHMsDQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4gWGlhb2h1DQo+ID4+Pj4+Pg0K
PiA+Pj4+Pj4gKkZyb206KnNmYyBbbWFpbHRvOnNmYy1ib3VuY2VzQGlldGYub3JnXSAqT24gQmVo
YWxmIE9mICpVVFRBUk8sDQo+ID4+Pj4+PiBKQU1FUw0KPiA+Pj4+Pj4gKlNlbnQ6KiBUdWVzZGF5
LCBNYXJjaCAxNSwgMjAxNiA4OjQ2IFBNDQo+ID4+Pj4+PiAqVG86KiBEb2xnYW5vdywgQW5kcmV3
IChOb2tpYSAtIFNHKTsgRVhUIEJvdHRvcmZmLCBQYXVsOyBSb24NCj4gPj4+Pj4+IFBhcmtlcjsg
U3Rld2FydCBCcnlhbnQ7IGFvLnRpbmdAenRlLmNvbS5jbg0KPiA+Pj4+Pj4gPG1haWx0bzphby50
aW5nQHp0ZS5jb20uY24+DQo+ID4+Pj4+PiAqQ2M6KiBzZmNAaWV0Zi5vcmcgPG1haWx0bzpzZmNA
aWV0Zi5vcmc+DQo+ID4+Pj4+PiAqU3ViamVjdDoqIFJlOiBbc2ZjXSBbR1JBWU1BSUxdIFJlOiBB
ZGRpbmcgYW4gTlNILm5leHQtaGVhZGVyDQo+ID4+Pj4+PiB0eXBlIG9mIE5TSA0KPiA+Pj4+Pj4N
Cj4gPj4+Pj4+ICovSWYgd2UgaGF2ZSBhbiBNUExTIGVuYWJsZWQgZmFicmljIHdvdWxkbuKAmXQg
aXQgYmUgc2ltcGxlciB0bw0KPiA+Pj4+Pj4gd2VhdmUgTlNIIGludG8gaXQgaWYgaXQgYWxsIHVz
ZXMgTVBMUz8gSWYgbm90IGhvdyB3b3VsZCB0aGUNCj4gPj4+Pj4+IGludGVyYWN0aW9uIGJldHdl
ZW4gdGhlIHR3byBlbnZpcm9ubWVudHMgd29yaz8vKg0KPiA+Pj4+Pj4NCj4gPj4+Pj4+ICovLyoN
Cj4gPj4+Pj4+DQo+ID4+Pj4+PiAqL0ppbSBVdHRhcm8vKg0KPiA+Pj4+Pj4NCj4gPj4+Pj4+ICov
LyoNCj4gPj4+Pj4+DQo+ID4+Pj4+PiAiL1RoaXMgZW1haWwgYW5kIGFueSBmaWxlcyB0cmFuc21p
dHRlZCB3aXRoIGl0IGFyZSBBVCZUIHByb3BlcnR5LA0KPiA+Pj4+Pj4gYXJlIGNvbmZpZGVudGlh
bCwgYW5kIGFyZSBpbnRlbmRlZCBzb2xlbHkgZm9yIHRoZSB1c2Ugb2YgdGhlDQo+ID4+Pj4+PiBp
bmRpdmlkdWFsIG9yIGVudGl0eSB0byB3aG9tIHRoaXMgZW1haWwgaXMgYWRkcmVzc2VkLiBJZiB5
b3UgYXJlDQo+ID4+Pj4+PiBub3Qgb25lIG9mIHRoZSBuYW1lZCByZWNpcGllbnQocykgb3Igb3Ro
ZXJ3aXNlIGhhdmUgcmVhc29uIHRvDQo+ID4+Pj4+PiBiZWxpZXZlIHRoYXQgeW91IGhhdmUgcmVj
ZWl2ZWQgdGhpcyBtZXNzYWdlIGluIGVycm9yLCBwbGVhc2UNCj4gPj4+Pj4+IG5vdGlmeSB0aGUg
c2VuZGVyIGFuZCBkZWxldGUgdGhpcyBtZXNzYWdlIGltbWVkaWF0ZWx5IGZyb20geW91cg0KPiA+
Pj4+Pj4gY29tcHV0ZXIuIEFueSBvdGhlciB1c2UsIHJldGVudGlvbiwgZGlzc2VtaW5hdGlvbiwg
Zm9yd2FyZGluZywNCj4gPj4+Pj4+IHByaW50aW5nLCBvciBjb3B5aW5nIG9mIHRoaXMgZW1haWwg
aXMgc3RyaWN0bHkgcHJvaGliaXRlZC8uIiovLyoNCj4gPj4+Pj4+DQo+ID4+Pj4+PiAqRnJvbToq
c2ZjIFttYWlsdG86c2ZjLWJvdW5jZXNAaWV0Zi5vcmddICpPbiBCZWhhbGYgT2YgKkRvbGdhbm93
LA0KPiA+Pj4+Pj4gQW5kcmV3IChOb2tpYSAtIFNHKQ0KPiA+Pj4+Pj4gKlNlbnQ6KiBNb25kYXks
IE1hcmNoIDE0LCAyMDE2IDExOjUyIFBNDQo+ID4+Pj4+PiAqVG86KiBFWFQgQm90dG9yZmYsIFBh
dWwNCj4gPj4+Pj4+IDw8bWFpbHRvOnBhdWwuYm90dG9yZmZAaHBlLmNvbT5wYXVsLmJvdHRvcmZm
QGhwZS5jb20+OyBSb24NCj4gUGFya2VyDQo+ID4+Pj4+PiA8Um9uX1BhcmtlckBhZmZpcm1lZG5l
dHdvcmtzLmNvbQ0KPiA+Pj4+Pj4gPG1haWx0bzpSb25fUGFya2VyQGFmZmlybWVkbmV0d29ya3Mu
Y29tPj47IFN0ZXdhcnQgQnJ5YW50DQo+ID4+Pj4+PiA8c3Rld2FydC5icnlhbnRAZ21haWwuY29t
IDxtYWlsdG86c3Rld2FydC5icnlhbnRAZ21haWwuY29tPj47DQo+ID4+Pj4+PiBhby50aW5nQHp0
ZS5jb20uY24gPG1haWx0bzphby50aW5nQHp0ZS5jb20uY24+DQo+ID4+Pj4+PiAqQ2M6KiBzZmNA
aWV0Zi5vcmcgPG1haWx0bzpzZmNAaWV0Zi5vcmc+DQo+ID4+Pj4+PiAqU3ViamVjdDoqIFJlOiBb
c2ZjXSBbR1JBWU1BSUxdIFJlOiBBZGRpbmcgYW4gTlNILm5leHQtaGVhZGVyDQo+ID4+Pj4+PiB0
eXBlIG9mIE5TSA0KPiA+Pj4+Pj4NCj4gPj4+Pj4+IEZvbGxvd2luZyDigJxuZXh0IGhlYWRlcuKA
nSBhcHByb2FjaCAgaXMgc2ltcGxlIGFuZCB0aGUgTlNIIGhlYWRlciBpcw0KPiA+Pj4+Pj4gYWxy
ZWFkeSBidWlsdCBsaWtlIHRoYXQuIEludHJvZHVjaW5nIE1QTFMgbGlrZSBhcHByb2FjaCB3b3Vs
ZCBhZGQNCj4gPj4+Pj4+IHlldCBhbm90aGVyIG1lY2hhbmlzbSB0byB0cmF2ZXJzZSB0aGUgaGVh
ZGVycywgd2hpY2ggd291bGQgbWFrZQ0KPiA+Pj4+Pj4gaC93IG1vcmUgY29tcGxleC4NCj4gPj4+
Pj4+DQo+ID4+Pj4+PiBJdCBpcyB0cnVlIHRoYXQgaC93IGNhbiBvbmx5IGxvb2sgYXQgWCBCeXRl
cyAoWCBkZXBlbmRpbmcgb24gaC93KS4NCj4gPj4+Pj4+IFRoaXMgaXMgdHJ1ZSBmb3IgbWFueSBo
ZWFkZXJzIG5vdCBvbmx5IHRoaXMgYW5kIGV2ZW4gdG9kYXkNCj4gPj4+Pj4+ICh3aXRob3V0DQo+
ID4+Pj4+PiBOU0gpIHlvdSBjYW4gZW5kLXVwIHdpdGggcGF5bG9hZCBiZWluZyB2ZXJ5IGRlZXAg
aW4gYSBwYWNrZXQuIEF0DQo+ID4+Pj4+PiB0aGUgZW5kIHdlIG5lZWQgdG8gaGF2ZSBhIGZsZXhp
YmxlIG1lY2hhbmlzbSB3aGljaCBOU0ggbmVzdGluZw0KPiA+Pj4+Pj4gd291bGQgcHJvdmlkZS4g
SWYgc29tZW9uZSDigJxhYnVzZXMgaXTigJ0gdGhpcyBjYW4gbGVhZCB0byB2YXJpb3VzDQo+ID4+
Pj4+PiBpc3N1ZXMuIEl0IGlzIHByb2JhYmx5IHdvcnRoIG5vdGluZyB0aGF0IGluIHRoZSBkcmFm
dCBpbmNsdWRpbmcNCj4gPj4+Pj4+IHNlY3VyaXR5IGNvbnNpZGVyYXRpb25zIChieSBhZGRpbmcg
bGFyZ2UgaGVhZGVycyBpdCB3aWxsIGJlDQo+ID4+Pj4+PiBoYXJkZXIgdG8gcGVyZm9ybSBwYXls
b2FkIGJhc2VkIEFDTCBERG9TIHByb3RlY3Rpb24gaW4gcm91dGVycyBmb3INCj4gZXhhbXBsZSku
DQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4gQW5kcmV3DQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4gT24gMjAxNi0w
My0xNSwgMzowMyBBTSwgInNmYyBvbiBiZWhhbGYgb2YgRVhUIEJvdHRvcmZmLCBQYXVsIiB3cm90
ZToNCj4gPj4+Pj4+DQo+ID4+Pj4+PiAgICBKdXN0IG9uZSBtb3JlIGNvbmNlcm4gYWJvdXQgdGhl
IHN0YWNrIGlzIGhvdyBkZWVwIGl0IHdpbGwgbmVzdC4NCj4gPj4+Pj4+ICAgIEhhcmR3YXJlIHN3
aXRjaCBpbXBsZW1lbnRhdGlvbnMgYXJlIHR5cGljYWxseSBsaW1pdGVkIGluIHRoZQ0KPiA+Pj4+
IGRlcHRoDQo+ID4+Pj4+PiAgICB0aGV5IGxvb2sgaW50byB0aGUgcGFja2V0LiBJZiB0aGUgaGFy
ZHdhcmUgbmVlZHMgdG8gbG9vayBhdCB0aGUNCj4gPj4+Pj4+ICAgIG9yaWdpbmFsIHBhY2tldCBo
ZWFkZXJzLCB0aGVuIGhhcmR3YXJlIHdvdWxkIG5lZWQgdG8gc2tpcCBvdmVyDQo+ID4+Pj4gdGhl
DQo+ID4+Pj4+PiAgICBzdGFjayBvZiBOU0ggaGVhZGVycyB0byByZWFjaCB0aGUgb3JpZ2luYWwg
cGFja2V0LiBJZiB0aGUgTlNIDQo+ID4+Pj4+PiAgICBzdGFjayBpcyB0b28gZGVlcCBpdCBtYXkg
ZXhjZWVkIHRoZSBoYXJkd2FyZSBkZXB0aCBsaW1pdHMuDQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4gICAg
Q2hlZXJzLA0KPiA+Pj4+Pj4NCj4gPj4+Pj4+DQo+ID4+Pj4+PiAgICBQYXVsDQo+ID4+Pj4+Pg0K
PiA+Pj4+Pj4gICAgKkZyb206KnNmYyBbbWFpbHRvOnNmYy1ib3VuY2VzQGlldGYub3JnXSAqT24g
QmVoYWxmIE9mICpSb24NCj4gPj4+PiBQYXJrZXINCj4gPj4+Pj4+ICAgICpTZW50OiogTW9uZGF5
LCBNYXJjaCAxNCwgMjAxNiAxMTo0NSBBTQ0KPiA+Pj4+Pj4gICAgKlRvOiogU3Rld2FydCBCcnlh
bnQNCj4gPj4+Pj4+DQo+IDw8bWFpbHRvOnN0ZXdhcnQuYnJ5YW50QGdtYWlsLmNvbT5zdGV3YXJ0
LmJyeWFudEBnbWFpbC5jb20+Ow0KPiA+Pj4+Pj4gICAgYW8udGluZ0B6dGUuY29tLmNuIDxtYWls
dG86YW8udGluZ0B6dGUuY29tLmNuPg0KPiA+Pj4+Pj4gICAgKkNjOiogc2ZjQGlldGYub3JnIDxt
YWlsdG86c2ZjQGlldGYub3JnPg0KPiA+Pj4+Pj4gICAgKlN1YmplY3Q6KiBSZTogW3NmY10gW0dS
QVlNQUlMXSBSZTogQWRkaW5nIGFuIE5TSC5uZXh0LWhlYWRlcg0KPiA+Pj4+IHR5cGUNCj4gPj4+
Pj4+ICAgIG9mIE5TSA0KPiA+Pj4+Pj4NCj4gPj4+Pj4+ICAgIEkgbGlrZSB0aGUgc2VsZiBkZXNj
cmliaW5nIHN0YWNrIG9mIE5TSCBoZWFkZXJzIGFuZCBJIGxpa2UgdGhlDQo+ID4+Pj4+PiAgICBm
aXJzdCBvbmUgYmVpbmcgdGhlIOKAnGN1cnJlbnTigJ0gc2NvcGluZy4gICBCdXQsIG9uZSBkaWZm
ZXJlbmNlDQo+ID4+Pj4+PiAgICBiZXR3ZWVuIE1QTFMgYW5kIE5TSOKApiAgIE1QTFMgZm9yd2Fy
ZGluZyBpcyBnZW5lcmFsbHkgaGFuZGxlZA0KPiA+PiBieQ0KPiA+Pj4+Pj4gICAgbG9va2luZyBv
bmx5IGF0IHRoZSBNUExTIGxhYmVscyB0aGF0IGFyZSDigJxpbiBzY29wZeKAnSBmb3IgdGhlDQo+
ID4+Pj4+PiAgICBjdXJyZW50IG5vZGUgKGkuZS4sIHN0YXJ0aW5nIGF0IHRoZSB0b3Atb2Ytc3Rh
Y2spIGFuZCBub3QgbmVlZGluZw0KPiA+Pj4+Pj4gICAgdG8gbG9jYXRlIGFuZCBwcm9jZXNzIHRo
ZSDigJxwYXlsb2Fk4oCdIGJleW9uZCB0aGUgYm90dG9tLW9mLXN0YWNrLg0KPiA+Pj4+Pj4gICAg
QnV0LCBpbiBOU0gsIG1vc3QgcHJvY2Vzc2luZyB3aWxsIHJlcXVpcmUgbG9jYXRpb24gb2YgdGhl
DQo+ID4+Pj4+PiAgICDigJxwYXlsb2Fk4oCdIGJleW9uZCB0aGUgbGFzdCBOU0ggaGVhZGVyLiAg
IEl0IGlzIGluZWZmaWNpZW50IHRvIGhhdmUNCj4gPj4+Pj4+ICAgIHRvIHdhbGsgdGhlIHN0YWNr
IG9mIE5TSCBoZWFkZXJzIGluIG9yZGVyIHRvIGxvY2F0ZSB0aGF0DQo+ID4+Pj4+PiAgICBwYXls
b2FkLiAgICBJZiBlYWNoIE5TSCBoZWFkZXIgdGhhdCB3YXMgcHVzaGVkIG9udG8gdGhlIHN0YWNr
DQo+ID4+Pj4gYWxzbw0KPiA+Pj4+Pj4gICAgaW5jbHVkZWQgYW4gb2Zmc2V0IHRvIGRpcmVjdGx5
IGxvY2F0ZSB0aGUgcGF5bG9hZCAoZWFjaCBuZXcgb25lDQo+ID4+Pj4+PiAgICBzaW1wbHkgYWRk
cyBpdHMgb3duIGJ5dGUgc2l6ZSksIHRoZW4gdGhpcyBwcm9jZXNzaW5nIGluZWZmaWNpZW5jeQ0K
PiA+Pj4+Pj4gICAgd291bGQgYmUgbWl0aWdhdGVkLg0KPiA+Pj4+Pj4NCj4gPj4+Pj4+ICAgIFJv
bg0KPiA+Pj4+Pj4NCj4gPj4+Pj4+ICAgICpGcm9tOipzZmMgW21haWx0bzpzZmMtYm91bmNlc0Bp
ZXRmLm9yZ10gKk9uIEJlaGFsZiBPZg0KPiA+Pj4+Pj4gKlN0ZXdhcnQNCj4gPj4+PiBCcnlhbnQN
Cj4gPj4+Pj4+ICAgICpTZW50OiogTW9uZGF5LCBNYXJjaCAxNCwgMjAxNiA1OjQwIEFNDQo+ID4+
Pj4+PiAgICAqVG86KiBhby50aW5nQHp0ZS5jb20uY24gPG1haWx0bzphby50aW5nQHp0ZS5jb20u
Y24+DQo+ID4+Pj4+PiAgICAqQ2M6KiBzZmNAaWV0Zi5vcmcgPG1haWx0bzpzZmNAaWV0Zi5vcmc+
DQo+ID4+Pj4+PiAgICAqU3ViamVjdDoqIFtHUkFZTUFJTF0gUmU6IFtzZmNdIEFkZGluZyBhbiBO
U0gubmV4dC1oZWFkZXIgdHlwZQ0KPiA+Pj4+Pj4gb2YgTlNIDQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4N
Cj4gPj4+Pj4+ICAgIEhhdmluZyByZW1pbmRlZCBteXNlbGYgb2YgdGhlIE5TSCBoZWFkZXIgc3Ry
dWN0dXJlLCBJIHNlZSB0aGF0DQo+ID4+Pj4gdGhpcw0KPiA+Pj4+Pj4gICAgaXMgbm90IHN0cmlj
dGx5IG5lZWRlZCBzaW5jZSB0aGlzIG5hdHVyYWxseSBmaXRzIHdpdGggdGhlIG5leHQNCj4gPj4+
Pj4+ICAgIHByb3RvY29sIGNvbXBvbmVudCBvZiB0aGUgYmFzZSBoZWFkZXIuIFRodXMgc3RhdGlu
ZyB0aGF0IHRoZQ0KPiA+Pj4+IHRoZXJlDQo+ID4+Pj4+PiAgICBpcyBubyBhcmNoaXRlY3R1cmFs
IGxpbWl0IG9uIHRoZSBudW1iZXIgb2YgU0ZIIGhlYWRlcnMgaW4gYQ0KPiA+Pj4+IHBhY2tldA0K
PiA+Pj4+Pj4gICAgaXMgdGhlIG5lY2Vzc2FyeSBhbmQgc3VmZmljaWVudCByZXF1aXJlbWVudCB0
byBhbGxvdyBhbiBhcmJpdGF0cnkNCj4gPj4+Pj4+ICAgIHN0YWNrIG9mIE5TSCBoZWFkZXJzLiBT
dGF0aW5nIHRoYXQgbmV3IE5TSCBoZWFkZXJzIGFyZSBhZGRlZCBhdA0KPiA+Pj4+Pj4gICAgdGhl
IGZyb250DQo+ID4+Pj4+PiAgICBvZiB0aGUgcGFja2V0LCBhbmQgcHJvY2Vzc2VkIGZpcnN0IGFu
ZCBkaXNjYXJkZWQgZmlyc3QgaXMNCj4gPj4+PiBzdWZmaWNpZW50DQo+ID4+Pj4+PiAgICB0byBy
ZW1vdmUgYW55IHByb2Nlc3NpbmcgYW1iaWd1aXR5LiBQcm9jZXNzaW5nIHdvdWxkIGFsc28gYmUN
Cj4gPj4+PiBzaW1wbGVyDQo+ID4+Pj4+PiAgICBpcyB5b3UgZm9sbG93ZWQgdGhlIE1QTFMgcnVs
ZSB0aGF0IHRoZSBvdXRlciBoZWFkZXIgaXMgdGhlDQo+ID4+Pj4+PiBvbmx5DQo+ID4+Pj4gb25l
DQo+ID4+Pj4+PiAgICBpbiBzY29wZSB1bnRpbCB0aGF0IGhlYWRlciBpcyBkaXNjYXJkZWQgKHBv
cHBlZCkuDQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4gICAgSSBkbyBob3dldmVyIHdvbmRlciB3aGV0aGVy
IHRoZSBJRVRGJ3MgYXJjaGl0ZXR1cmFsIHByZWZlcmVuY2UNCj4gPj4+PiBmb3INCj4gPj4+Pj4+
ICAgIHNlbGYgZGVzY3JpYmluZyBwYWNrZXRzIChNUExTIGJlaW5nIHRoZSBleGNlcHRpb24pIGxl
YWRzIHVzIHRvDQo+ID4+Pj4gbW9yZQ0KPiA+Pj4+Pj4gICAgY29tcGxleCBhbmQgdGh1cyBsZXNz
IGVmZmljZW50IGRhdGFwbGFuZSBkZXNpZ25zIHRoYW4gd2UgY291bGQNCj4gPj4+Pj4+ICAgIG90
aGVyd2lzZQ0KPiA+Pj4+Pj4gICAgYWNoaWV2ZS4NCj4gPj4+Pj4+DQo+ID4+Pj4+PiAgICAtIFN0
ZXdhcnQNCj4gPj4+Pj4+DQo+ID4+Pj4+PiAgICBPbiAxNC8wMy8yMDE2IDAxOjQ0LCBhby50aW5n
QHp0ZS5jb20uY24NCj4gPj4+Pj4+ICAgIDxtYWlsdG86YW8udGluZ0B6dGUuY29tLmNuPiB3cm90
ZToNCj4gPj4+Pj4+DQo+ID4+Pj4+PiAgICAgICAgU3Rld2FydCwNCj4gPj4+Pj4+DQo+ID4+Pj4+
PiAgICAgICAgVGhhbmtzLg0KPiA+Pj4+Pj4NCj4gPj4+Pj4+ICAgICAgICBEbyB5b3UgbWVhbiB3
ZSBzaG91bGQgYWRkIGFuIGluZGljYXRvciBmb3IgdGhlIG5lc3RlZCBOU0g/DQo+ID4+IEkNCj4g
Pj4+Pj4+ICAgICAgICBhZ3JlZSBhbnl0aGluZyBuZXcgc2hvdWxkIGJlIGNvbnNpZGVyZWQgY2Fy
ZWZ1bGx5LiBBbmQgdGhhdCdzDQo+ID4+Pj4+PiAgICAgICAgd2hhdCB3ZSBhcmUgZG9pbmcgcmln
aHQgbm93LjopDQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4NCj4gPj4+Pj4+DQo+ID4+Pj4+Pg0KPiA+Pj4+
Pj4NCj4gPj4+Pj4+DQo+ID4+Pj4+PiAgICAgICAg5Y+R5Lu25Lq6OiBTdGV3YXJ0IEJyeWFudCA8
c3Rld2FydC5icnlhbnRAZ21haWwuY29tPg0KPiA+Pj4+Pj4gICAgICAgIDxtYWlsdG86c3Rld2Fy
dC5icnlhbnRAZ21haWwuY29tPg0KPiA+Pj4+Pj4gICAgICAgIOaUtuS7tuS6ujoNCj4gPj4+Pj4+
DQo+ID4+Pj4+PiA8bWFpbHRvOnNmY0BpZXRmLm9yZz4ic2ZjQGlldGYub3JnIjxtYWlsdG86c2Zj
QGlldGYub3JnPjxzZmNAaWV0Zi4NCj4gPj4+Pj4+IG9yZw0KPiA+Pj4+Pj4+ICwNCj4gPj4+Pj4+
DQo+ID4+Pj4+PiAgICAgICAg5pel5pyfOiAyMDE2LzAzLzExIDE3OjI1DQo+ID4+Pj4+PiAgICAg
ICAg5Li76aKYOiBSZTogW3NmY10gQWRkaW5nIGFuIE5TSC5uZXh0LWhlYWRlciB0eXBlIG9mIE5T
SA0KPiA+Pj4+Pj4gICAgICAgIOWPkeS7tuS6ujogInNmYyIgPHNmYy1ib3VuY2VzQGlldGYub3Jn
Pg0KPiA+Pj4+Pj4gPG1haWx0bzpzZmMtYm91bmNlc0BpZXRmLm9yZz4NCj4gPj4+Pj4+DQo+ID4+
Pj4+Pg0KPiA+Pj4+Pj4gLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCj4gPj4+Pj4+IC0NCj4gPj4+Pj4+IC0tLQ0KPiA+Pj4+
Pj4gLS0tDQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4NCj4gPj4+Pj4+DQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4N
Cj4gPj4+Pj4+ICAgICAgICBUaGUgcHJvdG9jb2wgdGhhdCBjaG9zZSB0aGUgbW9zdCBlbGVnYW50
IGFwcHJvYWNoIHRvIGxheWVyaW5nDQo+ID4+Pj4+PiAgICAgICAgb25lIGhlYWRlciBvbiBhbm90
aGVyIHdhcyBNUExTLCB3aXRoIGl0cyBzdGFja2luZyBhcHByb2FjaA0KPiA+Pj4+Pj4gICAgICAg
IGFuZCBvbmUgYml0IGVuZCBvZiBzdGFjayBpbmRpY2F0b3IuDQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4g
ICAgICAgIFN1Y2ggYSBzaW1wbGUgZ2VuZXJhbCBhcHByb2FjaCBoYXMgbXVjaCB0byBjb21tZW5k
IGl0DQo+ID4+Pj4+PiAgICAgICAgYW5kIHlvdSBtaWdodCB0aGluayBzZXJpb3VzbHkgYWJvdXQg
YXBwbHlpbmcgaXQgaGVyZS4NCj4gPj4+Pj4+DQo+ID4+Pj4+PiAgICAgICAgU3Rld2FydA0KPiA+
Pj4+Pj4NCj4gPj4+Pj4+ICAgICAgICBfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fXw0KPiA+Pj4+Pj4gICAgICAgIHNmYyBtYWlsaW5nIGxpc3QNCj4gPj4+Pj4+
ICAgICAgICBzZmNAaWV0Zi5vcmcgPG1haWx0bzpzZmNAaWV0Zi5vcmc+DQo+ID4+Pj4+Pg0KPiA+
Pj4+Pj4gPGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjPmh0dHBzOi8v
d3d3LmlldGYub3JnL20NCj4gPj4+Pj4+IGENCj4gPj4+Pj4+IGlsbQ0KPiA+Pj4+Pj4gYW4vbGlz
dGluZm8vc2ZjDQo+ID4+Pj4+Pg0KPiA+Pj4+Pg0KPiA+Pj4+Pg0KPiA+Pj4+Pg0KPiA+Pj4+PiBf
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KPiA+Pj4+PiBz
ZmMgbWFpbGluZyBsaXN0DQo+ID4+Pj4+IHNmY0BpZXRmLm9yZw0KPiA+Pj4+PiBodHRwczovL3d3
dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL3NmYw0KPiA+Pj4+Pg0KPiA+Pj4gX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCj4gPj4+IHNmYyBtYWlsaW5n
IGxpc3QNCj4gPj4+IHNmY0BpZXRmLm9yZw0KPiA+Pj4gaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFp
bG1hbi9saXN0aW5mby9zZmMNCj4gPg0KPiA+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fDQo+ID4gc2ZjIG1haWxpbmcgbGlzdA0KPiA+IHNmY0BpZXRmLm9y
Zw0KPiA+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjDQoNCg==


From nobody Tue Apr  5 06:37:59 2016
Return-Path: <xuxiaohu@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4CDA12D951 for <sfc@ietfa.amsl.com>; Tue,  5 Apr 2016 06:33:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.231
X-Spam-Level: 
X-Spam-Status: No, score=-4.231 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n3JQQPl7D0Am for <sfc@ietfa.amsl.com>; Tue,  5 Apr 2016 06:33:28 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 852D912D974 for <sfc@ietf.org>; Tue,  5 Apr 2016 06:32:43 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml703-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CLP43048; Tue, 05 Apr 2016 13:32:38 +0000 (GMT)
Received: from NKGEML411-HUB.china.huawei.com (10.98.56.70) by lhreml703-cah.china.huawei.com (10.201.5.104) with Microsoft SMTP Server (TLS) id 14.3.235.1; Tue, 5 Apr 2016 14:32:32 +0100
Received: from NKGEML515-MBX.china.huawei.com ([fe80::a54a:89d2:c471:ff]) by nkgeml411-hub.china.huawei.com ([10.98.56.70]) with mapi id 14.03.0235.001; Tue, 5 Apr 2016 21:32:18 +0800
From: Xuxiaohu <xuxiaohu@huawei.com>
To: "UTTARO, JAMES" <ju1738@att.com>, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Thread-Topic: [sfc] [GRAYMAIL] Re: Adding an NSH.next-header type of NSH
Thread-Index: AQHRgGIbhNHv82pdBEmnzsTX6DSc4Z9dP1yAgAF9ZiCABNXngIABJ6ZAgABDfACAAU4y8IATgfMAgAGu3yo=
Date: Tue, 5 Apr 2016 13:32:18 +0000
Message-ID: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D537A3F@NKGEML515-MBX.china.huawei.com>
References: <E8355113905631478EFF04F5AA706E9830EC999B@wtl-exchp-2.sandvine.com> <56E68706.7090505@gmail.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D76CB4B@MBX021-W3-CA-2.exch021.domain.local> <TU4PR84MB0159958D81B6E6403AA5E589FE880@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <D30DA4B4.934A6%andrew.dolganow@alcatel-lucent.com> <B17A6910EEDD1F45980687268941550F135E305A@MISOUT7MSGUSRCD.ITServices.sbc.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D5331C8@NKGEML515-MBX.china.huawei.com> <E8355113905631478EFF04F5AA706E9830ED43D0@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D76DD42@MBX021-W3-CA-2.exch021.domain.local> <B17A6910EEDD1F45980687268941550F135E36D7@MISOUT7MSGUSRCD.ITServices.sbc.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D76EE8A@MBX021-W3-CA-2.exch021.domain.local> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D5337B6@NKGEML515-MBX.china.huawei.com> <B17A6910EEDD1F45980687268941550F135E3FB5@MISOUT7MSGUSRCD.ITServices.sbc.com> <56EACDC7.7060000@gmail.com> <56EACF91.6070703@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D533D68@NKGEML515-MBX.china.huawei.com> <D3159608.49136%jguichar@cisco.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D534964@NKGEML515-MBX.china.huawei.com> <EA4174BD-7054-47F1-8A74-B8E6E04A8246@cisco.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D534D9F@NKGEML515-MBX.china.huawei.com>, <B17A6910EEDD1F45980687268941550F135EF925@MISOUT7MSGUSRCD.ITServices.sbc.com>
In-Reply-To: <B17A6910EEDD1F45980687268941550F135EF925@MISOUT7MSGUSRCD.ITServices.sbc.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.212.197.133]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020204.5703BE78.0310, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 753fd124a36cb84618dc75ee40a7c856
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/V7NA8UYG9ru4_J2hEiwqp8mMs40>
X-Mailman-Approved-At: Tue, 05 Apr 2016 06:37:53 -0700
Cc: Ron Parker <Ron_Parker@affirmednetworks.com>, "sfc@ietf.org" <sfc@ietf.org>, "EXT Bottorff,  Paul" <paul.bottorff@hpe.com>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, "Dolganow, Andrew \(Nokia - SG\)" <andrew.dolganow@nokia.com>, "ao.ting@zte.com.cn" <ao.ting@zte.com.cn>, Stewart Bryant <stewart.bryant@gmail.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Dave Dolson <ddolson@sandvine.com>
Subject: Re: [sfc] [GRAYMAIL] Re: Adding an NSH.next-header type of NSH
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Apr 2016 13:33:36 -0000
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From nobody Tue Apr  5 06:59:55 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB5A912D18F for <sfc@ietfa.amsl.com>; Tue,  5 Apr 2016 06:56:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.93
X-Spam-Level: 
X-Spam-Status: No, score=-1.93 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V4A8IuFtNEi7 for <sfc@ietfa.amsl.com>; Tue,  5 Apr 2016 06:56:08 -0700 (PDT)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id B149A12D11B for <sfc@ietf.org>; Tue,  5 Apr 2016 06:56:08 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Tue, 5 Apr 2016 09:56:07 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: Xuxiaohu <xuxiaohu@huawei.com>, "UTTARO, JAMES" <ju1738@att.com>, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Thread-Topic: [sfc] Comments on draft-ietf-sfc-nsh [was Adding an NSH.next-header type of NSH]
Thread-Index: AdGPQtdy/i1AdXCZT2K2Ny8kyOdMFQ==
Date: Tue, 5 Apr 2016 13:56:07 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F07B68@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [31.133.161.186]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ACp2v0tHLnIcJHAofsw47-zwWdc>
X-Mailman-Approved-At: Tue, 05 Apr 2016 06:59:54 -0700
Cc: Ron Parker <Ron_Parker@affirmednetworks.com>, "sfc@ietf.org" <sfc@ietf.org>, "EXT Bottorff, Paul" <paul.bottorff@hpe.com>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, "Dolganow, Andrew \(Nokia - SG\)" <andrew.dolganow@nokia.com>, "ao.ting@zte.com.cn" <ao.ting@zte.com.cn>, Stewart Bryant <stewart.bryant@gmail.com>, "Joel M. Halpern" <jmh@joelhalpern.com>
Subject: Re: [sfc] Comments on draft-ietf-sfc-nsh [was Adding an NSH.next-header type of NSH]
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Apr 2016 13:56:10 -0000
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From nobody Tue Apr  5 18:44:01 2016
Return-Path: <youjianjie@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 648C612D173 for <sfc@ietfa.amsl.com>; Tue,  5 Apr 2016 18:43:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.23
X-Spam-Level: 
X-Spam-Status: No, score=-4.23 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 758EpqmVfcOe for <sfc@ietfa.amsl.com>; Tue,  5 Apr 2016 18:43:57 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3F6A412D59C for <sfc@ietf.org>; Tue,  5 Apr 2016 18:43:56 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml704-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CLP93511; Wed, 06 Apr 2016 01:43:54 +0000 (GMT)
Received: from NKGEML412-HUB.china.huawei.com (10.98.56.73) by lhreml704-cah.china.huawei.com (10.201.5.130) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 6 Apr 2016 02:43:52 +0100
Received: from NKGEML515-MBX.china.huawei.com ([fe80::a54a:89d2:c471:ff]) by nkgeml412-hub.china.huawei.com ([10.98.56.73]) with mapi id 14.03.0235.001; Wed, 6 Apr 2016 09:43:46 +0800
From: Youjianjie <youjianjie@huawei.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: Legacy SF
Thread-Index: AQHQsOmuFIw1+/NXJ0OcpkbP+ocVYp3OOASgga+w3SA=
Date: Wed, 6 Apr 2016 01:43:46 +0000
Message-ID: <F6C28B32DA084644BB6C8D0BD65B669DBDFB2A@NKGEML515-MBX.china.huawei.com>
References: <D1B4325F.13358%jguichar@cisco.com> <E33E01DFD5BEA24B9F3F18671078951F652CC327@nkgeml501-mbs.china.huawei.com>
In-Reply-To: <E33E01DFD5BEA24B9F3F18671078951F652CC327@nkgeml501-mbs.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.136.78.148]
Content-Type: multipart/alternative; boundary="_000_F6C28B32DA084644BB6C8D0BD65B669DBDFB2ANKGEML515MBXchina_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020204.570469DA.00C9, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 578413445d7edf4f2ce797e8c4077d31
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/XoLbwWICN-EXDu4RKtfQ75UDwEU>
Subject: [sfc] Legacy SF
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Apr 2016 01:43:59 -0000

--_000_F6C28B32DA084644BB6C8D0BD65B669DBDFB2ANKGEML515MBXchina_
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
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==

--_000_F6C28B32DA084644BB6C8D0BD65B669DBDFB2ANKGEML515MBXchina_
Content-Type: text/html; charset="gb2312"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dgb2312">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"PT Sans Caption";}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
h2
	{mso-style-priority:9;
	mso-style-link:"\6807\9898 2 Char";
	margin-top:15.75pt;
	margin-right:0cm;
	margin-bottom:7.9pt;
	margin-left:0cm;
	page-break-after:avoid;
	font-size:19.5pt;
	font-family:"PT Sans Caption";
	font-weight:normal;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"\7EAF\6587\672C Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.5pt;
	font-family:"Calibri","sans-serif";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"\6279\6CE8\6846\6587\672C Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:9.0pt;
	font-family:"Times New Roman","serif";}
span.2Char
	{mso-style-name:"\6807\9898 2 Char";
	mso-style-priority:9;
	mso-style-link:"\6807\9898 2";
	font-family:"PT Sans Caption";}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.Char
	{mso-style-name:"\6279\6CE8\6846\6587\672C Char";
	mso-style-priority:99;
	mso-style-link:\6279\6CE8\6846\6587\672C;
	font-family:SimSun;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.Char0
	{mso-style-name:"\7EAF\6587\672C Char";
	mso-style-priority:99;
	mso-style-link:\7EAF\6587\672C;
	font-family:"Calibri","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1505852374;
	mso-list-template-ids:998550512;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level2
	{mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level3
	{mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level4
	{mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level5
	{mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level6
	{mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level7
	{mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level8
	{mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level9
	{mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l1
	{mso-list-id:1907910121;
	mso-list-template-ids:-1317241974;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Hi all,<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Would you =
like to review legacy-SF draft?
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Thanks,<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Jianjie<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">A new version of I-D, draft-=
song-sfc-legacy-sf-mapping-07.txt<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">has been successfully submit=
ted by Jianjie You and posted to the IETF repository.<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Name:&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; draft-song-sf=
c-legacy-sf-mapping<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Revision:&nbsp; 07<o:p></o:p=
></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Title:&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; SFC Header Mapping for Legacy SF<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Document date:&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp; 2016-04-05<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Group:&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Individual S=
ubmission<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Pages:&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 17<o:p></o:p=
></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">URL:&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=3D"https://www.ietf.org/=
internet-drafts/draft-song-sfc-legacy-sf-mapping-07.txt">
https://www.ietf.org/internet-drafts/draft-song-sfc-legacy-sf-mapping-07.tx=
t</a><o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Status:&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=3D"https://datatracker.ietf.org/doc/dra=
ft-song-sfc-legacy-sf-mapping/">
https://datatracker.ietf.org/doc/draft-song-sfc-legacy-sf-mapping/</a><o:p>=
</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Htmlized:&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp; <a href=3D"https://tools.ietf.org/html/draft-song-sfc-leg=
acy-sf-mapping-07">
https://tools.ietf.org/html/draft-song-sfc-legacy-sf-mapping-07</a><o:p></o=
:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Diff:&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=3D"https://www.ietf.org/rfcdi=
ff?url2=3Ddraft-song-sfc-legacy-sf-mapping-07">
https://www.ietf.org/rfcdiff?url2=3Ddraft-song-sfc-legacy-sf-mapping-07</a>=
<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Abstract:<o:p></o:p></span><=
/p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">&nbsp;&nbsp; A Service Funct=
ion Chain (SFC) defines a set of abstract Service<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">&nbsp;&nbsp; Functions (SF) =
and ordering constraints that must be applied to<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">&nbsp;&nbsp; packets and/or =
frames selected as a result of classification.&nbsp; One<o:p></o:p></span><=
/p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">&nbsp;&nbsp; assumption of t=
his document is that legacy service functions can<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">&nbsp;&nbsp; participate in =
service function chains without having support for the<o:p></o:p></span></p=
>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">&nbsp;&nbsp; SFC header, or =
even being aware of it.&nbsp; This document provides a<o:p></o:p></span></p=
>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">&nbsp;&nbsp; mechanism betwe=
en an SFC proxy and an SFC-unaware service function<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">&nbsp;&nbsp; (herein termed =
&quot;legacy SF&quot;), to identify the SFC header associated<o:p></o:p></s=
pan></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">&nbsp;&nbsp; with a packet t=
hat is returned from a legacy SF, without an SFC<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">&nbsp;&nbsp; header being ex=
plicitly carried in the wired protocol between SFC<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">&nbsp;&nbsp; proxy and legac=
y SF.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:SimSu=
n">=B7=A2=BC=FE=C8=CB<span lang=3D"EN-US">:</span></span></b><span lang=3D"=
EN-US" style=3D"font-size:10.0pt;font-family:SimSun"> sfc [mailto:sfc-bounc=
es@ietf.org]
</span><b><span style=3D"font-size:10.0pt;font-family:SimSun">=B4=FA=B1=ED =
</span></b><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:SimSu=
n">Songhaibin (A)<br>
</span><b><span style=3D"font-size:10.0pt;font-family:SimSun">=B7=A2=CB=CD=
=CA=B1=BC=E4<span lang=3D"EN-US">:</span></span></b><span lang=3D"EN-US" st=
yle=3D"font-size:10.0pt;font-family:SimSun"> 2015</span><span style=3D"font=
-size:10.0pt;font-family:SimSun">=C4=EA<span lang=3D"EN-US">7</span>=D4=C2<=
span lang=3D"EN-US">6</span>=C8=D5<span lang=3D"EN-US">
 17:24<br>
</span><b>=CA=D5=BC=FE=C8=CB<span lang=3D"EN-US">:</span></b><span lang=3D"=
EN-US"> Jim Guichard (jguichar); sfc@ietf.org<br>
</span><b>=D6=F7=CC=E2<span lang=3D"EN-US">:</span></b><span lang=3D"EN-US"=
> Re: [sfc] SFC WG agenda slots - Prague<o:p></o:p></span></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Hi Jim,<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<h2><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibr=
i&quot;,&quot;sans-serif&quot;;color:#1F497D">I would like to request a ver=
y short slot presentation for draft-song-sfc-legacy-sf-mapping-05. This doc=
ument serves the purpose how legacy service functions can
 participate in the service function chaining. There are some updates. We m=
ake it informational and remove RFC 2119 language, and add a little more de=
ployment considerations, and also clarify on the meta data problem.
<o:p></o:p></span></h2>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<div>
<p class=3D"MsoNormal" style=3D"text-align:justify;text-justify:inter-ideog=
raph"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Cali=
bri&quot;,&quot;sans-serif&quot;;color:#1F497D">Best Regards!<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal" style=3D"text-align:justify;text-justify:inter-ideog=
raph"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Cali=
bri&quot;,&quot;sans-serif&quot;;color:#1F497D">-Haibin<o:p></o:p></span></=
p>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span =
lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&qu=
ot;sans-serif&quot;"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto:s=
fc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Jim Guichard (jguichar)<br>
<b>Sent:</b> Saturday, June 27, 2015 10:58 PM<br>
<b>To:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> [sfc] SFC WG agenda slots - Prague<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Greetings WG=
:<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;<=
/o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Our meeting =
in Prague is fast approaching. As always the goal of the meeting will be to=
 make the best use of our limited face-to-face time. With
 that in mind we welcome requests for agenda time.&nbsp;<o:p></o:p></span><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;<=
/o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">As we build =
the meeting agenda our goal will be to select presentations that best furth=
er the work of the WG, and that generally means focusing on
 key charter deliverables and topics with important open issues to resolve.=
 When making a request please consider what you think the WG should do with=
 its content =A8C for example:<o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;">Does the document have useful content that shou=
ld be moved into another WG document or progress on its own merit<o:p></o:p=
></span></li><li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-al=
t:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;">Does the content have a good basis for one of t=
he WG documents per the charter<o:p></o:p></span></li><li class=3D"MsoNorma=
l" style=3D"color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;=
mso-list:l0 level1 lfo3">
<span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;">Should the document content be merged with one =
or more other documents, so that a combined document could become a WG docu=
ment<o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Jim &amp; Th=
omas<o:p></o:p></span></p>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_F6C28B32DA084644BB6C8D0BD65B669DBDFB2ANKGEML515MBXchina_--


From nobody Wed Apr  6 07:13:31 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7017612D1C7 for <sfc@ietfa.amsl.com>; Wed,  6 Apr 2016 07:13:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level: 
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rHXg91u1llbJ for <sfc@ietfa.amsl.com>; Wed,  6 Apr 2016 07:13:29 -0700 (PDT)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) by ietfa.amsl.com (Postfix) with ESMTP id 0524512D5E6 for <sfc@ietf.org>; Wed,  6 Apr 2016 07:13:29 -0700 (PDT)
Received: from BLR-EXCHP-2.sandvine.com (192.168.196.172) by WTL-EXCHP-2.sandvine.com (192.168.194.177) with Microsoft SMTP Server (TLS) id 14.3.195.1; Wed, 6 Apr 2016 10:13:27 -0400
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by blr-exchp-2.sandvine.com ([fe80::6c6d:7108:c63c:9055%14]) with mapi id 14.03.0181.006; Wed, 6 Apr 2016 10:13:27 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: A request for Metadata allocation schemes
Thread-Index: AdGQDZcInpioWvGORw+Jt9cutzS71w==
Date: Wed, 6 Apr 2016 14:13:26 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F0AC6D@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [31.133.162.97]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830F0AC6Dwtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/8M08JCHhI7d5vY1CqDYCqOQTChI>
Subject: [sfc] A request for Metadata allocation schemes
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Apr 2016 14:13:30 -0000

--_000_E8355113905631478EFF04F5AA706E9830F0AC6Dwtlexchp2sandvi_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

To those authors of metadata allocations, I have a request.
I believe many types of service functions are going to want to distinguish =
up-link traffic from down-link traffic.
E.g., a security device treats in-bound to the protected device differently=
 from out-bound.
E.g., an accounting system needs to know whether to charge the source or de=
stination node.

So my request is to allocate a bit for up-link/down-link discrimination.
I think the alternative is to configure each SF about each path whether it =
is up or down, or to use something like an even/odd path ID scheme.

Does anyone else see this as useful?

I believe all of the allocation drafts have reserved bits.


David Dolson
Senior Software Architect
Sandvine


--_000_E8355113905631478EFF04F5AA706E9830F0AC6Dwtlexchp2sandvi_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">To those authors of metadata allocations, I have a r=
equest.<o:p></o:p></p>
<p class=3D"MsoNormal">I believe many types of service functions are going =
to want to distinguish up-link traffic from down-link traffic.<o:p></o:p></=
p>
<p class=3D"MsoNormal">E.g., a security device treats in-bound to the prote=
cted device differently from out-bound.<o:p></o:p></p>
<p class=3D"MsoNormal">E.g., an accounting system needs to know whether to =
charge the source or destination node.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">So my request is to allocate a bit for up-link/down-=
link discrimination.<o:p></o:p></p>
<p class=3D"MsoNormal">I think the alternative is to configure each SF abou=
t each path whether it is up or down, or to use something like an even/odd =
path ID scheme.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Does anyone else see this as useful?<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I believe all of the allocation drafts have reserved=
 bits.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">David Dolson<o:p></o:p></p>
<p class=3D"MsoNormal">Senior Software Architect<o:p></o:p></p>
<p class=3D"MsoNormal">Sandvine<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_E8355113905631478EFF04F5AA706E9830F0AC6Dwtlexchp2sandvi_--


From nobody Wed Apr  6 07:23:39 2016
Return-Path: <asayeed@redhat.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6384812D525 for <sfc@ietfa.amsl.com>; Wed,  6 Apr 2016 07:23:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BS80JZb8NquG for <sfc@ietfa.amsl.com>; Wed,  6 Apr 2016 07:23:24 -0700 (PDT)
Received: from mail-oi0-f46.google.com (mail-oi0-f46.google.com [209.85.218.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6524C12D0B4 for <sfc@ietf.org>; Wed,  6 Apr 2016 07:23:18 -0700 (PDT)
Received: by mail-oi0-f46.google.com with SMTP id w85so60170722oiw.0 for <sfc@ietf.org>; Wed, 06 Apr 2016 07:23:18 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:references:mime-version:in-reply-to :content-transfer-encoding:message-id:cc:from:subject:date:to; bh=waPFI5j/70jCLXjjMb5x9l+byKGkLmVP8svzXBM3gbU=; b=b3yg7BbRrVnEtRVU+49nNbO7VxghYhNgC93CkmL9jBxaGnXVeZVak1qjhxGnzB76YR xM00hRqIZxbLPZufMPtX/LAnayQ6EPINTCl96efnyCYtV0jysIo119bbYvdYK1FnASVS usUxcF60fVwveamYyM9ORXcyXn2HjTxDFL3Q147kGOu/NfcIxb08snyy+m7CmqWYBqNu C0yEZ8HhsVRLW8XdlHHHtHkWw16wVSD67eUpDhOOVf7vF2k9rB431wnNonItnNMm2lKJ uiGiB0rKTwXladUywxM/U94f/Bwz36Rtf8ssVBszMQbhK52smfg9KtjoVfUqKRl/bz+X i2Kg==
X-Gm-Message-State: AD7BkJIQrUmwbsNWL8bXD+SRm8MFLVQlCCQEP6dbdmJuGtstisFOcqohun0zomigdDAwlQqW
X-Received: by 10.157.14.183 with SMTP id 52mr10294760otj.83.1459952597719; Wed, 06 Apr 2016 07:23:17 -0700 (PDT)
Received: from [10.199.103.180] ([64.129.172.15]) by smtp.gmail.com with ESMTPSA id u2sm853053obz.24.2016.04.06.07.23.16 (version=TLSv1/SSLv3 cipher=OTHER); Wed, 06 Apr 2016 07:23:16 -0700 (PDT)
References: <E8355113905631478EFF04F5AA706E9830F0AC6D@wtl-exchp-2.sandvine.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F0AC6D@wtl-exchp-2.sandvine.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-5D82F98D-0656-422F-88FE-2AFA2901B74E
Content-Transfer-Encoding: 7bit
Message-Id: <8FE30018-9F2B-448E-AB70-B1EC5EE3F39D@redhat.com>
X-Mailer: iPhone Mail (13D15)
From: Azhar Sayeed <asayeed@redhat.com>
Date: Wed, 6 Apr 2016 09:23:14 -0500
To: Dave Dolson <ddolson@sandvine.com>
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/6Q5k4bKkSz75vqgvcbWYTiCf6G0>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] A request for Metadata allocation schemes
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Apr 2016 14:23:31 -0000

--Apple-Mail-5D82F98D-0656-422F-88FE-2AFA2901B74E
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

Hi Dave,

Why would you need a bit to distinguish the upstream and downstream traffic -=
 the traffic stream can be determined from SA/DA pair at the classifier and t=
he classifier can map the traffic to a service chain

May be I don't understand the use case you are describing.

Moreover upstream and downstream is relative to the point of view=20


Regards
Azhar



> On Apr 6, 2016, at 9:13 AM, Dave Dolson <ddolson@sandvine.com> wrote:
>=20
> To those authors of metadata allocations, I have a request.
> I believe many types of service functions are going to want to distinguish=
 up-link traffic from down-link traffic.
> E.g., a security device treats in-bound to the protected device differentl=
y from out-bound.
> E.g., an accounting system needs to know whether to charge the source or d=
estination node.
> =20
> So my request is to allocate a bit for up-link/down-link discrimination.
> I think the alternative is to configure each SF about each path whether it=
 is up or down, or to use something like an even/odd path ID scheme.
> =20
> Does anyone else see this as useful?
> =20
> I believe all of the allocation drafts have reserved bits.
> =20
> =20
> David Dolson
> Senior Software Architect
> Sandvine
> =20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc

--Apple-Mail-5D82F98D-0656-422F-88FE-2AFA2901B74E
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div>Hi Dave,</div><div id=3D"AppleMailSign=
ature"><br></div><div id=3D"AppleMailSignature">Why would you need a bit to d=
istinguish the upstream and downstream traffic - the traffic stream can be d=
etermined from SA/DA pair at the classifier and the classifier can map the t=
raffic to a service chain</div><div id=3D"AppleMailSignature"><br></div><div=
 id=3D"AppleMailSignature">May be I don't understand the use case you are de=
scribing.</div><div id=3D"AppleMailSignature"><br></div><div id=3D"AppleMail=
Signature">Moreover upstream and downstream is relative to the point of view=
&nbsp;</div><div id=3D"AppleMailSignature"><br></div><div id=3D"AppleMailSig=
nature"><br></div><div id=3D"AppleMailSignature">Regards</div><div id=3D"App=
leMailSignature">Azhar</div><div id=3D"AppleMailSignature"><br><br></div><di=
v><br>On Apr 6, 2016, at 9:13 AM, Dave Dolson &lt;<a href=3D"mailto:ddolson@=
sandvine.com">ddolson@sandvine.com</a>&gt; wrote:<br><br></div><blockquote t=
ype=3D"cite"><div>

<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii">=

<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->


<div class=3D"WordSection1">
<p class=3D"MsoNormal">To those authors of metadata allocations, I have a re=
quest.<o:p></o:p></p>
<p class=3D"MsoNormal">I believe many types of service functions are going t=
o want to distinguish up-link traffic from down-link traffic.<o:p></o:p></p>=

<p class=3D"MsoNormal">E.g., a security device treats in-bound to the protec=
ted device differently from out-bound.<o:p></o:p></p>
<p class=3D"MsoNormal">E.g., an accounting system needs to know whether to c=
harge the source or destination node.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">So my request is to allocate a bit for up-link/down-l=
ink discrimination.<o:p></o:p></p>
<p class=3D"MsoNormal">I think the alternative is to configure each SF about=
 each path whether it is up or down, or to use something like an even/odd pa=
th ID scheme.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Does anyone else see this as useful?<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I believe all of the allocation drafts have reserved b=
its.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">David Dolson<o:p></o:p></p>
<p class=3D"MsoNormal">Senior Software Architect<o:p></o:p></p>
<p class=3D"MsoNormal">Sandvine<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>


</div></blockquote><blockquote type=3D"cite"><div><span>____________________=
___________________________</span><br><span>sfc mailing list</span><br><span=
><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a></span><br><span><a href=3D=
"https://www.ietf.org/mailman/listinfo/sfc">https://www.ietf.org/mailman/lis=
tinfo/sfc</a></span><br></div></blockquote></body></html>=

--Apple-Mail-5D82F98D-0656-422F-88FE-2AFA2901B74E--


From nobody Wed Apr  6 07:41:50 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B97D12D5C7 for <sfc@ietfa.amsl.com>; Wed,  6 Apr 2016 07:41:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.929
X-Spam-Level: 
X-Spam-Status: No, score=-1.929 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rUyiKu12gB9k for <sfc@ietfa.amsl.com>; Wed,  6 Apr 2016 07:41:46 -0700 (PDT)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id 2353A12D0C0 for <sfc@ietf.org>; Wed,  6 Apr 2016 07:41:46 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Wed, 6 Apr 2016 10:41:44 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: Azhar Sayeed <asayeed@redhat.com>
Thread-Topic: [sfc] A request for Metadata allocation schemes
Thread-Index: AdGQDZcInpioWvGORw+Jt9cutzS71wAI8rQAAAfmFdA=
Date: Wed, 6 Apr 2016 14:41:44 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F0AE5B@wtl-exchp-2.sandvine.com>
References: <E8355113905631478EFF04F5AA706E9830F0AC6D@wtl-exchp-2.sandvine.com> <8FE30018-9F2B-448E-AB70-B1EC5EE3F39D@redhat.com>
In-Reply-To: <8FE30018-9F2B-448E-AB70-B1EC5EE3F39D@redhat.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [31.133.162.97]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830F0AE5Bwtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/8eZHg3zDyDdL0qtZrzb1beT7wig>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] A request for Metadata allocation schemes
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Apr 2016 14:41:48 -0000

--_000_E8355113905631478EFF04F5AA706E9830F0AE5Bwtlexchp2sandvi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_E8355113905631478EFF04F5AA706E9830F0AE5Bwtlexchp2sandvi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_E8355113905631478EFF04F5AA706E9830F0AE5Bwtlexchp2sandvi_--


From nobody Wed Apr  6 09:34:56 2016
Return-Path: <asayeed@redhat.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45C6912D52C for <sfc@ietfa.amsl.com>; Wed,  6 Apr 2016 09:34:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.62
X-Spam-Level: 
X-Spam-Status: No, score=-2.62 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QewkRQ6b3EmD for <sfc@ietfa.amsl.com>; Wed,  6 Apr 2016 09:34:53 -0700 (PDT)
Received: from mail-ob0-f181.google.com (mail-ob0-f181.google.com [209.85.214.181]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6EBC412D162 for <sfc@ietf.org>; Wed,  6 Apr 2016 09:34:53 -0700 (PDT)
Received: by mail-ob0-f181.google.com with SMTP id j9so34869425obd.3 for <sfc@ietf.org>; Wed, 06 Apr 2016 09:34:53 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=e65IzZSn6ZHChuNvQ/FQRHrRUsd7EenmS4uirwjed0o=; b=O+40TmDuOkCGEzDGUB52fuZli/sJJcxPVgl8/1BXxJ7VoT8oJGStlAJVrmXw3W0eCm B32yoaSaKyBdIBiCp7o0m9h91OLuWa4oGF1m9bHmBK425vMrY7KOAGh+5dhjjScYgJ5w 3p0G6eVC8KnOhrF3eMFdk3I6Xb7QownvSwhKANzAdrXYknYXFDoVxQv1/Q6TUexqh+hx Gm251oApVRkDiKVP9t6kYFu9Gul2Lnca4SsSe1PsLWU0F3gco5BBtJR22XgX3bh/uAvf Iil9+a1AYwJ6xynlTI75riXnmA7mlE+VSomTa+IHFeES7DYwrbGEXGc/hSvhvcLR8qYk JUkg==
X-Gm-Message-State: AD7BkJL4JB3c0nMj9/2wed3+mlPqs2YVNfVUnj1lBmdrm2hjPwdhg/Ai7OEm37Li9v4+Ac8B
X-Received: by 10.60.51.135 with SMTP id k7mr9356626oeo.42.1459960492765; Wed, 06 Apr 2016 09:34:52 -0700 (PDT)
Received: from [10.199.102.157] ([64.129.172.15]) by smtp.gmail.com with ESMTPSA id i5sm1029609obe.14.2016.04.06.09.34.51 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 06 Apr 2016 09:34:51 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_F45254EA-0824-4074-8170-7EAF8C633FFB"
Mime-Version: 1.0 (Mac OS X Mail 9.2 \(3112\))
From: Azhar Sayeed <asayeed@redhat.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F0AE5B@wtl-exchp-2.sandvine.com>
Date: Wed, 6 Apr 2016 11:34:50 -0500
Message-Id: <7140F7F5-EE1F-4492-A145-C88A2609945C@redhat.com>
References: <E8355113905631478EFF04F5AA706E9830F0AC6D@wtl-exchp-2.sandvine.com> <8FE30018-9F2B-448E-AB70-B1EC5EE3F39D@redhat.com> <E8355113905631478EFF04F5AA706E9830F0AE5B@wtl-exchp-2.sandvine.com>
To: Dave Dolson <ddolson@sandvine.com>
X-Mailer: Apple Mail (2.3112)
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/PbrZuPgPcwafk70d7AB0m5pSq7s>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] A request for Metadata allocation schemes
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Apr 2016 16:34:55 -0000

--Apple-Mail=_F45254EA-0824-4074-8170-7EAF8C633FFB
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Inline please

> Why would you need a bit to distinguish the upstream and downstream =
traffic - the traffic stream can be determined from SA/DA pair at the =
classifier and the classifier can map the traffic to a service chain
> [DD] Yes, the classifier should know; I=E2=80=99m looking for a way =
for the classifier to convey the information to the service function.


Azhar> The question is why would an SF care about upstream vs downstream =
unless the SF is also doing accounting in which case it may be possible =
- Even if you need to identify upstream vs downstream wouldn=E2=80=99t =
the sub-id/accounting id be different for upstream vs downstream =
traffic?


<snip>

Azhar


--Apple-Mail=_F45254EA-0824-4074-8170-7EAF8C633FFB
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D""><div class=3D"">Inline please</div><div class=3D""><br =
class=3D""></div><div><blockquote type=3D"cite" class=3D""><div =
class=3D""><div class=3D"WordSection1" style=3D"page: WordSection1; =
font-family: ArialMT; font-size: 12px; font-style: normal; font-variant: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: =
0px;"><div class=3D""><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;" class=3D"">Why would you need a =
bit to distinguish the upstream and downstream traffic - the traffic =
stream can be determined from SA/DA pair at the classifier and the =
classifier can map the traffic to a service chain<o:p =
class=3D""></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
style=3D"color: rgb(31, 73, 125);" class=3D"">[DD] Yes, the classifier =
should know; I=E2=80=99m looking for a way for the classifier to convey =
the information to the service =
function.</span></div></div></div></div></blockquote><div><br =
class=3D""></div><div><br class=3D""></div><div>Azhar&gt; The question =
is why would an SF care about upstream vs downstream unless the SF is =
also doing accounting in which case it may be possible - Even if you =
need to identify upstream vs downstream wouldn=E2=80=99t the =
sub-id/accounting id be different for upstream vs downstream =
traffic?</div><div><br class=3D""></div><blockquote type=3D"cite" =
class=3D""><div class=3D""><div class=3D"WordSection1" style=3D"page: =
WordSection1; font-family: ArialMT; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;"><div class=3D""><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D""></o:p></span></div></div></div></div></blockquote></div><div><f=
ont face=3D"Calibri, sans-serif" class=3D""><span style=3D"font-size: =
15px;" class=3D"">&lt;snip&gt;</span></font></div><div><font =
face=3D"Calibri, sans-serif" class=3D""><span style=3D"font-size: 15px;" =
class=3D""><br class=3D""></span></font></div><div><font face=3D"Calibri, =
sans-serif" class=3D""><span style=3D"font-size: 15px;" =
class=3D"">Azhar</span></font></div><br class=3D""></body></html>=

--Apple-Mail=_F45254EA-0824-4074-8170-7EAF8C633FFB--


From nobody Wed Apr  6 10:41:41 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5E2612D703 for <sfc@ietfa.amsl.com>; Wed,  6 Apr 2016 10:41:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.929
X-Spam-Level: 
X-Spam-Status: No, score=-1.929 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nooCeezvOyS3 for <sfc@ietfa.amsl.com>; Wed,  6 Apr 2016 10:41:24 -0700 (PDT)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id 8B07A12D0F3 for <sfc@ietf.org>; Wed,  6 Apr 2016 10:41:24 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Wed, 6 Apr 2016 13:41:18 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: Azhar Sayeed <asayeed@redhat.com>
Thread-Topic: [sfc] A request for Metadata allocation schemes
Thread-Index: AdGQDZcInpioWvGORw+Jt9cutzS71wAI8rQAAAfmFdD//+WUAIAANmJw
Date: Wed, 6 Apr 2016 17:41:17 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F0BA5E@wtl-exchp-2.sandvine.com>
References: <E8355113905631478EFF04F5AA706E9830F0AC6D@wtl-exchp-2.sandvine.com> <8FE30018-9F2B-448E-AB70-B1EC5EE3F39D@redhat.com> <E8355113905631478EFF04F5AA706E9830F0AE5B@wtl-exchp-2.sandvine.com> <7140F7F5-EE1F-4492-A145-C88A2609945C@redhat.com>
In-Reply-To: <7140F7F5-EE1F-4492-A145-C88A2609945C@redhat.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [31.133.162.97]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830F0BA5Ewtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/iMhfGWLxCqOgNpZMVlBV7opNYXY>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] A request for Metadata allocation schemes
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Apr 2016 17:41:26 -0000

--_000_E8355113905631478EFF04F5AA706E9830F0BA5Ewtlexchp2sandvi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_E8355113905631478EFF04F5AA706E9830F0BA5Ewtlexchp2sandvi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_E8355113905631478EFF04F5AA706E9830F0BA5Ewtlexchp2sandvi_--


From nobody Wed Apr  6 10:54:56 2016
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 483F112D608 for <sfc@ietfa.amsl.com>; Wed,  6 Apr 2016 10:54:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.53
X-Spam-Level: 
X-Spam-Status: No, score=-14.53 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q1stAFYADCsv for <sfc@ietfa.amsl.com>; Wed,  6 Apr 2016 10:54:53 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8DEBA12D0E1 for <sfc@ietf.org>; Wed,  6 Apr 2016 10:54:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6161; q=dns/txt; s=iport; t=1459965293; x=1461174893; h=from:to:subject:date:message-id:mime-version; bh=t/jd9hSATF06uslCA98MrGp/kKY1U5zVBIGgfUNOX/Y=; b=a8Bd6eUfguibFYhq4IVia4vdwxDXDWAQd9L6NgZHoVjSljECHoYAz3EW vNwPU54p5YxdS2egjvObc+eVUyk4FUTrZdFx6G/DvZlBuAo5xfgMsrdx5 cdp6S5LITqGA8gteOGazJ0mbsDV1iPT15WBqAzNryJ/hkCCFqSM0jG4PE g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AKAgAhTAVX/4wNJK1cgmtMU30GukYBD?= =?us-ascii?q?YFzgl2DMIFPOBQBAQEBAQEBZSeEQQECBC1eAQgOAwMBAig5FAkKBAESiCfBIQE?= =?us-ascii?q?BAQEBBQEBAQEBG4YhhEuEX4U2BY4FiXwBjgqPDo8gAR4BAUKDZ2yHdX4BAQE?=
X-IronPort-AV: E=Sophos; i="5.24,447,1454976000"; d="scan'208,217"; a="90748611"
Received: from alln-core-7.cisco.com ([173.36.13.140]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 06 Apr 2016 17:54:52 +0000
Received: from XCH-RCD-008.cisco.com (xch-rcd-008.cisco.com [173.37.102.18]) by alln-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id u36HsqVZ013145 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 6 Apr 2016 17:54:52 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-008.cisco.com (173.37.102.18) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 6 Apr 2016 12:54:51 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Wed, 6 Apr 2016 12:54:51 -0500
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] A request for Metadata allocation schemes
Thread-Index: AQHRkC1rTdVZJQBlYEu6cpTINhuWWQ==
Date: Wed, 6 Apr 2016 17:54:51 +0000
Message-ID: <D32AC580.4ACC8%jguichar@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.98.43.179]
Content-Type: multipart/alternative; boundary="_000_D32AC5804ACC8jguicharciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/CN0IMjBXH3edZWkyBe1mkQELKxE>
Subject: Re: [sfc] A request for Metadata allocation schemes
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Apr 2016 17:54:55 -0000

--_000_D32AC5804ACC8jguicharciscocom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Dave,

I guess my initial questions would be how do SF's achieve this today and wh=
y does NSH make that any different (except for the offset to the original p=
ayload in the packet changes) ?

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
Dave Dolson <ddolson@sandvine.com<mailto:ddolson@sandvine.com>>
Date: Wednesday, April 6, 2016 at 10:13 AM
To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: [sfc] A request for Metadata allocation schemes

To those authors of metadata allocations, I have a request.
I believe many types of service functions are going to want to distinguish =
up-link traffic from down-link traffic.
E.g., a security device treats in-bound to the protected device differently=
 from out-bound.
E.g., an accounting system needs to know whether to charge the source or de=
stination node.

So my request is to allocate a bit for up-link/down-link discrimination.
I think the alternative is to configure each SF about each path whether it =
is up or down, or to use something like an even/odd path ID scheme.

Does anyone else see this as useful?

I believe all of the allocation drafts have reserved bits.


David Dolson
Senior Software Architect
Sandvine


--_000_D32AC5804ACC8jguicharciscocom_
Content-Type: text/html; charset="iso-8859-1"
Content-ID: <6DFCC314A7D37249AB7F4BDCF38134B7@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif;">
<div>Hi Dave,</div>
<div><br>
</div>
<div>I guess my initial questions would be how do SF&#8217;s achieve this t=
oday and why does NSH make that any different (except for the offset to the=
 original payload in the packet changes) ?</div>
<div><br>
</div>
<div>Jim</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>sfc &lt;<a href=3D"mailto:sfc=
-bounces@ietf.org">sfc-bounces@ietf.org</a>&gt; on behalf of Dave Dolson &l=
t;<a href=3D"mailto:ddolson@sandvine.com">ddolson@sandvine.com</a>&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Wednesday, April 6, 2016 at 1=
0:13 AM<br>
<span style=3D"font-weight:bold">To: </span>&quot;<a href=3D"mailto:sfc@iet=
f.org">sfc@ietf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.=
org</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>[sfc] A request for Metada=
ta allocation schemes<br>
</div>
<div><br>
</div>
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">To those authors of metadata allocations, I have a r=
equest.<o:p></o:p></p>
<p class=3D"MsoNormal">I believe many types of service functions are going =
to want to distinguish up-link traffic from down-link traffic.<o:p></o:p></=
p>
<p class=3D"MsoNormal">E.g., a security device treats in-bound to the prote=
cted device differently from out-bound.<o:p></o:p></p>
<p class=3D"MsoNormal">E.g., an accounting system needs to know whether to =
charge the source or destination node.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">So my request is to allocate a bit for up-link/down-=
link discrimination.<o:p></o:p></p>
<p class=3D"MsoNormal">I think the alternative is to configure each SF abou=
t each path whether it is up or down, or to use something like an even/odd =
path ID scheme.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Does anyone else see this as useful?<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I believe all of the allocation drafts have reserved=
 bits.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">David Dolson<o:p></o:p></p>
<p class=3D"MsoNormal">Senior Software Architect<o:p></o:p></p>
<p class=3D"MsoNormal">Sandvine<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</span>
</body>
</html>

--_000_D32AC5804ACC8jguicharciscocom_--


From nobody Wed Apr  6 11:01:29 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B74412D6BC for <sfc@ietfa.amsl.com>; Wed,  6 Apr 2016 11:01:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level: 
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9ZZNtdNmRMVG for <sfc@ietfa.amsl.com>; Wed,  6 Apr 2016 11:01:24 -0700 (PDT)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) by ietfa.amsl.com (Postfix) with ESMTP id 056B612D6F1 for <sfc@ietf.org>; Wed,  6 Apr 2016 11:01:24 -0700 (PDT)
Received: from BLR-EXCHP-2.sandvine.com (192.168.196.172) by wtl-exchp-1.sandvine.com (192.168.194.176) with Microsoft SMTP Server (TLS) id 14.3.195.1; Wed, 6 Apr 2016 14:01:23 -0400
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by blr-exchp-2.sandvine.com ([fe80::6c6d:7108:c63c:9055%14]) with mapi id 14.03.0181.006; Wed, 6 Apr 2016 14:01:23 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] A request for Metadata allocation schemes
Thread-Index: AQHRkC1rnpioWvGORw+Jt9cutzS71599O1hA
Date: Wed, 6 Apr 2016 18:01:22 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F0BC2F@wtl-exchp-2.sandvine.com>
References: <D32AC580.4ACC8%jguichar@cisco.com>
In-Reply-To: <D32AC580.4ACC8%jguichar@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [31.133.162.97]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830F0BC2Fwtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Vkqad90yYIoBv7JgRNHBEdSiaPE>
Subject: Re: [sfc] A request for Metadata allocation schemes
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Apr 2016 18:01:26 -0000

--_000_E8355113905631478EFF04F5AA706E9830F0BC2Fwtlexchp2sandvi_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I'm familiar with methods:

-          Service function has two physical interfaces, each with an "up" =
or "down" role;

-          A bit in the path identifier indicates direction



From: Jim Guichard (jguichar) [mailto:jguichar@cisco.com]
Sent: Wednesday, April 06, 2016 2:55 PM
To: Dave Dolson; sfc@ietf.org
Subject: Re: [sfc] A request for Metadata allocation schemes

Hi Dave,

I guess my initial questions would be how do SF's achieve this today and wh=
y does NSH make that any different (except for the offset to the original p=
ayload in the packet changes) ?

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
Dave Dolson <ddolson@sandvine.com<mailto:ddolson@sandvine.com>>
Date: Wednesday, April 6, 2016 at 10:13 AM
To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: [sfc] A request for Metadata allocation schemes

To those authors of metadata allocations, I have a request.
I believe many types of service functions are going to want to distinguish =
up-link traffic from down-link traffic.
E.g., a security device treats in-bound to the protected device differently=
 from out-bound.
E.g., an accounting system needs to know whether to charge the source or de=
stination node.

So my request is to allocate a bit for up-link/down-link discrimination.
I think the alternative is to configure each SF about each path whether it =
is up or down, or to use something like an even/odd path ID scheme.

Does anyone else see this as useful?

I believe all of the allocation drafts have reserved bits.


David Dolson
Senior Software Architect
Sandvine


--_000_E8355113905631478EFF04F5AA706E9830F0BC2Fwtlexchp2sandvi_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:837960246;
	mso-list-type:hybrid;
	mso-list-template-ids:2032546584 1885912588 67698691 67698693 67698689 676=
98691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-start-at:5;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Calibri","sans-serif";
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I&#8217;m familiar wit=
h methods:<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">Service functi=
on has two physical interfaces, each with an &#8220;up&#8221; or &#8220;dow=
n&#8221; role;<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"color:#1F497D"><span style=3D"m=
so-list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">A bit in the p=
ath identifier indicates direction<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Jim Guic=
hard (jguichar) [mailto:jguichar@cisco.com]
<br>
<b>Sent:</b> Wednesday, April 06, 2016 2:55 PM<br>
<b>To:</b> Dave Dolson; sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] A request for Metadata allocation schemes<o:p></o=
:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Hi Dave=
,<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">I guess=
 my initial questions would be how do SF&#8217;s achieve this today and why=
 does NSH make that any different (except for the offset to the original pa=
yload in the packet changes) ?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black">Jim<o:p=
></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From: </span></b><spa=
n style=3D"color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of Dave Dolson &lt;<a href=3D"mailto:dd=
olson@sandvine.com">ddolson@sandvine.com</a>&gt;<br>
<b>Date: </b>Wednesday, April 6, 2016 at 10:13 AM<br>
<b>To: </b>&quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &lt=
;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<br>
<b>Subject: </b>[sfc] A request for Metadata allocation schemes<o:p></o:p><=
/span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;color:black"><o:p>&n=
bsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">To those authors of meta=
data allocations, I have a request.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">I believe many types of =
service functions are going to want to distinguish up-link traffic from dow=
n-link traffic.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">E.g., a security device =
treats in-bound to the protected device differently from out-bound.<o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">E.g., an accounting syst=
em needs to know whether to charge the source or destination node.<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:black">So my request is to allo=
cate a bit for up-link/down-link discrimination.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">I think the alternative =
is to configure each SF about each path whether it is up or down, or to use=
 something like an even/odd path ID scheme.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:black">Does anyone else see thi=
s as useful?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:black">I believe all of the all=
ocation drafts have reserved bits.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:black">David Dolson<o:p></o:p><=
/span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">Senior Software Architec=
t<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black">Sandvine<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
</div>
</div>
</div>
</body>
</html>

--_000_E8355113905631478EFF04F5AA706E9830F0BC2Fwtlexchp2sandvi_--


From nobody Wed Apr  6 11:49:26 2016
Return-Path: <lucy.yong@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 962E412D0C6 for <sfc@ietfa.amsl.com>; Wed,  6 Apr 2016 11:49:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.23
X-Spam-Level: 
X-Spam-Status: No, score=-4.23 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aANP-pKqw_eO for <sfc@ietfa.amsl.com>; Wed,  6 Apr 2016 11:49:22 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F219D12D13D for <sfc@ietf.org>; Wed,  6 Apr 2016 11:49:11 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml701-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CLR05654; Wed, 06 Apr 2016 18:49:09 +0000 (GMT)
Received: from DFWEML705-CHM.china.huawei.com (10.193.5.142) by lhreml701-cah.china.huawei.com (10.201.5.93) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 6 Apr 2016 19:49:08 +0100
Received: from DFWEML501-MBB.china.huawei.com ([10.193.5.179]) by dfweml705-chm ([10.193.5.142]) with mapi id 14.03.0235.001; Wed, 6 Apr 2016 11:48:55 -0700
From: Lucy yong <lucy.yong@huawei.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: comments to NSH draft
Thread-Index: AdGQNOwEDGPh+h+ERsq4ibKx/si6JA==
Date: Wed, 6 Apr 2016 18:48:55 +0000
Message-ID: <2691CE0099834E4A9C5044EEC662BB9D5727259F@dfweml501-mbb>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.212.244.145]
Content-Type: multipart/alternative; boundary="_000_2691CE0099834E4A9C5044EEC662BB9D5727259Fdfweml501mbb_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090203.57055A26.0020, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: b2538258c919575ebe6337d38800c2e6
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/yn_tSFghHwr3vmwrIkRaIMiryxE>
Subject: [sfc] comments to NSH draft
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Apr 2016 18:49:25 -0000

--_000_2691CE0099834E4A9C5044EEC662BB9D5727259Fdfweml501mbb_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

*         NSH draft defines NSH Proxy that is used by an NSH-unaware SF. RF=
C7665 already defined and specified SFC Proxy (4.6). NSH draft should use S=
FC proxy term to describe it  and cites the RFC.

*         For NSH encapsulation example, UDP+GRE+NSH is better example than=
 GRE+NSH.

Lucy

--_000_2691CE0099834E4A9C5044EEC662BB9D5727259Fdfweml501mbb_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:300772413;
	mso-list-type:hybrid;
	mso-list-template-ids:1286386956 67698689 67698691 67698693 67698689 67698=
691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span style=
=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Roma=
n&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>NSH draft defines NSH Proxy that is used by =
an NSH-unaware SF. RFC7665 already defined and specified SFC Proxy (4.6). N=
SH draft should use SFC proxy term to describe it &nbsp;and cites the RFC.
<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span style=
=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Roma=
n&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>For NSH encapsulation example, UDP&#43;GRE&#=
43;NSH is better example than GRE&#43;NSH. &nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Lucy<o:p></o:p></p>
</div>
</body>
</html>

--_000_2691CE0099834E4A9C5044EEC662BB9D5727259Fdfweml501mbb_--


From nobody Thu Apr  7 08:33:26 2016
Return-Path: <prvs=898ecd982=S.Majee@f5.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B337212D1EB for <sfc@ietfa.amsl.com>; Thu,  7 Apr 2016 08:33:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.03
X-Spam-Level: 
X-Spam-Status: No, score=-7.03 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=f5.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B38YdldRxEYS for <sfc@ietfa.amsl.com>; Thu,  7 Apr 2016 08:33:24 -0700 (PDT)
Received: from mail.f5.com (mail.f5.com [208.85.209.139]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0890A12D504 for <sfc@ietf.org>; Thu,  7 Apr 2016 08:27:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=f5.com; i=@f5.com; q=dns/txt; s=seattle; t=1460042845; x=1491578845; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=Z/qt5E5RMky66S26N6TAHh2Zo2u1kBkamxU/lKggaI0=; b=k/GOC3wyri8OUsQDPXi7bume0Ei4thtUQTgeeK0YFigXV5gD/O+A1spr lKc5sBlMXsUmnOcj22Vu5K5tT3tp+5TdXczvtJ4Es+1pCs+b/Y/c15BIX TerYSfGODLzuUzypwEiBpul8MgqiehxOMSPGrV1gxLhriw7f/8f1utbT3 Y=;
X-IronPort-AV: E=Sophos;i="5.24,449,1454976000";  d="scan'208,217";a="211784068"
Received: from oracle-apps.f5net.com (HELO exchmail.f5net.com) ([192.168.10.235]) by mail.f5.com with ESMTP; 07 Apr 2016 15:27:25 +0000
Received: from SEAEXCHMBX02.olympus.F5Net.com (192.168.15.224) by SEAEXCHMBX07.olympus.F5Net.com (192.168.15.50) with Microsoft SMTP Server (TLS) id 15.0.1156.6; Thu, 7 Apr 2016 08:27:24 -0700
Received: from SEAEXCHMBX02.olympus.F5Net.com ([fe80::dd5e:c398:17d9:927f]) by seaexchmbx02.olympus.F5Net.com ([fe80::dd5e:c398:17d9:927f%13]) with mapi id 15.00.1156.000; Thu, 7 Apr 2016 08:27:24 -0700
From: Sumandra Majee <S.Majee@F5.com>
To: Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: A request for Metadata allocation schemes
Thread-Index: AdGQDZcInpioWvGORw+Jt9cutzS71wA06k3B
Date: Thu, 7 Apr 2016 15:27:23 +0000
Message-ID: <1460042865963.25707@F5.com>
References: <E8355113905631478EFF04F5AA706E9830F0AC6D@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F0AC6D@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.168.15.239]
Content-Type: multipart/alternative; boundary="_000_146004286596325707F5com_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/FY5Y2Jn8HG1nptyYrWZlcKyPl2s>
Subject: Re: [sfc] A request for Metadata allocation schemes
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Apr 2016 15:33:25 -0000

--_000_146004286596325707F5com_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

?Dave,


The use case you have defined is supported by most devices by binding polic=
ies explicitly on,

   a) interface or equivalent

   b) flow direction. Most flow aware devices has to detect to and from cor=
rectly to do lot of thngs correctly.


So the question is what do we get by adding this bit? I am opposed to the t=
erm UP and DOWN (from show point of view?), rather forward and reverse (eve=
n that is confusing).


Sumandra

________________________________
From: sfc <sfc-bounces@ietf.org> on behalf of Dave Dolson <ddolson@sandvine=
.com>
Sent: Wednesday, April 6, 2016 7:13 AM
To: sfc@ietf.org
Subject: [sfc] A request for Metadata allocation schemes

To those authors of metadata allocations, I have a request.
I believe many types of service functions are going to want to distinguish =
up-link traffic from down-link traffic.
E.g., a security device treats in-bound to the protected device differently=
 from out-bound.
E.g., an accounting system needs to know whether to charge the source or de=
stination node.

So my request is to allocate a bit for up-link/down-link discrimination.
I think the alternative is to configure each SF about each path whether it =
is up or down, or to use something like an even/odd path ID scheme.

Does anyone else see this as useful?

I believe all of the allocation drafts have reserved bits.


David Dolson
Senior Software Architect
Sandvine


--_000_146004286596325707F5com_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<style type=3D"text/css" style=3D"display:none"><!-- p { margin-top: 0px; m=
argin-bottom: 0px; } @font-face { font-family: Calibri; } p.MsoNormal, li.M=
soNormal, div.MsoNormal { margin: 0in 0in 0.0001pt; font-size: 11pt; font-f=
amily: Calibri, sans-serif; } a:link, span.MsoHyperlink { color: blue; text=
-decoration: underline; } a:visited, span.MsoHyperlinkFollowed { color: pur=
ple; text-decoration: underline; } span.EmailStyle17 { font-family: Calibri=
, sans-serif; color: windowtext; } .MsoChpDefault { font-family: Calibri, s=
ans-serif; } @page WordSection1 { margin: 1in; } div.WordSection1 { }--></s=
tyle>
</head>
<body dir=3D"ltr" style=3D"font-size:12pt;color:#000000;background-color:#F=
FFFFF;font-family:Calibri,Arial,Helvetica,sans-serif;">
<p>&#8203;Dave,<br>
</p>
<p><br>
</p>
<p>The use case you have defined is supported by most devices by binding po=
licies explicitly on,<br>
</p>
<p>&nbsp; &nbsp;a) interface or equivalent<br>
</p>
<p>&nbsp; &nbsp;b) flow direction. Most flow aware devices has to detect to=
 and from correctly to do lot of thngs correctly.<br>
</p>
<p><br>
</p>
<p>So the question is what do we get by adding this bit? I am opposed to th=
e term UP and DOWN (from show point of view?), rather forward and reverse (=
even that is confusing). &nbsp;<br>
</p>
<p><br>
</p>
<p>Sumandra<br>
</p>
<div style=3D"color: rgb(33, 33, 33);">
<hr tabindex=3D"-1" style=3D"display:inline-block; width:98%">
<div id=3D"divRplyFwdMsg" dir=3D"ltr"><font face=3D"Calibri, sans-serif" co=
lor=3D"#000000" style=3D"font-size:11pt"><b>From:</b> sfc &lt;sfc-bounces@i=
etf.org&gt; on behalf of Dave Dolson &lt;ddolson@sandvine.com&gt;<br>
<b>Sent:</b> Wednesday, April 6, 2016 7:13 AM<br>
<b>To:</b> sfc@ietf.org<br>
<b>Subject:</b> [sfc] A request for Metadata allocation schemes</font>
<div>&nbsp;</div>
</div>
<div>
<div class=3D"WordSection1">
<p class=3D"MsoNormal">To those authors of metadata allocations, I have a r=
equest.</p>
<p class=3D"MsoNormal">I believe many types of service functions are going =
to want to distinguish up-link traffic from down-link traffic.</p>
<p class=3D"MsoNormal">E.g., a security device treats in-bound to the prote=
cted device differently from out-bound.</p>
<p class=3D"MsoNormal">E.g., an accounting system needs to know whether to =
charge the source or destination node.</p>
<p class=3D"MsoNormal">&nbsp;</p>
<p class=3D"MsoNormal">So my request is to allocate a bit for up-link/down-=
link discrimination.</p>
<p class=3D"MsoNormal">I think the alternative is to configure each SF abou=
t each path whether it is up or down, or to use something like an even/odd =
path ID scheme.</p>
<p class=3D"MsoNormal">&nbsp;</p>
<p class=3D"MsoNormal">Does anyone else see this as useful?</p>
<p class=3D"MsoNormal">&nbsp;</p>
<p class=3D"MsoNormal">I believe all of the allocation drafts have reserved=
 bits.</p>
<p class=3D"MsoNormal">&nbsp;</p>
<p class=3D"MsoNormal">&nbsp;</p>
<p class=3D"MsoNormal">David Dolson</p>
<p class=3D"MsoNormal">Senior Software Architect</p>
<p class=3D"MsoNormal">Sandvine</p>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
</div>
</div>
</body>
</html>

--_000_146004286596325707F5com_--


From nobody Thu Apr  7 10:40:20 2016
Return-Path: <xuxiaohu@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EF23B12D5D0; Thu,  7 Apr 2016 10:40:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.23
X-Spam-Level: 
X-Spam-Status: No, score=-4.23 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IznpSBdWNGjQ; Thu,  7 Apr 2016 10:40:01 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2BD3412D5A1; Thu,  7 Apr 2016 10:39:59 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml705-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CGZ94521; Thu, 07 Apr 2016 17:39:56 +0000 (GMT)
Received: from NKGEML414-HUB.china.huawei.com (10.98.56.75) by lhreml705-cah.china.huawei.com (10.201.5.168) with Microsoft SMTP Server (TLS) id 14.3.235.1; Thu, 7 Apr 2016 18:39:55 +0100
Received: from NKGEML515-MBX.china.huawei.com ([fe80::a54a:89d2:c471:ff]) by nkgeml414-hub.china.huawei.com ([10.98.56.75]) with mapi id 14.03.0235.001; Fri, 8 Apr 2016 01:39:49 +0800
From: Xuxiaohu <xuxiaohu@huawei.com>
To: Tony Przygienda <tonysietf@gmail.com>, "bier@ietf.org" <bier@ietf.org>
Thread-Topic: The first nibble issue associated with MPLS encapsulation
Thread-Index: AQHRkPR7Ow6l9wh8WUKpFJXl+MwAqA==
Date: Thu, 7 Apr 2016 17:39:49 +0000
Message-ID: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53871C@NKGEML515-MBX.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.212.198.246]
Content-Type: multipart/alternative; boundary="_000_1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53871CNKGEML515MBXchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020201.57069B6D.013A, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 76c0900cb14475b246c81dcc3d30b04a
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/AoMQHb6KDxxYgljIYf9qE-X76a4>
Cc: "mpls@ietf.org" <mpls@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: [sfc] The first nibble issue associated with MPLS encapsulation
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Apr 2016 17:40:05 -0000

--_000_1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53871CNKGEML515MBXchi_
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
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--_000_1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53871CNKGEML515MBXchi_
Content-Type: text/html; charset="gb2312"
Content-Transfer-Encoding: quoted-printable

<html dir=3D"ltr">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dgb2312">
<style id=3D"owaParaStyle">P {
	MARGIN-TOP: 0px; MARGIN-BOTTOM: 0px
}
</style>
</head>
<body fPStyle=3D"1" ocsi=3D"0">
<div style=3D"direction: ltr;font-family: Tahoma;color: #000000;font-size: =
10pt;">
<p>As for the first nibble issue, will it violate the layering principle of=
 network protocol stacks if the first nibble of any new encapsulation heade=
r (which could be an MPLS payload)&nbsp;is used as the &quot;MPLS payload t=
ype&quot; field? wouldn't it&nbsp; be more reasonable
 and sustainable&nbsp;to fix the&nbsp;problem (i.e., the lack of a protocol=
 field in the MPLS header) by the MPLS header itself?</p>
<p>&nbsp;</p>
<p>By the way, since it's claimed that the NSH is transport-independant, it=
 means the NSH should be able to be transported over MPLS. However, it seem=
s that the first nibble issue has not be considered&nbsp;in the current NSH=
 draft. As a result, when encapsulating
 NSH over MPLS, the NSH may be mis-interpreted as IP header.</p>
<p>&nbsp;</p>
<p>Best regards,</p>
<p>Xiaohu</p>
<p>&nbsp;</p>
<div style=3D"FONT-FAMILY: Times New Roman; COLOR: #000000; FONT-SIZE: 16px=
">
<hr tabindex=3D"-1">
<div style=3D"DIRECTION: ltr" id=3D"divRpF100744"><font color=3D"#000000" s=
ize=3D"2" face=3D"Tahoma"><b>=B7=A2=BC=FE=C8=CB:</b> BIER [bier-bounces@iet=
f.org] =B4=FA=B1=ED Tony Przygienda [tonysietf@gmail.com]<br>
<b>=B7=A2=CB=CD=CA=B1=BC=E4:</b> 2016=C4=EA4=D4=C25=C8=D5 22:36<br>
<b>=CA=D5=BC=FE=C8=CB:</b> bier@ietf.org<br>
<b>=D6=F7=CC=E2:</b> [Bier] comments on draft-wang-bier-ethernet-01<br>
</font><br>
</div>
<div></div>
<div>
<div dir=3D"ltr">after reading&nbsp;
<div><br>
</div>
<div>a) first nibble: refer to MPLS encaps as &quot;the same value&quot; to=
 keep in sync&nbsp;</div>
<div>b) refer to all other possible fields to MPLS encaps to keep in sync w=
hen describing instead of repeating&nbsp;</div>
<div>c) you need to describe which kind of ether MACs are allowed, especial=
ly on broadcast media, i.e. is it always p2p or can you take advantage of t=
he broadcast ?</div>
<div>d) Figure 4: use the architecture/MPLS encoding for the length, don't =
invent a new one&nbsp;</div>
<div>e) who will obtain a new ether type from IEEE? As far I understand, no=
t a trivial process albeit we have several liaisons with IEEE&nbsp;</div>
<div>
<div><br>
</div>
-- <br>
<div class=3D"gmail_signature">
<div dir=3D"ltr">
<div><span style=3D"FONT-SIZE: 12px"><font face=3D"georgia, serif"><i>We=A1=
=AFve heard that a million monkeys at a million keyboards could produce the=
 complete works of Shakespeare; now, thanks to the Internet, we know that i=
s not true.</i></font></span><i><font face=3D"garamond, serif"><br>
</font></i></div>
<div><span style=3D"FONT-SIZE: 12px"><font face=3D"times new roman, serif">=
=A1=AARobert Wilensky</font></span><br>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53871CNKGEML515MBXchi_--


From nobody Thu Apr  7 19:12:06 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6619312D1E0 for <sfc@ietfa.amsl.com>; Thu,  7 Apr 2016 19:12:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.929
X-Spam-Level: 
X-Spam-Status: No, score=-1.929 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hQPqTyuOofxP for <sfc@ietfa.amsl.com>; Thu,  7 Apr 2016 19:12:02 -0700 (PDT)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id 3929412D1DA for <sfc@ietf.org>; Thu,  7 Apr 2016 19:12:02 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Thu, 7 Apr 2016 22:12:00 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: Sumandra Majee <S.Majee@F5.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: A request for Metadata allocation schemes
Thread-Index: AdGQDZcInpioWvGORw+Jt9cutzS71wA06k3BABaJqpA=
Date: Fri, 8 Apr 2016 02:11:59 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F11EA7@wtl-exchp-2.sandvine.com>
References: <E8355113905631478EFF04F5AA706E9830F0AC6D@wtl-exchp-2.sandvine.com> <1460042865963.25707@F5.com>
In-Reply-To: <1460042865963.25707@F5.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [190.111.246.156]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830F11EA7wtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/qKCnX-Ysm79SwPZN__BSstonvlw>
Subject: Re: [sfc] A request for Metadata allocation schemes
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Apr 2016 02:12:04 -0000

--_000_E8355113905631478EFF04F5AA706E9830F11EA7wtlexchp2sandvi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_E8355113905631478EFF04F5AA706E9830F11EA7wtlexchp2sandvi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_E8355113905631478EFF04F5AA706E9830F11EA7wtlexchp2sandvi_--


From nobody Thu Apr  7 21:52:29 2016
Return-Path: <prvs=8998f8a75=S.Majee@f5.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26BB012D1E0 for <sfc@ietfa.amsl.com>; Thu,  7 Apr 2016 21:52:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.03
X-Spam-Level: 
X-Spam-Status: No, score=-7.03 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=f5.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0PxYmkeBgg8x for <sfc@ietfa.amsl.com>; Thu,  7 Apr 2016 21:52:25 -0700 (PDT)
Received: from mail.f5.com (mail.f5.com [208.85.209.139]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 95B5112D124 for <sfc@ietf.org>; Thu,  7 Apr 2016 21:52:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=f5.com; i=@f5.com; q=dns/txt; s=seattle; t=1460091146; x=1491627146; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=yyVEEZi4tv1H53MtewarpTNrS0u0zPZHeRGqj27g3O8=; b=oMV3JUlHebTZ2m7NbDR4nmV9hs9LHAMoUmTLqh8y260WDyOFgY61FEMV uOaWWxH+ED31M3/KV3nm406ySFuVJTE/3gIx6ohNUmxt68KjEtenU4hOl i+SFSd5KE9O90IHZQTeoKZAQ1HY1c2cUsG2krTOysQqFkDcDp5LwV34FM Q=;
X-IronPort-AV: E=Sophos;i="5.24,449,1454976000";  d="scan'208,217";a="212699469"
Received: from oracle-apps.f5net.com (HELO exchmail.f5net.com) ([192.168.10.235]) by mail.f5.com with ESMTP/TLS/AES256-SHA; 08 Apr 2016 04:51:45 +0000
Received: from SEAEXCHMBX02.olympus.F5Net.com (192.168.15.224) by seaexchmbx02.olympus.F5Net.com (192.168.15.224) with Microsoft SMTP Server (TLS) id 15.0.1156.6; Thu, 7 Apr 2016 21:51:43 -0700
Received: from SEAEXCHMBX02.olympus.F5Net.com ([fe80::dd5e:c398:17d9:927f]) by seaexchmbx02.olympus.F5Net.com ([fe80::dd5e:c398:17d9:927f%13]) with mapi id 15.00.1156.000; Thu, 7 Apr 2016 21:51:43 -0700
From: Sumandra Majee <S.Majee@F5.com>
To: Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: A request for Metadata allocation schemes
Thread-Index: AdGQDZcInpioWvGORw+Jt9cutzS71wA06k3BABaJqpAABVdClw==
Date: Fri, 8 Apr 2016 04:51:42 +0000
Message-ID: <1460091126273.230@F5.com>
References: <E8355113905631478EFF04F5AA706E9830F0AC6D@wtl-exchp-2.sandvine.com> <1460042865963.25707@F5.com>, <E8355113905631478EFF04F5AA706E9830F11EA7@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F11EA7@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.168.15.239]
Content-Type: multipart/alternative; boundary="_000_1460091126273230F5com_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/J7Y1IOkBHxmWAaY0YghMyQxNBJk>
Subject: Re: [sfc] A request for Metadata allocation schemes
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Apr 2016 04:52:28 -0000

--_000_1460091126273230F5com_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

?I think the part of the problem lies in the definition of UP and DOWN. So =
lets take some use cases.


a) In case of service provider many functions sits at the border between ne=
twork/internet  and subscriber/user. Typically the two sides of the border =
is defined by way of configuration, this interface/tunnel point to subscrib=
er side and that points to the internet. Anything ingress on subscriber sid=
e is FROM subscriber and vice versa. The UP or DOWN is not so useful.


b) Consider a typical client server.  Assuming you mean UP: client ->server=
/final destination and DOWN the other way. A flow aware service would have =
state SIP->DIP as UP and DIP->SIP as DOWN. Others like router etc. may not =
care at all and that is fine.


In case of security device the inbound and outbound (or zones) are defined =
by configuration that is local to that entity. So having a classifier say I=
N or OUT would be wrong in that case.


Sumandra

________________________________
From: Dave Dolson <ddolson@sandvine.com>
Sent: Thursday, April 7, 2016 7:11 PM
To: Sumandra Majee; sfc@ietf.org
Subject: RE: A request for Metadata allocation schemes

Sumandra (and others who have questioned this),
What do you mean by detecting direction from the encapsulated packet?
I'm having trouble understanding how one could tell from an arbitrary IP pa=
cket which direction it is going.
(Unless knowing the IP address allocation scheme in the inner network...?  =
That would be arduous.)

And possibly in-bound, out-bound are better names?
I don't like forward/reverse because I can't guess which is which.

-Dave

From: Sumandra Majee [mailto:S.Majee@F5.com]
Sent: Thursday, April 07, 2016 12:27 PM
To: Dave Dolson; sfc@ietf.org
Subject: Re: A request for Metadata allocation schemes


?Dave,



The use case you have defined is supported by most devices by binding polic=
ies explicitly on,

   a) interface or equivalent

   b) flow direction. Most flow aware devices has to detect to and from cor=
rectly to do lot of thngs correctly.



So the question is what do we get by adding this bit? I am opposed to the t=
erm UP and DOWN (from show point of view?), rather forward and reverse (eve=
n that is confusing).



Sumandra

________________________________
From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
Dave Dolson <ddolson@sandvine.com<mailto:ddolson@sandvine.com>>
Sent: Wednesday, April 6, 2016 7:13 AM
To: sfc@ietf.org<mailto:sfc@ietf.org>
Subject: [sfc] A request for Metadata allocation schemes

To those authors of metadata allocations, I have a request.
I believe many types of service functions are going to want to distinguish =
up-link traffic from down-link traffic.
E.g., a security device treats in-bound to the protected device differently=
 from out-bound.
E.g., an accounting system needs to know whether to charge the source or de=
stination node.

So my request is to allocate a bit for up-link/down-link discrimination.
I think the alternative is to configure each SF about each path whether it =
is up or down, or to use something like an even/odd path ID scheme.

Does anyone else see this as useful?

I believe all of the allocation drafts have reserved bits.


David Dolson
Senior Software Architect
Sandvine


--_000_1460091126273230F5com_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<style type=3D"text/css" style=3D"display:none"><!-- p { margin-top: 0px; m=
argin-bottom: 0px; } @font-face { font-family: Calibri; } @font-face { font=
-family: Tahoma; } p.MsoNormal, li.MsoNormal, div.MsoNormal { margin: 0in 0=
in 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif; } a:link, s=
pan.MsoHyperlink { color: blue; text-decoration: underline; } a:visited, sp=
an.MsoHyperlinkFollowed { color: purple; text-decoration: underline; } p.Ms=
oAcetate, li.MsoAcetate, div.MsoAcetate { margin: 0in 0in 0.0001pt; font-si=
ze: 8pt; font-family: Tahoma, sans-serif; } p.msochpdefault, li.msochpdefau=
lt, div.msochpdefault { margin: 0in 0in 0.0001pt; font-size: 12pt; font-fam=
ily: Calibri, sans-serif; } span.emailstyle17 { font-family: Calibri, sans-=
serif; color: windowtext; } span.BalloonTextChar { font-family: Tahoma, san=
s-serif; } span.EmailStyle22 { font-family: Calibri, sans-serif; color: rgb=
(31, 73, 125); } .MsoChpDefault { font-size: 10pt; font-family: Calibri, sa=
ns-serif; } @page WordSection1 { margin: 1in; } div.WordSection1 { }--></st=
yle>
</head>
<body dir=3D"ltr" style=3D"font-size:12pt;color:#000000;background-color:#F=
FFFFF;font-family:Calibri,Arial,Helvetica,sans-serif;">
<p>&#8203;I think the part of the problem lies in the definition of UP and =
DOWN. So lets take some use cases.<br>
</p>
<p><br>
</p>
<p>a) In case of service provider many functions sits at the border between=
&nbsp;network/internet &nbsp;and&nbsp;subscriber/user. Typically the two si=
des of the border is defined by way of configuration, this interface/tunnel=
 point to subscriber side and that points to the
 internet. Anything ingress on subscriber side is FROM subscriber and vice =
versa. The UP or DOWN is not so useful.</p>
<p><br>
</p>
<p>b) Consider a typical client server. &nbsp;Assuming you mean UP: client =
-&gt;server/final destination and DOWN the other way. A flow aware service =
would have state SIP-&gt;DIP as UP and DIP-&gt;SIP as DOWN. Others like rou=
ter etc. may not care at all and that is fine.&nbsp;<br>
</p>
<p><br>
</p>
<p>In case of security device the inbound and outbound (or zones) are defin=
ed by configuration that is local to that entity. So having a classifier sa=
y IN or OUT would be wrong in that case.<br>
</p>
<p><br>
</p>
<p>Sumandra<br>
</p>
<div style=3D"color: rgb(33, 33, 33);">
<hr tabindex=3D"-1" style=3D"display:inline-block; width:98%">
<div id=3D"divRplyFwdMsg" dir=3D"ltr"><font face=3D"Calibri, sans-serif" co=
lor=3D"#000000" style=3D"font-size:11pt"><b>From:</b> Dave Dolson &lt;ddols=
on@sandvine.com&gt;<br>
<b>Sent:</b> Thursday, April 7, 2016 7:11 PM<br>
<b>To:</b> Sumandra Majee; sfc@ietf.org<br>
<b>Subject:</b> RE: A request for Metadata allocation schemes</font>
<div>&nbsp;</div>
</div>
<div>
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Sumandra (and others w=
ho have questioned this),</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">What do you mean by de=
tecting direction from the encapsulated packet?</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I&#8217;m having troub=
le understanding how one could tell from an arbitrary IP packet which direc=
tion it is going.</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">(Unless knowing the IP=
 address allocation scheme in the inner network&#8230;?&nbsp; That would be=
 arduous.)</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">And possibly in-bound,=
 out-bound are better names?</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I don&#8217;t like for=
ward/reverse because I can&#8217;t guess which is which.</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">-Dave</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span></p>
<div>
<div style=3D"border:none; border-top:solid #B5C4DF 1.0pt; padding:3.0pt 0i=
n 0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt; font-family:&quo=
t;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-=
size:10.0pt; font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Sumand=
ra Majee [mailto:S.Majee@F5.com]
<br>
<b>Sent:</b> Thursday, April 07, 2016 12:27 PM<br>
<b>To:</b> Dave Dolson; sfc@ietf.org<br>
<b>Subject:</b> Re: A request for Metadata allocation schemes</span></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;</p>
<p><span style=3D"font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;; c=
olor:black">&#8203;Dave,</span></p>
<p><span style=3D"font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;; c=
olor:black">&nbsp;</span></p>
<p><span style=3D"font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;; c=
olor:black">The use case you have defined is supported by most devices by b=
inding policies explicitly on,</span></p>
<p><span style=3D"font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;; c=
olor:black">&nbsp; &nbsp;a) interface or equivalent</span></p>
<p><span style=3D"font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;; c=
olor:black">&nbsp; &nbsp;b) flow direction. Most flow aware devices has to =
detect to and from correctly to do lot of thngs correctly.</span></p>
<p><span style=3D"font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;; c=
olor:black">&nbsp;</span></p>
<p><span style=3D"font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;; c=
olor:black">So the question is what do we get by adding this bit? I am oppo=
sed to the term UP and DOWN (from show point of view?), rather forward and =
reverse (even that is confusing). &nbsp;</span></p>
<p><span style=3D"font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;; c=
olor:black">&nbsp;</span></p>
<p><span style=3D"font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;; c=
olor:black">Sumandra</span></p>
<div>
<div class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><span=
 style=3D"font-size:12.0pt; color:#212121">
<hr size=3D"2" width=3D"98%" align=3D"center">
</span></div>
<div id=3D"divRplyFwdMsg">
<p class=3D"MsoNormal"><b><span style=3D"color:black">From:</span></b><span=
 style=3D"color:black"> sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of Dave Dolson &lt;<a href=3D"mailto:dd=
olson@sandvine.com">ddolson@sandvine.com</a>&gt;<br>
<b>Sent:</b> Wednesday, April 6, 2016 7:13 AM<br>
<b>To:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Subject:</b> [sfc] A request for Metadata allocation schemes</span><span=
 style=3D"font-size:12.0pt; color:#212121">
</span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt; color:#212121">&nbs=
p;</span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#212121">To those authors of me=
tadata allocations, I have a request.</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#212121">I believe many types o=
f service functions are going to want to distinguish up-link traffic from d=
own-link traffic.</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#212121">E.g., a security devic=
e treats in-bound to the protected device differently from out-bound.</span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#212121">E.g., an accounting sy=
stem needs to know whether to charge the source or destination node.</span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#212121">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#212121">So my request is to al=
locate a bit for up-link/down-link discrimination.</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#212121">I think the alternativ=
e is to configure each SF about each path whether it is up or down, or to u=
se something like an even/odd path ID scheme.</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#212121">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#212121">Does anyone else see t=
his as useful?</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#212121">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#212121">I believe all of the a=
llocation drafts have reserved bits.</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#212121">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#212121">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#212121">David Dolson</span></p=
>
<p class=3D"MsoNormal"><span style=3D"color:#212121">Senior Software Archit=
ect</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#212121">Sandvine</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#212121">&nbsp;</span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_1460091126273230F5com_--


From nobody Fri Apr  8 02:16:04 2016
Return-Path: <nsarkar@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7383112D739 for <sfc@ietfa.amsl.com>; Fri,  8 Apr 2016 02:16:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RGLUEXtzx_Qs for <sfc@ietfa.amsl.com>; Fri,  8 Apr 2016 02:16:00 -0700 (PDT)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) by ietfa.amsl.com (Postfix) with ESMTP id 1CF8A12D73B for <sfc@ietf.org>; Fri,  8 Apr 2016 02:15:36 -0700 (PDT)
Received: from blr-exch-1.sandvine.com (10.30.4.60) by wtl-exchp-1.sandvine.com (192.168.194.176) with Microsoft SMTP Server (TLS) id 14.3.195.1; Fri, 8 Apr 2016 05:15:34 -0400
Received: from BLR-EXCH-1.sandvine.com ([fe80::b896:bd62:3a8d:e51d]) by blr-exch-1.sandvine.com ([fe80::b896:bd62:3a8d:e51d%15]) with mapi id 14.03.0224.001; Fri, 8 Apr 2016 14:45:31 +0530
From: Nilanjan Sarkar <nsarkar@sandvine.com>
To: Sumandra Majee <S.Majee@F5.com>
Thread-Topic: [sfc] A request for Metadata allocation schemes
Thread-Index: AQHRkXcyHpBD5thCv0e394mdK92J6g==
Date: Fri, 8 Apr 2016 09:15:30 +0000
Message-ID: <1D15709113D6B34BAE5E128F392059CA01268568BE@blr-exch-1.sandvine.com>
References: <E8355113905631478EFF04F5AA706E9830F0AC6D@wtl-exchp-2.sandvine.com> <1460042865963.25707@F5.com>, <E8355113905631478EFF04F5AA706E9830F11EA7@wtl-exchp-2.sandvine.com>, <1460091126273.230@F5.com>
In-Reply-To: <1460091126273.230@F5.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/uVaEfQnJy2sPqsmblwAKfea3J3g>
Cc: Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] A request for Metadata allocation schemes
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Apr 2016 09:16:03 -0000
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From nobody Fri Apr  8 06:10:40 2016
Return-Path: <paul.bottorff@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 01A2212D830 for <sfc@ietfa.amsl.com>; Fri,  8 Apr 2016 06:10:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.131
X-Spam-Level: 
X-Spam-Status: No, score=-1.131 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_SORBS_WEB=0.77, SPF_HELO_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iW9wfVxOGXNO for <sfc@ietfa.amsl.com>; Fri,  8 Apr 2016 06:10:37 -0700 (PDT)
Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1bon0755.outbound.protection.outlook.com [IPv6:2a01:111:f400:fc10::1:755]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 75CE312D853 for <sfc@ietf.org>; Fri,  8 Apr 2016 06:10:36 -0700 (PDT)
Received: from TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM (10.162.187.152) by TU4PR84MB0160.NAMPRD84.PROD.OUTLOOK.COM (10.162.187.153) with Microsoft SMTP Server (TLS) id 15.1.447.15; Fri, 8 Apr 2016 13:10:19 +0000
Received: from TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM ([10.162.187.152]) by TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM ([10.162.187.152]) with mapi id 15.01.0447.029; Fri, 8 Apr 2016 13:10:19 +0000
From: "Bottorff, Paul" <paul.bottorff@hpe.com>
To: Nilanjan Sarkar <nsarkar@sandvine.com>, Sumandra Majee <S.Majee@F5.com>
Thread-Topic: [sfc] A request for Metadata allocation schemes
Thread-Index: AdGQDZcInpioWvGORw+Jt9cutzS71wA06k3BABaJqpAABVdClwAJm5IAAAfdv4A=
Date: Fri, 8 Apr 2016 13:10:18 +0000
Message-ID: <TU4PR84MB01596CB74B2CC2D7395C545BFE910@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM>
References: <E8355113905631478EFF04F5AA706E9830F0AC6D@wtl-exchp-2.sandvine.com> <1460042865963.25707@F5.com>, <E8355113905631478EFF04F5AA706E9830F11EA7@wtl-exchp-2.sandvine.com>, <1460091126273.230@F5.com> <1D15709113D6B34BAE5E128F392059CA01268568BE@blr-exch-1.sandvine.com>
In-Reply-To: <1D15709113D6B34BAE5E128F392059CA01268568BE@blr-exch-1.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: sandvine.com; dkim=none (message not signed) header.d=none;sandvine.com; dmarc=none action=none header.from=hpe.com;
x-originating-ip: [200.61.9.66]
x-ms-office365-filtering-correlation-id: 1973cb80-127e-4352-9458-08d35faf2260
x-microsoft-exchange-diagnostics: 1; TU4PR84MB0160; 5:sLFNbevBxkxZCIeJ54CUmTw4ZlBOPftGU6PlIqfSZkaREuQ+OI6lB90ovSBCSYNAu23eD6jYh4dK8rr/DpDLfmSWSKWtTFevhtLGrqMS4TNz+cUi6eFLuP0TssyEMSjE8ewHXzSlUN3/fpAksrtbgg==; 24:KYt0pkIQt91AmXr8wuQAl+ZveRC88rqY6EDjQFv0NW8AhWv46z/N1b6leBIq03VsgoXswc6U74DkTad9BLRq+O0lULxfr+1cmG9U+mW77WI=
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:TU4PR84MB0160;
x-microsoft-antispam-prvs: <TU4PR84MB016096AA120CD046437EC9F8FE910@TU4PR84MB0160.NAMPRD84.PROD.OUTLOOK.COM>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(8121501046)(5005006)(10201501046)(3002001)(6055026);  SRVR:TU4PR84MB0160; BCL:0; PCL:0; RULEID:; SRVR:TU4PR84MB0160; 
x-forefront-prvs: 0906E83A25
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(377454003)(13464003)(24454002)(122556002)(11100500001)(93886004)(19580405001)(3280700002)(586003)(87936001)(4326007)(19580395003)(2906002)(5003600100002)(9686002)(81166005)(102836003)(6116002)(66066001)(3660700001)(5001770100001)(3846002)(54356999)(50986999)(5004730100002)(77096005)(189998001)(92566002)(15975445007)(10400500002)(76176999)(33656002)(1220700001)(5008740100001)(5002640100001)(2950100001)(86362001)(99286002)(1096002)(2900100001); DIR:OUT; SFP:1102; SCL:1; SRVR:TU4PR84MB0160; H:TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM; FPR:; SPF:None; MLV:sfv; LANG:en; 
spamdiagnosticoutput: 1:23
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: hpe.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Apr 2016 13:10:18.8010 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc
X-MS-Exchange-Transport-CrossTenantHeadersStamped: TU4PR84MB0160
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ye6XCqeHGcGySiGqrZGk72CvMak>
Cc: "sfc@ietf.org" <sfc@ietf.org>, Dave Dolson <ddolson@sandvine.com>
Subject: Re: [sfc] A request for Metadata allocation schemes
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Apr 2016 13:10:39 -0000

SGkgTmlsYW5qYW4sIFN1bWFuZHJhLCBEYXZlOg0KDQpBZ3JlZWQsIHRoZSBjYXNlIHdoZXJlIHRo
ZXJlIGFyZSB0d28gcG9ydHMgKG9yIHR3byB2TklDcyksIHRoZW4gd2UgY2FuIHVzZSB0aGUgU0Eg
KG9yIFNJUCkgdG8gZGV0ZXJtaW5lIHRoZSBkaXJlY3Rpb24uDQoNClRob3VnaCB0aGlzIGRvZXMg
bm90IHdvcmsgZm9yIGEgc2luZ2xlIGFybWVkIFNGIEkgc3VzcGVjdCB0aGUgU0ZzIHdoaWNoIG5l
ZWQgdG8gZm9ybSByZXZlcnNlIHBhdGhzIGFyZSBkdWFsIGFybWVkIHRvZGF5LiBJZiB3ZSBzaW1w
bHkgc2F5IHRoYXQgU0ZzIHdoaWNoIG5lZWQgdG8gcmV2ZXJzZSBkaXJlY3Rpb25zIGFsc28gbmVl
ZCB0byBiZSBkdWFsIGFybWVkLCB0aGVuIHRoaXMgY291bGQgYmUgYSB1bml2ZXJzYWwgc29sdXRp
b24uIFRoZSBvdGhlciBuaWNlIHRoaW5nIGFib3V0IGl0IGlzIHRoYXQgaXQgd29ya3MgZm9yIG11
bHRpLWFybWVkIGJyYW5jaGluZyBhbHNvLiBTbyBpZiBJIGhhdmUgYW4gU0Ygd2l0aCBOIGVncmVz
cyBwb3J0cyAob3Igdk5JQ3MpIHRoZW4gdGhlIFNGIGNhbiBicmFuY2ggTiB3YXlzIHNpbXBseSBi
eSBzZW5kaW5nIHRvIHRoZSBjb3JyZWN0IGVncmVzcyBwb3J0LiBUaGlzIHNlZW1zIG5hdHVyYWwg
ZnJvbSBhbiBTRiBjb2RpbmcgcG9pbnQgb2Ygdmlldy4NCg0KQ2hlZXJzLA0KDQpQYXVsIA0KDQot
LS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KRnJvbTogc2ZjIFttYWlsdG86c2ZjLWJvdW5jZXNA
aWV0Zi5vcmddIE9uIEJlaGFsZiBPZiBOaWxhbmphbiBTYXJrYXINClNlbnQ6IEZyaWRheSwgQXBy
aWwgMDgsIDIwMTYgMjoxNiBBTQ0KVG86IFN1bWFuZHJhIE1hamVlIDxTLk1hamVlQEY1LmNvbT4N
CkNjOiBEYXZlIERvbHNvbiA8ZGRvbHNvbkBzYW5kdmluZS5jb20+OyBzZmNAaWV0Zi5vcmcNClN1
YmplY3Q6IFJlOiBbc2ZjXSBBIHJlcXVlc3QgZm9yIE1ldGFkYXRhIGFsbG9jYXRpb24gc2NoZW1l
cw0KDQpXaWxsIGEgU0YgZGV2aWNlIGhhdmUgMiBwb3J0cz8gUHJvYmxlbSB3YXMgdG8gZmluZCBh
biAgSVAgcGFja2V0IGRpcmVjdGlvbiBpbiBhIHNpbmdsZSBwb3J0IFNGIGRldmljZS4gSW4gY2Fz
ZSB0aGVyZSBhcmUgMiBwb3J0cywgb25lIGlzIGNvbm5lY3RlZCB0byBzdWJzY3JpYmVycyBhbmQg
YW5vdGhlciBpcyBjb25uZWN0ZWQgdG8gaW50ZXJuZXQsIHRoZW4gdGhlcmUgaXMgbm8gaXNzdWUu
DQoNClJlZ2FyZHMsDQpOaWxhbmphbg0KKHNlbnQgZnJvbSBteSBtb2JpbGUgcGhvbmUpDQoNCk9u
IDggQXByIDIwMTYgMTA6MjIsIFN1bWFuZHJhIE1hamVlIDxTLk1hamVlQEY1LmNvbT4gd3JvdGU6
DQoNCuKAi0kgdGhpbmsgdGhlIHBhcnQgb2YgdGhlIHByb2JsZW0gbGllcyBpbiB0aGUgZGVmaW5p
dGlvbiBvZiBVUCBhbmQgRE9XTi4gU28gbGV0cyB0YWtlIHNvbWUgdXNlIGNhc2VzLg0KDQoNCmEp
IEluIGNhc2Ugb2Ygc2VydmljZSBwcm92aWRlciBtYW55IGZ1bmN0aW9ucyBzaXRzIGF0IHRoZSBi
b3JkZXIgYmV0d2VlbiBuZXR3b3JrL2ludGVybmV0ICBhbmQgc3Vic2NyaWJlci91c2VyLiBUeXBp
Y2FsbHkgdGhlIHR3byBzaWRlcyBvZiB0aGUgYm9yZGVyIGlzIGRlZmluZWQgYnkgd2F5IG9mIGNv
bmZpZ3VyYXRpb24sIHRoaXMgaW50ZXJmYWNlL3R1bm5lbCBwb2ludCB0byBzdWJzY3JpYmVyIHNp
ZGUgYW5kIHRoYXQgcG9pbnRzIHRvIHRoZSBpbnRlcm5ldC4gQW55dGhpbmcgaW5ncmVzcyBvbiBz
dWJzY3JpYmVyIHNpZGUgaXMgRlJPTSBzdWJzY3JpYmVyIGFuZCB2aWNlIHZlcnNhLiBUaGUgVVAg
b3IgRE9XTiBpcyBub3Qgc28gdXNlZnVsLg0KDQoNCmIpIENvbnNpZGVyIGEgdHlwaWNhbCBjbGll
bnQgc2VydmVyLiAgQXNzdW1pbmcgeW91IG1lYW4gVVA6IGNsaWVudCAtPnNlcnZlci9maW5hbCBk
ZXN0aW5hdGlvbiBhbmQgRE9XTiB0aGUgb3RoZXIgd2F5LiBBIGZsb3cgYXdhcmUgc2VydmljZSB3
b3VsZCBoYXZlIHN0YXRlIFNJUC0+RElQIGFzIFVQIGFuZCBESVAtPlNJUCBhcyBET1dOLiBPdGhl
cnMgbGlrZSByb3V0ZXIgZXRjLiBtYXkgbm90IGNhcmUgYXQgYWxsIGFuZCB0aGF0IGlzIGZpbmUu
DQoNCg0KSW4gY2FzZSBvZiBzZWN1cml0eSBkZXZpY2UgdGhlIGluYm91bmQgYW5kIG91dGJvdW5k
IChvciB6b25lcykgYXJlIGRlZmluZWQgYnkgY29uZmlndXJhdGlvbiB0aGF0IGlzIGxvY2FsIHRv
IHRoYXQgZW50aXR5LiBTbyBoYXZpbmcgYSBjbGFzc2lmaWVyIHNheSBJTiBvciBPVVQgd291bGQg
YmUgd3JvbmcgaW4gdGhhdCBjYXNlLg0KDQoNClN1bWFuZHJhDQoNCl9fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fDQpGcm9tOiBEYXZlIERvbHNvbiA8ZGRvbHNvbkBzYW5kdmluZS5jb20+
DQpTZW50OiBUaHVyc2RheSwgQXByaWwgNywgMjAxNiA3OjExIFBNDQpUbzogU3VtYW5kcmEgTWFq
ZWU7IHNmY0BpZXRmLm9yZw0KU3ViamVjdDogUkU6IEEgcmVxdWVzdCBmb3IgTWV0YWRhdGEgYWxs
b2NhdGlvbiBzY2hlbWVzDQoNClN1bWFuZHJhIChhbmQgb3RoZXJzIHdobyBoYXZlIHF1ZXN0aW9u
ZWQgdGhpcyksIFdoYXQgZG8geW91IG1lYW4gYnkgZGV0ZWN0aW5nIGRpcmVjdGlvbiBmcm9tIHRo
ZSBlbmNhcHN1bGF0ZWQgcGFja2V0Pw0KSeKAmW0gaGF2aW5nIHRyb3VibGUgdW5kZXJzdGFuZGlu
ZyBob3cgb25lIGNvdWxkIHRlbGwgZnJvbSBhbiBhcmJpdHJhcnkgSVAgcGFja2V0IHdoaWNoIGRp
cmVjdGlvbiBpdCBpcyBnb2luZy4NCihVbmxlc3Mga25vd2luZyB0aGUgSVAgYWRkcmVzcyBhbGxv
Y2F0aW9uIHNjaGVtZSBpbiB0aGUgaW5uZXIgbmV0d29ya+KApj8gIFRoYXQgd291bGQgYmUgYXJk
dW91cy4pDQoNCkFuZCBwb3NzaWJseSBpbi1ib3VuZCwgb3V0LWJvdW5kIGFyZSBiZXR0ZXIgbmFt
ZXM/DQpJIGRvbuKAmXQgbGlrZSBmb3J3YXJkL3JldmVyc2UgYmVjYXVzZSBJIGNhbuKAmXQgZ3Vl
c3Mgd2hpY2ggaXMgd2hpY2guDQoNCi1EYXZlDQoNCkZyb206IFN1bWFuZHJhIE1hamVlIFttYWls
dG86Uy5NYWplZUBGNS5jb21dDQpTZW50OiBUaHVyc2RheSwgQXByaWwgMDcsIDIwMTYgMTI6Mjcg
UE0NClRvOiBEYXZlIERvbHNvbjsgc2ZjQGlldGYub3JnDQpTdWJqZWN0OiBSZTogQSByZXF1ZXN0
IGZvciBNZXRhZGF0YSBhbGxvY2F0aW9uIHNjaGVtZXMNCg0KDQrigItEYXZlLA0KDQoNCg0KVGhl
IHVzZSBjYXNlIHlvdSBoYXZlIGRlZmluZWQgaXMgc3VwcG9ydGVkIGJ5IG1vc3QgZGV2aWNlcyBi
eSBiaW5kaW5nIHBvbGljaWVzIGV4cGxpY2l0bHkgb24sDQoNCiAgIGEpIGludGVyZmFjZSBvciBl
cXVpdmFsZW50DQoNCiAgIGIpIGZsb3cgZGlyZWN0aW9uLiBNb3N0IGZsb3cgYXdhcmUgZGV2aWNl
cyBoYXMgdG8gZGV0ZWN0IHRvIGFuZCBmcm9tIGNvcnJlY3RseSB0byBkbyBsb3Qgb2YgdGhuZ3Mg
Y29ycmVjdGx5Lg0KDQoNCg0KU28gdGhlIHF1ZXN0aW9uIGlzIHdoYXQgZG8gd2UgZ2V0IGJ5IGFk
ZGluZyB0aGlzIGJpdD8gSSBhbSBvcHBvc2VkIHRvIHRoZSB0ZXJtIFVQIGFuZCBET1dOIChmcm9t
IHNob3cgcG9pbnQgb2Ygdmlldz8pLCByYXRoZXIgZm9yd2FyZCBhbmQgcmV2ZXJzZSAoZXZlbiB0
aGF0IGlzIGNvbmZ1c2luZykuDQoNCg0KDQpTdW1hbmRyYQ0KDQpfX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fXw0KRnJvbTogc2ZjIDxzZmMtYm91bmNlc0BpZXRmLm9yZzxtYWlsdG86c2Zj
LWJvdW5jZXNAaWV0Zi5vcmc+PiBvbiBiZWhhbGYgb2YgRGF2ZSBEb2xzb24gPGRkb2xzb25Ac2Fu
ZHZpbmUuY29tPG1haWx0bzpkZG9sc29uQHNhbmR2aW5lLmNvbT4+DQpTZW50OiBXZWRuZXNkYXks
IEFwcmlsIDYsIDIwMTYgNzoxMyBBTQ0KVG86IHNmY0BpZXRmLm9yZzxtYWlsdG86c2ZjQGlldGYu
b3JnPg0KU3ViamVjdDogW3NmY10gQSByZXF1ZXN0IGZvciBNZXRhZGF0YSBhbGxvY2F0aW9uIHNj
aGVtZXMNCg0KVG8gdGhvc2UgYXV0aG9ycyBvZiBtZXRhZGF0YSBhbGxvY2F0aW9ucywgSSBoYXZl
IGEgcmVxdWVzdC4NCkkgYmVsaWV2ZSBtYW55IHR5cGVzIG9mIHNlcnZpY2UgZnVuY3Rpb25zIGFy
ZSBnb2luZyB0byB3YW50IHRvIGRpc3Rpbmd1aXNoIHVwLWxpbmsgdHJhZmZpYyBmcm9tIGRvd24t
bGluayB0cmFmZmljLg0KRS5nLiwgYSBzZWN1cml0eSBkZXZpY2UgdHJlYXRzIGluLWJvdW5kIHRv
IHRoZSBwcm90ZWN0ZWQgZGV2aWNlIGRpZmZlcmVudGx5IGZyb20gb3V0LWJvdW5kLg0KRS5nLiwg
YW4gYWNjb3VudGluZyBzeXN0ZW0gbmVlZHMgdG8ga25vdyB3aGV0aGVyIHRvIGNoYXJnZSB0aGUg
c291cmNlIG9yIGRlc3RpbmF0aW9uIG5vZGUuDQoNClNvIG15IHJlcXVlc3QgaXMgdG8gYWxsb2Nh
dGUgYSBiaXQgZm9yIHVwLWxpbmsvZG93bi1saW5rIGRpc2NyaW1pbmF0aW9uLg0KSSB0aGluayB0
aGUgYWx0ZXJuYXRpdmUgaXMgdG8gY29uZmlndXJlIGVhY2ggU0YgYWJvdXQgZWFjaCBwYXRoIHdo
ZXRoZXIgaXQgaXMgdXAgb3IgZG93biwgb3IgdG8gdXNlIHNvbWV0aGluZyBsaWtlIGFuIGV2ZW4v
b2RkIHBhdGggSUQgc2NoZW1lLg0KDQpEb2VzIGFueW9uZSBlbHNlIHNlZSB0aGlzIGFzIHVzZWZ1
bD8NCg0KSSBiZWxpZXZlIGFsbCBvZiB0aGUgYWxsb2NhdGlvbiBkcmFmdHMgaGF2ZSByZXNlcnZl
ZCBiaXRzLg0KDQoNCkRhdmlkIERvbHNvbg0KU2VuaW9yIFNvZnR3YXJlIEFyY2hpdGVjdA0KU2Fu
ZHZpbmUNCg0KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18N
CnNmYyBtYWlsaW5nIGxpc3QNCnNmY0BpZXRmLm9yZw0KaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFp
bG1hbi9saXN0aW5mby9zZmMNCg==


From nobody Fri Apr  8 11:25:09 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6CBBB12D1B6; Fri,  8 Apr 2016 11:25:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.53
X-Spam-Level: 
X-Spam-Status: No, score=-14.53 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7JRy2AazpRaQ; Fri,  8 Apr 2016 11:25:01 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2D52312D0DA; Fri,  8 Apr 2016 11:25:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=18279; q=dns/txt; s=iport; t=1460139901; x=1461349501; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=1cyZjRKPxzXh4QWLnZWQrpumAGulu07/L3skIFOKguI=; b=cuZOldjV7wqbqUQ0EBXEbyNN4JtYZxbdx+5RWVVo93xlyBcK8RjEGaqf I9nsFGOMns0ONxR7pyw5baD1Dyln+rOEJnTEohpVmUff2AKLWjB5ljOnI gwNg75ugS7qi7NLiDR2z4RWUjKD+vy1fdVn+LTliK8XEDYO3vcFrwRW+k 0=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DLAgAp9gdX/4wNJK1cgmtMU30GrmeGZ?= =?us-ascii?q?YRzDoFzFwEJhWwCgTM4FAEBAQEBAQFlJ4RBAQEBAwEBAQEgSwsFCwIBBgISBic?= =?us-ascii?q?DAgIhBgsUAw4CBA4FCQWIBAMKCA6RWp0XjEINhSEBAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQENCIYhgXUIgk6CQYIFJgmCSiuCKwWTGYQ6MQGDI4FmbYJygy6BdYFnhE2?= =?us-ascii?q?IWYdKh1oBHgFDg2dsiDt+AQEB?=
X-IronPort-AV: E=Sophos;i="5.24,454,1454976000";  d="asc'?scan'208,217";a="259203294"
Received: from alln-core-7.cisco.com ([173.36.13.140]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 08 Apr 2016 18:24:59 +0000
Received: from XCH-RTP-019.cisco.com (xch-rtp-019.cisco.com [64.101.220.159]) by alln-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id u38IOxr1010852 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 8 Apr 2016 18:24:59 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-019.cisco.com (64.101.220.159) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 8 Apr 2016 14:24:58 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Fri, 8 Apr 2016 14:24:58 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Xiaohu Xu <xuxiaohu@huawei.com>
Thread-Topic: [mpls] The first nibble issue associated with MPLS encapsulation
Thread-Index: AQHRkPR7Ow6l9wh8WUKpFJXl+MwAqJ+AqQ4A
Date: Fri, 8 Apr 2016 18:24:58 +0000
Message-ID: <B664DB14-0A8C-4437-83E3-F9DA6C0DDA61@cisco.com>
References: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53871C@NKGEML515-MBX.china.huawei.com>
In-Reply-To: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53871C@NKGEML515-MBX.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.247.9]
Content-Type: multipart/signed; boundary="Apple-Mail=_96308AB7-A1EC-47DF-AA5E-35FBEE6ACEE6"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ytSHRRyQb5nA2MwvOG5GzWSNUDo>
Cc: "mpls@ietf.org" <mpls@ietf.org>, "bier@ietf.org" <bier@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Dr. Tony Przygienda" <tonysietf@gmail.com>
Subject: Re: [sfc] [mpls] The first nibble issue associated with MPLS encapsulation
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Apr 2016 18:25:04 -0000

--Apple-Mail=_96308AB7-A1EC-47DF-AA5E-35FBEE6ACEE6
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_BB41A064-4BB5-4219-94E9-B998B9A81CC1"


--Apple-Mail=_BB41A064-4BB5-4219-94E9-B998B9A81CC1
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Xiaohu, Tony,

Please see inline.

> On Apr 7, 2016, at 2:39 PM, Xuxiaohu <xuxiaohu@huawei.com> wrote:
>=20
> As for the first nibble issue, will it violate the layering principle =
of network protocol stacks if the first nibble of any new encapsulation =
header (which could be an MPLS payload) is used as the "MPLS payload =
type" field?

Reading draft-wang-bier-ethernet-01, Section 3, the =E2=80=9Cfirst =
nibble=E2=80=9D is _not_ used as an =E2=80=9CMPLS payload type=E2=80=9D. =
Instead, the text describes an anti-aliasing mechanism, much like RFC =
4928.

The relevant text is:
     First nibble: The first 4 bits of the header are set to 0101; this
   ensures that the BIER header will not be confused with an IP header
   or with the header of a pseudowire packet.

Which says =E2=80=9C=E2=80=A6 will not be confused with =E2=80=A6"

> wouldn't it  be more reasonable and sustainable to fix the problem =
(i.e., the lack of a protocol field in the MPLS header) by the MPLS =
header itself?
>=20

Who says it is a *problem*? There=E2=80=99s no =E2=80=9Cfixing=E2=80=9D =
needed.

> By the way, since it's claimed that the NSH is transport-independant, =
it means the NSH should be able to be transported over MPLS. However, it =
seems that the first nibble issue has not be considered in the current =
NSH draft. As a result, when encapsulating NSH over MPLS, the NSH may be =
mis-interpreted as IP header.
>=20
>=20

There seems to be some massive confusion on this paragraph, on a number =
of levels. First, NSH is not =E2=80=9Cclaimed to be=E2=80=9D =
transport-independent. It is by charter and by design. Second, the NSH =
draft does not even include the term =E2=80=9CMPLS=E2=80=9D, because it =
does not define transports. The SFC Encapsulation can be used in a =
transport-agnostic way.

One more comment below.

> Best regards,
> Xiaohu
>=20
> =E5=8F=91=E4=BB=B6=E4=BA=BA: BIER [bier-bounces@ietf.org =
<mailto:bier-bounces@ietf.org>] =E4=BB=A3=E8=A1=A8 Tony Przygienda =
[tonysietf@gmail.com <mailto:tonysietf@gmail.com>]
> =E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4: 2016=E5=B9=B44=E6=9C=885=E6=97=A5 =
22:36
> =E6=94=B6=E4=BB=B6=E4=BA=BA: bier@ietf.org <mailto:bier@ietf.org>
> =E4=B8=BB=E9=A2=98: [Bier] comments on draft-wang-bier-ethernet-01
>=20
> after reading
>=20
> a) first nibble: refer to MPLS encaps as "the same value" to keep in =
sync

One comment regarding the =E2=80=9CFirst nibble=E2=80=9D text at =
draft-ietf-bier-mpls-encapsulation-03

Since the function of the first nibble is to prevent aliasing with an IP =
packet, in order for RFC 4928 to specify values of 0x0 and 0x1 for the =
First Nibble, it had to =E2=80=9CReserve=E2=80=9D IP protocol versions =
of 0 and 1, referencing that RFC (see =
https://tools.ietf.org/html/rfc4928#section-5).

Is the intent to re-assign IPv5 at =
http://www.iana.org/assignments/version-numbers/ =
<http://www.iana.org/assignments/version-numbers/> ?

Note that RFC 4928 says =E2=80=9CREQUIRED=E2=80=9D at:

   It is REQUIRED, however, that applications depend upon in-order
   packet delivery restrict the first nibble values to 0x0 and 0x1.

Thanks,

=E2=80=94 Carlos.


> b) refer to all other possible fields to MPLS encaps to keep in sync =
when describing instead of repeating
> c) you need to describe which kind of ether MACs are allowed, =
especially on broadcast media, i.e. is it always p2p or can you take =
advantage of the broadcast ?
> d) Figure 4: use the architecture/MPLS encoding for the length, don't =
invent a new one
> e) who will obtain a new ether type from IEEE? As far I understand, =
not a trivial process albeit we have several liaisons with IEEE
>=20
> --
> We=E2=80=99ve heard that a million monkeys at a million keyboards =
could produce the complete works of Shakespeare; now, thanks to the =
Internet, we know that is not true.
> =E2=80=95Robert Wilensky
> _______________________________________________
> mpls mailing list
> mpls@ietf.org <mailto:mpls@ietf.org>
> https://www.ietf.org/mailman/listinfo/mpls =
<https://www.ietf.org/mailman/listinfo/mpls>

--Apple-Mail=_BB41A064-4BB5-4219-94E9-B998B9A81CC1
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">Xiaohu, Tony,<div class=3D""><br class=3D""></div><div =
class=3D"">Please see inline.<br class=3D""><div class=3D""><br =
class=3D""><div><blockquote type=3D"cite" class=3D""><div class=3D"">On =
Apr 7, 2016, at 2:39 PM, Xuxiaohu &lt;<a =
href=3D"mailto:xuxiaohu@huawei.com" class=3D"">xuxiaohu@huawei.com</a>&gt;=
 wrote:</div><br class=3D"Apple-interchange-newline"><div class=3D""><div =
style=3D"font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; orphans: auto; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; widows: =
auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; direction: ltr; =
font-family: Tahoma; font-size: 10pt;" class=3D""><div =
style=3D"margin-top: 0px; margin-bottom: 0px;" class=3D"">As for the =
first nibble issue, will it violate the layering principle of network =
protocol stacks if the first nibble of any new encapsulation header =
(which could be an MPLS payload)&nbsp;is used as the "MPLS payload type" =
field? </div></div></div></blockquote><div><br =
class=3D""></div><div>Reading&nbsp;draft-wang-bier-ethernet-01, Section =
3, the =E2=80=9Cfirst nibble=E2=80=9D is _not_ used as an =E2=80=9CMPLS =
payload type=E2=80=9D. Instead, the text describes an anti-aliasing =
mechanism, much like RFC 4928.&nbsp;</div><div><br =
class=3D""></div><div>The relevant text is:</div><div><div =
class=3D"">&nbsp; &nbsp; &nbsp;First nibble: The first 4 bits of the =
header are set to 0101; this</div><div class=3D"">&nbsp; &nbsp;ensures =
that the BIER header will not be confused with an IP header</div><div =
class=3D"">&nbsp; &nbsp;or with the header of a pseudowire =
packet.</div><div class=3D""><br class=3D""></div><div class=3D"">Which =
says =E2=80=9C=E2=80=A6 will not be confused with =E2=80=A6"</div></div><b=
r class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
style=3D"font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; orphans: auto; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; widows: =
auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; direction: ltr; =
font-family: Tahoma; font-size: 10pt;" class=3D""><div =
style=3D"margin-top: 0px; margin-bottom: 0px;" class=3D"">wouldn't =
it&nbsp; be more reasonable and sustainable&nbsp;to fix the&nbsp;problem =
(i.e., the lack of a protocol field in the MPLS header) by the MPLS =
header itself?</div><p style=3D"margin-top: 0px; margin-bottom: 0px;" =
class=3D"">&nbsp;</p></div></div></blockquote><div><br =
class=3D""></div><div>Who says it is a *problem*? There=E2=80=99s no =
=E2=80=9Cfixing=E2=80=9D needed.</div><div><br =
class=3D""></div><blockquote type=3D"cite" class=3D""><div class=3D""><div=
 style=3D"font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; orphans: auto; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; widows: =
auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; direction: ltr; =
font-family: Tahoma; font-size: 10pt;" class=3D""><div =
style=3D"margin-top: 0px; margin-bottom: 0px;" class=3D"">By the way, =
since it's claimed that the NSH is transport-independant, it means the =
NSH should be able to be transported over MPLS. However, it seems that =
the first nibble issue has not be considered&nbsp;in the current NSH =
draft. As a result, when encapsulating NSH over MPLS, the NSH may be =
mis-interpreted as IP header.</div><p style=3D"margin-top: 0px; =
margin-bottom: 0px;" class=3D"">&nbsp;</p><div class=3D""><br =
class=3D""></div></div></div></blockquote><div><br =
class=3D""></div><div>There seems to be some massive confusion on this =
paragraph, on a number of levels. First, NSH is not =E2=80=9Cclaimed to =
be=E2=80=9D transport-independent. It is by charter and by design. =
Second, the NSH draft does not even include the term =E2=80=9CMPLS=E2=80=9D=
, because it does not define transports. The SFC Encapsulation can be =
used in a transport-agnostic way.</div><div><br class=3D""></div><div>One =
more comment below.</div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D""><div style=3D"font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; direction: ltr; font-family: Tahoma; =
font-size: 10pt;" class=3D""><div style=3D"margin-top: 0px; =
margin-bottom: 0px;" class=3D"">Best regards,</div><div =
style=3D"margin-top: 0px; margin-bottom: 0px;" class=3D"">Xiaohu</div><p =
style=3D"margin-top: 0px; margin-bottom: 0px;" class=3D"">&nbsp;</p><div =
style=3D"font-family: 'Times New Roman'; font-size: 16px;" class=3D""><hr =
tabindex=3D"-1" class=3D""><div id=3D"divRpF100744" style=3D"direction: =
ltr;" class=3D""><font size=3D"2" face=3D"Tahoma" class=3D""><b =
class=3D"">=E5=8F=91=E4=BB=B6=E4=BA=BA:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>BIER [<a =
href=3D"mailto:bier-bounces@ietf.org" =
class=3D"">bier-bounces@ietf.org</a>] =E4=BB=A3=E8=A1=A8 Tony Przygienda =
[<a href=3D"mailto:tonysietf@gmail.com" =
class=3D"">tonysietf@gmail.com</a>]<br class=3D""><b =
class=3D"">=E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>2016=E5=B9=B44=E6=9C=885=E6=97=
=A5 22:36<br class=3D""><b class=3D"">=E6=94=B6=E4=BB=B6=E4=BA=BA:</b><spa=
n class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:bier@ietf.org" class=3D"">bier@ietf.org</a><br =
class=3D""><b class=3D"">=E4=B8=BB=E9=A2=98:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>[Bier] comments on =
draft-wang-bier-ethernet-01<br class=3D""></font><br class=3D""></div><div=
 class=3D""></div><div class=3D""><div dir=3D"ltr" class=3D"">after =
reading&nbsp;<div class=3D""><br class=3D""></div><div class=3D"">a) =
first nibble: refer to MPLS encaps as "the same value" to keep in =
sync&nbsp;</div></div></div></div></div></div></blockquote><div><br =
class=3D""></div><div>One comment regarding the =E2=80=9CFirst nibble=E2=80=
=9D text at&nbsp;draft-ietf-bier-mpls-encapsulation-03</div><div><br =
class=3D""></div><div>Since the function of the first nibble is to =
prevent aliasing with an IP packet, in order for RFC 4928 to specify =
values of 0x0 and 0x1 for the First Nibble, it had to =E2=80=9CReserve=E2=80=
=9D IP protocol versions of 0 and 1, referencing that RFC (see <a =
href=3D"https://tools.ietf.org/html/rfc4928#section-5" =
class=3D"">https://tools.ietf.org/html/rfc4928#section-5</a>).</div><div><=
br class=3D""></div><div>Is the intent to re-assign IPv5 at&nbsp;<a =
href=3D"http://www.iana.org/assignments/version-numbers/" =
class=3D"">http://www.iana.org/assignments/version-numbers/</a>&nbsp;?</di=
v><div><br class=3D""></div><div>Note that RFC 4928 says =E2=80=9CREQUIRED=
=E2=80=9D at:</div><div><br class=3D""></div><div><div class=3D"">&nbsp; =
&nbsp;It is REQUIRED, however, that applications depend upon =
in-order</div><div class=3D"">&nbsp; &nbsp;packet delivery restrict the =
first nibble values to 0x0 and 0x1.</div><div class=3D""><br =
class=3D""></div><div class=3D"">Thanks,</div><div class=3D""><br =
class=3D""></div><div class=3D"">=E2=80=94 Carlos.</div></div><div><br =
class=3D""></div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D""><div style=3D"font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
direction: ltr; font-family: Tahoma; font-size: 10pt;" class=3D""><div =
style=3D"font-family: 'Times New Roman'; font-size: 16px;" class=3D""><div=
 class=3D""><div dir=3D"ltr" class=3D""><div class=3D"">b) refer to all =
other possible fields to MPLS encaps to keep in sync when describing =
instead of repeating&nbsp;</div><div class=3D"">c) you need to describe =
which kind of ether MACs are allowed, especially on broadcast media, =
i.e. is it always p2p or can you take advantage of the broadcast =
?</div><div class=3D"">d) Figure 4: use the architecture/MPLS encoding =
for the length, don't invent a new one&nbsp;</div><div class=3D"">e) who =
will obtain a new ether type from IEEE? As far I understand, not a =
trivial process albeit we have several liaisons with =
IEEE&nbsp;</div><div class=3D""><div class=3D""><br =
class=3D""></div>--<span class=3D"Apple-converted-space">&nbsp;</span><br =
class=3D""><div class=3D"gmail_signature"><div dir=3D"ltr" class=3D""><div=
 class=3D""><span style=3D"font-size: 12px;" class=3D""><font =
face=3D"georgia, serif" class=3D""><i class=3D"">We=E2=80=99ve heard =
that a million monkeys at a million keyboards could produce the complete =
works of Shakespeare; now, thanks to the Internet, we know that is not =
true.</i></font></span><i class=3D""><font face=3D"garamond, serif" =
class=3D""><br class=3D""></font></i></div><div class=3D""><span =
style=3D"font-size: 12px;" class=3D""><font face=3D"times new roman, =
serif" class=3D"">=E2=80=95Robert Wilensky</font></span><br =
class=3D""></div></div></div></div></div></div></div></div><span =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" =
class=3D"">_______________________________________________</span><br =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><span style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">mpls mailing =
list</span><br style=3D"font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><a =
href=3D"mailto:mpls@ietf.org" style=3D"font-family: Helvetica; =
font-size: 12px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D"">mpls@ietf.org</a><br style=3D"font-family: Helvetica; =
font-size: 12px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><a href=3D"https://www.ietf.org/mailman/listinfo/mpls" =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" =
class=3D"">https://www.ietf.org/mailman/listinfo/mpls</a></div></blockquot=
e></div><br class=3D""></div></div></body></html>=

--Apple-Mail=_BB41A064-4BB5-4219-94E9-B998B9A81CC1--

--Apple-Mail=_96308AB7-A1EC-47DF-AA5E-35FBEE6ACEE6
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=H9Kq
-----END PGP SIGNATURE-----

--Apple-Mail=_96308AB7-A1EC-47DF-AA5E-35FBEE6ACEE6--


From nobody Fri Apr  8 12:31:40 2016
Return-Path: <Alexander.Vainshtein@ecitele.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B828C12D516; Fri,  8 Apr 2016 12:31:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.921
X-Spam-Level: 
X-Spam-Status: No, score=-1.921 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=eci365.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PxsOUOFc9a9j; Fri,  8 Apr 2016 12:31:34 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01on0092.outbound.protection.outlook.com [104.47.1.92]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C01AB12D58E; Fri,  8 Apr 2016 12:31:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ECI365.onmicrosoft.com; s=selector1-ecitele-com; h=From:To:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=YJZ464g5S6HzuLzW1RjymsrBHTZ9O+PX5WpBjUzTn2I=; b=cx0e1HTw7vycGxbYTEs0FTEbQlCKR7n6HKDNRxQYj1O4MPXilhl4CZrXBkAhPG4jvBeR8U8JqlYlwhBYoKrdg70GIigOuaFA1JN9dqUKCY0zp8zmACnHO9vHZXi0YbVztrrMZokIb5RjeGfGPMhRvSZHeZzz6zFQEZ19b1OnauU=
Received: from DB3PR03MB0780.eurprd03.prod.outlook.com (10.161.55.12) by DB3PR03MB0778.eurprd03.prod.outlook.com (10.161.54.28) with Microsoft SMTP Server (TLS) id 15.1.447.15; Fri, 8 Apr 2016 19:31:30 +0000
Received: from DB3PR03MB0780.eurprd03.prod.outlook.com ([10.161.55.12]) by DB3PR03MB0780.eurprd03.prod.outlook.com ([10.161.55.12]) with mapi id 15.01.0447.029; Fri, 8 Apr 2016 19:31:30 +0000
From: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, Xiaohu Xu <xuxiaohu@huawei.com>
Thread-Topic: [mpls] The first nibble issue associated with MPLS encapsulation
Thread-Index: AQHRkPR7Ow6l9wh8WUKpFJXl+MwAqJ+AqQ4A///PiXs=
Date: Fri, 8 Apr 2016 19:31:30 +0000
Message-ID: <mc51yrrf9n0wxbjsrprt9amf.1460143890063@email.android.com>
References: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53871C@NKGEML515-MBX.china.huawei.com>,  <B664DB14-0A8C-4437-83E3-F9DA6C0DDA61@cisco.com>
In-Reply-To: <B664DB14-0A8C-4437-83E3-F9DA6C0DDA61@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=ecitele.com;
x-originating-ip: [79.181.138.125]
x-ms-office365-filtering-correlation-id: 00ab3b3b-9438-4e93-8b95-08d35fe46304
x-microsoft-exchange-diagnostics: 1; DB3PR03MB0778; 5:rNtyABEHhCDUe2L/9LfAtLWr4zJTgk6bYn3jBsLaXKawHBRNOlWowL1TvqamfEKuZkPQU63neMo9osHDXuFO5Li5H6rtXVd3rRMYPG+emAw4tJKiDS1vGpZhPY7kqiqUGjmSRXgTGc1o8/y+lxXPEw==; 24:9O8J18ruzemFmYl3WI8DEU0r68Frh0aGgw4sH0r95qVNYdQYDQVE2ywQZX0qPVQ6z2OcOlJ3Fote+Co9NJJp5gp5QpISq3DijCdzuI+Qi6g=
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:DB3PR03MB0778;
x-microsoft-antispam-prvs: <DB3PR03MB0778262B413CC229FC20E9199D910@DB3PR03MB0778.eurprd03.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(95692535739014);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046); SRVR:DB3PR03MB0778; BCL:0; PCL:0; RULEID:; SRVR:DB3PR03MB0778; 
x-forefront-prvs: 0906E83A25
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(24454002)(13464003)(52034003)(377454003)(10400500002)(11100500001)(95246002)(5008740100001)(19580405001)(19580395003)(86362001)(586003)(3846002)(164054004)(1096002)(5004730100002)(3660700001)(3280700002)(1220700001)(9686002)(102836003)(6116002)(92566002)(4326007)(33646002)(19617315012)(2906002)(50986999)(76176999)(54356999)(66066001)(16236675004)(5002640100001)(5001770100001)(15975445007)(106116001)(77096005)(189998001)(2900100001)(81166005)(87936001)(122556002)(2950100001)(51650200001); DIR:OUT; SFP:1102; SCL:1; SRVR:DB3PR03MB0778; H:DB3PR03MB0780.eurprd03.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; 
spamdiagnosticoutput: 1:23
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_mc51yrrf9n0wxbjsrprt9amf1460143890063emailandroidcom_"
MIME-Version: 1.0
X-OriginatorOrg: ecitele.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Apr 2016 19:31:30.5765 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2c514a61-08de-4519-b4c0-921fef62c42a
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB3PR03MB0778
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/IXq7XBAJSVKHuAfDYHun-cbi5ds>
Cc: "mpls@ietf.org" <mpls@ietf.org>, "bier@ietf.org" <bier@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Dr. Tony Przygienda" <tonysietf@gmail.com>
Subject: Re: [sfc] [mpls] The first nibble issue associated with MPLS encapsulation
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Apr 2016 19:31:38 -0000

--_000_mc51yrrf9n0wxbjsrprt9amf1460143890063emailandroidcom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Carlos and all,
Just for the reference, IANA has defined version 5 (0101) has assigned to S=
T protocol and refers to RFC 1119. The latter has been obsoleted by RFC 181=
9, but the IANA
assignment still holds.

Is there, just in case, any relationship between BIER and ST?
Thumb typed on my cellphone
Regards,
Sasha

-------- Original Message --------
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Date: Fri, April 08, 2016 9:25 PM +0300
To: Xiaohu Xu <xuxiaohu@huawei.com>
CC: mpls@ietf.org, bier@ietf.org, sfc@ietf.org, "Dr. Tony Przygienda" <tony=
sietf@gmail.com>
Subject: Re: [mpls] The first nibble issue associated with MPLS encapsulati=
on



Xiaohu, Tony,

Please see inline.

On Apr 7, 2016, at 2:39 PM, Xuxiaohu <xuxiaohu@huawei.com<mailto:xuxiaohu@h=
uawei.com>> wrote:

As for the first nibble issue, will it violate the layering principle of ne=
twork protocol stacks if the first nibble of any new encapsulation header (=
which could be an MPLS payload) is used as the "MPLS payload type" field?

Reading draft-wang-bier-ethernet-01, Section 3, the "first nibble" is _not_=
 used as an "MPLS payload type". Instead, the text describes an anti-aliasi=
ng mechanism, much like RFC 4928.

The relevant text is:
     First nibble: The first 4 bits of the header are set to 0101; this
   ensures that the BIER header will not be confused with an IP header
   or with the header of a pseudowire packet.

Which says "... will not be confused with ..."

wouldn't it  be more reasonable and sustainable to fix the problem (i.e., t=
he lack of a protocol field in the MPLS header) by the MPLS header itself?



Who says it is a *problem*? There's no "fixing" needed.

By the way, since it's claimed that the NSH is transport-independant, it me=
ans the NSH should be able to be transported over MPLS. However, it seems t=
hat the first nibble issue has not be considered in the current NSH draft. =
As a result, when encapsulating NSH over MPLS, the NSH may be mis-interpret=
ed as IP header.




There seems to be some massive confusion on this paragraph, on a number of =
levels. First, NSH is not "claimed to be" transport-independent. It is by c=
harter and by design. Second, the NSH draft does not even include the term =
"MPLS", because it does not define transports. The SFC Encapsulation can be=
 used in a transport-agnostic way.

One more comment below.

Best regards,
Xiaohu



________________________________
???: BIER [bier-bounces@ietf.org<mailto:bier-bounces@ietf.org>] ?? Tony Prz=
ygienda [tonysietf@gmail.com<mailto:tonysietf@gmail.com>]
????: 2016?4?5? 22:36
???: bier@ietf.org<mailto:bier@ietf.org>
??: [Bier] comments on draft-wang-bier-ethernet-01

after reading

a) first nibble: refer to MPLS encaps as "the same value" to keep in sync

One comment regarding the "First nibble" text at draft-ietf-bier-mpls-encap=
sulation-03

Since the function of the first nibble is to prevent aliasing with an IP pa=
cket, in order for RFC 4928 to specify values of 0x0 and 0x1 for the First =
Nibble, it had to "Reserve" IP protocol versions of 0 and 1, referencing th=
at RFC (see https://tools.ietf.org/html/rfc4928#section-5).

Is the intent to re-assign IPv5 at http://www.iana.org/assignments/version-=
numbers/ ?

Note that RFC 4928 says "REQUIRED" at:

   It is REQUIRED, however, that applications depend upon in-order
   packet delivery restrict the first nibble values to 0x0 and 0x1.

Thanks,

- Carlos.


b) refer to all other possible fields to MPLS encaps to keep in sync when d=
escribing instead of repeating
c) you need to describe which kind of ether MACs are allowed, especially on=
 broadcast media, i.e. is it always p2p or can you take advantage of the br=
oadcast ?
d) Figure 4: use the architecture/MPLS encoding for the length, don't inven=
t a new one
e) who will obtain a new ether type from IEEE? As far I understand, not a t=
rivial process albeit we have several liaisons with IEEE

--
We've heard that a million monkeys at a million keyboards could produce the=
 complete works of Shakespeare; now, thanks to the Internet, we know that i=
s not true.
?Robert Wilensky
_______________________________________________
mpls mailing list
mpls@ietf.org<mailto:mpls@ietf.org>
https://www.ietf.org/mailman/listinfo/mpls


--_000_mc51yrrf9n0wxbjsrprt9amf1460143890063emailandroidcom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta content=3D"text/html; charset=3Dutf-8">
</head>
<body class=3D"" style=3D"word-wrap:break-word">
<pre style=3D"word-wrap:break-word; font-size:10.0pt; font-family:Tahoma; c=
olor:black">Carlos and all,=0A=
Just for the reference, IANA has defined version 5 (0101) has assigned to S=
T protocol and refers to RFC 1119. The latter has been obsoleted by RFC 181=
9, but the IANA =0A=
assignment still holds.=0A=
=0A=
Is there, just in case, any relationship between BIER and ST?=0A=
Thumb typed on my cellphone=0A=
Regards,=0A=
Sasha=0A=
=0A=
-------- Original Message --------=0A=
From: &quot;Carlos Pignataro (cpignata)&quot; &lt;cpignata@cisco.com&gt;=0A=
Date: Fri, April 08, 2016 9:25 PM &#43;0300=0A=
To: Xiaohu Xu &lt;xuxiaohu@huawei.com&gt;=0A=
CC: mpls@ietf.org, bier@ietf.org, sfc@ietf.org, &quot;Dr. Tony Przygienda&q=
uot; &lt;tonysietf@gmail.com&gt;=0A=
Subject: Re: [mpls] The first nibble issue associated with MPLS encapsulati=
on=0A=
=0A=
</pre>
<div>Xiaohu, Tony,
<div class=3D""><br class=3D"">
</div>
<div class=3D"">Please see inline.<br class=3D"">
<div class=3D""><br class=3D"">
<div>
<blockquote type=3D"cite" class=3D"">
<div class=3D"">On Apr 7, 2016, at 2:39 PM, Xuxiaohu &lt;<a href=3D"mailto:=
xuxiaohu@huawei.com" class=3D"">xuxiaohu@huawei.com</a>&gt; wrote:</div>
<br class=3D"Apple-interchange-newline">
<div class=3D"">
<div class=3D"" style=3D"font-style:normal; font-weight:normal; letter-spac=
ing:normal; orphans:auto; text-align:start; text-indent:0px; text-transform=
:none; white-space:normal; widows:auto; word-spacing:0px; direction:ltr; fo=
nt-family:Tahoma; font-size:10pt">
<div class=3D"" style=3D"margin-top:0px; margin-bottom:0px">As for the firs=
t nibble issue, will it violate the layering principle of network protocol =
stacks if the first nibble of any new encapsulation header (which could be =
an MPLS payload)&nbsp;is used as the &quot;MPLS
 payload type&quot; field? </div>
</div>
</div>
</blockquote>
<div><br class=3D"">
</div>
<div>Reading&nbsp;draft-wang-bier-ethernet-01, Section 3, the &#8220;first =
nibble&#8221; is _not_ used as an &#8220;MPLS payload type&#8221;. Instead,=
 the text describes an anti-aliasing mechanism, much like RFC 4928.&nbsp;</=
div>
<div><br class=3D"">
</div>
<div>The relevant text is:</div>
<div>
<div class=3D"">&nbsp; &nbsp; &nbsp;First nibble: The first 4 bits of the h=
eader are set to 0101; this</div>
<div class=3D"">&nbsp; &nbsp;ensures that the BIER header will not be confu=
sed with an IP header</div>
<div class=3D"">&nbsp; &nbsp;or with the header of a pseudowire packet.</di=
v>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">Which says &#8220;&#8230; will not be confused with &#8230;=
&quot;</div>
</div>
<br class=3D"">
<blockquote type=3D"cite" class=3D"">
<div class=3D"">
<div class=3D"" style=3D"font-style:normal; font-weight:normal; letter-spac=
ing:normal; orphans:auto; text-align:start; text-indent:0px; text-transform=
:none; white-space:normal; widows:auto; word-spacing:0px; direction:ltr; fo=
nt-family:Tahoma; font-size:10pt">
<div class=3D"" style=3D"margin-top:0px; margin-bottom:0px">wouldn't it&nbs=
p; be more reasonable and sustainable&nbsp;to fix the&nbsp;problem (i.e., t=
he lack of a protocol field in the MPLS header) by the MPLS header itself?<=
/div>
<p class=3D"" style=3D"margin-top:0px; margin-bottom:0px">&nbsp;</p>
</div>
</div>
</blockquote>
<div><br class=3D"">
</div>
<div>Who says it is a *problem*? There&#8217;s no &#8220;fixing&#8221; need=
ed.</div>
<div><br class=3D"">
</div>
<blockquote type=3D"cite" class=3D"">
<div class=3D"">
<div class=3D"" style=3D"font-style:normal; font-weight:normal; letter-spac=
ing:normal; orphans:auto; text-align:start; text-indent:0px; text-transform=
:none; white-space:normal; widows:auto; word-spacing:0px; direction:ltr; fo=
nt-family:Tahoma; font-size:10pt">
<div class=3D"" style=3D"margin-top:0px; margin-bottom:0px">By the way, sin=
ce it's claimed that the NSH is transport-independant, it means the NSH sho=
uld be able to be transported over MPLS. However, it seems that the first n=
ibble issue has not be considered&nbsp;in
 the current NSH draft. As a result, when encapsulating NSH over MPLS, the =
NSH may be mis-interpreted as IP header.</div>
<p class=3D"" style=3D"margin-top:0px; margin-bottom:0px">&nbsp;</p>
<div class=3D""><br class=3D"">
</div>
</div>
</div>
</blockquote>
<div><br class=3D"">
</div>
<div>There seems to be some massive confusion on this paragraph, on a numbe=
r of levels. First, NSH is not &#8220;claimed to be&#8221; transport-indepe=
ndent. It is by charter and by design. Second, the NSH draft does not even =
include the term &#8220;MPLS&#8221;, because it does not
 define transports. The SFC Encapsulation can be used in a transport-agnost=
ic way.</div>
<div><br class=3D"">
</div>
<div>One more comment below.</div>
<br class=3D"">
<blockquote type=3D"cite" class=3D"">
<div class=3D"">
<div class=3D"" style=3D"font-style:normal; font-weight:normal; letter-spac=
ing:normal; orphans:auto; text-align:start; text-indent:0px; text-transform=
:none; white-space:normal; widows:auto; word-spacing:0px; direction:ltr; fo=
nt-family:Tahoma; font-size:10pt">
<div class=3D"" style=3D"margin-top:0px; margin-bottom:0px">Best regards,</=
div>
<div class=3D"" style=3D"margin-top:0px; margin-bottom:0px">Xiaohu</div>
<p class=3D"" style=3D"margin-top:0px; margin-bottom:0px">&nbsp;</p>
<div class=3D"" style=3D"font-family:'Times New Roman'; font-size:16px">
<hr tabindex=3D"-1" class=3D"">
<div id=3D"divRpF100744" class=3D"" style=3D"direction:ltr"><font size=3D"2=
" face=3D"Tahoma" class=3D""><b class=3D"">&#21457;&#20214;&#20154;:</b><sp=
an class=3D"Apple-converted-space">&nbsp;</span>BIER [<a href=3D"mailto:bie=
r-bounces@ietf.org" class=3D"">bier-bounces@ietf.org</a>] &#20195;&#34920; =
Tony Przygienda [<a href=3D"mailto:tonysietf@gmail.com" class=3D"">tonysiet=
f@gmail.com</a>]<br class=3D"">
<b class=3D"">&#21457;&#36865;&#26102;&#38388;:</b><span class=3D"Apple-con=
verted-space">&nbsp;</span>2016&#24180;4&#26376;5&#26085; 22:36<br class=3D=
"">
<b class=3D"">&#25910;&#20214;&#20154;:</b><span class=3D"Apple-converted-s=
pace">&nbsp;</span><a href=3D"mailto:bier@ietf.org" class=3D"">bier@ietf.or=
g</a><br class=3D"">
<b class=3D"">&#20027;&#39064;:</b><span class=3D"Apple-converted-space">&n=
bsp;</span>[Bier] comments on draft-wang-bier-ethernet-01<br class=3D"">
</font><br class=3D"">
</div>
<div class=3D""></div>
<div class=3D"">
<div dir=3D"ltr" class=3D"">after reading&nbsp;
<div class=3D""><br class=3D"">
</div>
<div class=3D"">a) first nibble: refer to MPLS encaps as &quot;the same val=
ue&quot; to keep in sync&nbsp;</div>
</div>
</div>
</div>
</div>
</div>
</blockquote>
<div><br class=3D"">
</div>
<div>One comment regarding the &#8220;First nibble&#8221; text at&nbsp;draf=
t-ietf-bier-mpls-encapsulation-03</div>
<div><br class=3D"">
</div>
<div>Since the function of the first nibble is to prevent aliasing with an =
IP packet, in order for RFC 4928 to specify values of 0x0 and 0x1 for the F=
irst Nibble, it had to &#8220;Reserve&#8221; IP protocol versions of 0 and =
1, referencing that RFC (see
<a href=3D"https://tools.ietf.org/html/rfc4928#section-5" class=3D"">https:=
//tools.ietf.org/html/rfc4928#section-5</a>).</div>
<div><br class=3D"">
</div>
<div>Is the intent to re-assign IPv5 at&nbsp;<a href=3D"http://www.iana.org=
/assignments/version-numbers/" class=3D"">http://www.iana.org/assignments/v=
ersion-numbers/</a>&nbsp;?</div>
<div><br class=3D"">
</div>
<div>Note that RFC 4928 says &#8220;REQUIRED&#8221; at:</div>
<div><br class=3D"">
</div>
<div>
<div class=3D"">&nbsp; &nbsp;It is REQUIRED, however, that applications dep=
end upon in-order</div>
<div class=3D"">&nbsp; &nbsp;packet delivery restrict the first nibble valu=
es to 0x0 and 0x1.</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">Thanks,</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">&#8212; Carlos.</div>
</div>
<div><br class=3D"">
</div>
<br class=3D"">
<blockquote type=3D"cite" class=3D"">
<div class=3D"">
<div class=3D"" style=3D"font-style:normal; font-weight:normal; letter-spac=
ing:normal; orphans:auto; text-align:start; text-indent:0px; text-transform=
:none; white-space:normal; widows:auto; word-spacing:0px; direction:ltr; fo=
nt-family:Tahoma; font-size:10pt">
<div class=3D"" style=3D"font-family:'Times New Roman'; font-size:16px">
<div class=3D"">
<div dir=3D"ltr" class=3D"">
<div class=3D"">b) refer to all other possible fields to MPLS encaps to kee=
p in sync when describing instead of repeating&nbsp;</div>
<div class=3D"">c) you need to describe which kind of ether MACs are allowe=
d, especially on broadcast media, i.e. is it always p2p or can you take adv=
antage of the broadcast ?</div>
<div class=3D"">d) Figure 4: use the architecture/MPLS encoding for the len=
gth, don't invent a new one&nbsp;</div>
<div class=3D"">e) who will obtain a new ether type from IEEE? As far I und=
erstand, not a trivial process albeit we have several liaisons with IEEE&nb=
sp;</div>
<div class=3D"">
<div class=3D""><br class=3D"">
</div>
--<span class=3D"Apple-converted-space">&nbsp;</span><br class=3D"">
<div class=3D"gmail_signature">
<div dir=3D"ltr" class=3D"">
<div class=3D""><span class=3D"" style=3D"font-size:12px"><font face=3D"geo=
rgia, serif" class=3D""><i class=3D"">We&#8217;ve heard that a million monk=
eys at a million keyboards could produce the complete works of Shakespeare;=
 now, thanks to the Internet, we know that is not
 true.</i></font></span><i class=3D""><font face=3D"garamond, serif" class=
=3D""><br class=3D"">
</font></i></div>
<div class=3D""><span class=3D"" style=3D"font-size:12px"><font face=3D"tim=
es new roman, serif" class=3D"">&#8213;Robert Wilensky</font></span><br cla=
ss=3D"">
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<span class=3D"" style=3D"font-family:Helvetica; font-size:12px; font-style=
:normal; font-weight:normal; letter-spacing:normal; orphans:auto; text-alig=
n:start; text-indent:0px; text-transform:none; white-space:normal; widows:a=
uto; word-spacing:0px; float:none; display:inline!important">______________=
_________________________________</span><br class=3D"" style=3D"font-family=
:Helvetica; font-size:12px; font-style:normal; font-weight:normal; letter-s=
pacing:normal; orphans:auto; text-align:start; text-indent:0px; text-transf=
orm:none; white-space:normal; widows:auto; word-spacing:0px">
<span class=3D"" style=3D"font-family:Helvetica; font-size:12px; font-style=
:normal; font-weight:normal; letter-spacing:normal; orphans:auto; text-alig=
n:start; text-indent:0px; text-transform:none; white-space:normal; widows:a=
uto; word-spacing:0px; float:none; display:inline!important">mpls
 mailing list</span><br class=3D"" style=3D"font-family:Helvetica; font-siz=
e:12px; font-style:normal; font-weight:normal; letter-spacing:normal; orpha=
ns:auto; text-align:start; text-indent:0px; text-transform:none; white-spac=
e:normal; widows:auto; word-spacing:0px">
<a href=3D"mailto:mpls@ietf.org" class=3D"" style=3D"font-family:Helvetica;=
 font-size:12px; font-style:normal; font-weight:normal; letter-spacing:norm=
al; orphans:auto; text-align:start; text-indent:0px; text-transform:none; w=
hite-space:normal; widows:auto; word-spacing:0px">mpls@ietf.org</a><br clas=
s=3D"" style=3D"font-family:Helvetica; font-size:12px; font-style:normal; f=
ont-weight:normal; letter-spacing:normal; orphans:auto; text-align:start; t=
ext-indent:0px; text-transform:none; white-space:normal; widows:auto; word-=
spacing:0px">
<a href=3D"https://www.ietf.org/mailman/listinfo/mpls" class=3D"" style=3D"=
font-family:Helvetica; font-size:12px; font-style:normal; font-weight:norma=
l; letter-spacing:normal; orphans:auto; text-align:start; text-indent:0px; =
text-transform:none; white-space:normal; widows:auto; word-spacing:0px">htt=
ps://www.ietf.org/mailman/listinfo/mpls</a></div>
</blockquote>
</div>
<br class=3D"">
</div>
</div>
</div>
</body>
</html>

--_000_mc51yrrf9n0wxbjsrprt9amf1460143890063emailandroidcom_--


From nobody Fri Apr  8 15:39:02 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B225C12D5D0; Fri,  8 Apr 2016 15:38:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.53
X-Spam-Level: 
X-Spam-Status: No, score=-14.53 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H5x3lklHNWsU; Fri,  8 Apr 2016 15:38:55 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 895C512D540; Fri,  8 Apr 2016 15:38:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=26832; q=dns/txt; s=iport; t=1460155135; x=1461364735; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=YDiRtT4z7/PeWPK+q5IbDY56DYuoaGFxYHtujOsIkmw=; b=d8X+DsDYe/US9YsfpSEOEs9UNIaQUVKwGHjIFW5MmTnC6ITBolPe77OI 5sPVUb+3bSqff/epL9uIBaLs3uQ7qdm4O/6n3AAlxwTbdvzJbn2s33L5o T2UEL4XB1WFGffS4fXCoEBhHfNGfNbwo9QseYf/NiDBdJ8fn4coq6hwdN 0=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ANAgCqMQhX/4UNJK1cgmtMU30GrnWLW?= =?us-ascii?q?AENgXMXAQuFagIcgRg4FAEBAQEBAQFlJ4RBAQEBBAEBAWsEBwwEAgEGAhEBAgE?= =?us-ascii?q?CIQcFAgIfBgsUAwYIAgQBDQUJiAkDEg6RZZ0RCIw7DYUhAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBAQEBFYYghEuCQYIEEAoNCQSCQoJaBZMZhDoxAYV2gnKDLoF1gWeETYh?= =?us-ascii?q?Zh0qHWgEeAQFCg2dsAYg6fgEBAQ?=
X-IronPort-AV: E=Sophos; i="5.24,454,1454976000"; d="scan'208,217"; a="91609990"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 08 Apr 2016 22:38:54 +0000
Received: from XCH-RTP-018.cisco.com (xch-rtp-018.cisco.com [64.101.220.158]) by alln-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id u38Mcr0q031643 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 8 Apr 2016 22:38:54 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-018.cisco.com (64.101.220.158) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 8 Apr 2016 18:38:52 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Fri, 8 Apr 2016 18:38:53 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>, Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
Thread-Topic: [mpls] The first nibble issue associated with MPLS encapsulation
Thread-Index: AQHRkPR7Ow6l9wh8WUKpFJXl+MwAqJ+AqQ4A///PiXuAAHRmgP//0LOA
Date: Fri, 8 Apr 2016 22:38:52 +0000
Message-ID: <D32DB725.3F57B%cpignata@cisco.com>
References: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53871C@NKGEML515-MBX.china.huawei.com> <B664DB14-0A8C-4437-83E3-F9DA6C0DDA61@cisco.com> <mc51yrrf9n0wxbjsrprt9amf.1460143890063@email.android.com> <CA+RyBmXpZ-Kt77TW-=_kPYmahdw_yUHB5xhy8YtYVq2OcRJxbA@mail.gmail.com>
In-Reply-To: <CA+RyBmXpZ-Kt77TW-=_kPYmahdw_yUHB5xhy8YtYVq2OcRJxbA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.6.2.160219
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.247.9]
Content-Type: multipart/alternative; boundary="_000_D32DB7253F57Bcpignataciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/JMcQDWuXdCnqY6AmwV3q5b6Jtnw>
Cc: "mpls@ietf.org" <mpls@ietf.org>, Xiaohu Xu <xuxiaohu@huawei.com>, "bier@ietf.org" <bier@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Dr. Tony Przygienda" <tonysietf@gmail.com>
Subject: Re: [sfc] [mpls] The first nibble issue associated with MPLS encapsulation
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Apr 2016 22:38:58 -0000

--_000_D32DB7253F57Bcpignataciscocom_
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
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--_000_D32DB7253F57Bcpignataciscocom_
Content-Type: text/html; charset="gb2312"
Content-ID: <3242BE28202B6448860133AA216FD753@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dgb2312">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space;">
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
Greg,</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
My point, sorry if I was not clear, was that there is no such a thing as a =
=A1=AEfirst nibble registry=A1=AF.</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
Instead, RFC 4928, Section 5, at <a href=3D"https://tools.ietf.org/html/rfc=
4928#section-5">
https://tools.ietf.org/html/rfc4928#section-5</a>, says:</div>
<div>
<div><br>
</div>
<div><font face=3D"Calibri,sans-serif">&nbsp; &nbsp;IANA has marked the val=
ue 0x1 in the IP protocol version number space</font></div>
<div><font face=3D"Calibri,sans-serif">&nbsp; &nbsp;as &quot;Reserved&quot;=
 and placed a reference to this document to both values</font></div>
<div><font face=3D"Calibri,sans-serif">&nbsp; &nbsp;0x0 and 0x1.</font></di=
v>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
And that is reflected as&nbsp;<a href=3D"http://www.iana.org/assignments/ve=
rsion-numbers/version-numbers.xhtml#version-numbers-1">http://www.iana.org/=
assignments/version-numbers/version-numbers.xhtml#version-numbers-1</a>&nbs=
p;</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
The IANA text in 4928 is additionally followed by a disclaimer:</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
<br>
</div>
<div>
<div><font face=3D"Calibri,sans-serif">&nbsp; &nbsp;Note that this document=
 does not in any way change the policies</font></div>
<div><font face=3D"Calibri,sans-serif">&nbsp; &nbsp;regarding the allocatio=
n of version numbers, including the possible</font></div>
<div><font face=3D"Calibri,sans-serif">&nbsp; &nbsp;use of the reserved num=
bers for some future purpose.</font></div>
</div>
<div><font face=3D"Calibri,sans-serif"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
Further, RFC 4385 does not specify the =A1=AEfirst nibble=A1=AF as a field.=
 Instead, it depicts the actual binary values for the different CW formats.=
 In other words, it takes the values from the IP protocol version number an=
d not as a new CW Field.</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
Thanks,</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
=A1=AA Carlos.</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
PS: Sasha, quick typo, s/1119/1190/;</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-s=
ize: 14px;">
<br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION" style=3D"color: rgb(0, 0, 0); font-family=
: Calibri, sans-serif; font-size: 14px;">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>Greg Mirsky &lt;<a href=3D"ma=
ilto:gregimirsky@gmail.com">gregimirsky@gmail.com</a>&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Friday, April 8, 2016 at 7:28=
 PM<br>
<span style=3D"font-weight:bold">To: </span>Alexander Vainshtein &lt;<a hre=
f=3D"mailto:Alexander.Vainshtein@ecitele.com">Alexander.Vainshtein@ecitele.=
com</a>&gt;<br>
<span style=3D"font-weight:bold">Cc: </span>&quot;<a href=3D"mailto:sfc@iet=
f.org">sfc@ietf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.=
org</a>&gt;, &quot;<a href=3D"mailto:bier@ietf.org">bier@ietf.org</a>&quot;=
 &lt;<a href=3D"mailto:bier@ietf.org">bier@ietf.org</a>&gt;, &quot;Dr. Tony=
 Przygienda&quot;
 &lt;<a href=3D"mailto:tonysietf@gmail.com">tonysietf@gmail.com</a>&gt;, &q=
uot;<a href=3D"mailto:mpls@ietf.org">mpls@ietf.org</a>&quot; &lt;<a href=3D=
"mailto:mpls@ietf.org">mpls@ietf.org</a>&gt;, Xiaohu Xu &lt;<a href=3D"mail=
to:xuxiaohu@huawei.com">xuxiaohu@huawei.com</a>&gt;, Carlos Pignataro
 &lt;<a href=3D"mailto:cpignata@cisco.com">cpignata@cisco.com</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>Re: [mpls] The first nibbl=
e issue associated with MPLS encapsulation<br>
</div>
<div><br>
</div>
<div>
<div>
<p dir=3D"ltr">Hi Sasha, <br>
thank you for pointing to existing IANA allocation, though stale. I wonder =
if there is the registry for the first nibble. We, Tony and I, had discusse=
d the way the first nibble space managed. If there already is the registry,=
 could you please point me to it.
<br>
Regards, Greg </p>
<div class=3D"gmail_quote">On Apr 8, 2016 2:31 PM, &quot;Alexander Vainshte=
in&quot; &lt;<a href=3D"mailto:Alexander.Vainshtein@ecitele.com">Alexander.=
Vainshtein@ecitele.com</a>&gt; wrote:<br type=3D"attribution">
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<div style=3D"word-wrap:break-word">
<pre style=3D"word-wrap:break-word;font-size:10.0pt;font-family:Tahoma;colo=
r:black">Carlos and all,
Just for the reference, IANA has defined version 5 (0101) has assigned to S=
T protocol and refers to RFC 1119. The latter has been obsoleted by RFC 181=
9, but the IANA=20
assignment still holds.

Is there, just in case, any relationship between BIER and ST?
Thumb typed on my cellphone
Regards,
Sasha

-------- Original Message --------
From: &quot;Carlos Pignataro (cpignata)&quot; &lt;<a href=3D"mailto:cpignat=
a@cisco.com" target=3D"_blank">cpignata@cisco.com</a>&gt;
Date: Fri, April 08, 2016 9:25 PM &#43;0300
To: Xiaohu Xu &lt;<a href=3D"mailto:xuxiaohu@huawei.com" target=3D"_blank">=
xuxiaohu@huawei.com</a>&gt;
CC: <a href=3D"mailto:mpls@ietf.org" target=3D"_blank">mpls@ietf.org</a>, <=
a href=3D"mailto:bier@ietf.org" target=3D"_blank">bier@ietf.org</a>, <a hre=
f=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>, &quot;Dr. Ton=
y Przygienda&quot; &lt;<a href=3D"mailto:tonysietf@gmail.com" target=3D"_bl=
ank">tonysietf@gmail.com</a>&gt;
Subject: Re: [mpls] The first nibble issue associated with MPLS encapsulati=
on

</pre>
<div>Xiaohu, Tony,
<div><br>
</div>
<div>Please see inline.<br>
<div><br>
<div>
<blockquote type=3D"cite">
<div>On Apr 7, 2016, at 2:39 PM, Xuxiaohu &lt;<a href=3D"mailto:xuxiaohu@hu=
awei.com" target=3D"_blank">xuxiaohu@huawei.com</a>&gt; wrote:</div>
<br>
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"margin-top:0px;margin-bottom:0px">As for the first nibble iss=
ue, will it violate the layering principle of network protocol stacks if th=
e first nibble of any new encapsulation header (which could be an MPLS payl=
oad)&nbsp;is used as the &quot;MPLS payload
 type&quot; field? </div>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>Reading&nbsp;draft-wang-bier-ethernet-01, Section 3, the =A1=B0first n=
ibble=A1=B1 is _not_ used as an =A1=B0MPLS payload type=A1=B1. Instead, the=
 text describes an anti-aliasing mechanism, much like RFC 4928.&nbsp;</div>
<div><br>
</div>
<div>The relevant text is:</div>
<div>
<div>&nbsp; &nbsp; &nbsp;First nibble: The first 4 bits of the header are s=
et to 0101; this</div>
<div>&nbsp; &nbsp;ensures that the BIER header will not be confused with an=
 IP header</div>
<div>&nbsp; &nbsp;or with the header of a pseudowire packet.</div>
<div><br>
</div>
<div>Which says =A1=B0=A1=AD will not be confused with =A1=AD&quot;</div>
</div>
<br>
<blockquote type=3D"cite">
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"margin-top:0px;margin-bottom:0px">wouldn't it&nbsp; be more r=
easonable and sustainable&nbsp;to fix the&nbsp;problem (i.e., the lack of a=
 protocol field in the MPLS header) by the MPLS header itself?</div>
<p style=3D"margin-top:0px;margin-bottom:0px">&nbsp;</p>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>Who says it is a *problem*? There=A1=AFs no =A1=B0fixing=A1=B1 needed.=
</div>
<div><br>
</div>
<blockquote type=3D"cite">
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"margin-top:0px;margin-bottom:0px">By the way, since it's clai=
med that the NSH is transport-independant, it means the NSH should be able =
to be transported over MPLS. However, it seems that the first nibble issue =
has not be considered&nbsp;in the current
 NSH draft. As a result, when encapsulating NSH over MPLS, the NSH may be m=
is-interpreted as IP header.</div>
<p style=3D"margin-top:0px;margin-bottom:0px">&nbsp;</p>
<div><br>
</div>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>There seems to be some massive confusion on this paragraph, on a numbe=
r of levels. First, NSH is not =A1=B0claimed to be=A1=B1 transport-independ=
ent. It is by charter and by design. Second, the NSH draft does not even in=
clude the term =A1=B0MPLS=A1=B1, because it does not
 define transports. The SFC Encapsulation can be used in a transport-agnost=
ic way.</div>
<div><br>
</div>
<div>One more comment below.</div>
<br>
<blockquote type=3D"cite">
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"margin-top:0px;margin-bottom:0px">Best regards,</div>
<div style=3D"margin-top:0px;margin-bottom:0px">Xiaohu</div>
<p style=3D"margin-top:0px;margin-bottom:0px">&nbsp;</p>
<div style=3D"font-family:'Times New Roman';font-size:16px">
<hr>
<div style=3D"direction:ltr"><font size=3D"2" face=3D"Tahoma"><b>=B7=A2=BC=
=FE=C8=CB:</b><span>&nbsp;</span>BIER [<a href=3D"mailto:bier-bounces@ietf.=
org" target=3D"_blank">bier-bounces@ietf.org</a>] =B4=FA=B1=ED Tony Przygie=
nda [<a href=3D"mailto:tonysietf@gmail.com" target=3D"_blank">tonysietf@gma=
il.com</a>]<br>
<b>=B7=A2=CB=CD=CA=B1=BC=E4:</b><span>&nbsp;</span>2016=C4=EA4=D4=C25=C8=D5=
 22:36<br>
<b>=CA=D5=BC=FE=C8=CB:</b><span>&nbsp;</span><a href=3D"mailto:bier@ietf.or=
g" target=3D"_blank">bier@ietf.org</a><br>
<b>=D6=F7=CC=E2:</b><span>&nbsp;</span>[Bier] comments on draft-wang-bier-e=
thernet-01<br>
</font><br>
</div>
<div></div>
<div>
<div dir=3D"ltr">after reading&nbsp;
<div><br>
</div>
<div>a) first nibble: refer to MPLS encaps as &quot;the same value&quot; to=
 keep in sync&nbsp;</div>
</div>
</div>
</div>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>One comment regarding the =A1=B0First nibble=A1=B1 text at&nbsp;draft-=
ietf-bier-mpls-encapsulation-03</div>
<div><br>
</div>
<div>Since the function of the first nibble is to prevent aliasing with an =
IP packet, in order for RFC 4928 to specify values of 0x0 and 0x1 for the F=
irst Nibble, it had to =A1=B0Reserve=A1=B1 IP protocol versions of 0 and 1,=
 referencing that RFC (see
<a href=3D"https://tools.ietf.org/html/rfc4928#section-5" target=3D"_blank"=
>https://tools.ietf.org/html/rfc4928#section-5</a>).</div>
<div><br>
</div>
<div>Is the intent to re-assign IPv5 at&nbsp;<a href=3D"http://www.iana.org=
/assignments/version-numbers/" target=3D"_blank">http://www.iana.org/assign=
ments/version-numbers/</a>&nbsp;?</div>
<div><br>
</div>
<div>Note that RFC 4928 says =A1=B0REQUIRED=A1=B1 at:</div>
<div><br>
</div>
<div>
<div>&nbsp; &nbsp;It is REQUIRED, however, that applications depend upon in=
-order</div>
<div>&nbsp; &nbsp;packet delivery restrict the first nibble values to 0x0 a=
nd 0x1.</div>
<div><br>
</div>
<div>Thanks,</div>
<div><br>
</div>
<div>=A1=AA Carlos.</div>
</div>
<div><br>
</div>
<br>
<blockquote type=3D"cite">
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"font-family:'Times New Roman';font-size:16px">
<div>
<div dir=3D"ltr">
<div>b) refer to all other possible fields to MPLS encaps to keep in sync w=
hen describing instead of repeating&nbsp;</div>
<div>c) you need to describe which kind of ether MACs are allowed, especial=
ly on broadcast media, i.e. is it always p2p or can you take advantage of t=
he broadcast ?</div>
<div>d) Figure 4: use the architecture/MPLS encoding for the length, don't =
invent a new one&nbsp;</div>
<div>e) who will obtain a new ether type from IEEE? As far I understand, no=
t a trivial process albeit we have several liaisons with IEEE&nbsp;</div>
<div>
<div><br>
</div>
--<span>&nbsp;</span><br>
<div>
<div dir=3D"ltr">
<div><span style=3D"font-size:12px"><font face=3D"georgia,serif"><i>We=A1=
=AFve heard that a million monkeys at a million keyboards could produce the=
 complete works of Shakespeare; now, thanks to the Internet, we know that i=
s not true.</i></font></span><i><font face=3D"garamond,serif"><br>
</font></i></div>
<div><span style=3D"font-size:12px"><font face=3D"times new roman,serif">=
=A1=AARobert Wilensky</font></span><br>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<span style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-=
weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-t=
ransform:none;white-space:normal;word-spacing:0px;float:none;display:inline=
!important">_______________________________________________</span><br style=
=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weight:norm=
al;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:no=
ne;white-space:normal;word-spacing:0px">
<span style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-=
weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-t=
ransform:none;white-space:normal;word-spacing:0px;float:none;display:inline=
!important">mpls mailing list</span><br style=3D"font-family:Helvetica;font=
-size:12px;font-style:normal;font-weight:normal;letter-spacing:normal;text-=
align:start;text-indent:0px;text-transform:none;white-space:normal;word-spa=
cing:0px">
<a href=3D"mailto:mpls@ietf.org" style=3D"font-family:Helvetica;font-size:1=
2px;font-style:normal;font-weight:normal;letter-spacing:normal;text-align:s=
tart;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0p=
x" target=3D"_blank">mpls@ietf.org</a><br style=3D"font-family:Helvetica;fo=
nt-size:12px;font-style:normal;font-weight:normal;letter-spacing:normal;tex=
t-align:start;text-indent:0px;text-transform:none;white-space:normal;word-s=
pacing:0px">
<a href=3D"https://www.ietf.org/mailman/listinfo/mpls" style=3D"font-family=
:Helvetica;font-size:12px;font-style:normal;font-weight:normal;letter-spaci=
ng:normal;text-align:start;text-indent:0px;text-transform:none;white-space:=
normal;word-spacing:0px" target=3D"_blank">https://www.ietf.org/mailman/lis=
tinfo/mpls</a></div>
</blockquote>
</div>
<br>
</div>
</div>
</div>
</div>
<br>
_______________________________________________<br>
mpls mailing list<br>
<a href=3D"mailto:mpls@ietf.org">mpls@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/mpls" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/mpls</a><br>
<br>
</blockquote>
</div>
</div>
</div>
</span>
</body>
</html>

--_000_D32DB7253F57Bcpignataciscocom_--


From nobody Fri Apr  8 21:10:02 2016
Return-Path: <gregimirsky@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B0F6112D6C1; Fri,  8 Apr 2016 15:28:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EflBJwUB4_29; Fri,  8 Apr 2016 15:28:09 -0700 (PDT)
Received: from mail-yw0-x22c.google.com (mail-yw0-x22c.google.com [IPv6:2607:f8b0:4002:c05::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD88012D17A; Fri,  8 Apr 2016 15:28:08 -0700 (PDT)
Received: by mail-yw0-x22c.google.com with SMTP id o66so59690836ywc.3; Fri, 08 Apr 2016 15:28:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc; bh=gxW+eFOid6SS3OoXP2shRdQuv2sGmLcDM3Gpf42Hqu0=; b=ZAPz/fH1Bs5G9my+27NdFFOcjnbxjTRlYtXsbP5nSFRECdrTzjGzQz9OoHXfu+S/gC 8YPE+C+rn20oQGFbui3wVXKYWy8cQ7i1JOIwErWYpj5aOZp0pACMfVmHMLikkNwI5We+ eMSf5mL2ITXg9852QWTiT1l0zmi9fvOieURvYxa5OtDBvx/tldV40oUrDsXXqLyhlzOs Op9kznwXtsrGDd+vmL1jbrCHCIpJTsfRBV79C3P1sfq05vetOsTNT/Hc/+tA5Fu/m4t9 EgguNYhoENS1X8UxMSTXtIq8CwELBfgEMnAOozqK89BJBvVpzj3+5FuEcxwpRJmNHXhL IPrQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc; bh=gxW+eFOid6SS3OoXP2shRdQuv2sGmLcDM3Gpf42Hqu0=; b=NS2nvuu7ZS7jfM9sNbJZqjuv6I7dntbouhe7tTmqptFeWTSL9C6RndTO/CaKdjCQB+ XY+UvI2HFotQv2LWuLrKMFJfPldnyIOOGx15iCATmCcurqWLXcaneFusxyMnSMSq4Eze QfadMue+NEsi4GASRojeigD4OBanMTMpy4nGlBeKRA/8Kcz10Cfbmoo1ZUBF7L+ELQ1s Ta6iuwiLvEZX9OE3R5Nwk8lNRwTR2h0I0iQhzCAw+qKCe0ZoI8Of4tQf0ZLxksaCOU9b nZjQaBZWtwIvVPQQDkrel5liibvDyFXaGgBDZDUsWX/Y86c9jtWq1KF/7Y7ZVCAMbn6d qO2g==
X-Gm-Message-State: AD7BkJKCVo2VTVaaHv24WRtfXYtvkiFfcSkVCMuaSFe4G/6P9V1UskHOY9tV0lQEx7DcroKFvL2BJT2e0vgtRw==
MIME-Version: 1.0
X-Received: by 10.129.159.194 with SMTP id w185mr6163070ywg.297.1460154487311;  Fri, 08 Apr 2016 15:28:07 -0700 (PDT)
Received: by 10.37.215.143 with HTTP; Fri, 8 Apr 2016 15:28:07 -0700 (PDT)
Received: by 10.37.215.143 with HTTP; Fri, 8 Apr 2016 15:28:07 -0700 (PDT)
In-Reply-To: <mc51yrrf9n0wxbjsrprt9amf.1460143890063@email.android.com>
References: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53871C@NKGEML515-MBX.china.huawei.com> <B664DB14-0A8C-4437-83E3-F9DA6C0DDA61@cisco.com> <mc51yrrf9n0wxbjsrprt9amf.1460143890063@email.android.com>
Date: Fri, 8 Apr 2016 15:28:07 -0700
Message-ID: <CA+RyBmXpZ-Kt77TW-=_kPYmahdw_yUHB5xhy8YtYVq2OcRJxbA@mail.gmail.com>
From: Greg Mirsky <gregimirsky@gmail.com>
To: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
Content-Type: multipart/alternative; boundary=94eb2c0c01268892a0053000b5b6
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/8GNYjXVgUddNltMgNnlvtnsSMss>
X-Mailman-Approved-At: Fri, 08 Apr 2016 21:09:59 -0700
Cc: "mpls@ietf.org" <mpls@ietf.org>, "bier@ietf.org" <bier@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Carlos Pignataro \(cpignata\)" <cpignata@cisco.com>, Xiaohu Xu <xuxiaohu@huawei.com>, "Dr. Tony Przygienda" <tonysietf@gmail.com>
Subject: Re: [sfc] [mpls] The first nibble issue associated with MPLS encapsulation
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Apr 2016 22:28:11 -0000

--94eb2c0c01268892a0053000b5b6
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Sasha,
thank you for pointing to existing IANA allocation, though stale. I wonder
if there is the registry for the first nibble. We, Tony and I, had
discussed the way the first nibble space managed. If there already is the
registry, could you please point me to it.
Regards, Greg
On Apr 8, 2016 2:31 PM, "Alexander Vainshtein" <
Alexander.Vainshtein@ecitele.com> wrote:

> Carlos and all,
> Just for the reference, IANA has defined version 5 (0101) has assigned to=
 ST protocol and refers to RFC 1119. The latter has been obsoleted by RFC 1=
819, but the IANA
> assignment still holds.
>
> Is there, just in case, any relationship between BIER and ST?
> Thumb typed on my cellphone
> Regards,
> Sasha
>
> -------- Original Message --------
> From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
> Date: Fri, April 08, 2016 9:25 PM +0300
> To: Xiaohu Xu <xuxiaohu@huawei.com>
> CC: mpls@ietf.org, bier@ietf.org, sfc@ietf.org, "Dr. Tony Przygienda" <to=
nysietf@gmail.com>
> Subject: Re: [mpls] The first nibble issue associated with MPLS encapsula=
tion
>
>
> Xiaohu, Tony,
>
> Please see inline.
>
> On Apr 7, 2016, at 2:39 PM, Xuxiaohu <xuxiaohu@huawei.com> wrote:
>
> As for the first nibble issue, will it violate the layering principle of
> network protocol stacks if the first nibble of any new encapsulation head=
er
> (which could be an MPLS payload) is used as the "MPLS payload type" field=
?
>
>
> Reading draft-wang-bier-ethernet-01, Section 3, the =E2=80=9Cfirst nibble=
=E2=80=9D is
> _not_ used as an =E2=80=9CMPLS payload type=E2=80=9D. Instead, the text d=
escribes an
> anti-aliasing mechanism, much like RFC 4928.
>
> The relevant text is:
>      First nibble: The first 4 bits of the header are set to 0101; this
>    ensures that the BIER header will not be confused with an IP header
>    or with the header of a pseudowire packet.
>
> Which says =E2=80=9C=E2=80=A6 will not be confused with =E2=80=A6"
>
> wouldn't it  be more reasonable and sustainable to fix the problem (i.e.,
> the lack of a protocol field in the MPLS header) by the MPLS header itsel=
f?
>
>
>
>
> Who says it is a *problem*? There=E2=80=99s no =E2=80=9Cfixing=E2=80=9D n=
eeded.
>
> By the way, since it's claimed that the NSH is transport-independant, it
> means the NSH should be able to be transported over MPLS. However, it see=
ms
> that the first nibble issue has not be considered in the current NSH draf=
t.
> As a result, when encapsulating NSH over MPLS, the NSH may be
> mis-interpreted as IP header.
>
>
>
>
> There seems to be some massive confusion on this paragraph, on a number o=
f
> levels. First, NSH is not =E2=80=9Cclaimed to be=E2=80=9D transport-indep=
endent. It is by
> charter and by design. Second, the NSH draft does not even include the te=
rm
> =E2=80=9CMPLS=E2=80=9D, because it does not define transports. The SFC En=
capsulation can be
> used in a transport-agnostic way.
>
> One more comment below.
>
> Best regards,
> Xiaohu
>
>
> ------------------------------
> *=E5=8F=91=E4=BB=B6=E4=BA=BA:* BIER [bier-bounces@ietf.org] =E4=BB=A3=E8=
=A1=A8 Tony Przygienda [
> tonysietf@gmail.com]
> *=E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4:* 2016=E5=B9=B44=E6=9C=885=E6=97=A5=
 22:36
> *=E6=94=B6=E4=BB=B6=E4=BA=BA:* bier@ietf.org
> *=E4=B8=BB=E9=A2=98:* [Bier] comments on draft-wang-bier-ethernet-01
>
> after reading
>
> a) first nibble: refer to MPLS encaps as "the same value" to keep in sync
>
>
> One comment regarding the =E2=80=9CFirst nibble=E2=80=9D text
> at draft-ietf-bier-mpls-encapsulation-03
>
> Since the function of the first nibble is to prevent aliasing with an IP
> packet, in order for RFC 4928 to specify values of 0x0 and 0x1 for the
> First Nibble, it had to =E2=80=9CReserve=E2=80=9D IP protocol versions of=
 0 and 1,
> referencing that RFC (see https://tools.ietf.org/html/rfc4928#section-5).
>
> Is the intent to re-assign IPv5 at
> http://www.iana.org/assignments/version-numbers/ ?
>
> Note that RFC 4928 says =E2=80=9CREQUIRED=E2=80=9D at:
>
>    It is REQUIRED, however, that applications depend upon in-order
>    packet delivery restrict the first nibble values to 0x0 and 0x1.
>
> Thanks,
>
> =E2=80=94 Carlos.
>
>
> b) refer to all other possible fields to MPLS encaps to keep in sync when
> describing instead of repeating
> c) you need to describe which kind of ether MACs are allowed, especially
> on broadcast media, i.e. is it always p2p or can you take advantage of th=
e
> broadcast ?
> d) Figure 4: use the architecture/MPLS encoding for the length, don't
> invent a new one
> e) who will obtain a new ether type from IEEE? As far I understand, not a
> trivial process albeit we have several liaisons with IEEE
>
> --
> *We=E2=80=99ve heard that a million monkeys at a million keyboards could =
produce
> the complete works of Shakespeare; now, thanks to the Internet, we know
> that is not true.*
> =E2=80=95Robert Wilensky
> _______________________________________________
> mpls mailing list
> mpls@ietf.org
> https://www.ietf.org/mailman/listinfo/mpls
>
>
>
> _______________________________________________
> mpls mailing list
> mpls@ietf.org
> https://www.ietf.org/mailman/listinfo/mpls
>
>

--94eb2c0c01268892a0053000b5b6
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<p dir=3D"ltr">Hi Sasha, <br>
thank you for pointing to existing IANA allocation, though stale. I wonder =
if there is the registry for the first nibble. We, Tony and I, had discusse=
d the way the first nibble space managed. If there already is the registry,=
 could you please point me to it. <br>
Regards, Greg </p>
<div class=3D"gmail_quote">On Apr 8, 2016 2:31 PM, &quot;Alexander Vainshte=
in&quot; &lt;<a href=3D"mailto:Alexander.Vainshtein@ecitele.com">Alexander.=
Vainshtein@ecitele.com</a>&gt; wrote:<br type=3D"attribution"><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex">




<div style=3D"word-wrap:break-word">
<pre style=3D"word-wrap:break-word;font-size:10.0pt;font-family:Tahoma;colo=
r:black">Carlos and all,
Just for the reference, IANA has defined version 5 (0101) has assigned to S=
T protocol and refers to RFC 1119. The latter has been obsoleted by RFC 181=
9, but the IANA=20
assignment still holds.

Is there, just in case, any relationship between BIER and ST?
Thumb typed on my cellphone
Regards,
Sasha

-------- Original Message --------
From: &quot;Carlos Pignataro (cpignata)&quot; &lt;<a href=3D"mailto:cpignat=
a@cisco.com" target=3D"_blank">cpignata@cisco.com</a>&gt;
Date: Fri, April 08, 2016 9:25 PM +0300
To: Xiaohu Xu &lt;<a href=3D"mailto:xuxiaohu@huawei.com" target=3D"_blank">=
xuxiaohu@huawei.com</a>&gt;
CC: <a href=3D"mailto:mpls@ietf.org" target=3D"_blank">mpls@ietf.org</a>, <=
a href=3D"mailto:bier@ietf.org" target=3D"_blank">bier@ietf.org</a>, <a hre=
f=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>, &quot;Dr. Ton=
y Przygienda&quot; &lt;<a href=3D"mailto:tonysietf@gmail.com" target=3D"_bl=
ank">tonysietf@gmail.com</a>&gt;
Subject: Re: [mpls] The first nibble issue associated with MPLS encapsulati=
on

</pre>
<div>Xiaohu, Tony,
<div><br>
</div>
<div>Please see inline.<br>
<div><br>
<div>
<blockquote type=3D"cite">
<div>On Apr 7, 2016, at 2:39 PM, Xuxiaohu &lt;<a href=3D"mailto:xuxiaohu@hu=
awei.com" target=3D"_blank">xuxiaohu@huawei.com</a>&gt; wrote:</div>
<br>
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"margin-top:0px;margin-bottom:0px">As for the first nibble iss=
ue, will it violate the layering principle of network protocol stacks if th=
e first nibble of any new encapsulation header (which could be an MPLS payl=
oad)=C2=A0is used as the &quot;MPLS
 payload type&quot; field? </div>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>Reading=C2=A0draft-wang-bier-ethernet-01, Section 3, the =E2=80=9Cfirs=
t nibble=E2=80=9D is _not_ used as an =E2=80=9CMPLS payload type=E2=80=9D. =
Instead, the text describes an anti-aliasing mechanism, much like RFC 4928.=
=C2=A0</div>
<div><br>
</div>
<div>The relevant text is:</div>
<div>
<div>=C2=A0 =C2=A0 =C2=A0First nibble: The first 4 bits of the header are s=
et to 0101; this</div>
<div>=C2=A0 =C2=A0ensures that the BIER header will not be confused with an=
 IP header</div>
<div>=C2=A0 =C2=A0or with the header of a pseudowire packet.</div>
<div><br>
</div>
<div>Which says =E2=80=9C=E2=80=A6 will not be confused with =E2=80=A6&quot=
;</div>
</div>
<br>
<blockquote type=3D"cite">
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"margin-top:0px;margin-bottom:0px">wouldn&#39;t it=C2=A0 be mo=
re reasonable and sustainable=C2=A0to fix the=C2=A0problem (i.e., the lack =
of a protocol field in the MPLS header) by the MPLS header itself?</div>
<p style=3D"margin-top:0px;margin-bottom:0px">=C2=A0</p>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>Who says it is a *problem*? There=E2=80=99s no =E2=80=9Cfixing=E2=80=
=9D needed.</div>
<div><br>
</div>
<blockquote type=3D"cite">
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"margin-top:0px;margin-bottom:0px">By the way, since it&#39;s =
claimed that the NSH is transport-independant, it means the NSH should be a=
ble to be transported over MPLS. However, it seems that the first nibble is=
sue has not be considered=C2=A0in
 the current NSH draft. As a result, when encapsulating NSH over MPLS, the =
NSH may be mis-interpreted as IP header.</div>
<p style=3D"margin-top:0px;margin-bottom:0px">=C2=A0</p>
<div><br>
</div>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>There seems to be some massive confusion on this paragraph, on a numbe=
r of levels. First, NSH is not =E2=80=9Cclaimed to be=E2=80=9D transport-in=
dependent. It is by charter and by design. Second, the NSH draft does not e=
ven include the term =E2=80=9CMPLS=E2=80=9D, because it does not
 define transports. The SFC Encapsulation can be used in a transport-agnost=
ic way.</div>
<div><br>
</div>
<div>One more comment below.</div>
<br>
<blockquote type=3D"cite">
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"margin-top:0px;margin-bottom:0px">Best regards,</div>
<div style=3D"margin-top:0px;margin-bottom:0px">Xiaohu</div>
<p style=3D"margin-top:0px;margin-bottom:0px">=C2=A0</p>
<div style=3D"font-family:&#39;Times New Roman&#39;;font-size:16px">
<hr>
<div style=3D"direction:ltr"><font size=3D"2" face=3D"Tahoma"><b>=E5=8F=91=
=E4=BB=B6=E4=BA=BA:</b><span>=C2=A0</span>BIER [<a href=3D"mailto:bier-boun=
ces@ietf.org" target=3D"_blank">bier-bounces@ietf.org</a>] =E4=BB=A3=E8=A1=
=A8 Tony Przygienda [<a href=3D"mailto:tonysietf@gmail.com" target=3D"_blan=
k">tonysietf@gmail.com</a>]<br>
<b>=E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4:</b><span>=C2=A0</span>2016=E5=B9=
=B44=E6=9C=885=E6=97=A5 22:36<br>
<b>=E6=94=B6=E4=BB=B6=E4=BA=BA:</b><span>=C2=A0</span><a href=3D"mailto:bie=
r@ietf.org" target=3D"_blank">bier@ietf.org</a><br>
<b>=E4=B8=BB=E9=A2=98:</b><span>=C2=A0</span>[Bier] comments on draft-wang-=
bier-ethernet-01<br>
</font><br>
</div>
<div></div>
<div>
<div dir=3D"ltr">after reading=C2=A0
<div><br>
</div>
<div>a) first nibble: refer to MPLS encaps as &quot;the same value&quot; to=
 keep in sync=C2=A0</div>
</div>
</div>
</div>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>One comment regarding the =E2=80=9CFirst nibble=E2=80=9D text at=C2=A0=
draft-ietf-bier-mpls-encapsulation-03</div>
<div><br>
</div>
<div>Since the function of the first nibble is to prevent aliasing with an =
IP packet, in order for RFC 4928 to specify values of 0x0 and 0x1 for the F=
irst Nibble, it had to =E2=80=9CReserve=E2=80=9D IP protocol versions of 0 =
and 1, referencing that RFC (see
<a href=3D"https://tools.ietf.org/html/rfc4928#section-5" target=3D"_blank"=
>https://tools.ietf.org/html/rfc4928#section-5</a>).</div>
<div><br>
</div>
<div>Is the intent to re-assign IPv5 at=C2=A0<a href=3D"http://www.iana.org=
/assignments/version-numbers/" target=3D"_blank">http://www.iana.org/assign=
ments/version-numbers/</a>=C2=A0?</div>
<div><br>
</div>
<div>Note that RFC 4928 says =E2=80=9CREQUIRED=E2=80=9D at:</div>
<div><br>
</div>
<div>
<div>=C2=A0 =C2=A0It is REQUIRED, however, that applications depend upon in=
-order</div>
<div>=C2=A0 =C2=A0packet delivery restrict the first nibble values to 0x0 a=
nd 0x1.</div>
<div><br>
</div>
<div>Thanks,</div>
<div><br>
</div>
<div>=E2=80=94 Carlos.</div>
</div>
<div><br>
</div>
<br>
<blockquote type=3D"cite">
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"font-family:&#39;Times New Roman&#39;;font-size:16px">
<div>
<div dir=3D"ltr">
<div>b) refer to all other possible fields to MPLS encaps to keep in sync w=
hen describing instead of repeating=C2=A0</div>
<div>c) you need to describe which kind of ether MACs are allowed, especial=
ly on broadcast media, i.e. is it always p2p or can you take advantage of t=
he broadcast ?</div>
<div>d) Figure 4: use the architecture/MPLS encoding for the length, don&#3=
9;t invent a new one=C2=A0</div>
<div>e) who will obtain a new ether type from IEEE? As far I understand, no=
t a trivial process albeit we have several liaisons with IEEE=C2=A0</div>
<div>
<div><br>
</div>
--<span>=C2=A0</span><br>
<div>
<div dir=3D"ltr">
<div><span style=3D"font-size:12px"><font face=3D"georgia, serif"><i>We=E2=
=80=99ve heard that a million monkeys at a million keyboards could produce =
the complete works of Shakespeare; now, thanks to the Internet, we know tha=
t is not
 true.</i></font></span><i><font face=3D"garamond, serif"><br>
</font></i></div>
<div><span style=3D"font-size:12px"><font face=3D"times new roman, serif">=
=E2=80=95Robert Wilensky</font></span><br>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<span style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-=
weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-t=
ransform:none;white-space:normal;word-spacing:0px;float:none;display:inline=
!important">_______________________________________________</span><br style=
=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weight:norm=
al;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:no=
ne;white-space:normal;word-spacing:0px">
<span style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-=
weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-t=
ransform:none;white-space:normal;word-spacing:0px;float:none;display:inline=
!important">mpls
 mailing list</span><br style=3D"font-family:Helvetica;font-size:12px;font-=
style:normal;font-weight:normal;letter-spacing:normal;text-align:start;text=
-indent:0px;text-transform:none;white-space:normal;word-spacing:0px">
<a href=3D"mailto:mpls@ietf.org" style=3D"font-family:Helvetica;font-size:1=
2px;font-style:normal;font-weight:normal;letter-spacing:normal;text-align:s=
tart;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0p=
x" target=3D"_blank">mpls@ietf.org</a><br style=3D"font-family:Helvetica;fo=
nt-size:12px;font-style:normal;font-weight:normal;letter-spacing:normal;tex=
t-align:start;text-indent:0px;text-transform:none;white-space:normal;word-s=
pacing:0px">
<a href=3D"https://www.ietf.org/mailman/listinfo/mpls" style=3D"font-family=
:Helvetica;font-size:12px;font-style:normal;font-weight:normal;letter-spaci=
ng:normal;text-align:start;text-indent:0px;text-transform:none;white-space:=
normal;word-spacing:0px" target=3D"_blank">https://www.ietf.org/mailman/lis=
tinfo/mpls</a></div>
</blockquote>
</div>
<br>
</div>
</div>
</div>
</div>

<br>_______________________________________________<br>
mpls mailing list<br>
<a href=3D"mailto:mpls@ietf.org">mpls@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/mpls" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/mpls</a><br>
<br></blockquote></div>

--94eb2c0c01268892a0053000b5b6--


From nobody Fri Apr  8 21:10:05 2016
Return-Path: <gregimirsky@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D98A712D529; Fri,  8 Apr 2016 16:05:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B37xZErWW8a7; Fri,  8 Apr 2016 16:05:52 -0700 (PDT)
Received: from mail-yw0-x235.google.com (mail-yw0-x235.google.com [IPv6:2607:f8b0:4002:c05::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A79112D0E1; Fri,  8 Apr 2016 16:05:52 -0700 (PDT)
Received: by mail-yw0-x235.google.com with SMTP id d68so151617701ywe.1; Fri, 08 Apr 2016 16:05:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc; bh=fsZNJKiA0lO0GEWzjNEjsbc5MqkiJCPPc9PvgOB60qQ=; b=ohn+JkbYMpr7NlfudKEVqxMGl0d4ygJvVFY+FilSI1E6W9etLXNYH0Nel0CP/q43H0 yZy/VXf9L2SCQ7/oQGHzJeizfv30qFK+iKDOqKcjxKGfLNl39esVnXVVidKJnUoHihf2 6BbqdStYgLm5fwZSRNeoPW11DHZgF90MxqExewOhOL46cuHBVGkMgEoIU6NJormJIS+2 vYLZr3z1pY5LvxXeOJKd77ukcH5jZEAPcR+4MXMUE8mzyc84e5R/jhX+rndsuow2LJgE CvzIsJt2zX5ftbmkpHVSyMqCG9FR+F6g2JoV3Jm8Yszs4r60+jP2S/Lg43Fgou3oyy7z SGOg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc; bh=fsZNJKiA0lO0GEWzjNEjsbc5MqkiJCPPc9PvgOB60qQ=; b=i75+oaNrOBmuRB6u+oiwbm/XOitpHF2YI7BQoqkjRnYBzO4YVhiE95K7ec4YeQFBK2 BiGdLflKykJOy7VGACnM/85CnoUsRorbnDsoR6xKqRbjvesRLAdSArXa5g5dSau9gf1a 4A+7hfBY0OnWvxFtxLGmB4BEzCL69pZeOtt42NNnVQHlcGnwuxKlJhQ9OhxPRiaS/uDC jJNYmqgCBzSvP/EkQ7Q/sYfoAPMcLLmoe9axrW9wZYBoV5mjTiE9wb0iLJ6n4gv6Zr7Z RPKmcZLVaxBrYk2oKA/EIOECod71yb966ftyQzpboAhmbOgxxmEMgF7QmhIisuJTtzVm tIHA==
X-Gm-Message-State: AD7BkJIl62grfIxr7YxqmS/jcKT/XrdETY1Mb7cMW5o95EUPOr20lmbg5rpg4dx5EnzQTN4oMUbipIackKXkIw==
MIME-Version: 1.0
X-Received: by 10.13.220.197 with SMTP id f188mr5650849ywe.172.1460156751807;  Fri, 08 Apr 2016 16:05:51 -0700 (PDT)
Received: by 10.37.215.143 with HTTP; Fri, 8 Apr 2016 16:05:51 -0700 (PDT)
Received: by 10.37.215.143 with HTTP; Fri, 8 Apr 2016 16:05:51 -0700 (PDT)
In-Reply-To: <D32DB725.3F57B%cpignata@cisco.com>
References: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53871C@NKGEML515-MBX.china.huawei.com> <B664DB14-0A8C-4437-83E3-F9DA6C0DDA61@cisco.com> <mc51yrrf9n0wxbjsrprt9amf.1460143890063@email.android.com> <CA+RyBmXpZ-Kt77TW-=_kPYmahdw_yUHB5xhy8YtYVq2OcRJxbA@mail.gmail.com> <D32DB725.3F57B%cpignata@cisco.com>
Date: Fri, 8 Apr 2016 16:05:51 -0700
Message-ID: <CA+RyBmW+qonpScnLOfsGorayCvsS0vrFcn+o5nPvOqCOv9Jc3g@mail.gmail.com>
From: Greg Mirsky <gregimirsky@gmail.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Content-Type: multipart/alternative; boundary=94eb2c07bc90820b460530013ca7
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Nq2pwGK9OYXWkthdLcltGfQc920>
X-Mailman-Approved-At: Fri, 08 Apr 2016 21:09:59 -0700
Cc: "mpls@ietf.org" <mpls@ietf.org>, "bier@ietf.org" <bier@ietf.org>, sfc@ietf.org, Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>, Xiaohu Xu <xuxiaohu@huawei.com>, "Dr. Tony Przygienda" <tonysietf@gmail.com>
Subject: Re: [sfc] [mpls] The first nibble issue associated with MPLS encapsulation
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Apr 2016 23:05:56 -0000

--94eb2c07bc90820b460530013ca7
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Carlos,
thank you for the clarification. Should we think about establishing the
registry than?
Regards, Greg
On Apr 8, 2016 5:38 PM, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
wrote:

> Greg,
>
> My point, sorry if I was not clear, was that there is no such a thing as =
a
> =E2=80=98first nibble registry=E2=80=99.
>
> Instead, RFC 4928, Section 5, at
> https://tools.ietf.org/html/rfc4928#section-5, says:
>
>    IANA has marked the value 0x1 in the IP protocol version number space
>    as "Reserved" and placed a reference to this document to both values
>    0x0 and 0x1.
>
> And that is reflected as
> http://www.iana.org/assignments/version-numbers/version-numbers.xhtml#ver=
sion-numbers-1
>
>
> The IANA text in 4928 is additionally followed by a disclaimer:
>
>    Note that this document does not in any way change the policies
>    regarding the allocation of version numbers, including the possible
>    use of the reserved numbers for some future purpose.
>
> Further, RFC 4385 does not specify the =E2=80=98first nibble=E2=80=99 as =
a field. Instead,
> it depicts the actual binary values for the different CW formats. In othe=
r
> words, it takes the values from the IP protocol version number and not as=
 a
> new CW Field.
>
> Thanks,
>
> =E2=80=94 Carlos.
>
> PS: Sasha, quick typo, s/1119/1190/;
>
> From: Greg Mirsky <gregimirsky@gmail.com>
> Date: Friday, April 8, 2016 at 7:28 PM
> To: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
> Cc: "sfc@ietf.org" <sfc@ietf.org>, "bier@ietf.org" <bier@ietf.org>, "Dr.
> Tony Przygienda" <tonysietf@gmail.com>, "mpls@ietf.org" <mpls@ietf.org>,
> Xiaohu Xu <xuxiaohu@huawei.com>, Carlos Pignataro <cpignata@cisco.com>
> Subject: Re: [mpls] The first nibble issue associated with MPLS
> encapsulation
>
> Hi Sasha,
> thank you for pointing to existing IANA allocation, though stale. I wonde=
r
> if there is the registry for the first nibble. We, Tony and I, had
> discussed the way the first nibble space managed. If there already is the
> registry, could you please point me to it.
> Regards, Greg
> On Apr 8, 2016 2:31 PM, "Alexander Vainshtein" <
> Alexander.Vainshtein@ecitele.com> wrote:
>
>> Carlos and all,
>> Just for the reference, IANA has defined version 5 (0101) has assigned t=
o ST protocol and refers to RFC 1119. The latter has been obsoleted by RFC =
1819, but the IANA
>> assignment still holds.
>>
>> Is there, just in case, any relationship between BIER and ST?
>> Thumb typed on my cellphone
>> Regards,
>> Sasha
>>
>> -------- Original Message --------
>> From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
>> Date: Fri, April 08, 2016 9:25 PM +0300
>> To: Xiaohu Xu <xuxiaohu@huawei.com>
>> CC: mpls@ietf.org, bier@ietf.org, sfc@ietf.org, "Dr. Tony Przygienda" <t=
onysietf@gmail.com>
>> Subject: Re: [mpls] The first nibble issue associated with MPLS encapsul=
ation
>>
>>
>> Xiaohu, Tony,
>>
>> Please see inline.
>>
>> On Apr 7, 2016, at 2:39 PM, Xuxiaohu <xuxiaohu@huawei.com> wrote:
>>
>> As for the first nibble issue, will it violate the layering principle of
>> network protocol stacks if the first nibble of any new encapsulation hea=
der
>> (which could be an MPLS payload) is used as the "MPLS payload type" fiel=
d?
>>
>>
>> Reading draft-wang-bier-ethernet-01, Section 3, the =E2=80=9Cfirst nibbl=
e=E2=80=9D is
>> _not_ used as an =E2=80=9CMPLS payload type=E2=80=9D. Instead, the text =
describes an
>> anti-aliasing mechanism, much like RFC 4928.
>>
>> The relevant text is:
>>      First nibble: The first 4 bits of the header are set to 0101; this
>>    ensures that the BIER header will not be confused with an IP header
>>    or with the header of a pseudowire packet.
>>
>> Which says =E2=80=9C=E2=80=A6 will not be confused with =E2=80=A6"
>>
>> wouldn't it  be more reasonable and sustainable to fix the problem (i.e.=
,
>> the lack of a protocol field in the MPLS header) by the MPLS header itse=
lf?
>>
>>
>>
>>
>> Who says it is a *problem*? There=E2=80=99s no =E2=80=9Cfixing=E2=80=9D =
needed.
>>
>> By the way, since it's claimed that the NSH is transport-independant, it
>> means the NSH should be able to be transported over MPLS. However, it se=
ems
>> that the first nibble issue has not be considered in the current NSH dra=
ft.
>> As a result, when encapsulating NSH over MPLS, the NSH may be
>> mis-interpreted as IP header.
>>
>>
>>
>>
>> There seems to be some massive confusion on this paragraph, on a number
>> of levels. First, NSH is not =E2=80=9Cclaimed to be=E2=80=9D transport-i=
ndependent. It is
>> by charter and by design. Second, the NSH draft does not even include th=
e
>> term =E2=80=9CMPLS=E2=80=9D, because it does not define transports. The =
SFC Encapsulation
>> can be used in a transport-agnostic way.
>>
>> One more comment below.
>>
>> Best regards,
>> Xiaohu
>>
>>
>> ------------------------------
>> *=E5=8F=91=E4=BB=B6=E4=BA=BA:* BIER [bier-bounces@ietf.org] =E4=BB=A3=E8=
=A1=A8 Tony Przygienda [
>> tonysietf@gmail.com]
>> *=E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4:* 2016=E5=B9=B44=E6=9C=885=E6=97=
=A5 22:36
>> *=E6=94=B6=E4=BB=B6=E4=BA=BA:* bier@ietf.org
>> *=E4=B8=BB=E9=A2=98:* [Bier] comments on draft-wang-bier-ethernet-01
>>
>> after reading
>>
>> a) first nibble: refer to MPLS encaps as "the same value" to keep in syn=
c
>>
>>
>> One comment regarding the =E2=80=9CFirst nibble=E2=80=9D text
>> at draft-ietf-bier-mpls-encapsulation-03
>>
>> Since the function of the first nibble is to prevent aliasing with an IP
>> packet, in order for RFC 4928 to specify values of 0x0 and 0x1 for the
>> First Nibble, it had to =E2=80=9CReserve=E2=80=9D IP protocol versions o=
f 0 and 1,
>> referencing that RFC (see https://tools.ietf.org/html/rfc4928#section-5)=
.
>>
>> Is the intent to re-assign IPv5 at
>> http://www.iana.org/assignments/version-numbers/ ?
>>
>> Note that RFC 4928 says =E2=80=9CREQUIRED=E2=80=9D at:
>>
>>    It is REQUIRED, however, that applications depend upon in-order
>>    packet delivery restrict the first nibble values to 0x0 and 0x1.
>>
>> Thanks,
>>
>> =E2=80=94 Carlos.
>>
>>
>> b) refer to all other possible fields to MPLS encaps to keep in sync whe=
n
>> describing instead of repeating
>> c) you need to describe which kind of ether MACs are allowed, especially
>> on broadcast media, i.e. is it always p2p or can you take advantage of t=
he
>> broadcast ?
>> d) Figure 4: use the architecture/MPLS encoding for the length, don't
>> invent a new one
>> e) who will obtain a new ether type from IEEE? As far I understand, not =
a
>> trivial process albeit we have several liaisons with IEEE
>>
>> --
>> *We=E2=80=99ve heard that a million monkeys at a million keyboards could=
 produce
>> the complete works of Shakespeare; now, thanks to the Internet, we know
>> that is not true.*
>> =E2=80=94Robert Wilensky
>> _______________________________________________
>> mpls mailing list
>> mpls@ietf.org
>> https://www.ietf.org/mailman/listinfo/mpls
>>
>>
>>
>> _______________________________________________
>> mpls mailing list
>> mpls@ietf.org
>> https://www.ietf.org/mailman/listinfo/mpls
>>
>>

--94eb2c07bc90820b460530013ca7
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<p dir=3D"ltr">Hi Carlos, <br>
thank you for the clarification. Should we think about establishing the reg=
istry than? <br>
Regards, Greg </p>
<div class=3D"gmail_quote">On Apr 8, 2016 5:38 PM, &quot;Carlos Pignataro (=
cpignata)&quot; &lt;<a href=3D"mailto:cpignata@cisco.com">cpignata@cisco.co=
m</a>&gt; wrote:<br type=3D"attribution"><blockquote class=3D"gmail_quote" =
style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">



<div style=3D"word-wrap:break-word">
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
Greg,</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
My point, sorry if I was not clear, was that there is no such a thing as a =
=E2=80=98first nibble registry=E2=80=99.</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
Instead, RFC 4928, Section 5, at <a href=3D"https://tools.ietf.org/html/rfc=
4928#section-5" target=3D"_blank">
https://tools.ietf.org/html/rfc4928#section-5</a>, says:</div>
<div>
<div><br>
</div>
<div><font face=3D"Calibri,sans-serif">=C2=A0 =C2=A0IANA has marked the val=
ue 0x1 in the IP protocol version number space</font></div>
<div><font face=3D"Calibri,sans-serif">=C2=A0 =C2=A0as &quot;Reserved&quot;=
 and placed a reference to this document to both values</font></div>
<div><font face=3D"Calibri,sans-serif">=C2=A0 =C2=A00x0 and 0x1.</font></di=
v>
</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
And that is reflected as=C2=A0<a href=3D"http://www.iana.org/assignments/ve=
rsion-numbers/version-numbers.xhtml#version-numbers-1" target=3D"_blank">ht=
tp://www.iana.org/assignments/version-numbers/version-numbers.xhtml#version=
-numbers-1</a>=C2=A0</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
The IANA text in 4928 is additionally followed by a disclaimer:</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<div>
<div><font face=3D"Calibri,sans-serif">=C2=A0 =C2=A0Note that this document=
 does not in any way change the policies</font></div>
<div><font face=3D"Calibri,sans-serif">=C2=A0 =C2=A0regarding the allocatio=
n of version numbers, including the possible</font></div>
<div><font face=3D"Calibri,sans-serif">=C2=A0 =C2=A0use of the reserved num=
bers for some future purpose.</font></div>
</div>
<div><font face=3D"Calibri,sans-serif"><br>
</font></div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
Further, RFC 4385 does not specify the =E2=80=98first nibble=E2=80=99 as a =
field. Instead, it depicts the actual binary values for the different CW fo=
rmats. In other words, it takes the values from the IP protocol version num=
ber and not as a new CW Field.</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
Thanks,</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
=E2=80=94 Carlos.</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
PS: Sasha, quick typo, s/1119/1190/;</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<span style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14=
px">
<div style=3D"font-family:Calibri;font-size:11pt;text-align:left;color:blac=
k;BORDER-BOTTOM:medium none;BORDER-LEFT:medium none;PADDING-BOTTOM:0in;PADD=
ING-LEFT:0in;PADDING-RIGHT:0in;BORDER-TOP:#b5c4df 1pt solid;BORDER-RIGHT:me=
dium none;PADDING-TOP:3pt">
<span style=3D"font-weight:bold">From: </span>Greg Mirsky &lt;<a href=3D"ma=
ilto:gregimirsky@gmail.com" target=3D"_blank">gregimirsky@gmail.com</a>&gt;=
<br>
<span style=3D"font-weight:bold">Date: </span>Friday, April 8, 2016 at 7:28=
 PM<br>
<span style=3D"font-weight:bold">To: </span>Alexander Vainshtein &lt;<a hre=
f=3D"mailto:Alexander.Vainshtein@ecitele.com" target=3D"_blank">Alexander.V=
ainshtein@ecitele.com</a>&gt;<br>
<span style=3D"font-weight:bold">Cc: </span>&quot;<a href=3D"mailto:sfc@iet=
f.org" target=3D"_blank">sfc@ietf.org</a>&quot; &lt;<a href=3D"mailto:sfc@i=
etf.org" target=3D"_blank">sfc@ietf.org</a>&gt;, &quot;<a href=3D"mailto:bi=
er@ietf.org" target=3D"_blank">bier@ietf.org</a>&quot; &lt;<a href=3D"mailt=
o:bier@ietf.org" target=3D"_blank">bier@ietf.org</a>&gt;, &quot;Dr. Tony Pr=
zygienda&quot;
 &lt;<a href=3D"mailto:tonysietf@gmail.com" target=3D"_blank">tonysietf@gma=
il.com</a>&gt;, &quot;<a href=3D"mailto:mpls@ietf.org" target=3D"_blank">mp=
ls@ietf.org</a>&quot; &lt;<a href=3D"mailto:mpls@ietf.org" target=3D"_blank=
">mpls@ietf.org</a>&gt;, Xiaohu Xu &lt;<a href=3D"mailto:xuxiaohu@huawei.co=
m" target=3D"_blank">xuxiaohu@huawei.com</a>&gt;, Carlos Pignataro
 &lt;<a href=3D"mailto:cpignata@cisco.com" target=3D"_blank">cpignata@cisco=
.com</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>Re: [mpls] The first nibbl=
e issue associated with MPLS encapsulation<br>
</div>
<div><br>
</div>
<div>
<div>
<p dir=3D"ltr">Hi Sasha, <br>
thank you for pointing to existing IANA allocation, though stale. I wonder =
if there is the registry for the first nibble. We, Tony and I, had discusse=
d the way the first nibble space managed. If there already is the registry,=
 could you please point me to it.
<br>
Regards, Greg </p>
<div class=3D"gmail_quote">On Apr 8, 2016 2:31 PM, &quot;Alexander Vainshte=
in&quot; &lt;<a href=3D"mailto:Alexander.Vainshtein@ecitele.com" target=3D"=
_blank">Alexander.Vainshtein@ecitele.com</a>&gt; wrote:<br type=3D"attribut=
ion">
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<div style=3D"word-wrap:break-word">
<pre style=3D"word-wrap:break-word;font-size:10.0pt;font-family:Tahoma;colo=
r:black">Carlos and all,
Just for the reference, IANA has defined version 5 (0101) has assigned to S=
T protocol and refers to RFC 1119. The latter has been obsoleted by RFC 181=
9, but the IANA=20
assignment still holds.

Is there, just in case, any relationship between BIER and ST?
Thumb typed on my cellphone
Regards,
Sasha

-------- Original Message --------
From: &quot;Carlos Pignataro (cpignata)&quot; &lt;<a href=3D"mailto:cpignat=
a@cisco.com" target=3D"_blank">cpignata@cisco.com</a>&gt;
Date: Fri, April 08, 2016 9:25 PM +0300
To: Xiaohu Xu &lt;<a href=3D"mailto:xuxiaohu@huawei.com" target=3D"_blank">=
xuxiaohu@huawei.com</a>&gt;
CC: <a href=3D"mailto:mpls@ietf.org" target=3D"_blank">mpls@ietf.org</a>, <=
a href=3D"mailto:bier@ietf.org" target=3D"_blank">bier@ietf.org</a>, <a hre=
f=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>, &quot;Dr. Ton=
y Przygienda&quot; &lt;<a href=3D"mailto:tonysietf@gmail.com" target=3D"_bl=
ank">tonysietf@gmail.com</a>&gt;
Subject: Re: [mpls] The first nibble issue associated with MPLS encapsulati=
on

</pre>
<div>Xiaohu, Tony,
<div><br>
</div>
<div>Please see inline.<br>
<div><br>
<div>
<blockquote type=3D"cite">
<div>On Apr 7, 2016, at 2:39 PM, Xuxiaohu &lt;<a href=3D"mailto:xuxiaohu@hu=
awei.com" target=3D"_blank">xuxiaohu@huawei.com</a>&gt; wrote:</div>
<br>
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"margin-top:0px;margin-bottom:0px">As for the first nibble iss=
ue, will it violate the layering principle of network protocol stacks if th=
e first nibble of any new encapsulation header (which could be an MPLS payl=
oad)=C2=A0is used as the &quot;MPLS payload
 type&quot; field? </div>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>Reading=C2=A0draft-wang-bier-ethernet-01, Section 3, the =E2=80=9Cfirs=
t nibble=E2=80=9D is _not_ used as an =E2=80=9CMPLS payload type=E2=80=9D. =
Instead, the text describes an anti-aliasing mechanism, much like RFC 4928.=
=C2=A0</div>
<div><br>
</div>
<div>The relevant text is:</div>
<div>
<div>=C2=A0 =C2=A0 =C2=A0First nibble: The first 4 bits of the header are s=
et to 0101; this</div>
<div>=C2=A0 =C2=A0ensures that the BIER header will not be confused with an=
 IP header</div>
<div>=C2=A0 =C2=A0or with the header of a pseudowire packet.</div>
<div><br>
</div>
<div>Which says =E2=80=9C=E2=80=A6 will not be confused with =E2=80=A6&quot=
;</div>
</div>
<br>
<blockquote type=3D"cite">
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"margin-top:0px;margin-bottom:0px">wouldn&#39;t it=C2=A0 be mo=
re reasonable and sustainable=C2=A0to fix the=C2=A0problem (i.e., the lack =
of a protocol field in the MPLS header) by the MPLS header itself?</div>
<p style=3D"margin-top:0px;margin-bottom:0px">=C2=A0</p>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>Who says it is a *problem*? There=E2=80=99s no =E2=80=9Cfixing=E2=80=
=9D needed.</div>
<div><br>
</div>
<blockquote type=3D"cite">
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"margin-top:0px;margin-bottom:0px">By the way, since it&#39;s =
claimed that the NSH is transport-independant, it means the NSH should be a=
ble to be transported over MPLS. However, it seems that the first nibble is=
sue has not be considered=C2=A0in the current
 NSH draft. As a result, when encapsulating NSH over MPLS, the NSH may be m=
is-interpreted as IP header.</div>
<p style=3D"margin-top:0px;margin-bottom:0px">=C2=A0</p>
<div><br>
</div>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>There seems to be some massive confusion on this paragraph, on a numbe=
r of levels. First, NSH is not =E2=80=9Cclaimed to be=E2=80=9D transport-in=
dependent. It is by charter and by design. Second, the NSH draft does not e=
ven include the term =E2=80=9CMPLS=E2=80=9D, because it does not
 define transports. The SFC Encapsulation can be used in a transport-agnost=
ic way.</div>
<div><br>
</div>
<div>One more comment below.</div>
<br>
<blockquote type=3D"cite">
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"margin-top:0px;margin-bottom:0px">Best regards,</div>
<div style=3D"margin-top:0px;margin-bottom:0px">Xiaohu</div>
<p style=3D"margin-top:0px;margin-bottom:0px">=C2=A0</p>
<div style=3D"font-family:&#39;Times New Roman&#39;;font-size:16px">
<hr>
<div style=3D"direction:ltr"><font size=3D"2" face=3D"Tahoma"><b>=E5=8F=91=
=E4=BB=B6=E4=BA=BA:</b><span>=C2=A0</span>BIER [<a href=3D"mailto:bier-boun=
ces@ietf.org" target=3D"_blank">bier-bounces@ietf.org</a>] =E4=BB=A3=E8=A1=
=A8 Tony Przygienda [<a href=3D"mailto:tonysietf@gmail.com" target=3D"_blan=
k">tonysietf@gmail.com</a>]<br>
<b>=E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4:</b><span>=C2=A0</span>2016=E5=B9=
=B44=E6=9C=885=E6=97=A5 22:36<br>
<b>=E6=94=B6=E4=BB=B6=E4=BA=BA:</b><span>=C2=A0</span><a href=3D"mailto:bie=
r@ietf.org" target=3D"_blank">bier@ietf.org</a><br>
<b>=E4=B8=BB=E9=A2=98:</b><span>=C2=A0</span>[Bier] comments on draft-wang-=
bier-ethernet-01<br>
</font><br>
</div>
<div></div>
<div>
<div dir=3D"ltr">after reading=C2=A0
<div><br>
</div>
<div>a) first nibble: refer to MPLS encaps as &quot;the same value&quot; to=
 keep in sync=C2=A0</div>
</div>
</div>
</div>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>One comment regarding the =E2=80=9CFirst nibble=E2=80=9D text at=C2=A0=
draft-ietf-bier-mpls-encapsulation-03</div>
<div><br>
</div>
<div>Since the function of the first nibble is to prevent aliasing with an =
IP packet, in order for RFC 4928 to specify values of 0x0 and 0x1 for the F=
irst Nibble, it had to =E2=80=9CReserve=E2=80=9D IP protocol versions of 0 =
and 1, referencing that RFC (see
<a href=3D"https://tools.ietf.org/html/rfc4928#section-5" target=3D"_blank"=
>https://tools.ietf.org/html/rfc4928#section-5</a>).</div>
<div><br>
</div>
<div>Is the intent to re-assign IPv5 at=C2=A0<a href=3D"http://www.iana.org=
/assignments/version-numbers/" target=3D"_blank">http://www.iana.org/assign=
ments/version-numbers/</a>=C2=A0?</div>
<div><br>
</div>
<div>Note that RFC 4928 says =E2=80=9CREQUIRED=E2=80=9D at:</div>
<div><br>
</div>
<div>
<div>=C2=A0 =C2=A0It is REQUIRED, however, that applications depend upon in=
-order</div>
<div>=C2=A0 =C2=A0packet delivery restrict the first nibble values to 0x0 a=
nd 0x1.</div>
<div><br>
</div>
<div>Thanks,</div>
<div><br>
</div>
<div>=E2=80=94 Carlos.</div>
</div>
<div><br>
</div>
<br>
<blockquote type=3D"cite">
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"font-family:&#39;Times New Roman&#39;;font-size:16px">
<div>
<div dir=3D"ltr">
<div>b) refer to all other possible fields to MPLS encaps to keep in sync w=
hen describing instead of repeating=C2=A0</div>
<div>c) you need to describe which kind of ether MACs are allowed, especial=
ly on broadcast media, i.e. is it always p2p or can you take advantage of t=
he broadcast ?</div>
<div>d) Figure 4: use the architecture/MPLS encoding for the length, don&#3=
9;t invent a new one=C2=A0</div>
<div>e) who will obtain a new ether type from IEEE? As far I understand, no=
t a trivial process albeit we have several liaisons with IEEE=C2=A0</div>
<div>
<div><br>
</div>
--<span>=C2=A0</span><br>
<div>
<div dir=3D"ltr">
<div><span style=3D"font-size:12px"><font face=3D"georgia,serif"><i>We=E2=
=80=99ve heard that a million monkeys at a million keyboards could produce =
the complete works of Shakespeare; now, thanks to the Internet, we know tha=
t is not true.</i></font></span><i><font face=3D"garamond,serif"><br>
</font></i></div>
<div><span style=3D"font-size:12px"><font face=3D"times new roman,serif">=
=E2=80=94Robert Wilensky</font></span><br>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<span style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-=
weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-t=
ransform:none;white-space:normal;word-spacing:0px;float:none;display:inline=
!important">_______________________________________________</span><br style=
=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weight:norm=
al;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:no=
ne;white-space:normal;word-spacing:0px">
<span style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-=
weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-t=
ransform:none;white-space:normal;word-spacing:0px;float:none;display:inline=
!important">mpls mailing list</span><br style=3D"font-family:Helvetica;font=
-size:12px;font-style:normal;font-weight:normal;letter-spacing:normal;text-=
align:start;text-indent:0px;text-transform:none;white-space:normal;word-spa=
cing:0px">
<a href=3D"mailto:mpls@ietf.org" style=3D"font-family:Helvetica;font-size:1=
2px;font-style:normal;font-weight:normal;letter-spacing:normal;text-align:s=
tart;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0p=
x" target=3D"_blank">mpls@ietf.org</a><br style=3D"font-family:Helvetica;fo=
nt-size:12px;font-style:normal;font-weight:normal;letter-spacing:normal;tex=
t-align:start;text-indent:0px;text-transform:none;white-space:normal;word-s=
pacing:0px">
<a href=3D"https://www.ietf.org/mailman/listinfo/mpls" style=3D"font-family=
:Helvetica;font-size:12px;font-style:normal;font-weight:normal;letter-spaci=
ng:normal;text-align:start;text-indent:0px;text-transform:none;white-space:=
normal;word-spacing:0px" target=3D"_blank">https://www.ietf.org/mailman/lis=
tinfo/mpls</a></div>
</blockquote>
</div>
<br>
</div>
</div>
</div>
</div>
<br>
_______________________________________________<br>
mpls mailing list<br>
<a href=3D"mailto:mpls@ietf.org" target=3D"_blank">mpls@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/mpls" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/mpls</a><br>
<br>
</blockquote>
</div>
</div>
</div>
</span>
</div>

</blockquote></div>

--94eb2c07bc90820b460530013ca7--


From nobody Fri Apr  8 21:43:44 2016
Return-Path: <tonysietf@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E0AE112D736; Fri,  8 Apr 2016 21:43:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZPHslMZLQ6iu; Fri,  8 Apr 2016 21:43:34 -0700 (PDT)
Received: from mail-io0-x233.google.com (mail-io0-x233.google.com [IPv6:2607:f8b0:4001:c06::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9534212D732; Fri,  8 Apr 2016 21:43:34 -0700 (PDT)
Received: by mail-io0-x233.google.com with SMTP id q128so153813117iof.3; Fri, 08 Apr 2016 21:43:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=U1RZmcIyOJF98alsdMYhMT3PZLzoA+seFYmkiMvrBL0=; b=jqZ8s8dW01YrmPcLpcaKQsQcu/cvt6NuD85LuDylys+SqZhs/6FhjSM6NKEy41wa0N BXI0pTyWjB76xOgOi7nBG18XQcUp3pi1Ga3wZhbBbBhuIELnxA3gQlbuSnq6i/d6hUfq wbEZzbLcdldlzaty55AJM7AADpA3eji41IiKJvHmq8QWzMIxsuddFlPOYabXlbn3S4Yc TuSxCCxZEYTTpwtCVFlm5eT6C377gYGoD6jPe6YB1dcBji2gvugdCttdnIV1OON/Xn8M H/uuPSfYD/42uM0E5N5vnrLjmDtyRBCxLinQHIaR4qIOlgcVQDLdodnDEQB1fbkiAEyX tU3w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=U1RZmcIyOJF98alsdMYhMT3PZLzoA+seFYmkiMvrBL0=; b=LLDwPthl9hAdrEUcL3JCVdLK6eXiPxM3B0lpYdQj8roVhLnAnQtCLvmtaZBfqPD9o5 sN1Ij5SVMsVHQf3lpiFYG6Xcnma/SmNypHvOKuvdZOdlM5w+F5peNK3FsFRmnwjBEDx9 o6ve626AfFdF9/SPlihvLlO9HO0+nxOwfkSva4YR2xC2PUY3UBChO38swiqyLgZ8BFLr q0HEc0+Q9BFS81Fs+/8ipW5UV1R+OeLE4R9le3e9jwbLNVHf4Yum8go5nzFqecxN8Alq S3A+4MXrsPviydrdEyfP6uP+muVxxDXO/LzP85xMZOhD7W1UWrT6nIIzJdoVpglq0CkZ fh4A==
X-Gm-Message-State: AD7BkJJf6iLfd1oRD5Z0Q1ZXDv6gUQ6DjluSrsJ2Vij+xT7siZG0ec28ZkQoBEJ2EAoFvJahs3Xw9UHO7n4Gnw==
X-Received: by 10.107.132.78 with SMTP id g75mr13312367iod.50.1460177013821; Fri, 08 Apr 2016 21:43:33 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.107.198.198 with HTTP; Fri, 8 Apr 2016 21:42:54 -0700 (PDT)
In-Reply-To: <CA+RyBmW+qonpScnLOfsGorayCvsS0vrFcn+o5nPvOqCOv9Jc3g@mail.gmail.com>
References: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53871C@NKGEML515-MBX.china.huawei.com> <B664DB14-0A8C-4437-83E3-F9DA6C0DDA61@cisco.com> <mc51yrrf9n0wxbjsrprt9amf.1460143890063@email.android.com> <CA+RyBmXpZ-Kt77TW-=_kPYmahdw_yUHB5xhy8YtYVq2OcRJxbA@mail.gmail.com> <D32DB725.3F57B%cpignata@cisco.com> <CA+RyBmW+qonpScnLOfsGorayCvsS0vrFcn+o5nPvOqCOv9Jc3g@mail.gmail.com>
From: Tony Przygienda <tonysietf@gmail.com>
Date: Fri, 8 Apr 2016 21:42:54 -0700
Message-ID: <CA+wi2hMei091-xRWDPBYHCjMiuZiBVbma-dMj-whxhLQ54JR_A@mail.gmail.com>
To: Greg Mirsky <gregimirsky@gmail.com>
Content-Type: multipart/alternative; boundary=001a113fb6b237d75b053005f4bd
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/LSt0aZ6T2q0ggySftnUJJyTB0mY>
Cc: "Carlos Pignataro \(cpignata\)" <cpignata@cisco.com>, "bier@ietf.org" <bier@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "mpls@ietf.org" <mpls@ietf.org>, Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>, Xiaohu Xu <xuxiaohu@huawei.com>
Subject: Re: [sfc] [mpls] The first nibble issue associated with MPLS encapsulation
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Apr 2016 04:43:38 -0000

--001a113fb6b237d75b053005f4bd
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Carlos, thanks, enlightening input. That leads kind of back towards BIER
with the question whether we are comfortable with it being  ECMP'ed by DPI
by mistake or whether we actually consider it desirable that it is ECMP'ed.
BIER has its own ECMP section and is otherwise basically a hop-by-hop
technology but the question still hold in case we have IP ECMP between two
nodes (now, whether that's of practical relevance today or will be of
relevance I leave over to the list to discuss). Then there is of course the
consideration what happens if BIER is carried over tunnels, amongst them
MPLS.

Overall, looks like the only safe choice if we do NOT want it to be ECMP'ed
unintentionally is to follow 4925 sec. 5, otherwise to pick up something
that is not 4/6 to prevent firewall DPI and other tricks.

--- tony

On Fri, Apr 8, 2016 at 4:05 PM, Greg Mirsky <gregimirsky@gmail.com> wrote:

> Hi Carlos,
> thank you for the clarification. Should we think about establishing the
> registry than?
> Regards, Greg
> On Apr 8, 2016 5:38 PM, "Carlos Pignataro (cpignata)" <cpignata@cisco.com=
>
> wrote:
>
>> Greg,
>>
>> My point, sorry if I was not clear, was that there is no such a thing as
>> a =E2=80=98first nibble registry=E2=80=99.
>>
>> Instead, RFC 4928, Section 5, at
>> https://tools.ietf.org/html/rfc4928#section-5, says:
>>
>>    IANA has marked the value 0x1 in the IP protocol version number space
>>    as "Reserved" and placed a reference to this document to both values
>>    0x0 and 0x1.
>>
>> And that is reflected as
>> http://www.iana.org/assignments/version-numbers/version-numbers.xhtml#ve=
rsion-numbers-1
>>
>>
>> The IANA text in 4928 is additionally followed by a disclaimer:
>>
>>    Note that this document does not in any way change the policies
>>    regarding the allocation of version numbers, including the possible
>>    use of the reserved numbers for some future purpose.
>>
>> Further, RFC 4385 does not specify the =E2=80=98first nibble=E2=80=99 as=
 a field.
>> Instead, it depicts the actual binary values for the different CW format=
s.
>> In other words, it takes the values from the IP protocol version number =
and
>> not as a new CW Field.
>>
>> Thanks,
>>
>> =E2=80=94 Carlos.
>>
>> PS: Sasha, quick typo, s/1119/1190/;
>>
>> From: Greg Mirsky <gregimirsky@gmail.com>
>> Date: Friday, April 8, 2016 at 7:28 PM
>> To: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
>> Cc: "sfc@ietf.org" <sfc@ietf.org>, "bier@ietf.org" <bier@ietf.org>, "Dr.
>> Tony Przygienda" <tonysietf@gmail.com>, "mpls@ietf.org" <mpls@ietf.org>,
>> Xiaohu Xu <xuxiaohu@huawei.com>, Carlos Pignataro <cpignata@cisco.com>
>> Subject: Re: [mpls] The first nibble issue associated with MPLS
>> encapsulation
>>
>> Hi Sasha,
>> thank you for pointing to existing IANA allocation, though stale. I
>> wonder if there is the registry for the first nibble. We, Tony and I, ha=
d
>> discussed the way the first nibble space managed. If there already is th=
e
>> registry, could you please point me to it.
>> Regards, Greg
>> On Apr 8, 2016 2:31 PM, "Alexander Vainshtein" <
>> Alexander.Vainshtein@ecitele.com> wrote:
>>
>>> Carlos and all,
>>> Just for the reference, IANA has defined version 5 (0101) has assigned =
to ST protocol and refers to RFC 1119. The latter has been obsoleted by RFC=
 1819, but the IANA
>>> assignment still holds.
>>>
>>> Is there, just in case, any relationship between BIER and ST?
>>> Thumb typed on my cellphone
>>> Regards,
>>> Sasha
>>>
>>> -------- Original Message --------
>>> From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
>>> Date: Fri, April 08, 2016 9:25 PM +0300
>>> To: Xiaohu Xu <xuxiaohu@huawei.com>
>>> CC: mpls@ietf.org, bier@ietf.org, sfc@ietf.org, "Dr. Tony Przygienda" <=
tonysietf@gmail.com>
>>> Subject: Re: [mpls] The first nibble issue associated with MPLS encapsu=
lation
>>>
>>>
>>> Xiaohu, Tony,
>>>
>>> Please see inline.
>>>
>>> On Apr 7, 2016, at 2:39 PM, Xuxiaohu <xuxiaohu@huawei.com> wrote:
>>>
>>> As for the first nibble issue, will it violate the layering principle o=
f
>>> network protocol stacks if the first nibble of any new encapsulation he=
ader
>>> (which could be an MPLS payload) is used as the "MPLS payload type" fie=
ld?
>>>
>>>
>>> Reading draft-wang-bier-ethernet-01, Section 3, the =E2=80=9Cfirst nibb=
le=E2=80=9D is
>>> _not_ used as an =E2=80=9CMPLS payload type=E2=80=9D. Instead, the text=
 describes an
>>> anti-aliasing mechanism, much like RFC 4928.
>>>
>>> The relevant text is:
>>>      First nibble: The first 4 bits of the header are set to 0101; this
>>>    ensures that the BIER header will not be confused with an IP header
>>>    or with the header of a pseudowire packet.
>>>
>>> Which says =E2=80=9C=E2=80=A6 will not be confused with =E2=80=A6"
>>>
>>> wouldn't it  be more reasonable and sustainable to fix the problem
>>> (i.e., the lack of a protocol field in the MPLS header) by the MPLS hea=
der
>>> itself?
>>>
>>>
>>>
>>>
>>> Who says it is a *problem*? There=E2=80=99s no =E2=80=9Cfixing=E2=80=9D=
 needed.
>>>
>>> By the way, since it's claimed that the NSH is transport-independant, i=
t
>>> means the NSH should be able to be transported over MPLS. However, it s=
eems
>>> that the first nibble issue has not be considered in the current NSH dr=
aft.
>>> As a result, when encapsulating NSH over MPLS, the NSH may be
>>> mis-interpreted as IP header.
>>>
>>>
>>>
>>>
>>> There seems to be some massive confusion on this paragraph, on a number
>>> of levels. First, NSH is not =E2=80=9Cclaimed to be=E2=80=9D transport-=
independent. It is
>>> by charter and by design. Second, the NSH draft does not even include t=
he
>>> term =E2=80=9CMPLS=E2=80=9D, because it does not define transports. The=
 SFC Encapsulation
>>> can be used in a transport-agnostic way.
>>>
>>> One more comment below.
>>>
>>> Best regards,
>>> Xiaohu
>>>
>>>
>>> ------------------------------
>>> *=E5=8F=91=E4=BB=B6=E4=BA=BA:* BIER [bier-bounces@ietf.org] =E4=BB=A3=
=E8=A1=A8 Tony Przygienda [
>>> tonysietf@gmail.com]
>>> *=E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4:* 2016=E5=B9=B44=E6=9C=885=E6=97=
=A5 22:36
>>> *=E6=94=B6=E4=BB=B6=E4=BA=BA:* bier@ietf.org
>>> *=E4=B8=BB=E9=A2=98:* [Bier] comments on draft-wang-bier-ethernet-01
>>>
>>> after reading
>>>
>>> a) first nibble: refer to MPLS encaps as "the same value" to keep in
>>> sync
>>>
>>>
>>> One comment regarding the =E2=80=9CFirst nibble=E2=80=9D text
>>> at draft-ietf-bier-mpls-encapsulation-03
>>>
>>> Since the function of the first nibble is to prevent aliasing with an I=
P
>>> packet, in order for RFC 4928 to specify values of 0x0 and 0x1 for the
>>> First Nibble, it had to =E2=80=9CReserve=E2=80=9D IP protocol versions =
of 0 and 1,
>>> referencing that RFC (see https://tools.ietf.org/html/rfc4928#section-5
>>> ).
>>>
>>> Is the intent to re-assign IPv5 at
>>> http://www.iana.org/assignments/version-numbers/ ?
>>>
>>> Note that RFC 4928 says =E2=80=9CREQUIRED=E2=80=9D at:
>>>
>>>    It is REQUIRED, however, that applications depend upon in-order
>>>    packet delivery restrict the first nibble values to 0x0 and 0x1.
>>>
>>> Thanks,
>>>
>>> =E2=80=94 Carlos.
>>>
>>>
>>> b) refer to all other possible fields to MPLS encaps to keep in sync
>>> when describing instead of repeating
>>> c) you need to describe which kind of ether MACs are allowed, especiall=
y
>>> on broadcast media, i.e. is it always p2p or can you take advantage of =
the
>>> broadcast ?
>>> d) Figure 4: use the architecture/MPLS encoding for the length, don't
>>> invent a new one
>>> e) who will obtain a new ether type from IEEE? As far I understand, not
>>> a trivial process albeit we have several liaisons with IEEE
>>>
>>> --
>>> *We=E2=80=99ve heard that a million monkeys at a million keyboards coul=
d produce
>>> the complete works of Shakespeare; now, thanks to the Internet, we know
>>> that is not true.*
>>> =E2=80=94Robert Wilensky
>>> _______________________________________________
>>> mpls mailing list
>>> mpls@ietf.org
>>> https://www.ietf.org/mailman/listinfo/mpls
>>>
>>>
>>>
>>> _______________________________________________
>>> mpls mailing list
>>> mpls@ietf.org
>>> https://www.ietf.org/mailman/listinfo/mpls
>>>
>>>


--=20
*We=E2=80=99ve heard that a million monkeys at a million keyboards could pr=
oduce
the complete works of Shakespeare; now, thanks to the Internet, we know
that is not true.*
=E2=80=94Robert Wilensky

--001a113fb6b237d75b053005f4bd
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Carlos, thanks, enlightening input. That leads kind of bac=
k towards BIER with the question whether we are comfortable with it being =
=C2=A0ECMP&#39;ed by DPI by mistake or whether we actually consider it desi=
rable that it is ECMP&#39;ed. BIER has its own ECMP section and is otherwis=
e basically a hop-by-hop technology but the question still hold in case we =
have IP ECMP between two nodes (now, whether that&#39;s of practical releva=
nce today or will be of relevance I leave over to the list to discuss). The=
n there is of course the consideration what happens if BIER is carried over=
 tunnels, amongst them MPLS.=C2=A0<div><br></div><div>Overall, looks like t=
he only safe choice if we do NOT want it to be ECMP&#39;ed unintentionally =
is to follow 4925 sec. 5, otherwise to pick up something that is not 4/6 to=
 prevent firewall DPI and other tricks.=C2=A0<br><div><br></div><div>--- to=
ny =C2=A0</div></div></div><div class=3D"gmail_extra"><br><div class=3D"gma=
il_quote">On Fri, Apr 8, 2016 at 4:05 PM, Greg Mirsky <span dir=3D"ltr">&lt=
;<a href=3D"mailto:gregimirsky@gmail.com" target=3D"_blank">gregimirsky@gma=
il.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"=
margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><p dir=3D"lt=
r">Hi Carlos, <br>
thank you for the clarification. Should we think about establishing the reg=
istry than? <br>
Regards, Greg </p><div class=3D"HOEnZb"><div class=3D"h5">
<div class=3D"gmail_quote">On Apr 8, 2016 5:38 PM, &quot;Carlos Pignataro (=
cpignata)&quot; &lt;<a href=3D"mailto:cpignata@cisco.com" target=3D"_blank"=
>cpignata@cisco.com</a>&gt; wrote:<br type=3D"attribution"><blockquote clas=
s=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pad=
ding-left:1ex">



<div style=3D"word-wrap:break-word">
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
Greg,</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
My point, sorry if I was not clear, was that there is no such a thing as a =
=E2=80=98first nibble registry=E2=80=99.</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
Instead, RFC 4928, Section 5, at <a href=3D"https://tools.ietf.org/html/rfc=
4928#section-5" target=3D"_blank">
https://tools.ietf.org/html/rfc4928#section-5</a>, says:</div>
<div>
<div><br>
</div>
<div><font face=3D"Calibri,sans-serif">=C2=A0 =C2=A0IANA has marked the val=
ue 0x1 in the IP protocol version number space</font></div>
<div><font face=3D"Calibri,sans-serif">=C2=A0 =C2=A0as &quot;Reserved&quot;=
 and placed a reference to this document to both values</font></div>
<div><font face=3D"Calibri,sans-serif">=C2=A0 =C2=A00x0 and 0x1.</font></di=
v>
</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
And that is reflected as=C2=A0<a href=3D"http://www.iana.org/assignments/ve=
rsion-numbers/version-numbers.xhtml#version-numbers-1" target=3D"_blank">ht=
tp://www.iana.org/assignments/version-numbers/version-numbers.xhtml#version=
-numbers-1</a>=C2=A0</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
The IANA text in 4928 is additionally followed by a disclaimer:</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<div>
<div><font face=3D"Calibri,sans-serif">=C2=A0 =C2=A0Note that this document=
 does not in any way change the policies</font></div>
<div><font face=3D"Calibri,sans-serif">=C2=A0 =C2=A0regarding the allocatio=
n of version numbers, including the possible</font></div>
<div><font face=3D"Calibri,sans-serif">=C2=A0 =C2=A0use of the reserved num=
bers for some future purpose.</font></div>
</div>
<div><font face=3D"Calibri,sans-serif"><br>
</font></div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
Further, RFC 4385 does not specify the =E2=80=98first nibble=E2=80=99 as a =
field. Instead, it depicts the actual binary values for the different CW fo=
rmats. In other words, it takes the values from the IP protocol version num=
ber and not as a new CW Field.</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
Thanks,</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
=E2=80=94 Carlos.</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
PS: Sasha, quick typo, s/1119/1190/;</div>
<div style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14p=
x">
<br>
</div>
<span style=3D"color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14=
px">
<div style=3D"font-family:Calibri;font-size:11pt;text-align:left;color:blac=
k;BORDER-BOTTOM:medium none;BORDER-LEFT:medium none;PADDING-BOTTOM:0in;PADD=
ING-LEFT:0in;PADDING-RIGHT:0in;BORDER-TOP:#b5c4df 1pt solid;BORDER-RIGHT:me=
dium none;PADDING-TOP:3pt">
<span style=3D"font-weight:bold">From: </span>Greg Mirsky &lt;<a href=3D"ma=
ilto:gregimirsky@gmail.com" target=3D"_blank">gregimirsky@gmail.com</a>&gt;=
<br>
<span style=3D"font-weight:bold">Date: </span>Friday, April 8, 2016 at 7:28=
 PM<br>
<span style=3D"font-weight:bold">To: </span>Alexander Vainshtein &lt;<a hre=
f=3D"mailto:Alexander.Vainshtein@ecitele.com" target=3D"_blank">Alexander.V=
ainshtein@ecitele.com</a>&gt;<br>
<span style=3D"font-weight:bold">Cc: </span>&quot;<a href=3D"mailto:sfc@iet=
f.org" target=3D"_blank">sfc@ietf.org</a>&quot; &lt;<a href=3D"mailto:sfc@i=
etf.org" target=3D"_blank">sfc@ietf.org</a>&gt;, &quot;<a href=3D"mailto:bi=
er@ietf.org" target=3D"_blank">bier@ietf.org</a>&quot; &lt;<a href=3D"mailt=
o:bier@ietf.org" target=3D"_blank">bier@ietf.org</a>&gt;, &quot;Dr. Tony Pr=
zygienda&quot;
 &lt;<a href=3D"mailto:tonysietf@gmail.com" target=3D"_blank">tonysietf@gma=
il.com</a>&gt;, &quot;<a href=3D"mailto:mpls@ietf.org" target=3D"_blank">mp=
ls@ietf.org</a>&quot; &lt;<a href=3D"mailto:mpls@ietf.org" target=3D"_blank=
">mpls@ietf.org</a>&gt;, Xiaohu Xu &lt;<a href=3D"mailto:xuxiaohu@huawei.co=
m" target=3D"_blank">xuxiaohu@huawei.com</a>&gt;, Carlos Pignataro
 &lt;<a href=3D"mailto:cpignata@cisco.com" target=3D"_blank">cpignata@cisco=
.com</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>Re: [mpls] The first nibbl=
e issue associated with MPLS encapsulation<br>
</div>
<div><br>
</div>
<div>
<div>
<p dir=3D"ltr">Hi Sasha, <br>
thank you for pointing to existing IANA allocation, though stale. I wonder =
if there is the registry for the first nibble. We, Tony and I, had discusse=
d the way the first nibble space managed. If there already is the registry,=
 could you please point me to it.
<br>
Regards, Greg </p>
<div class=3D"gmail_quote">On Apr 8, 2016 2:31 PM, &quot;Alexander Vainshte=
in&quot; &lt;<a href=3D"mailto:Alexander.Vainshtein@ecitele.com" target=3D"=
_blank">Alexander.Vainshtein@ecitele.com</a>&gt; wrote:<br type=3D"attribut=
ion">
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<div style=3D"word-wrap:break-word">
<pre style=3D"word-wrap:break-word;font-size:10.0pt;font-family:Tahoma;colo=
r:black">Carlos and all,
Just for the reference, IANA has defined version 5 (0101) has assigned to S=
T protocol and refers to RFC 1119. The latter has been obsoleted by RFC 181=
9, but the IANA=20
assignment still holds.

Is there, just in case, any relationship between BIER and ST?
Thumb typed on my cellphone
Regards,
Sasha

-------- Original Message --------
From: &quot;Carlos Pignataro (cpignata)&quot; &lt;<a href=3D"mailto:cpignat=
a@cisco.com" target=3D"_blank">cpignata@cisco.com</a>&gt;
Date: Fri, April 08, 2016 9:25 PM +0300
To: Xiaohu Xu &lt;<a href=3D"mailto:xuxiaohu@huawei.com" target=3D"_blank">=
xuxiaohu@huawei.com</a>&gt;
CC: <a href=3D"mailto:mpls@ietf.org" target=3D"_blank">mpls@ietf.org</a>, <=
a href=3D"mailto:bier@ietf.org" target=3D"_blank">bier@ietf.org</a>, <a hre=
f=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>, &quot;Dr. Ton=
y Przygienda&quot; &lt;<a href=3D"mailto:tonysietf@gmail.com" target=3D"_bl=
ank">tonysietf@gmail.com</a>&gt;
Subject: Re: [mpls] The first nibble issue associated with MPLS encapsulati=
on

</pre>
<div>Xiaohu, Tony,
<div><br>
</div>
<div>Please see inline.<br>
<div><br>
<div>
<blockquote type=3D"cite">
<div>On Apr 7, 2016, at 2:39 PM, Xuxiaohu &lt;<a href=3D"mailto:xuxiaohu@hu=
awei.com" target=3D"_blank">xuxiaohu@huawei.com</a>&gt; wrote:</div>
<br>
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"margin-top:0px;margin-bottom:0px">As for the first nibble iss=
ue, will it violate the layering principle of network protocol stacks if th=
e first nibble of any new encapsulation header (which could be an MPLS payl=
oad)=C2=A0is used as the &quot;MPLS payload
 type&quot; field? </div>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>Reading=C2=A0draft-wang-bier-ethernet-01, Section 3, the =E2=80=9Cfirs=
t nibble=E2=80=9D is _not_ used as an =E2=80=9CMPLS payload type=E2=80=9D. =
Instead, the text describes an anti-aliasing mechanism, much like RFC 4928.=
=C2=A0</div>
<div><br>
</div>
<div>The relevant text is:</div>
<div>
<div>=C2=A0 =C2=A0 =C2=A0First nibble: The first 4 bits of the header are s=
et to 0101; this</div>
<div>=C2=A0 =C2=A0ensures that the BIER header will not be confused with an=
 IP header</div>
<div>=C2=A0 =C2=A0or with the header of a pseudowire packet.</div>
<div><br>
</div>
<div>Which says =E2=80=9C=E2=80=A6 will not be confused with =E2=80=A6&quot=
;</div>
</div>
<br>
<blockquote type=3D"cite">
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"margin-top:0px;margin-bottom:0px">wouldn&#39;t it=C2=A0 be mo=
re reasonable and sustainable=C2=A0to fix the=C2=A0problem (i.e., the lack =
of a protocol field in the MPLS header) by the MPLS header itself?</div>
<p style=3D"margin-top:0px;margin-bottom:0px">=C2=A0</p>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>Who says it is a *problem*? There=E2=80=99s no =E2=80=9Cfixing=E2=80=
=9D needed.</div>
<div><br>
</div>
<blockquote type=3D"cite">
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"margin-top:0px;margin-bottom:0px">By the way, since it&#39;s =
claimed that the NSH is transport-independant, it means the NSH should be a=
ble to be transported over MPLS. However, it seems that the first nibble is=
sue has not be considered=C2=A0in the current
 NSH draft. As a result, when encapsulating NSH over MPLS, the NSH may be m=
is-interpreted as IP header.</div>
<p style=3D"margin-top:0px;margin-bottom:0px">=C2=A0</p>
<div><br>
</div>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>There seems to be some massive confusion on this paragraph, on a numbe=
r of levels. First, NSH is not =E2=80=9Cclaimed to be=E2=80=9D transport-in=
dependent. It is by charter and by design. Second, the NSH draft does not e=
ven include the term =E2=80=9CMPLS=E2=80=9D, because it does not
 define transports. The SFC Encapsulation can be used in a transport-agnost=
ic way.</div>
<div><br>
</div>
<div>One more comment below.</div>
<br>
<blockquote type=3D"cite">
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"margin-top:0px;margin-bottom:0px">Best regards,</div>
<div style=3D"margin-top:0px;margin-bottom:0px">Xiaohu</div>
<p style=3D"margin-top:0px;margin-bottom:0px">=C2=A0</p>
<div style=3D"font-family:&#39;Times New Roman&#39;;font-size:16px">
<hr>
<div style=3D"direction:ltr"><font size=3D"2" face=3D"Tahoma"><b>=E5=8F=91=
=E4=BB=B6=E4=BA=BA:</b><span>=C2=A0</span>BIER [<a href=3D"mailto:bier-boun=
ces@ietf.org" target=3D"_blank">bier-bounces@ietf.org</a>] =E4=BB=A3=E8=A1=
=A8 Tony Przygienda [<a href=3D"mailto:tonysietf@gmail.com" target=3D"_blan=
k">tonysietf@gmail.com</a>]<br>
<b>=E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4:</b><span>=C2=A0</span>2016=E5=B9=
=B44=E6=9C=885=E6=97=A5 22:36<br>
<b>=E6=94=B6=E4=BB=B6=E4=BA=BA:</b><span>=C2=A0</span><a href=3D"mailto:bie=
r@ietf.org" target=3D"_blank">bier@ietf.org</a><br>
<b>=E4=B8=BB=E9=A2=98:</b><span>=C2=A0</span>[Bier] comments on draft-wang-=
bier-ethernet-01<br>
</font><br>
</div>
<div></div>
<div>
<div dir=3D"ltr">after reading=C2=A0
<div><br>
</div>
<div>a) first nibble: refer to MPLS encaps as &quot;the same value&quot; to=
 keep in sync=C2=A0</div>
</div>
</div>
</div>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>One comment regarding the =E2=80=9CFirst nibble=E2=80=9D text at=C2=A0=
draft-ietf-bier-mpls-encapsulation-03</div>
<div><br>
</div>
<div>Since the function of the first nibble is to prevent aliasing with an =
IP packet, in order for RFC 4928 to specify values of 0x0 and 0x1 for the F=
irst Nibble, it had to =E2=80=9CReserve=E2=80=9D IP protocol versions of 0 =
and 1, referencing that RFC (see
<a href=3D"https://tools.ietf.org/html/rfc4928#section-5" target=3D"_blank"=
>https://tools.ietf.org/html/rfc4928#section-5</a>).</div>
<div><br>
</div>
<div>Is the intent to re-assign IPv5 at=C2=A0<a href=3D"http://www.iana.org=
/assignments/version-numbers/" target=3D"_blank">http://www.iana.org/assign=
ments/version-numbers/</a>=C2=A0?</div>
<div><br>
</div>
<div>Note that RFC 4928 says =E2=80=9CREQUIRED=E2=80=9D at:</div>
<div><br>
</div>
<div>
<div>=C2=A0 =C2=A0It is REQUIRED, however, that applications depend upon in=
-order</div>
<div>=C2=A0 =C2=A0packet delivery restrict the first nibble values to 0x0 a=
nd 0x1.</div>
<div><br>
</div>
<div>Thanks,</div>
<div><br>
</div>
<div>=E2=80=94 Carlos.</div>
</div>
<div><br>
</div>
<br>
<blockquote type=3D"cite">
<div>
<div style=3D"font-style:normal;font-weight:normal;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;direction:ltr;font-family:Tahoma;font-size:10pt">
<div style=3D"font-family:&#39;Times New Roman&#39;;font-size:16px">
<div>
<div dir=3D"ltr">
<div>b) refer to all other possible fields to MPLS encaps to keep in sync w=
hen describing instead of repeating=C2=A0</div>
<div>c) you need to describe which kind of ether MACs are allowed, especial=
ly on broadcast media, i.e. is it always p2p or can you take advantage of t=
he broadcast ?</div>
<div>d) Figure 4: use the architecture/MPLS encoding for the length, don&#3=
9;t invent a new one=C2=A0</div>
<div>e) who will obtain a new ether type from IEEE? As far I understand, no=
t a trivial process albeit we have several liaisons with IEEE=C2=A0</div>
<div>
<div><br>
</div>
--<span>=C2=A0</span><br>
<div>
<div dir=3D"ltr">
<div><span style=3D"font-size:12px"><font face=3D"georgia,serif"><i>We=E2=
=80=99ve heard that a million monkeys at a million keyboards could produce =
the complete works of Shakespeare; now, thanks to the Internet, we know tha=
t is not true.</i></font></span><i><font face=3D"garamond,serif"><br>
</font></i></div>
<div><span style=3D"font-size:12px"><font face=3D"times new roman,serif">=
=E2=80=94Robert Wilensky</font></span><br>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<span style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-=
weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-t=
ransform:none;white-space:normal;word-spacing:0px;float:none;display:inline=
!important">_______________________________________________</span><br style=
=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weight:norm=
al;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:no=
ne;white-space:normal;word-spacing:0px">
<span style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-=
weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-t=
ransform:none;white-space:normal;word-spacing:0px;float:none;display:inline=
!important">mpls mailing list</span><br style=3D"font-family:Helvetica;font=
-size:12px;font-style:normal;font-weight:normal;letter-spacing:normal;text-=
align:start;text-indent:0px;text-transform:none;white-space:normal;word-spa=
cing:0px">
<a href=3D"mailto:mpls@ietf.org" style=3D"font-family:Helvetica;font-size:1=
2px;font-style:normal;font-weight:normal;letter-spacing:normal;text-align:s=
tart;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0p=
x" target=3D"_blank">mpls@ietf.org</a><br style=3D"font-family:Helvetica;fo=
nt-size:12px;font-style:normal;font-weight:normal;letter-spacing:normal;tex=
t-align:start;text-indent:0px;text-transform:none;white-space:normal;word-s=
pacing:0px">
<a href=3D"https://www.ietf.org/mailman/listinfo/mpls" style=3D"font-family=
:Helvetica;font-size:12px;font-style:normal;font-weight:normal;letter-spaci=
ng:normal;text-align:start;text-indent:0px;text-transform:none;white-space:=
normal;word-spacing:0px" target=3D"_blank">https://www.ietf.org/mailman/lis=
tinfo/mpls</a></div>
</blockquote>
</div>
<br>
</div>
</div>
</div>
</div>
<br>
_______________________________________________<br>
mpls mailing list<br>
<a href=3D"mailto:mpls@ietf.org" target=3D"_blank">mpls@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/mpls" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/mpls</a><br>
<br>
</blockquote>
</div>
</div>
</div>
</span>
</div>

</blockquote></div>
</div></div></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>=
<div class=3D"gmail_signature"><div dir=3D"ltr"><div><span style=3D"font-si=
ze:12.8000001907349px"><font face=3D"georgia, serif"><i>We=E2=80=99ve heard=
 that a million monkeys at a million keyboards could produce the complete w=
orks of Shakespeare; now, thanks to the Internet, we know that is not true.=
</i></font></span><i><font face=3D"garamond, serif"><br></font></i></div><d=
iv><span style=3D"font-size:12.8000001907349px"><font face=3D"times new rom=
an, serif">=E2=80=94Robert Wilensky</font></span><br></div></div></div>
</div>

--001a113fb6b237d75b053005f4bd--


From nobody Mon Apr 11 04:14:07 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D08C12EC10 for <sfc@ietfa.amsl.com>; Mon, 11 Apr 2016 04:14:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.915
X-Spam-Level: 
X-Spam-Status: No, score=-2.915 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ymWuQx3PTcZT for <sfc@ietfa.amsl.com>; Mon, 11 Apr 2016 04:14:04 -0700 (PDT)
Received: from relais-inet.orange.com (relais-nor34.orange.com [80.12.70.34]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7EDAF12EC0F for <sfc@ietf.org>; Mon, 11 Apr 2016 04:14:04 -0700 (PDT)
Received: from opfednr07.francetelecom.fr (unknown [xx.xx.xx.71]) by opfednr27.francetelecom.fr (ESMTP service) with ESMTP id B7E80A0371; Mon, 11 Apr 2016 13:14:02 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.32]) by opfednr07.francetelecom.fr (ESMTP service) with ESMTP id 8AB2D1C007F; Mon, 11 Apr 2016 13:14:02 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM32.corporate.adroot.infra.ftgroup ([fe80::8924:188:2124:a046%19]) with mapi id 14.03.0279.002; Mon, 11 Apr 2016 13:14:02 +0200
From: <mohamed.boucadair@orange.com>
To: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfPQCYv/wVVMUagOUO32rRCGp+Er+Aw
Date: Mon, 11 Apr 2016 11:14:02 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <m3egarz7kh.wl-narten@us.ibm.com>
In-Reply-To: <m3egarz7kh.wl-narten@us.ibm.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/pZnZ_T3lL_F9Emq6yfmuklZ1jCQ>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Apr 2016 11:14:06 -0000

Dear Thomas, all,=20

As I mentioned during the meeting, there are several issues that are not co=
vered in the last version of the draft. I already provided examples of the =
issues offline as requested by Martin.=20

Cheers,
Med

> -----Message d'origine-----
> De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten
> Envoy=E9=A0: jeudi 31 mars 2016 04:48
> =C0=A0: sfc@ietf.org
> Objet=A0: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Dear WG:
>=20
> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>=20
> The editors of the NSH document have indicated that they have
> addressed all known comments and that there are no open issues with
> the current version of the document.
>=20
> Substantive comments to the list please, editorial comments can go
> directly to the document editors.
>=20
> We'll also get a brief update from the editors at next week's
> meeting. If there are any remaining issues with the document, raising
> them before the meeting would be especially helpful.
>=20
> For the chairs,
> Thomas
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Mon Apr 11 05:45:13 2016
Return-Path: <Alexander.Vainshtein@ecitele.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A63A12D1D2; Mon, 11 Apr 2016 05:45:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.921
X-Spam-Level: 
X-Spam-Status: No, score=-1.921 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=eci365.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vFiHPpIoAD0v; Mon, 11 Apr 2016 05:45:07 -0700 (PDT)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-db5eur01on0131.outbound.protection.outlook.com [104.47.2.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9216112EDF3; Mon, 11 Apr 2016 05:45:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ECI365.onmicrosoft.com; s=selector1-ecitele-com; h=From:To:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=BqWWij5NkOViBc6lr5Vpb6RLY3ykmzRFEKa7uikncR0=; b=SESnpIQqYGYhwCxeM1Q+8wg5/C6u7pUxIYpEbfj1ZGKRNoO9om/FC67227k86Uj605ieSB3C5i1BRYeoUAZFe1Vigv6zUUer9R+rAyMZ+yrFHCbbvcV2Ffw+y69oYOMwYjfKekfC7OBUr81gZ0LhFgdK7hOwyfuINQ8wvCvr09M=
Received: from AM3PR03MB0775.eurprd03.prod.outlook.com (2a01:111:e400:8848::11) by AM3PR03MB0776.eurprd03.prod.outlook.com (2a01:111:e400:8848::12) with Microsoft SMTP Server (TLS) id 15.1.453.26; Mon, 11 Apr 2016 12:45:03 +0000
Received: from AM3PR03MB0775.eurprd03.prod.outlook.com ([fe80::bd20:7adf:a75f:a656]) by AM3PR03MB0775.eurprd03.prod.outlook.com ([fe80::bd20:7adf:a75f:a656%18]) with mapi id 15.01.0453.029; Mon, 11 Apr 2016 12:45:03 +0000
From: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
To: Greg Mirsky <gregimirsky@gmail.com>
Thread-Topic: [mpls] The first nibble issue associated with MPLS encapsulation
Thread-Index: AQHRkPR7Ow6l9wh8WUKpFJXl+MwAqJ+AqQ4A///PiXuAADFYgIAAAwEAgAAHioCAA/oHsA==
Date: Mon, 11 Apr 2016 12:45:02 +0000
Message-ID: <AM3PR03MB0775C55E5AD3247F373007139D940@AM3PR03MB0775.eurprd03.prod.outlook.com>
References: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53871C@NKGEML515-MBX.china.huawei.com> <B664DB14-0A8C-4437-83E3-F9DA6C0DDA61@cisco.com> <mc51yrrf9n0wxbjsrprt9amf.1460143890063@email.android.com> <CA+RyBmXpZ-Kt77TW-=_kPYmahdw_yUHB5xhy8YtYVq2OcRJxbA@mail.gmail.com> <D32DB725.3F57B%cpignata@cisco.com> <CA+RyBmW+qonpScnLOfsGorayCvsS0vrFcn+o5nPvOqCOv9Jc3g@mail.gmail.com>
In-Reply-To: <CA+RyBmW+qonpScnLOfsGorayCvsS0vrFcn+o5nPvOqCOv9Jc3g@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=ecitele.com;
x-originating-ip: [147.234.241.1]
x-ms-office365-filtering-correlation-id: 577dfd5e-db9e-4e05-04d4-08d362071a13
x-microsoft-exchange-diagnostics: 1; AM3PR03MB0776; 5:O7B6Alj63/+flhxc+yVurfVCZQSxkAbWUw99rj+vGHx3WvJilwaqLlbzSQsjerZMFAqQvRoeF8FDS0lGi3fdvJ1D3DTrIRMl6d9b69BbYlShe8JwErCjTJ8X9O8qYBl5iOR0dBhuIcVdYyPtu++CkQ==; 24:uvfc7XtnwFf3+lnq2RCGzSlto5i/Y1pdOBb82gSO588005CvfDoO1vcg618c6h7TyfG+zjIuKyQoVTGyqaJWYr8hUjD9DTzLIVC4D/pPZBM=
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:AM3PR03MB0776;
x-microsoft-antispam-prvs: <AM3PR03MB0776EE89262589CF3AA0697B9D940@AM3PR03MB0776.eurprd03.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(95692535739014);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(5005006)(8121501046)(10201501046)(3002001); SRVR:AM3PR03MB0776; BCL:0; PCL:0; RULEID:; SRVR:AM3PR03MB0776; 
x-forefront-prvs: 09090B6B69
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(377454003)(252514010)(13464003)(24454002)(52034003)(5002640100001)(2900100001)(2950100001)(74316001)(19609705001)(87936001)(5250100002)(19580395003)(164054004)(110136002)(15975445007)(9686002)(189998001)(5008740100001)(5004730100002)(76576001)(66066001)(586003)(11100500001)(1220700001)(1096002)(6116002)(3846002)(102836003)(790700001)(93886004)(92566002)(16236675004)(19617315012)(345774005)(19580405001)(50986999)(54356999)(33656002)(5003600100002)(86362001)(106116001)(3660700001)(19625215002)(4326007)(76176999)(3280700002)(19300405004)(81166005)(2906002); DIR:OUT; SFP:1102; SCL:1; SRVR:AM3PR03MB0776; H:AM3PR03MB0775.eurprd03.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; 
spamdiagnosticoutput: 1:23
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_AM3PR03MB0775C55E5AD3247F373007139D940AM3PR03MB0775eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ecitele.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Apr 2016 12:45:02.8150 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2c514a61-08de-4519-b4c0-921fef62c42a
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM3PR03MB0776
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/BAN_yAZPQCndqb13b0hae28HX0M>
Cc: "mpls@ietf.org" <mpls@ietf.org>, "bier@ietf.org" <bier@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Carlos Pignataro \(cpignata\)" <cpignata@cisco.com>, Xiaohu Xu <xuxiaohu@huawei.com>, "Dr. Tony Przygienda" <tonysietf@gmail.com>
Subject: Re: [sfc] [mpls] The first nibble issue associated with MPLS encapsulation
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Apr 2016 12:45:11 -0000

--_000_AM3PR03MB0775C55E5AD3247F373007139D940AM3PR03MB0775eurp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

R3JlZywgYW5kIGFsbCwNCkZyb20gbXkgZXhwZXJpZW5jZSAoZnJvbSB0aGUgZGF5cyBsb25nIHBh
c3TimLopLCB0aGUgSUVURiBoYXMgYmVlbiBhbHdheXMgdHJlYXRpbmcgdGhlIGZpcnN0IG5pYmJs
ZSBqdXN0IGFmdGVyIHRoZSBib3R0b20gb2YgdGhlIGxhYmVsIHN0YWNrIGFzIGJlaW5nIG1hbmFn
ZWQgdmlhIHRoZSBJUCBWZXJzaW9uIE51bWJlcnMgcmVnaXN0cnk8aHR0cDovL3d3dy5pYW5hLm9y
Zy9hc3NpZ25tZW50cy92ZXJzaW9uLW51bWJlcnMvdmVyc2lvbi1udW1iZXJzLnhodG1sPiDigJMg
YW5kIHRoaXMgYmVjYXVzZSwgYXMgcGVyIFJGQyAzMDMyPGh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcv
aHRtbC9yZmMzMDMyPiwg4oCcdGhlIG5ldHdvcmsgIGxheWVyIHBhY2tldCBpbW1lZGlhdGVseSBm
b2xsb3dzIHRoZSBsYWJlbCBzdGFjayBlbnRyeSB3aGljaCBoYXMgdGhlICBTIGJpdCBzZXTigJ0u
DQoNClJGQyA0Mzg1PGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL3JmYzQzODUvP2lu
Y2x1ZGVfdGV4dD0xPiBoYXMgcmV1c2VkIHRoZSB2YWx1ZXMgdGhhdCBoYXZlIGJlZW4gZGVmaW5l
ZCBhcyDigJxSZXNlcnZlZOKAnSBpbiB0aGlzIHJlZ2lzdHJ5Lg0KQnV0LCBBRkFJSywgYXR0ZW1w
dHMgdG8gcmV1c2Ugc29tZSBzdGFsZSB2YWx1ZXMgKGUuZy4sIFBJUDxodHRwczovL3Rvb2xzLmll
dGYub3JnL2h0bWwvcmZjMTYyMT4pIGhhdmUgYmVlbiByZWplY3RlZCBvdXQtb2YtaGFuZC4NCg0K
TXkgMmMsDQpTYXNoYQ0KDQpPZmZpY2U6ICs5NzItMzkyNjYzMDINCkNlbGw6ICAgICAgKzk3Mi01
NDkyNjYzMDINCkVtYWlsOiAgIEFsZXhhbmRlci5WYWluc2h0ZWluQGVjaXRlbGUuY29tDQoNCkZy
b206IEdyZWcgTWlyc2t5IFttYWlsdG86Z3JlZ2ltaXJza3lAZ21haWwuY29tXQ0KU2VudDogU2F0
dXJkYXksIEFwcmlsIDA5LCAyMDE2IDI6MDYgQU0NClRvOiBDYXJsb3MgUGlnbmF0YXJvIChjcGln
bmF0YSkNCkNjOiBzZmNAaWV0Zi5vcmc7IEFsZXhhbmRlciBWYWluc2h0ZWluOyBiaWVyQGlldGYu
b3JnOyBEci4gVG9ueSBQcnp5Z2llbmRhOyBYaWFvaHUgWHU7IG1wbHNAaWV0Zi5vcmcNClN1Ympl
Y3Q6IFJlOiBbbXBsc10gVGhlIGZpcnN0IG5pYmJsZSBpc3N1ZSBhc3NvY2lhdGVkIHdpdGggTVBM
UyBlbmNhcHN1bGF0aW9uDQoNCg0KSGkgQ2FybG9zLA0KdGhhbmsgeW91IGZvciB0aGUgY2xhcmlm
aWNhdGlvbi4gU2hvdWxkIHdlIHRoaW5rIGFib3V0IGVzdGFibGlzaGluZyB0aGUgcmVnaXN0cnkg
dGhhbj8NClJlZ2FyZHMsIEdyZWcNCk9uIEFwciA4LCAyMDE2IDU6MzggUE0sICJDYXJsb3MgUGln
bmF0YXJvIChjcGlnbmF0YSkiIDxjcGlnbmF0YUBjaXNjby5jb208bWFpbHRvOmNwaWduYXRhQGNp
c2NvLmNvbT4+IHdyb3RlOg0KR3JlZywNCg0KTXkgcG9pbnQsIHNvcnJ5IGlmIEkgd2FzIG5vdCBj
bGVhciwgd2FzIHRoYXQgdGhlcmUgaXMgbm8gc3VjaCBhIHRoaW5nIGFzIGEg4oCYZmlyc3Qgbmli
YmxlIHJlZ2lzdHJ54oCZLg0KDQpJbnN0ZWFkLCBSRkMgNDkyOCwgU2VjdGlvbiA1LCBhdCBodHRw
czovL3Rvb2xzLmlldGYub3JnL2h0bWwvcmZjNDkyOCNzZWN0aW9uLTUsIHNheXM6DQoNCiAgIElB
TkEgaGFzIG1hcmtlZCB0aGUgdmFsdWUgMHgxIGluIHRoZSBJUCBwcm90b2NvbCB2ZXJzaW9uIG51
bWJlciBzcGFjZQ0KICAgYXMgIlJlc2VydmVkIiBhbmQgcGxhY2VkIGEgcmVmZXJlbmNlIHRvIHRo
aXMgZG9jdW1lbnQgdG8gYm90aCB2YWx1ZXMNCiAgIDB4MCBhbmQgMHgxLg0KDQpBbmQgdGhhdCBp
cyByZWZsZWN0ZWQgYXMgaHR0cDovL3d3dy5pYW5hLm9yZy9hc3NpZ25tZW50cy92ZXJzaW9uLW51
bWJlcnMvdmVyc2lvbi1udW1iZXJzLnhodG1sI3ZlcnNpb24tbnVtYmVycy0xDQoNClRoZSBJQU5B
IHRleHQgaW4gNDkyOCBpcyBhZGRpdGlvbmFsbHkgZm9sbG93ZWQgYnkgYSBkaXNjbGFpbWVyOg0K
DQogICBOb3RlIHRoYXQgdGhpcyBkb2N1bWVudCBkb2VzIG5vdCBpbiBhbnkgd2F5IGNoYW5nZSB0
aGUgcG9saWNpZXMNCiAgIHJlZ2FyZGluZyB0aGUgYWxsb2NhdGlvbiBvZiB2ZXJzaW9uIG51bWJl
cnMsIGluY2x1ZGluZyB0aGUgcG9zc2libGUNCiAgIHVzZSBvZiB0aGUgcmVzZXJ2ZWQgbnVtYmVy
cyBmb3Igc29tZSBmdXR1cmUgcHVycG9zZS4NCg0KRnVydGhlciwgUkZDIDQzODUgZG9lcyBub3Qg
c3BlY2lmeSB0aGUg4oCYZmlyc3QgbmliYmxl4oCZIGFzIGEgZmllbGQuIEluc3RlYWQsIGl0IGRl
cGljdHMgdGhlIGFjdHVhbCBiaW5hcnkgdmFsdWVzIGZvciB0aGUgZGlmZmVyZW50IENXIGZvcm1h
dHMuIEluIG90aGVyIHdvcmRzLCBpdCB0YWtlcyB0aGUgdmFsdWVzIGZyb20gdGhlIElQIHByb3Rv
Y29sIHZlcnNpb24gbnVtYmVyIGFuZCBub3QgYXMgYSBuZXcgQ1cgRmllbGQuDQoNClRoYW5rcywN
Cg0K4oCUIENhcmxvcy4NCg0KUFM6IFNhc2hhLCBxdWljayB0eXBvLCBzLzExMTkvMTE5MC87DQoN
CkZyb206IEdyZWcgTWlyc2t5IDxncmVnaW1pcnNreUBnbWFpbC5jb208bWFpbHRvOmdyZWdpbWly
c2t5QGdtYWlsLmNvbT4+DQpEYXRlOiBGcmlkYXksIEFwcmlsIDgsIDIwMTYgYXQgNzoyOCBQTQ0K
VG86IEFsZXhhbmRlciBWYWluc2h0ZWluIDxBbGV4YW5kZXIuVmFpbnNodGVpbkBlY2l0ZWxlLmNv
bTxtYWlsdG86QWxleGFuZGVyLlZhaW5zaHRlaW5AZWNpdGVsZS5jb20+Pg0KQ2M6ICJzZmNAaWV0
Zi5vcmc8bWFpbHRvOnNmY0BpZXRmLm9yZz4iIDxzZmNAaWV0Zi5vcmc8bWFpbHRvOnNmY0BpZXRm
Lm9yZz4+LCAiYmllckBpZXRmLm9yZzxtYWlsdG86YmllckBpZXRmLm9yZz4iIDxiaWVyQGlldGYu
b3JnPG1haWx0bzpiaWVyQGlldGYub3JnPj4sICJEci4gVG9ueSBQcnp5Z2llbmRhIiA8dG9ueXNp
ZXRmQGdtYWlsLmNvbTxtYWlsdG86dG9ueXNpZXRmQGdtYWlsLmNvbT4+LCAibXBsc0BpZXRmLm9y
ZzxtYWlsdG86bXBsc0BpZXRmLm9yZz4iIDxtcGxzQGlldGYub3JnPG1haWx0bzptcGxzQGlldGYu
b3JnPj4sIFhpYW9odSBYdSA8eHV4aWFvaHVAaHVhd2VpLmNvbTxtYWlsdG86eHV4aWFvaHVAaHVh
d2VpLmNvbT4+LCBDYXJsb3MgUGlnbmF0YXJvIDxjcGlnbmF0YUBjaXNjby5jb208bWFpbHRvOmNw
aWduYXRhQGNpc2NvLmNvbT4+DQpTdWJqZWN0OiBSZTogW21wbHNdIFRoZSBmaXJzdCBuaWJibGUg
aXNzdWUgYXNzb2NpYXRlZCB3aXRoIE1QTFMgZW5jYXBzdWxhdGlvbg0KDQoNCkhpIFNhc2hhLA0K
dGhhbmsgeW91IGZvciBwb2ludGluZyB0byBleGlzdGluZyBJQU5BIGFsbG9jYXRpb24sIHRob3Vn
aCBzdGFsZS4gSSB3b25kZXIgaWYgdGhlcmUgaXMgdGhlIHJlZ2lzdHJ5IGZvciB0aGUgZmlyc3Qg
bmliYmxlLiBXZSwgVG9ueSBhbmQgSSwgaGFkIGRpc2N1c3NlZCB0aGUgd2F5IHRoZSBmaXJzdCBu
aWJibGUgc3BhY2UgbWFuYWdlZC4gSWYgdGhlcmUgYWxyZWFkeSBpcyB0aGUgcmVnaXN0cnksIGNv
dWxkIHlvdSBwbGVhc2UgcG9pbnQgbWUgdG8gaXQuDQpSZWdhcmRzLCBHcmVnDQpPbiBBcHIgOCwg
MjAxNiAyOjMxIFBNLCAiQWxleGFuZGVyIFZhaW5zaHRlaW4iIDxBbGV4YW5kZXIuVmFpbnNodGVp
bkBlY2l0ZWxlLmNvbTxtYWlsdG86QWxleGFuZGVyLlZhaW5zaHRlaW5AZWNpdGVsZS5jb20+PiB3
cm90ZToNCg0KQ2FybG9zIGFuZCBhbGwsDQoNCkp1c3QgZm9yIHRoZSByZWZlcmVuY2UsIElBTkEg
aGFzIGRlZmluZWQgdmVyc2lvbiA1ICgwMTAxKSBoYXMgYXNzaWduZWQgdG8gU1QgcHJvdG9jb2wg
YW5kIHJlZmVycyB0byBSRkMgMTExOS4gVGhlIGxhdHRlciBoYXMgYmVlbiBvYnNvbGV0ZWQgYnkg
UkZDIDE4MTksIGJ1dCB0aGUgSUFOQQ0KDQphc3NpZ25tZW50IHN0aWxsIGhvbGRzLg0KDQoNCg0K
SXMgdGhlcmUsIGp1c3QgaW4gY2FzZSwgYW55IHJlbGF0aW9uc2hpcCBiZXR3ZWVuIEJJRVIgYW5k
IFNUPw0KDQpUaHVtYiB0eXBlZCBvbiBteSBjZWxscGhvbmUNCg0KUmVnYXJkcywNCg0KU2FzaGEN
Cg0KDQoNCi0tLS0tLS0tIE9yaWdpbmFsIE1lc3NhZ2UgLS0tLS0tLS0NCg0KRnJvbTogIkNhcmxv
cyBQaWduYXRhcm8gKGNwaWduYXRhKSIgPGNwaWduYXRhQGNpc2NvLmNvbTxtYWlsdG86Y3BpZ25h
dGFAY2lzY28uY29tPj4NCg0KRGF0ZTogRnJpLCBBcHJpbCAwOCwgMjAxNiA5OjI1IFBNICswMzAw
DQoNClRvOiBYaWFvaHUgWHUgPHh1eGlhb2h1QGh1YXdlaS5jb208bWFpbHRvOnh1eGlhb2h1QGh1
YXdlaS5jb20+Pg0KDQpDQzogbXBsc0BpZXRmLm9yZzxtYWlsdG86bXBsc0BpZXRmLm9yZz4sIGJp
ZXJAaWV0Zi5vcmc8bWFpbHRvOmJpZXJAaWV0Zi5vcmc+LCBzZmNAaWV0Zi5vcmc8bWFpbHRvOnNm
Y0BpZXRmLm9yZz4sICJEci4gVG9ueSBQcnp5Z2llbmRhIiA8dG9ueXNpZXRmQGdtYWlsLmNvbTxt
YWlsdG86dG9ueXNpZXRmQGdtYWlsLmNvbT4+DQoNClN1YmplY3Q6IFJlOiBbbXBsc10gVGhlIGZp
cnN0IG5pYmJsZSBpc3N1ZSBhc3NvY2lhdGVkIHdpdGggTVBMUyBlbmNhcHN1bGF0aW9uDQoNCg0K
WGlhb2h1LCBUb255LA0KDQpQbGVhc2Ugc2VlIGlubGluZS4NCg0KT24gQXByIDcsIDIwMTYsIGF0
IDI6MzkgUE0sIFh1eGlhb2h1IDx4dXhpYW9odUBodWF3ZWkuY29tPG1haWx0bzp4dXhpYW9odUBo
dWF3ZWkuY29tPj4gd3JvdGU6DQoNCkFzIGZvciB0aGUgZmlyc3QgbmliYmxlIGlzc3VlLCB3aWxs
IGl0IHZpb2xhdGUgdGhlIGxheWVyaW5nIHByaW5jaXBsZSBvZiBuZXR3b3JrIHByb3RvY29sIHN0
YWNrcyBpZiB0aGUgZmlyc3QgbmliYmxlIG9mIGFueSBuZXcgZW5jYXBzdWxhdGlvbiBoZWFkZXIg
KHdoaWNoIGNvdWxkIGJlIGFuIE1QTFMgcGF5bG9hZCkgaXMgdXNlZCBhcyB0aGUgIk1QTFMgcGF5
bG9hZCB0eXBlIiBmaWVsZD8NCg0KUmVhZGluZyBkcmFmdC13YW5nLWJpZXItZXRoZXJuZXQtMDEs
IFNlY3Rpb24gMywgdGhlIOKAnGZpcnN0IG5pYmJsZeKAnSBpcyBfbm90XyB1c2VkIGFzIGFuIOKA
nE1QTFMgcGF5bG9hZCB0eXBl4oCdLiBJbnN0ZWFkLCB0aGUgdGV4dCBkZXNjcmliZXMgYW4gYW50
aS1hbGlhc2luZyBtZWNoYW5pc20sIG11Y2ggbGlrZSBSRkMgNDkyOC4NCg0KVGhlIHJlbGV2YW50
IHRleHQgaXM6DQogICAgIEZpcnN0IG5pYmJsZTogVGhlIGZpcnN0IDQgYml0cyBvZiB0aGUgaGVh
ZGVyIGFyZSBzZXQgdG8gMDEwMTsgdGhpcw0KICAgZW5zdXJlcyB0aGF0IHRoZSBCSUVSIGhlYWRl
ciB3aWxsIG5vdCBiZSBjb25mdXNlZCB3aXRoIGFuIElQIGhlYWRlcg0KICAgb3Igd2l0aCB0aGUg
aGVhZGVyIG9mIGEgcHNldWRvd2lyZSBwYWNrZXQuDQoNCldoaWNoIHNheXMg4oCc4oCmIHdpbGwg
bm90IGJlIGNvbmZ1c2VkIHdpdGgg4oCmIg0KDQoNCndvdWxkbid0IGl0ICBiZSBtb3JlIHJlYXNv
bmFibGUgYW5kIHN1c3RhaW5hYmxlIHRvIGZpeCB0aGUgcHJvYmxlbSAoaS5lLiwgdGhlIGxhY2sg
b2YgYSBwcm90b2NvbCBmaWVsZCBpbiB0aGUgTVBMUyBoZWFkZXIpIGJ5IHRoZSBNUExTIGhlYWRl
ciBpdHNlbGY/DQoNCg0KDQpXaG8gc2F5cyBpdCBpcyBhICpwcm9ibGVtKj8gVGhlcmXigJlzIG5v
IOKAnGZpeGluZ+KAnSBuZWVkZWQuDQoNCkJ5IHRoZSB3YXksIHNpbmNlIGl0J3MgY2xhaW1lZCB0
aGF0IHRoZSBOU0ggaXMgdHJhbnNwb3J0LWluZGVwZW5kYW50LCBpdCBtZWFucyB0aGUgTlNIIHNo
b3VsZCBiZSBhYmxlIHRvIGJlIHRyYW5zcG9ydGVkIG92ZXIgTVBMUy4gSG93ZXZlciwgaXQgc2Vl
bXMgdGhhdCB0aGUgZmlyc3QgbmliYmxlIGlzc3VlIGhhcyBub3QgYmUgY29uc2lkZXJlZCBpbiB0
aGUgY3VycmVudCBOU0ggZHJhZnQuIEFzIGEgcmVzdWx0LCB3aGVuIGVuY2Fwc3VsYXRpbmcgTlNI
IG92ZXIgTVBMUywgdGhlIE5TSCBtYXkgYmUgbWlzLWludGVycHJldGVkIGFzIElQIGhlYWRlci4N
Cg0KDQoNCg0KVGhlcmUgc2VlbXMgdG8gYmUgc29tZSBtYXNzaXZlIGNvbmZ1c2lvbiBvbiB0aGlz
IHBhcmFncmFwaCwgb24gYSBudW1iZXIgb2YgbGV2ZWxzLiBGaXJzdCwgTlNIIGlzIG5vdCDigJxj
bGFpbWVkIHRvIGJl4oCdIHRyYW5zcG9ydC1pbmRlcGVuZGVudC4gSXQgaXMgYnkgY2hhcnRlciBh
bmQgYnkgZGVzaWduLiBTZWNvbmQsIHRoZSBOU0ggZHJhZnQgZG9lcyBub3QgZXZlbiBpbmNsdWRl
IHRoZSB0ZXJtIOKAnE1QTFPigJ0sIGJlY2F1c2UgaXQgZG9lcyBub3QgZGVmaW5lIHRyYW5zcG9y
dHMuIFRoZSBTRkMgRW5jYXBzdWxhdGlvbiBjYW4gYmUgdXNlZCBpbiBhIHRyYW5zcG9ydC1hZ25v
c3RpYyB3YXkuDQoNCk9uZSBtb3JlIGNvbW1lbnQgYmVsb3cuDQoNCg0KQmVzdCByZWdhcmRzLA0K
WGlhb2h1DQoNCg0KDQpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0K5Y+R5Lu25Lq6
OiBCSUVSIFtiaWVyLWJvdW5jZXNAaWV0Zi5vcmc8bWFpbHRvOmJpZXItYm91bmNlc0BpZXRmLm9y
Zz5dIOS7o+ihqCBUb255IFByenlnaWVuZGEgW3RvbnlzaWV0ZkBnbWFpbC5jb208bWFpbHRvOnRv
bnlzaWV0ZkBnbWFpbC5jb20+XQ0K5Y+R6YCB5pe26Ze0OiAyMDE25bm0NOaciDXml6UgMjI6MzYN
CuaUtuS7tuS6ujogYmllckBpZXRmLm9yZzxtYWlsdG86YmllckBpZXRmLm9yZz4NCuS4u+mimDog
W0JpZXJdIGNvbW1lbnRzIG9uIGRyYWZ0LXdhbmctYmllci1ldGhlcm5ldC0wMQ0KYWZ0ZXIgcmVh
ZGluZw0KDQphKSBmaXJzdCBuaWJibGU6IHJlZmVyIHRvIE1QTFMgZW5jYXBzIGFzICJ0aGUgc2Ft
ZSB2YWx1ZSIgdG8ga2VlcCBpbiBzeW5jDQoNCk9uZSBjb21tZW50IHJlZ2FyZGluZyB0aGUg4oCc
Rmlyc3QgbmliYmxl4oCdIHRleHQgYXQgZHJhZnQtaWV0Zi1iaWVyLW1wbHMtZW5jYXBzdWxhdGlv
bi0wMw0KDQpTaW5jZSB0aGUgZnVuY3Rpb24gb2YgdGhlIGZpcnN0IG5pYmJsZSBpcyB0byBwcmV2
ZW50IGFsaWFzaW5nIHdpdGggYW4gSVAgcGFja2V0LCBpbiBvcmRlciBmb3IgUkZDIDQ5MjggdG8g
c3BlY2lmeSB2YWx1ZXMgb2YgMHgwIGFuZCAweDEgZm9yIHRoZSBGaXJzdCBOaWJibGUsIGl0IGhh
ZCB0byDigJxSZXNlcnZl4oCdIElQIHByb3RvY29sIHZlcnNpb25zIG9mIDAgYW5kIDEsIHJlZmVy
ZW5jaW5nIHRoYXQgUkZDIChzZWUgaHR0cHM6Ly90b29scy5pZXRmLm9yZy9odG1sL3JmYzQ5Mjgj
c2VjdGlvbi01KS4NCg0KSXMgdGhlIGludGVudCB0byByZS1hc3NpZ24gSVB2NSBhdCBodHRwOi8v
d3d3LmlhbmEub3JnL2Fzc2lnbm1lbnRzL3ZlcnNpb24tbnVtYmVycy8gPw0KDQpOb3RlIHRoYXQg
UkZDIDQ5Mjggc2F5cyDigJxSRVFVSVJFROKAnSBhdDoNCg0KICAgSXQgaXMgUkVRVUlSRUQsIGhv
d2V2ZXIsIHRoYXQgYXBwbGljYXRpb25zIGRlcGVuZCB1cG9uIGluLW9yZGVyDQogICBwYWNrZXQg
ZGVsaXZlcnkgcmVzdHJpY3QgdGhlIGZpcnN0IG5pYmJsZSB2YWx1ZXMgdG8gMHgwIGFuZCAweDEu
DQoNClRoYW5rcywNCg0K4oCUIENhcmxvcy4NCg0KDQoNCmIpIHJlZmVyIHRvIGFsbCBvdGhlciBw
b3NzaWJsZSBmaWVsZHMgdG8gTVBMUyBlbmNhcHMgdG8ga2VlcCBpbiBzeW5jIHdoZW4gZGVzY3Jp
YmluZyBpbnN0ZWFkIG9mIHJlcGVhdGluZw0KYykgeW91IG5lZWQgdG8gZGVzY3JpYmUgd2hpY2gg
a2luZCBvZiBldGhlciBNQUNzIGFyZSBhbGxvd2VkLCBlc3BlY2lhbGx5IG9uIGJyb2FkY2FzdCBt
ZWRpYSwgaS5lLiBpcyBpdCBhbHdheXMgcDJwIG9yIGNhbiB5b3UgdGFrZSBhZHZhbnRhZ2Ugb2Yg
dGhlIGJyb2FkY2FzdCA/DQpkKSBGaWd1cmUgNDogdXNlIHRoZSBhcmNoaXRlY3R1cmUvTVBMUyBl
bmNvZGluZyBmb3IgdGhlIGxlbmd0aCwgZG9uJ3QgaW52ZW50IGEgbmV3IG9uZQ0KZSkgd2hvIHdp
bGwgb2J0YWluIGEgbmV3IGV0aGVyIHR5cGUgZnJvbSBJRUVFPyBBcyBmYXIgSSB1bmRlcnN0YW5k
LCBub3QgYSB0cml2aWFsIHByb2Nlc3MgYWxiZWl0IHdlIGhhdmUgc2V2ZXJhbCBsaWFpc29ucyB3
aXRoIElFRUUNCg0KLS0NCldl4oCZdmUgaGVhcmQgdGhhdCBhIG1pbGxpb24gbW9ua2V5cyBhdCBh
IG1pbGxpb24ga2V5Ym9hcmRzIGNvdWxkIHByb2R1Y2UgdGhlIGNvbXBsZXRlIHdvcmtzIG9mIFNo
YWtlc3BlYXJlOyBub3csIHRoYW5rcyB0byB0aGUgSW50ZXJuZXQsIHdlIGtub3cgdGhhdCBpcyBu
b3QgdHJ1ZS4NCuKAlFJvYmVydCBXaWxlbnNreQ0KX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX18NCm1wbHMgbWFpbGluZyBsaXN0DQptcGxzQGlldGYub3JnPG1h
aWx0bzptcGxzQGlldGYub3JnPg0KaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5m
by9tcGxzDQoNCg0KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X18NCm1wbHMgbWFpbGluZyBsaXN0DQptcGxzQGlldGYub3JnPG1haWx0bzptcGxzQGlldGYub3Jn
Pg0KaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9tcGxzDQo=

--_000_AM3PR03MB0775C55E5AD3247F373007139D940AM3PR03MB0775eurp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_AM3PR03MB0775C55E5AD3247F373007139D940AM3PR03MB0775eurp_--


From nobody Tue Apr 12 11:50:15 2016
Return-Path: <trac+sfc@tools.ietf.org>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D2F312DF09 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 11:50:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.896
X-Spam-Level: 
X-Spam-Status: No, score=-7.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.996] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4X-nJeNHawYM for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 11:50:12 -0700 (PDT)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:123a::1:2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 53D8912DEFD for <sfc@ietf.org>; Tue, 12 Apr 2016 11:50:12 -0700 (PDT)
Received: from localhost ([::1]:36293 helo=zinfandel.tools.ietf.org) by zinfandel.tools.ietf.org with esmtp (Exim 4.82_1-5b7a7c0-XX) (envelope-from <trac+sfc@tools.ietf.org>) id 1aq3O8-0007Pu-3K; Tue, 12 Apr 2016 11:50:12 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "sfc issue tracker" <trac+sfc@tools.ietf.org>
X-Trac-Version: 0.12.5
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.5, by Edgewall Software
To: draft-ietf-sfc-nsh@tools.ietf.org, paulq@cisco.com
X-Trac-Project: sfc
Date: Tue, 12 Apr 2016 18:50:12 -0000
X-URL: https://tools.ietf.org/sfc/
X-Trac-Ticket-URL: https://trac.tools.ietf.org/wg/sfc/trac/ticket/19#comment:1
Message-ID: <082.7d97c9f6976fc689f2b380a40263328d@tools.ietf.org>
References: <067.cab2ac7351c39145b242787570b38828@tools.ietf.org>
X-Trac-Ticket-ID: 19
In-Reply-To: <067.cab2ac7351c39145b242787570b38828@tools.ietf.org>
X-SA-Exim-Connect-IP: ::1
X-SA-Exim-Rcpt-To: draft-ietf-sfc-nsh@tools.ietf.org, paulq@cisco.com, sfc@ietf.org
X-SA-Exim-Mail-From: trac+sfc@tools.ietf.org
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
Resent-To: draft-ietf-sfc-nsh@ietf.org
Resent-Message-Id: <20160412185012.53D8912DEFD@ietfa.amsl.com>
Resent-Date: Tue, 12 Apr 2016 11:50:12 -0700 (PDT)
Resent-From: trac+sfc@tools.ietf.org
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/_B5HRwoH1WJpoL5A8Tm1f3eKOzE>
Cc: sfc@ietf.org
Subject: Re: [sfc] #19 (nsh): Mandatory context headers
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Apr 2016 18:50:14 -0000

#19: Mandatory context headers

Changes (by paulq@cisco.com):

 * status:  new => closed
 * resolution:   => wontfix


Comment:

 This was discussed on list, no consensus for change.  Will leave as is.

-- 
-------------------------------------+-------------------------------------
 Reporter:                           |       Owner:  draft-ietf-sfc-
  mohamed.boucadair@orange.com       |  nsh@tools.ietf.org
     Type:  defect                   |      Status:  closed
 Priority:  major                    |   Milestone:
Component:  nsh                      |     Version:
 Severity:  -                        |  Resolution:  wontfix
 Keywords:                           |
-------------------------------------+-------------------------------------

Ticket URL: <https://trac.tools.ietf.org/wg/sfc/trac/ticket/19#comment:1>
sfc <https://tools.ietf.org/sfc/>


From nobody Tue Apr 12 11:52:47 2016
Return-Path: <trac+sfc@tools.ietf.org>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E0AFA12E08A for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 11:52:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.896
X-Spam-Level: 
X-Spam-Status: No, score=-7.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ocwz-sIGZD6h for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 11:52:45 -0700 (PDT)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:123a::1:2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D450212E02A for <sfc@ietf.org>; Tue, 12 Apr 2016 11:52:45 -0700 (PDT)
Received: from localhost ([::1]:36462 helo=zinfandel.tools.ietf.org) by zinfandel.tools.ietf.org with esmtp (Exim 4.82_1-5b7a7c0-XX) (envelope-from <trac+sfc@tools.ietf.org>) id 1aq3Qb-0008AG-LN; Tue, 12 Apr 2016 11:52:45 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "sfc issue tracker" <trac+sfc@tools.ietf.org>
X-Trac-Version: 0.12.5
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.5, by Edgewall Software
To: draft-ietf-sfc-nsh@tools.ietf.org, paulq@cisco.com
X-Trac-Project: sfc
Date: Tue, 12 Apr 2016 18:52:45 -0000
X-URL: https://tools.ietf.org/sfc/
X-Trac-Ticket-URL: https://trac.tools.ietf.org/wg/sfc/trac/ticket/18#comment:1
Message-ID: <082.049e70547d966ac79d10e9bc1b371b0b@tools.ietf.org>
References: <067.9df4155255e7f9166fd94d4f85865aa0@tools.ietf.org>
X-Trac-Ticket-ID: 18
In-Reply-To: <067.9df4155255e7f9166fd94d4f85865aa0@tools.ietf.org>
X-SA-Exim-Connect-IP: ::1
X-SA-Exim-Rcpt-To: draft-ietf-sfc-nsh@tools.ietf.org, paulq@cisco.com, sfc@ietf.org
X-SA-Exim-Mail-From: trac+sfc@tools.ietf.org
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
Resent-To: draft-ietf-sfc-nsh@ietf.org
Resent-Message-Id: <20160412185245.D450212E02A@ietfa.amsl.com>
Resent-Date: Tue, 12 Apr 2016 11:52:45 -0700 (PDT)
Resent-From: trac+sfc@tools.ietf.org
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/-Y_ghI2qxundH2yyRe2KbuBQS90>
Cc: sfc@ietf.org
Subject: Re: [sfc] #18 (nsh): Mandatory to implement MD Type
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Apr 2016 18:52:47 -0000

#18: Mandatory to implement MD Type

Changes (by paulq@cisco.com):

 * status:  new => closed
 * resolution:   => wontfix


Comment:

 Discussed on list -- changes to draft to make type support more clear.  No
 consensus to change key word.

-- 
-------------------------------------+-------------------------------------
 Reporter:                           |       Owner:  draft-ietf-sfc-
  mohamed.boucadair@orange.com       |  nsh@tools.ietf.org
     Type:  defect                   |      Status:  closed
 Priority:  major                    |   Milestone:
Component:  nsh                      |     Version:
 Severity:  -                        |  Resolution:  wontfix
 Keywords:                           |
-------------------------------------+-------------------------------------

Ticket URL: <https://trac.tools.ietf.org/wg/sfc/trac/ticket/18#comment:1>
sfc <https://tools.ietf.org/sfc/>


From nobody Tue Apr 12 12:17:00 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5864912E6A9 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 12:16:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m4hfCu_Vl2rT for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 12:16:57 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7F74E12E352 for <sfc@ietf.org>; Tue, 12 Apr 2016 12:16:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=7081; q=dns/txt; s=iport; t=1460488614; x=1461698214; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=m903Ww10hNQSRujtRUyDVvk08LeIt6le5LptjawD6E8=; b=VjNCXpiBIbNSgoyWaEY0TkZQpUXlDdLJgmtf6vmxekCCnG4En7o45+0s +WZMxk+6VqLIXwOIRf+4pDdRMHv9EinaR23XQDIdMb9ZAugvYGw+Fk8qp tiMfAxOc96ozEqt0HTMU5PhcscN+T5MRIhwwnTgFN5cyBr5B6LXCLUSB+ Y=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DrAgCLSA1X/4oNJK1egzdTfQa6YQ6Bd?= =?us-ascii?q?hcLhWwCgTg4FAEBAQEBAQFlJ4RBAQEBAwEBAQEaBgRHCwULAgEGAhIGKgICJws?= =?us-ascii?q?XDgIEDgUOiBIIDpJXnReRdgEBAQEBAQEBAQEBAQEBAQEBAQEBAQ0EBIYhgXWCV?= =?us-ascii?q?oc/K4IrBYdyiymEbQGDI4FmbYgWgWeETohbhiCJBgEeAUODZ2yJB34BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,475,1454976000";  d="asc'?scan'208";a="260639613"
Received: from alln-core-5.cisco.com ([173.36.13.138]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 12 Apr 2016 19:16:53 +0000
Received: from XCH-RTP-017.cisco.com (xch-rtp-017.cisco.com [64.101.220.157]) by alln-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id u3CJGr1U013903 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 12 Apr 2016 19:16:53 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-017.cisco.com (64.101.220.157) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Tue, 12 Apr 2016 15:16:52 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Tue, 12 Apr 2016 15:16:52 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Thomas Narten <narten@us.ibm.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfXjVJMNJL6xkKtVPhZYT1+65+HDNqA
Date: Tue, 12 Apr 2016 19:16:52 +0000
Message-ID: <6EF86774-FF91-4CCC-B885-9ECBBC908E5C@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com>
In-Reply-To: <m3egarz7kh.wl-narten@us.ibm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.150.53.164]
Content-Type: multipart/signed; boundary="Apple-Mail=_B5D39C15-1609-4345-837D-8190F89819D7"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/2huj87MxHf8Z6vq86qs8p_t8K_g>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Apr 2016 19:16:59 -0000

--Apple-Mail=_B5D39C15-1609-4345-837D-8190F89819D7
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Thomas, SFC,

I spent some time in the airplane back from beautiful Buenos Aires, =
re-reading draft-ietf-sfc-nsh-04.txt from top to bottom.

I fully support this document advancing now and being sent to the IESG. =
It realizes the SFC Architecture and squarely fulfills the WG=E2=80=99s =
milestone of:
  Aug 2015 - Submit to IESG Standards Track document specifying the =
generic service function chaining header encapsulation

Plus, frankly, it was quite refreshing to see the presentation at IETF95 =
and the four slides of implementation report and running code.

I do have quite a number of comments and suggestions. None of these are =
totally blocking, but I strongly recommend these are fixed sooner rather =
than later:


Abstract

   This draft describes a Network Service Header (NSH) inserted onto
   encapsulated packets or frames to realize service function paths.
   NSH also provides a mechanism for metadata exchange along the
   instantiated service path.  NSH is the SFC encapsulation as per SFC
   Architecture [SFC-arch]

:s/draft/document/g

Please, no citations in the Abstract. You can write down =E2=80=9CRFC =
7665=E2=80=9D but not =E2=80=9C[RFC 7665]=E2=80=9D.

1.  Requirements Language

Please add that the Terminology from RFC 7665 is used.

2.1.  Definition of Terms

There is a bit of repetition with the terminology in RFC 7665. It might =
be cleaner to just refer to the architecture and only expand definition =
of new terms.

Perhaps define also =E2=80=9CService Plane=E2=80=9D, as it is thoroughly =
used?

3.  Network Service Header

[=E2=80=A6]
   NSH is added by a Service Classifier.  The NSH header is removed by
   the last SFF in the chain or by a SF that consumes the packet.

This sentence should start as =E2=80=9CThe NSH=E2=80=9D (missing =
article).

3.1.  Network Service Header Format

   A NSH is composed of a 4-byte Base Header, a 4-byte Service Path
   Header and Context Headers, as shown in Figure 1 below.

:s/A NSH/An NSH/g


   MD- Type =3D 0x2

Extraneous space.

   2.  Path MTU Discovery [RFC1191]"describes a technique for
       dynamically discovering the maximum transmission unit (MTU) of an
       arbitrary internet path" and can be utilized to ensure the the
       required packet size is used.

Please also add a reference to IPv6 PMTUD.

   +-------------------------------------------------------+
   |  SPI |  SI |  NH                 |   Transport        |
   +-------------------------------------------------------+
   |  10  | 255 |  1.1.1.1            |   VXLAN-gpe        |
   |  10  | 254 |  2.2.2.2            |   nvGRE            |
   |  10  | 251 |  10.1.2.3           |   GRE              |
   |  40  | 251 |  10.1.2.3           |   GRE              |
   |  50  | 200 |  01:23:45:67:89:ab  |   Ethernet         |
   |  15  | 212 |  Null (end of path) |   None             |
   =
+=E2=80=94=E2=80=94=E2=80=94=E2=80=94=E2=80=94=E2=80=94=E2=80=94=E2=80=94=E2=
=80=94=E2=80=94=E2=80=94=E2=80=94=E2=80=94=E2=80=94=E2=80=94=E2=80=94=E2=80=
=94=E2=80=94=E2=80=94=E2=80=94=E2=80=94=E2=80=94=E2=80=94=E2=80=94=E2=80=94=
=E2=80=94=E2=80=94+
[=E2=80=A6]
    +-----------------------------------+
    |  SF  |  NH          |  Transport  |
    +-----------------------------------|
    |  SF2 |  10.1.1.1    |  VXLAN-gpe  |
    |  SF34|  192.168.1.1 |  UDP        |
    |  SF9 |  1.1.1.1     |  GRE        |
    +-----------------------------------+
[=E2=80=A6]
   Examples of mapping for a topology:

   1.  Next SF is located at SFFb with locator 10.1.1.1
       SFFa mapping: SPI=3D10 --> VXLAN-gpe, dst-ip: 10.1.1.1

This comment applies to these tables, as well as to a few other tables, =
and paragraphs throughout:

Please use IP addresses from the TEST-NET / documentation block.

Further, please use IPv6 documentation prefixes.

9.  NSH Encapsulation Examples

The word =E2=80=9CExamples=E2=80=9D speaks to this already, but it might =
be useful to add a sentence about the non-normativeness of this section.

10.  Security Considerations

   Further security considerations are discussed in [nsh-sec].

Perhaps some of these, high-level, could be ported here to strengthen =
the NSH security considerations section?

14.  IANA Considerations

There=E2=80=99s a registry missing for the 3 "Reserved bits=E2=80=9D of =
the MD-Type 2 TLV header:

   Reserved bits: three reserved bit are present for future use.  The
   reserved bits MUST be set to 0x0.


References:

ID-Nits complains about a number of reference and citation errors, which =
should be fixed:

  Checking references for intended status: Proposed Standard

(Missing, Unused).


Net,net, this draft should progress to the IESG now.

Thanks,

=E2=80=94 Carlos.



> On Mar 30, 2016, at 10:48 PM, Thomas Narten <narten@us.ibm.com> wrote:
>=20
> Dear WG:
>=20
> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>=20
> The editors of the NSH document have indicated that they have
> addressed all known comments and that there are no open issues with
> the current version of the document.
>=20
> Substantive comments to the list please, editorial comments can go
> directly to the document editors.
>=20
> We'll also get a brief update from the editors at next week's
> meeting. If there are any remaining issues with the document, raising
> them before the meeting would be especially helpful.
>=20
> For the chairs,
> Thomas
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


--Apple-Mail=_B5D39C15-1609-4345-837D-8190F89819D7
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=A1zH
-----END PGP SIGNATURE-----

--Apple-Mail=_B5D39C15-1609-4345-837D-8190F89819D7--


From nobody Tue Apr 12 12:29:34 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 30F8812DF98 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 12:29:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.916
X-Spam-Level: 
X-Spam-Status: No, score=-2.916 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rtMt7MYtwD_A for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 12:29:24 -0700 (PDT)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id B7FAF12E2C4 for <sfc@ietf.org>; Tue, 12 Apr 2016 12:29:24 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Tue, 12 Apr 2016 15:29:23 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfOeSAX3MU5GUyUYGxYNRxnVJ+GxnOg
Date: Tue, 12 Apr 2016 19:29:23 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F1BBAC@wtl-exchp-2.sandvine.com>
References: <m3egarz7kh.wl-narten@us.ibm.com>
In-Reply-To: <m3egarz7kh.wl-narten@us.ibm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/e4FyPNMtPvAnCIYYYVQEWtvUBWc>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Apr 2016 19:29:28 -0000

The NSH draft indicates that MD-Type 1 MUST be supported, yet the Mandatory=
 Context Header fields are not defined in the document.

Issues with metadata semantics have been raised various times on this list =
and in drafts, and never satisfactorily addressed.
Examples:
https://tools.ietf.org/html/draft-vallamkonda-sfc-metadata-model-00.txt
https://www.ietf.org/archive/id/draft-wang-sfc-md-type-issues-00.txt
https://www.ietf.org/archive/id/draft-penno-sfc-packet-02.txt
https://mailarchive.ietf.org/arch/msg/sfc/2YvBakDgJ_hjY-BGvgWdcTTUDIs


So I don't feel this draft sufficiently explains the MD-Type 1 metadata wel=
l enough to explain how one can make an interoperable implementation.

The draft references metadata allocation drafts, but they have not been ado=
pted yet, so (as I understand it) these "works in progress" cannot support =
draft-ietf-sfc-nsh.


I think it might be acceptable to say that the metadata must be undirection=
ally clonable (or better phrase).
In other words,

   Metadata used in NSH headers must been the condition that
   a transport-layer-stateful Service Function can save away
   metadata values that it has witnessed.  An injected packet can
   therefore be assigned a clone of metadata taken from an earlier
   packet going in the same direction.  For example, a Service Function
   can send a TCP packet using metadata cloned from another TCP packet
   of the same connection and direction.

   Note that the Service Function need not know the meaning of the
   metadata; it just needs to know it is safe to clone in this manner.



Another alternative would be to import one of the metadata allocation schem=
es into this draft as MD-Type 1, and allow IANA to allocate MD-types for ot=
her schemes.



-Dave




-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
Sent: Wednesday, March 30, 2016 10:48 PM
To: sfc@ietf.org
Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Dear WG:

This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
(https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).

The editors of the NSH document have indicated that they have
addressed all known comments and that there are no open issues with
the current version of the document.

Substantive comments to the list please, editorial comments can go
directly to the document editors.

We'll also get a brief update from the editors at next week's
meeting. If there are any remaining issues with the document, raising
them before the meeting would be especially helpful.

For the chairs,
Thomas

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Apr 12 12:41:25 2016
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9683912DB7E for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 12:41:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.621
X-Spam-Level: 
X-Spam-Status: No, score=-2.621 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J5mzSDimkJuE for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 12:41:22 -0700 (PDT)
Received: from hub021-ca-3.exch021.serverdata.net (hub021-ca-3.exch021.serverdata.net [64.78.22.170]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7488A12DAC3 for <sfc@ietf.org>; Tue, 12 Apr 2016 12:41:22 -0700 (PDT)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-3.exch021.domain.local ([10.254.4.36]) with mapi id 14.03.0266.001;  Tue, 12 Apr 2016 12:41:22 -0700
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: Dave Dolson <ddolson@sandvine.com>, Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfOjVJMNJL6xkKtVPhZYT1+65+GxnOggAAIdrA=
Date: Tue, 12 Apr 2016 19:41:21 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B6D77F0B6@MBX021-W3-CA-2.exch021.domain.local>
References: <m3egarz7kh.wl-narten@us.ibm.com> <E8355113905631478EFF04F5AA706E9830F1BBAC@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F1BBAC@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/YOzaGPRpzbnprzctl4KAPD8h3Jk>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Apr 2016 19:41:24 -0000

Dave,

I, too, have raised this issue on the thread.   I think you hit the nail on=
 the head regarding interoperability, which is the primary reason for havin=
g a specification, at all.    My mental model for the type-1 mandatory cont=
ext headers is that of a composite 16-byte locally defined scratchpad.   I =
struggle with having its definition completely undefined in the document an=
d still making it mandatory.   =20

Much of the justification offered has been to be friendly to hardware.   Su=
rely hardware needs to know the exact format and meaning of these 16 bytes.

   Ron




-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
Sent: Tuesday, April 12, 2016 3:29 PM
To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt


The NSH draft indicates that MD-Type 1 MUST be supported, yet the Mandatory=
 Context Header fields are not defined in the document.

Issues with metadata semantics have been raised various times on this list =
and in drafts, and never satisfactorily addressed.
Examples:
https://tools.ietf.org/html/draft-vallamkonda-sfc-metadata-model-00.txt
https://www.ietf.org/archive/id/draft-wang-sfc-md-type-issues-00.txt
https://www.ietf.org/archive/id/draft-penno-sfc-packet-02.txt
https://mailarchive.ietf.org/arch/msg/sfc/2YvBakDgJ_hjY-BGvgWdcTTUDIs


So I don't feel this draft sufficiently explains the MD-Type 1 metadata wel=
l enough to explain how one can make an interoperable implementation.

The draft references metadata allocation drafts, but they have not been ado=
pted yet, so (as I understand it) these "works in progress" cannot support =
draft-ietf-sfc-nsh.


I think it might be acceptable to say that the metadata must be undirection=
ally clonable (or better phrase).
In other words,

   Metadata used in NSH headers must been the condition that
   a transport-layer-stateful Service Function can save away
   metadata values that it has witnessed.  An injected packet can
   therefore be assigned a clone of metadata taken from an earlier
   packet going in the same direction.  For example, a Service Function
   can send a TCP packet using metadata cloned from another TCP packet
   of the same connection and direction.

   Note that the Service Function need not know the meaning of the
   metadata; it just needs to know it is safe to clone in this manner.



Another alternative would be to import one of the metadata allocation schem=
es into this draft as MD-Type 1, and allow IANA to allocate MD-types for ot=
her schemes.



-Dave




-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
Sent: Wednesday, March 30, 2016 10:48 PM
To: sfc@ietf.org
Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Dear WG:

This note begins a WG last call on draft-ietf-sfc-nsh-04.txt (https://datat=
racker.ietf.org/doc/draft-ietf-sfc-nsh/).

The editors of the NSH document have indicated that they have addressed all=
 known comments and that there are no open issues with the current version =
of the document.

Substantive comments to the list please, editorial comments can go directly=
 to the document editors.

We'll also get a brief update from the editors at next week's meeting. If t=
here are any remaining issues with the document, raising them before the me=
eting would be especially helpful.

For the chairs,
Thomas

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Apr 12 14:20:46 2016
Return-Path: <agmalis@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6266512E87C for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 14:20:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wERaDEZVNBZQ for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 14:20:42 -0700 (PDT)
Received: from mail-oi0-x22f.google.com (mail-oi0-x22f.google.com [IPv6:2607:f8b0:4003:c06::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1481B12E13E for <sfc@ietf.org>; Tue, 12 Apr 2016 14:18:39 -0700 (PDT)
Received: by mail-oi0-x22f.google.com with SMTP id w85so38976759oiw.0 for <sfc@ietf.org>; Tue, 12 Apr 2016 14:18:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=JLt1D9rUY9sEid3hsiDBOF16QemX8lftCQROs7v+es8=; b=G8T0hmeGE3hVw7Xg/exqBQx+2dN3wagKyg0a5i9WeEykdDvVG7ZdxRUveojv6HpN73 rU7b4051HZwpJf1JMPxcJxN2YyggcVElKL52fnI/fmWi6lTmZ8CIzNfBHZGaqpVVKpVG U46KP1Z5F9YxzHmAFYaQa2y/Xd5SFMHwJXtPr50pYF3IBVoH95ceUG4YkAc/iYAt87lF PFOTJcz+zX/GQJSWiHyz9HthlOdLzjXpTlpGLekiFCU5u/bPJHlz4RQG2QBYbHs6GjbA mEvlCTawuVJNQk5H72EvfkSxMRptNKiwuTHOnLDnbA9nGB/53Dy/w6revCl9kTM85scE /ecw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=JLt1D9rUY9sEid3hsiDBOF16QemX8lftCQROs7v+es8=; b=E2cJc8K8R0HUSPO/NxlIBc+3jFFQg1XMuVj2M7NUb0gadFKZjxVYVZ2fyHc37DibUA R/ocqGFg8tN8YCCilGnp4Xmu4I9EcOPv0DwnFLIt9UJS2n3qaUhHoa2htrFYkmHNb0C9 2e9QL+pJ2UOiqxYPJMYawEMD0cIPmKFQqY3d0pJBCpN30cNgYgZbgV1mLre9vdFuMJ9V 76SuSp1/amRbNg7Cl8qQc5HhXHJQ06Fpf/DnK4mYj039tbC/K0QDuqgVAJgwU6RSpvg0 sUsRbldf8YRSjCzL0VJYAC1DdKaO2QluvzkB5BEekJrrvOE5hF7flAj2pyW5bOyDh1zw ykqA==
X-Gm-Message-State: AOPr4FU6WJZ063THyyYeKL+Do+BQBtjUz7o3MQfbO/5kimfLuHCmThQAPx6jCp5uxtSZgwxNYLEvWH3rdXMj5Q==
X-Received: by 10.202.197.16 with SMTP id v16mr2552042oif.28.1460495918487; Tue, 12 Apr 2016 14:18:38 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.182.242.35 with HTTP; Tue, 12 Apr 2016 14:18:19 -0700 (PDT)
In-Reply-To: <m3egarz7kh.wl-narten@us.ibm.com>
References: <m3egarz7kh.wl-narten@us.ibm.com>
From: "Andrew G. Malis" <agmalis@gmail.com>
Date: Tue, 12 Apr 2016 17:18:19 -0400
Message-ID: <CAA=duU0jSG7J8ChoHP8zB4SWL2x9_YBHPx3vYovmGRmmpti9Lw@mail.gmail.com>
To: Thomas Narten <narten@us.ibm.com>
Content-Type: multipart/alternative; boundary=001a113e3c466adf000530503442
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/0KfDs32zYfRL5H5ICnAsxkHA4b8>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Apr 2016 21:20:45 -0000

--001a113e3c466adf000530503442
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Thomas,

I do NOT support this WG last call.

Back in November, I reported a bug in section 14.2.3 that was acknowledged
on the WG list, but was never corrected in the text. To repeat my report:

There=E2=80=99s a bug with section 14.2.3. The text should be corrected as =
follows:

OLD:

14.2.3.  TLV Class Registry

   IANA is requested to set up a registry of "TLV Types".  These are 16-
   bit values.  Registry entries are assigned by using the "IETF Review"
   policy defined in RFC 5226 [RFC5226].

NEW:

14.2.3.  TLV Class Registry

   IANA is requested to set up a registry of "TLV Classes".  These are 16-
   bit values.  Registry entries are assigned by using the "IETF Review"
   policy defined in RFC 5226 [RFC5226].


This leaves me curious as to what other acknowledged comments on the draft
may have been also left out of the editing process.

I also note that although the TLV Class registry is being created, there
are no values to be allocated within the registry. I believe that this is
contrary to IANA policy. Or if not, it=E2=80=99s at least questionable.

Section 11 still lists open items for WG resolution.

I also agree with the interoperability concerns raised by others on the
list.

Thanks,
Andy


On Wed, Mar 30, 2016 at 10:48 PM, Thomas Narten <narten@us.ibm.com> wrote:

> Dear WG:
>
> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>
> The editors of the NSH document have indicated that they have
> addressed all known comments and that there are no open issues with
> the current version of the document.
>
> Substantive comments to the list please, editorial comments can go
> directly to the document editors.
>
> We'll also get a brief update from the editors at next week's
> meeting. If there are any remaining issues with the document, raising
> them before the meeting would be especially helpful.
>
> For the chairs,
> Thomas
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>

--001a113e3c466adf000530503442
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Thomas,<div><br></div><div>I do NOT support this WG last c=
all.</div><div><br></div><div>Back in November, I reported a bug in section=
 14.2.3 that was acknowledged on the WG list, but was never corrected in th=
e text. To repeat my report:</div><div><br></div><div><div>There=E2=80=99s =
a bug with section 14.2.3. The text should be corrected as follows:</div><d=
iv><br></div><div>OLD:=C2=A0</div><div><br></div><div>14.2.3.=C2=A0 TLV Cla=
ss Registry</div><div><br></div><div>=C2=A0 =C2=A0IANA is requested to set =
up a registry of &quot;TLV Types&quot;.=C2=A0 These are 16-</div><div>=C2=
=A0 =C2=A0bit values.=C2=A0 Registry entries are assigned by using the &quo=
t;IETF Review&quot;</div><div>=C2=A0 =C2=A0policy defined in RFC 5226 [RFC5=
226].</div><div><br></div><div>NEW:</div><div><br></div><div>14.2.3.=C2=A0 =
TLV Class Registry</div><div><br></div><div>=C2=A0 =C2=A0IANA is requested =
to set up a registry of &quot;TLV Classes&quot;.=C2=A0 These are 16-</div><=
div>=C2=A0 =C2=A0bit values.=C2=A0 Registry entries are assigned by using t=
he &quot;IETF Review&quot;</div><div>=C2=A0 =C2=A0policy defined in RFC 522=
6 [RFC5226].</div><div><br></div><div><br></div></div><div>This leaves me c=
urious as to what other acknowledged comments on the draft may have been al=
so left out of the editing process.</div><div><br></div><div>I also note th=
at although the TLV Class registry is being created, there are no values to=
 be allocated within the registry. I believe that this is contrary to IANA =
policy. Or if not, it=E2=80=99s at least questionable.</div><div><br></div>=
<div>Section 11 still lists open items for WG resolution.</div><div><br></d=
iv><div>I also agree with the interoperability concerns raised by others on=
 the list.</div><div><br></div><div>Thanks,</div><div>Andy</div><div><br></=
div></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Wed,=
 Mar 30, 2016 at 10:48 PM, Thomas Narten <span dir=3D"ltr">&lt;<a href=3D"m=
ailto:narten@us.ibm.com" target=3D"_blank">narten@us.ibm.com</a>&gt;</span>=
 wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bor=
der-left:1px #ccc solid;padding-left:1ex">Dear WG:<br>
<br>
This note begins a WG last call on draft-ietf-sfc-nsh-04.txt<br>
(<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/" rel=3D"no=
referrer" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-sfc=
-nsh/</a>).<br>
<br>
The editors of the NSH document have indicated that they have<br>
addressed all known comments and that there are no open issues with<br>
the current version of the document.<br>
<br>
Substantive comments to the list please, editorial comments can go<br>
directly to the document editors.<br>
<br>
We&#39;ll also get a brief update from the editors at next week&#39;s<br>
meeting. If there are any remaining issues with the document, raising<br>
them before the meeting would be especially helpful.<br>
<br>
For the chairs,<br>
Thomas<br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
</blockquote></div><br></div>

--001a113e3c466adf000530503442--


From nobody Tue Apr 12 18:03:17 2016
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC65512DD76 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 18:03:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iVKd5_tCHMAV for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 18:03:13 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1256D12DD6D for <sfc@ietf.org>; Tue, 12 Apr 2016 18:03:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5088; q=dns/txt; s=iport; t=1460509392; x=1461718992; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=0jGcQNu71+CE44ZaqWAsZbJM1Xe9jzZjd6SMaS44cS0=; b=AMVkq8L7y85LDMsWTAL0FZjniniiYlcY9U+KMkhHnquIfesR8T/xlKV0 6OaVQ15mvFdqQp7KUN3aym9jfZOGVS/Gu54NPazy/ZDjQQcg96j2kECYV WaI1CrLiTAqrHDPwsbE2P2cLqhMmS3xT6JyeJigF10Rdvv3YDQ2vCLM7l A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0D2AQAhmg1X/51dJa1egzdTfQa6YwENg?= =?us-ascii?q?XYXC4VsAoFBOBQBAQEBAQEBZSeEQQEBAQMBAQEBGgoTNAsFBwQCAQgRBAEBAR4?= =?us-ascii?q?JBycLFAkIAgQOBYggCA7CLgEBAQEBAQEBAQEBAQEBAQEBAQEBAREEhiGBdYFUg?= =?us-ascii?q?QKEPQiDJYIrBZgIAYV2iBaBZ4ROiFuGIIkGAR4BAUKCAQMZgUpsAYkGfgEBAQ?=
X-IronPort-AV: E=Sophos;i="5.24,477,1454976000"; d="scan'208";a="260639987"
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 Apr 2016 01:03:12 +0000
Received: from XCH-RCD-009.cisco.com (xch-rcd-009.cisco.com [173.37.102.19]) by rcdn-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id u3D13CXK007063 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 01:03:12 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-009.cisco.com (173.37.102.19) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Tue, 12 Apr 2016 20:03:11 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Tue, 12 Apr 2016 20:03:11 -0500
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: Ron Parker <Ron_Parker@affirmednetworks.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfXi0m0zbDrFUiQMfrqrpCL9J+HIR6AgAADWICAAFnogA==
Date: Wed, 13 Apr 2016 01:03:11 +0000
Message-ID: <14F8542B-9EE1-40DF-8DA2-E6E5048A16A3@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <E8355113905631478EFF04F5AA706E9830F1BBAC@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D77F0B6@MBX021-W3-CA-2.exch021.domain.local>
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B6D77F0B6@MBX021-W3-CA-2.exch021.domain.local>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.247.208]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <29C12F06A616DF4A8E15BF70C653B93A@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/cIBkpUvPUis9Db8Jz5qIbJDAeb8>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>, Dave Dolson <ddolson@sandvine.com>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 01:03:15 -0000

Ron, Dave,

The draft describes the metadata as opaque, and really NSH is just the enve=
lop for it.  The same can be said for the TLV as well -- there's no spec in=
 NSH, not should there be.  In both cases, the metadata can/should/(must?) =
be define in auxiliary drafts.  There are several drafts re: metadata that =
can be discussed and eventually standardized.  It also bears mentioning tha=
t the control plane, today in opensource, defines the type 1 semantics.  Th=
at schemes works well, and mixed implementations can play together.

So, perhaps the best way forward:

1.  Agree on the envelop and the use of that envelop
2.  As a WG, adopt --> standardize the opaque data, and the TLVs
3.  As a WG, work on more detailed of use of the control plane to, when nee=
ded, define semantics

Thoughts?

Thanks,
Paul


> On Apr 12, 2016, at 3:41 PM, Ron Parker <Ron_Parker@affirmednetworks.com>=
 wrote:
>=20
> Dave,
>=20
> I, too, have raised this issue on the thread.   I think you hit the nail =
on the head regarding interoperability, which is the primary reason for hav=
ing a specification, at all.    My mental model for the type-1 mandatory co=
ntext headers is that of a composite 16-byte locally defined scratchpad.   =
I struggle with having its definition completely undefined in the document =
and still making it mandatory.   =20
>=20
> Much of the justification offered has been to be friendly to hardware.   =
Surely hardware needs to know the exact format and meaning of these 16 byte=
s.
>=20
>   Ron
>=20
>=20
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
> Sent: Tuesday, April 12, 2016 3:29 PM
> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
>=20
> The NSH draft indicates that MD-Type 1 MUST be supported, yet the Mandato=
ry Context Header fields are not defined in the document.
>=20
> Issues with metadata semantics have been raised various times on this lis=
t and in drafts, and never satisfactorily addressed.
> Examples:
> https://tools.ietf.org/html/draft-vallamkonda-sfc-metadata-model-00.txt
> https://www.ietf.org/archive/id/draft-wang-sfc-md-type-issues-00.txt
> https://www.ietf.org/archive/id/draft-penno-sfc-packet-02.txt
> https://mailarchive.ietf.org/arch/msg/sfc/2YvBakDgJ_hjY-BGvgWdcTTUDIs
>=20
>=20
> So I don't feel this draft sufficiently explains the MD-Type 1 metadata w=
ell enough to explain how one can make an interoperable implementation.
>=20
> The draft references metadata allocation drafts, but they have not been a=
dopted yet, so (as I understand it) these "works in progress" cannot suppor=
t draft-ietf-sfc-nsh.
>=20
>=20
> I think it might be acceptable to say that the metadata must be undirecti=
onally clonable (or better phrase).
> In other words,
>=20
>   Metadata used in NSH headers must been the condition that
>   a transport-layer-stateful Service Function can save away
>   metadata values that it has witnessed.  An injected packet can
>   therefore be assigned a clone of metadata taken from an earlier
>   packet going in the same direction.  For example, a Service Function
>   can send a TCP packet using metadata cloned from another TCP packet
>   of the same connection and direction.
>=20
>   Note that the Service Function need not know the meaning of the
>   metadata; it just needs to know it is safe to clone in this manner.
>=20
>=20
>=20
> Another alternative would be to import one of the metadata allocation sch=
emes into this draft as MD-Type 1, and allow IANA to allocate MD-types for =
other schemes.
>=20
>=20
>=20
> -Dave
>=20
>=20
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
> Sent: Wednesday, March 30, 2016 10:48 PM
> To: sfc@ietf.org
> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Dear WG:
>=20
> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt (https://dat=
atracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>=20
> The editors of the NSH document have indicated that they have addressed a=
ll known comments and that there are no open issues with the current versio=
n of the document.
>=20
> Substantive comments to the list please, editorial comments can go direct=
ly to the document editors.
>=20
> We'll also get a brief update from the editors at next week's meeting. If=
 there are any remaining issues with the document, raising them before the =
meeting would be especially helpful.
>=20
> For the chairs,
> Thomas
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Apr 12 18:06:02 2016
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED9C412D7F9 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 18:06:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dVoh3YUMoQJT for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 18:06:00 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1DF5412D8D4 for <sfc@ietf.org>; Tue, 12 Apr 2016 18:05:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11510; q=dns/txt; s=iport; t=1460509558; x=1461719158; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=6mLVGt/jbdyUdkCvToFlV1+vbi0RV6rddX1JLBTcyKE=; b=PXI1q95WjifLEL6k22PY4CmNgaNVjORYantIGBGQYMpZFxXqvcvV5YDs 6j42zqrSMzhZ1Gfaeqtvp2iUGs6g7WoGf4AHgsXSRqLA0CkXrpCd16yjj dWim1vXQCG1IH9lsjOCKAOPtErGjyURb6L8u+Z0bee99D2n4atA5GA89m s=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0D3AQAhmg1X/5hdJa1egzdTfQavC4tYA?= =?us-ascii?q?Q2BdhcBCoVsAhyBJTgUAQEBAQEBAWUnhEIBAQQBAQEaBksLEAIBCD8DAgICHwY?= =?us-ascii?q?LFBECBA4FiBMDEg6wFIxgDYUtAQEBAQEBAQEBAQEBAQEBAQEBAQEBEQSGIYF1g?= =?us-ascii?q?laCQYFOEQFLglMrgisFl1cxAYV2hiGBdYFnhE6IW4YggSuHWwEeAQFCg2dsiFE?= =?us-ascii?q?2fgEBAQ?=
X-IronPort-AV: E=Sophos;i="5.24,477,1454976000";  d="scan'208,217";a="260640728"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 Apr 2016 01:05:57 +0000
Received: from XCH-RCD-009.cisco.com (xch-rcd-009.cisco.com [173.37.102.19]) by rcdn-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id u3D15voP018362 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 01:05:57 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-009.cisco.com (173.37.102.19) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Tue, 12 Apr 2016 20:05:56 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Tue, 12 Apr 2016 20:05:56 -0500
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: "Andrew G. Malis" <agmalis@gmail.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfXi0m0zbDrFUiQMfrqrpCL9J+HP42AgAA/l4A=
Date: Wed, 13 Apr 2016 01:05:56 +0000
Message-ID: <BC7C623C-EE3D-4DC3-B8C6-0F86A536D6D3@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <CAA=duU0jSG7J8ChoHP8zB4SWL2x9_YBHPx3vYovmGRmmpti9Lw@mail.gmail.com>
In-Reply-To: <CAA=duU0jSG7J8ChoHP8zB4SWL2x9_YBHPx3vYovmGRmmpti9Lw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.247.208]
Content-Type: multipart/alternative; boundary="_000_BC7C623CEE3D4DC3B8C60F86A536D6D3ciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/QA3fJJIXurdkwZkWHf7HNI-fRLo>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 01:06:02 -0000

--_000_BC7C623CEE3D4DC3B8C60F86A536D6D3ciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_BC7C623CEE3D4DC3B8C60F86A536D6D3ciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <77819C6954BF2444A4C097858C70071E@emea.cisco.com>
Content-Transfer-Encoding: base64

PGh0bWw+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIgY29udGVudD0i
dGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjwvaGVhZD4NCjxib2R5IHN0eWxlPSJ3b3JkLXdy
YXA6IGJyZWFrLXdvcmQ7IC13ZWJraXQtbmJzcC1tb2RlOiBzcGFjZTsgLXdlYmtpdC1saW5lLWJy
ZWFrOiBhZnRlci13aGl0ZS1zcGFjZTsiIGNsYXNzPSIiPg0KQW5keSwNCjxkaXYgY2xhc3M9IiI+
PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2
Pg0KPGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9IiI+DQo8ZGl2Pg0KPGJsb2NrcXVvdGUgdHlwZT0i
Y2l0ZSIgY2xhc3M9IiI+DQo8ZGl2IGNsYXNzPSIiPk9uIEFwciAxMiwgMjAxNiwgYXQgNToxOCBQ
TSwgQW5kcmV3IEcuIE1hbGlzICZsdDs8YSBocmVmPSJtYWlsdG86YWdtYWxpc0BnbWFpbC5jb20i
IGNsYXNzPSIiPmFnbWFsaXNAZ21haWwuY29tPC9hPiZndDsgd3JvdGU6PC9kaXY+DQo8YnIgY2xh
c3M9IkFwcGxlLWludGVyY2hhbmdlLW5ld2xpbmUiPg0KPGRpdiBjbGFzcz0iIj4NCjxkaXYgZGly
PSJsdHIiIGNsYXNzPSIiPlRob21hcywNCjxkaXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIiPg0KPC9k
aXY+DQo8ZGl2IGNsYXNzPSIiPkkgZG8gTk9UIHN1cHBvcnQgdGhpcyBXRyBsYXN0IGNhbGwuPC9k
aXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj5C
YWNrIGluIE5vdmVtYmVyLCBJIHJlcG9ydGVkIGEgYnVnIGluIHNlY3Rpb24gMTQuMi4zIHRoYXQg
d2FzIGFja25vd2xlZGdlZCBvbiB0aGUgV0cgbGlzdCwgYnV0IHdhcyBuZXZlciBjb3JyZWN0ZWQg
aW4gdGhlIHRleHQuIFRvIHJlcGVhdCBteSByZXBvcnQ6PC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxi
ciBjbGFzcz0iIj4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjxkaXY+
PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2PkZpcnN0IG9mZiwgbXkgYXBvbG9naWVzIGlmIHdl
IG1pc3NlZCBpbmNsdWRpbmcgeW91ciBlZGl0b3JpYWwgdXBkYXRlLiAmbmJzcDtXZSBjZXJ0YWlu
bHkgd2lsbC4gJm5ic3A7SG93ZXZlciwgd2l0aCBhbGwgZHVlIHJlc3BlY3QsIEknbSBub3Qgc3Vy
ZSB0aGF0IHdhcnJhbnRzIG9iamVjdGluZyB0byBsYXN0IGNhbGwuICZuYnNwO0NhcmxvcywgaW4g
aGlzIGVtYWlsIG9mIHN1cHBvcnQsIGFsc28gcmFpc2VkIHNldmVyYWwgZWRpdG9yaWFsIGNoYW5n
ZXMsIHdoaWNoDQogd2lsbCBiZSByZWZsZWN0ZWQgaW4gdGhlIG5ldyB2ZXJzaW9uLiAmbmJzcDs8
L2Rpdj4NCjxkaXY+PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8YnIgY2xhc3M9IiI+DQo8YmxvY2tx
dW90ZSB0eXBlPSJjaXRlIiBjbGFzcz0iIj4NCjxkaXYgY2xhc3M9IiI+DQo8ZGl2IGRpcj0ibHRy
IiBjbGFzcz0iIj4NCjxkaXYgY2xhc3M9IiI+DQo8ZGl2IGNsYXNzPSIiPlRoZXJl4oCZcyBhIGJ1
ZyB3aXRoIHNlY3Rpb24gMTQuMi4zLiBUaGUgdGV4dCBzaG91bGQgYmUgY29ycmVjdGVkIGFzIGZv
bGxvd3M6PC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBj
bGFzcz0iIj5PTEQ6Jm5ic3A7PC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwv
ZGl2Pg0KPGRpdiBjbGFzcz0iIj4xNC4yLjMuJm5ic3A7IFRMViBDbGFzcyBSZWdpc3RyeTwvZGl2
Pg0KPGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9IiI+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+Jm5i
c3A7ICZuYnNwO0lBTkEgaXMgcmVxdWVzdGVkIHRvIHNldCB1cCBhIHJlZ2lzdHJ5IG9mICZxdW90
O1RMViBUeXBlcyZxdW90Oy4mbmJzcDsgVGhlc2UgYXJlIDE2LTwvZGl2Pg0KPGRpdiBjbGFzcz0i
Ij4mbmJzcDsgJm5ic3A7Yml0IHZhbHVlcy4mbmJzcDsgUmVnaXN0cnkgZW50cmllcyBhcmUgYXNz
aWduZWQgYnkgdXNpbmcgdGhlICZxdW90O0lFVEYgUmV2aWV3JnF1b3Q7PC9kaXY+DQo8ZGl2IGNs
YXNzPSIiPiZuYnNwOyAmbmJzcDtwb2xpY3kgZGVmaW5lZCBpbiBSRkMgNTIyNiBbUkZDNTIyNl0u
PC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBjbGFzcz0i
Ij5ORVc6PC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBj
bGFzcz0iIj4xNC4yLjMuJm5ic3A7IFRMViBDbGFzcyBSZWdpc3RyeTwvZGl2Pg0KPGRpdiBjbGFz
cz0iIj48YnIgY2xhc3M9IiI+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+Jm5ic3A7ICZuYnNwO0lB
TkEgaXMgcmVxdWVzdGVkIHRvIHNldCB1cCBhIHJlZ2lzdHJ5IG9mICZxdW90O1RMViBDbGFzc2Vz
JnF1b3Q7LiZuYnNwOyBUaGVzZSBhcmUgMTYtPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPiZuYnNwOyAm
bmJzcDtiaXQgdmFsdWVzLiZuYnNwOyBSZWdpc3RyeSBlbnRyaWVzIGFyZSBhc3NpZ25lZCBieSB1
c2luZyB0aGUgJnF1b3Q7SUVURiBSZXZpZXcmcXVvdDs8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+Jm5i
c3A7ICZuYnNwO3BvbGljeSBkZWZpbmVkIGluIFJGQyA1MjI2IFtSRkM1MjI2XS48L2Rpdj4NCjxk
aXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFz
cz0iIj4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPlRoaXMgbGVhdmVzIG1lIGN1cmlv
dXMgYXMgdG8gd2hhdCBvdGhlciBhY2tub3dsZWRnZWQgY29tbWVudHMgb24gdGhlIGRyYWZ0IG1h
eSBoYXZlIGJlZW4gYWxzbyBsZWZ0IG91dCBvZiB0aGUgZWRpdGluZyBwcm9jZXNzLjwvZGl2Pg0K
PGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9IiI+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+SSBhbHNv
IG5vdGUgdGhhdCBhbHRob3VnaCB0aGUgVExWIENsYXNzIHJlZ2lzdHJ5IGlzIGJlaW5nIGNyZWF0
ZWQsIHRoZXJlIGFyZSBubyB2YWx1ZXMgdG8gYmUgYWxsb2NhdGVkIHdpdGhpbiB0aGUgcmVnaXN0
cnkuIEkgYmVsaWV2ZSB0aGF0IHRoaXMgaXMgY29udHJhcnkgdG8gSUFOQSBwb2xpY3kuIE9yIGlm
IG5vdCwgaXTigJlzIGF0IGxlYXN0IHF1ZXN0aW9uYWJsZS48L2Rpdj4NCjxkaXYgY2xhc3M9IiI+
PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPlNlY3Rpb24gMTEgc3RpbGwgbGlz
dHMgb3BlbiBpdGVtcyBmb3IgV0cgcmVzb2x1dGlvbi48L2Rpdj4NCjxkaXYgY2xhc3M9IiI+PGJy
IGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPkkgYWxzbyBhZ3JlZSB3aXRoIHRoZSBp
bnRlcm9wZXJhYmlsaXR5IGNvbmNlcm5zIHJhaXNlZCBieSBvdGhlcnMgb24gdGhlIGxpc3QuPC9k
aXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj5U
aGFua3MsPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPkFuZHk8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+PGJy
IGNsYXNzPSIiPg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9ImdtYWlsX2V4dHJhIj48YnIg
Y2xhc3M9IiI+DQo8ZGl2IGNsYXNzPSJnbWFpbF9xdW90ZSI+T24gV2VkLCBNYXIgMzAsIDIwMTYg
YXQgMTA6NDggUE0sIFRob21hcyBOYXJ0ZW4gPHNwYW4gZGlyPSJsdHIiIGNsYXNzPSIiPg0KJmx0
OzxhIGhyZWY9Im1haWx0bzpuYXJ0ZW5AdXMuaWJtLmNvbSIgdGFyZ2V0PSJfYmxhbmsiIGNsYXNz
PSIiPm5hcnRlbkB1cy5pYm0uY29tPC9hPiZndDs8L3NwYW4+IHdyb3RlOjxiciBjbGFzcz0iIj4N
CjxibG9ja3F1b3RlIGNsYXNzPSJnbWFpbF9xdW90ZSIgc3R5bGU9Im1hcmdpbjowIDAgMCAuOGV4
O2JvcmRlci1sZWZ0OjFweCAjY2NjIHNvbGlkO3BhZGRpbmctbGVmdDoxZXgiPg0KRGVhciBXRzo8
YnIgY2xhc3M9IiI+DQo8YnIgY2xhc3M9IiI+DQpUaGlzIG5vdGUgYmVnaW5zIGEgV0cgbGFzdCBj
YWxsIG9uIGRyYWZ0LWlldGYtc2ZjLW5zaC0wNC50eHQ8YnIgY2xhc3M9IiI+DQooPGEgaHJlZj0i
aHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvZHJhZnQtaWV0Zi1zZmMtbnNoLyIgcmVs
PSJub3JlZmVycmVyIiB0YXJnZXQ9Il9ibGFuayIgY2xhc3M9IiI+aHR0cHM6Ly9kYXRhdHJhY2tl
ci5pZXRmLm9yZy9kb2MvZHJhZnQtaWV0Zi1zZmMtbnNoLzwvYT4pLjxiciBjbGFzcz0iIj4NCjxi
ciBjbGFzcz0iIj4NClRoZSBlZGl0b3JzIG9mIHRoZSBOU0ggZG9jdW1lbnQgaGF2ZSBpbmRpY2F0
ZWQgdGhhdCB0aGV5IGhhdmU8YnIgY2xhc3M9IiI+DQphZGRyZXNzZWQgYWxsIGtub3duIGNvbW1l
bnRzIGFuZCB0aGF0IHRoZXJlIGFyZSBubyBvcGVuIGlzc3VlcyB3aXRoPGJyIGNsYXNzPSIiPg0K
dGhlIGN1cnJlbnQgdmVyc2lvbiBvZiB0aGUgZG9jdW1lbnQuPGJyIGNsYXNzPSIiPg0KPGJyIGNs
YXNzPSIiPg0KU3Vic3RhbnRpdmUgY29tbWVudHMgdG8gdGhlIGxpc3QgcGxlYXNlLCBlZGl0b3Jp
YWwgY29tbWVudHMgY2FuIGdvPGJyIGNsYXNzPSIiPg0KZGlyZWN0bHkgdG8gdGhlIGRvY3VtZW50
IGVkaXRvcnMuPGJyIGNsYXNzPSIiPg0KPGJyIGNsYXNzPSIiPg0KV2UnbGwgYWxzbyBnZXQgYSBi
cmllZiB1cGRhdGUgZnJvbSB0aGUgZWRpdG9ycyBhdCBuZXh0IHdlZWsnczxiciBjbGFzcz0iIj4N
Cm1lZXRpbmcuIElmIHRoZXJlIGFyZSBhbnkgcmVtYWluaW5nIGlzc3VlcyB3aXRoIHRoZSBkb2N1
bWVudCwgcmFpc2luZzxiciBjbGFzcz0iIj4NCnRoZW0gYmVmb3JlIHRoZSBtZWV0aW5nIHdvdWxk
IGJlIGVzcGVjaWFsbHkgaGVscGZ1bC48YnIgY2xhc3M9IiI+DQo8YnIgY2xhc3M9IiI+DQpGb3Ig
dGhlIGNoYWlycyw8YnIgY2xhc3M9IiI+DQpUaG9tYXM8YnIgY2xhc3M9IiI+DQo8YnIgY2xhc3M9
IiI+DQpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXzxiciBj
bGFzcz0iIj4NCnNmYyBtYWlsaW5nIGxpc3Q8YnIgY2xhc3M9IiI+DQo8YSBocmVmPSJtYWlsdG86
c2ZjQGlldGYub3JnIiBjbGFzcz0iIj5zZmNAaWV0Zi5vcmc8L2E+PGJyIGNsYXNzPSIiPg0KPGEg
aHJlZj0iaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zZmMiIHJlbD0ibm9y
ZWZlcnJlciIgdGFyZ2V0PSJfYmxhbmsiIGNsYXNzPSIiPmh0dHBzOi8vd3d3LmlldGYub3JnL21h
aWxtYW4vbGlzdGluZm8vc2ZjPC9hPjxiciBjbGFzcz0iIj4NCjwvYmxvY2txdW90ZT4NCjwvZGl2
Pg0KPGJyIGNsYXNzPSIiPg0KPC9kaXY+DQpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fXzxiciBjbGFzcz0iIj4NCnNmYyBtYWlsaW5nIGxpc3Q8YnIgY2xhc3M9
IiI+DQo8YSBocmVmPSJtYWlsdG86c2ZjQGlldGYub3JnIiBjbGFzcz0iIj5zZmNAaWV0Zi5vcmc8
L2E+PGJyIGNsYXNzPSIiPg0KaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9z
ZmM8YnIgY2xhc3M9IiI+DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjwvZGl2Pg0KPGJyIGNsYXNz
PSIiPg0KPC9kaXY+DQo8L2JvZHk+DQo8L2h0bWw+DQo=

--_000_BC7C623CEE3D4DC3B8C60F86A536D6D3ciscocom_--


From nobody Tue Apr 12 18:30:49 2016
Return-Path: <xuxiaohu@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B34AB12D53D; Tue, 12 Apr 2016 18:30:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.216
X-Spam-Level: 
X-Spam-Status: No, score=-5.216 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4YgRUQ5J_ymi; Tue, 12 Apr 2016 18:30:43 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8221B12D6E6; Tue, 12 Apr 2016 18:30:42 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml705-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CLY72075; Wed, 13 Apr 2016 01:30:39 +0000 (GMT)
Received: from NKGEML413-HUB.china.huawei.com (10.98.56.74) by lhreml705-cah.china.huawei.com (10.201.5.168) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 13 Apr 2016 02:30:38 +0100
Received: from NKGEML515-MBX.china.huawei.com ([fe80::a54a:89d2:c471:ff]) by NKGEML413-HUB.china.huawei.com ([10.98.56.74]) with mapi id 14.03.0235.001; Wed, 13 Apr 2016 09:30:27 +0800
From: Xuxiaohu <xuxiaohu@huawei.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Thread-Topic: [mpls] The first nibble issue associated with MPLS encapsulation
Thread-Index: AQHRkPR7Ow6l9wh8WUKpFJXl+MwAqJ+AqQ4AgAZ6g/A=
Date: Wed, 13 Apr 2016 01:30:26 +0000
Message-ID: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539531@NKGEML515-MBX.china.huawei.com>
References: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53871C@NKGEML515-MBX.china.huawei.com> <B664DB14-0A8C-4437-83E3-F9DA6C0DDA61@cisco.com>
In-Reply-To: <B664DB14-0A8C-4437-83E3-F9DA6C0DDA61@cisco.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.111.99.55]
Content-Type: multipart/alternative; boundary="_000_1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539531NKGEML515MBXchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020206.570DA140.00C0, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: ab026e93858a75662410608323ce5cf6
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/79oVEuE0yUj8Cw8b9wL0mDLSWSI>
Cc: "mpls@ietf.org" <mpls@ietf.org>, "bier@ietf.org" <bier@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "Dr. Tony Przygienda" <tonysietf@gmail.com>
Subject: Re: [sfc] [mpls] The first nibble issue associated with MPLS encapsulation
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 01:30:45 -0000

--_000_1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539531NKGEML515MBXchi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539531NKGEML515MBXchi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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==

--_000_1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539531NKGEML515MBXchi_--


From nobody Tue Apr 12 18:41:45 2016
Return-Path: <xuxiaohu@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F033612DA65 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 18:41:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.217
X-Spam-Level: 
X-Spam-Status: No, score=-5.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yPsrYXovVopK for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 18:41:41 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D42A12DA54 for <sfc@ietf.org>; Tue, 12 Apr 2016 18:41:40 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml706-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CHF61762; Wed, 13 Apr 2016 01:41:38 +0000 (GMT)
Received: from NKGEML412-HUB.china.huawei.com (10.98.56.73) by lhreml706-cah.china.huawei.com (10.201.5.182) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 13 Apr 2016 02:41:37 +0100
Received: from NKGEML515-MBX.china.huawei.com ([fe80::a54a:89d2:c471:ff]) by nkgeml412-hub.china.huawei.com ([10.98.56.73]) with mapi id 14.03.0235.001; Wed, 13 Apr 2016 09:41:32 +0800
From: Xuxiaohu <xuxiaohu@huawei.com>
To: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfgoOh5TUt/KkmiZB4K1T/tUZ+HM4ag
Date: Wed, 13 Apr 2016 01:41:32 +0000
Message-ID: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com>
References: <m3egarz7kh.wl-narten@us.ibm.com>
In-Reply-To: <m3egarz7kh.wl-narten@us.ibm.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.111.99.55]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A0B0202.570DA3D2.00B9, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: f00e12aefba01234b913f67e0c7526fe
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/egyK9yDyzb1I9nAaXdUPV-uyGDM>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 01:41:43 -0000

Hi Thomas,

It said in the NSH draft:
=20
  "6.  Transport Agnostic: NSH is transport independent and is carried
       in an overlay, over existing underlays.  If an existing overlay
       topology provides the required service path connectivity, that
       existing overlay may be used."

That means the NSH should be able to be transported over MPLS. However, acc=
ording to the current NSH format definition, it's not safe to carry the NSH=
 over MPLS due to the first nibble issue. Therefore, I believe this issue n=
eeds to be addressed before publication.

Best regards,
Xiaohu

> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
> Sent: Thursday, March 31, 2016 10:48 AM
> To: sfc@ietf.org
> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Dear WG:
>=20
> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>=20
> The editors of the NSH document have indicated that they have addressed a=
ll
> known comments and that there are no open issues with the current version=
 of
> the document.
>=20
> Substantive comments to the list please, editorial comments can go direct=
ly to
> the document editors.
>=20
> We'll also get a brief update from the editors at next week's meeting. If=
 there are
> any remaining issues with the document, raising them before the meeting w=
ould
> be especially helpful.
>=20
> For the chairs,
> Thomas
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Apr 12 18:44:49 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D661112D67E for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 18:44:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cELzXGpt65Kl for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 18:44:47 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A35812D63E for <sfc@ietf.org>; Tue, 12 Apr 2016 18:44:47 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 608081C02DE; Tue, 12 Apr 2016 18:44:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1460511887; bh=3Af9VGykJUqfBr+B4zbnGJTWzRLI5LXxB7AFzwaeQec=; h=Subject:To:References:From:Date:In-Reply-To:From; b=gvalPysYlQHdLmwsUMhb+fp84CV0sVUg8PpfoQnD3Ek9GeOM8F9wFJ/8ZJPlVvtmU R0A8MhNmIr7CrMKCPaplF/W7gbQmdj24p3+DXp3oNFhgmycPd0bJHjDD1YuV0aJzno FeNIAlELWx9vVpTM2hckuPegGx28rHe3r0K7mfRQ=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id B57A01C024F; Tue, 12 Apr 2016 18:44:46 -0700 (PDT)
To: Xuxiaohu <xuxiaohu@huawei.com>, Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <570DA48A.9010507@joelhalpern.com>
Date: Tue, 12 Apr 2016 21:44:42 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/OLPhp4ns6aa-Ie82BTks5sBViWo>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 01:44:49 -0000

Xu,
      I do not believe that there is an MPLS specification that requires 
that all content other than IP must have a first nibble of 0 or 1. 
There are specifications where it is discussed as desirable.

It is in fact pretty trivial for us to change the format so that the 
first three bits are 0, but it burns several valuable flag bits.  It is 
an SFC working group decision, not, as far as I can tell, a violation of 
the MPLS specification.

Yours,
Joel

On 4/12/16 9:41 PM, Xuxiaohu wrote:
> Hi Thomas,
>
> It said in the NSH draft:
>
>    "6.  Transport Agnostic: NSH is transport independent and is carried
>         in an overlay, over existing underlays.  If an existing overlay
>         topology provides the required service path connectivity, that
>         existing overlay may be used."
>
> That means the NSH should be able to be transported over MPLS. However, according to the current NSH format definition, it's not safe to carry the NSH over MPLS due to the first nibble issue. Therefore, I believe this issue needs to be addressed before publication.
>
> Best regards,
> Xiaohu
>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
>> Sent: Thursday, March 31, 2016 10:48 AM
>> To: sfc@ietf.org
>> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Dear WG:
>>
>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>
>> The editors of the NSH document have indicated that they have addressed all
>> known comments and that there are no open issues with the current version of
>> the document.
>>
>> Substantive comments to the list please, editorial comments can go directly to
>> the document editors.
>>
>> We'll also get a brief update from the editors at next week's meeting. If there are
>> any remaining issues with the document, raising them before the meeting would
>> be especially helpful.
>>
>> For the chairs,
>> Thomas
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Tue Apr 12 18:54:12 2016
Return-Path: <xuxiaohu@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E7F3012DBB5 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 18:54:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.217
X-Spam-Level: 
X-Spam-Status: No, score=-5.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aIa2TCxslbSO for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 18:54:06 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B3AC912DDD5 for <sfc@ietf.org>; Tue, 12 Apr 2016 18:54:04 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml702-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CLY73333; Wed, 13 Apr 2016 01:54:02 +0000 (GMT)
Received: from NKGEML413-HUB.china.huawei.com (10.98.56.74) by lhreml702-cah.china.huawei.com (10.201.5.99) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 13 Apr 2016 02:54:02 +0100
Received: from NKGEML515-MBX.china.huawei.com ([fe80::a54a:89d2:c471:ff]) by NKGEML413-HUB.china.huawei.com ([10.98.56.74]) with mapi id 14.03.0235.001; Wed, 13 Apr 2016 09:53:57 +0800
From: Xuxiaohu <xuxiaohu@huawei.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfgoOh5TUt/KkmiZB4K1T/tUZ+HM4ag//98hgCAAIcBwA==
Date: Wed, 13 Apr 2016 01:53:57 +0000
Message-ID: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com>
In-Reply-To: <570DA48A.9010507@joelhalpern.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.111.99.55]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A0B0203.570DA6BB.0008, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 7f390b4846863f306fe54fcbe9ebbbe3
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/qLhsXnW5CETWMVzx8Pm7ahT7TC8>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 01:54:11 -0000

Joel,

> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Wednesday, April 13, 2016 9:45 AM
> To: Xuxiaohu; Thomas Narten; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Xu,
>       I do not believe that there is an MPLS specification that requires =
that all
> content other than IP must have a first nibble of 0 or 1.

When encapsulating NSH over MPLS directly, the first nibble of the NSH must=
 not be 4 or 6.

> There are specifications where it is discussed as desirable.
>=20
> It is in fact pretty trivial for us to change the format so that the firs=
t three bits are
> 0, but it burns several valuable flag bits.  It is an SFC working group d=
ecision,

That's the reason why I raised the first nibble question.

Best regards,
Xiaohu

> not, as far as I can tell, a violation of the MPLS specification.
>=20
> Yours,
> Joel
>=20
> On 4/12/16 9:41 PM, Xuxiaohu wrote:
> > Hi Thomas,
> >
> > It said in the NSH draft:
> >
> >    "6.  Transport Agnostic: NSH is transport independent and is carried
> >         in an overlay, over existing underlays.  If an existing overlay
> >         topology provides the required service path connectivity, that
> >         existing overlay may be used."
> >
> > That means the NSH should be able to be transported over MPLS. However,
> according to the current NSH format definition, it's not safe to carry th=
e NSH
> over MPLS due to the first nibble issue. Therefore, I believe this issue =
needs to be
> addressed before publication.
> >
> > Best regards,
> > Xiaohu
> >
> >> -----Original Message-----
> >> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
> >> Sent: Thursday, March 31, 2016 10:48 AM
> >> To: sfc@ietf.org
> >> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>
> >> Dear WG:
> >>
> >> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> >> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> >>
> >> The editors of the NSH document have indicated that they have
> >> addressed all known comments and that there are no open issues with
> >> the current version of the document.
> >>
> >> Substantive comments to the list please, editorial comments can go
> >> directly to the document editors.
> >>
> >> We'll also get a brief update from the editors at next week's
> >> meeting. If there are any remaining issues with the document, raising
> >> them before the meeting would be especially helpful.
> >>
> >> For the chairs,
> >> Thomas
> >>
> >> _______________________________________________
> >> sfc mailing list
> >> sfc@ietf.org
> >> https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
> >


From nobody Tue Apr 12 19:27:11 2016
Return-Path: <xuxiaohu@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7315C12D7A6; Tue, 12 Apr 2016 19:27:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.217
X-Spam-Level: 
X-Spam-Status: No, score=-5.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jlql1dQXpHDT; Tue, 12 Apr 2016 19:27:07 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6400712D787; Tue, 12 Apr 2016 19:27:06 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml707-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CLY75157; Wed, 13 Apr 2016 02:27:04 +0000 (GMT)
Received: from NKGEML414-HUB.china.huawei.com (10.98.56.75) by lhreml707-cah.china.huawei.com (10.201.5.199) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 13 Apr 2016 03:27:03 +0100
Received: from NKGEML515-MBX.china.huawei.com ([fe80::a54a:89d2:c471:ff]) by nkgeml414-hub.china.huawei.com ([10.98.56.75]) with mapi id 14.03.0235.001; Wed, 13 Apr 2016 10:26:56 +0800
From: Xuxiaohu <xuxiaohu@huawei.com>
To: Joel Halpern Direct <jmh.direct@joelhalpern.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfgoOh5TUt/KkmiZB4K1T/tUZ+HM4ag//98hgCAAIcBwP//f7YAgACID4A=
Date: Wed, 13 Apr 2016 02:26:56 +0000
Message-ID: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539638@NKGEML515-MBX.china.huawei.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <570DAA2C.10800@joelhalpern.com>
In-Reply-To: <570DAA2C.10800@joelhalpern.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.111.99.55]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020204.570DAE78.00FC, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 7f390b4846863f306fe54fcbe9ebbbe3
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/arLoIVelZe8XuLofWC4MMjV57AQ>
Cc: "mpls@ietf.org" <mpls@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 02:27:09 -0000

Hi Joel,

Please see https://tools.ietf.org/html/rfc4928#page-4. Although it's a BCP =
RFC, it'd better to obey it, IMO. No?

Best regards,
Xiaohu

> -----Original Message-----
> From: Joel Halpern Direct [mailto:jmh.direct@joelhalpern.com]
> Sent: Wednesday, April 13, 2016 10:09 AM
> To: Xuxiaohu
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Is there a standards track RFC that requires this?
>=20
> I know it is a good practice.  It may even be a good idea for us as a des=
ign point,
> as I do want MPLS to be a usable transport for NSH.
>=20
> But as far as I can tell, there is no standards track RFC that requires t=
his.
>=20
> Yours,
> Joel
>=20
> On 4/12/16 9:53 PM, Xuxiaohu wrote:
> > Joel,
> >
> >> -----Original Message-----
> >> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> >> Sent: Wednesday, April 13, 2016 9:45 AM
> >> To: Xuxiaohu; Thomas Narten; sfc@ietf.org
> >> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>
> >> Xu,
> >>        I do not believe that there is an MPLS specification that
> >> requires that all content other than IP must have a first nibble of 0 =
or 1.
> >
> > When encapsulating NSH over MPLS directly, the first nibble of the NSH =
must
> not be 4 or 6.
> >
> >> There are specifications where it is discussed as desirable.
> >>
> >> It is in fact pretty trivial for us to change the format so that the
> >> first three bits are 0, but it burns several valuable flag bits.  It
> >> is an SFC working group decision,
> >
> > That's the reason why I raised the first nibble question.
> >
> > Best regards,
> > Xiaohu
> >
> >> not, as far as I can tell, a violation of the MPLS specification.
> >>
> >> Yours,
> >> Joel
> >>
> >> On 4/12/16 9:41 PM, Xuxiaohu wrote:
> >>> Hi Thomas,
> >>>
> >>> It said in the NSH draft:
> >>>
> >>>     "6.  Transport Agnostic: NSH is transport independent and is carr=
ied
> >>>          in an overlay, over existing underlays.  If an existing over=
lay
> >>>          topology provides the required service path connectivity, th=
at
> >>>          existing overlay may be used."
> >>>
> >>> That means the NSH should be able to be transported over MPLS.
> >>> However,
> >> according to the current NSH format definition, it's not safe to
> >> carry the NSH over MPLS due to the first nibble issue. Therefore, I
> >> believe this issue needs to be addressed before publication.
> >>>
> >>> Best regards,
> >>> Xiaohu
> >>>
> >>>> -----Original Message-----
> >>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
> >>>> Sent: Thursday, March 31, 2016 10:48 AM
> >>>> To: sfc@ietf.org
> >>>> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>
> >>>> Dear WG:
> >>>>
> >>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> >>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> >>>>
> >>>> The editors of the NSH document have indicated that they have
> >>>> addressed all known comments and that there are no open issues with
> >>>> the current version of the document.
> >>>>
> >>>> Substantive comments to the list please, editorial comments can go
> >>>> directly to the document editors.
> >>>>
> >>>> We'll also get a brief update from the editors at next week's
> >>>> meeting. If there are any remaining issues with the document,
> >>>> raising them before the meeting would be especially helpful.
> >>>>
> >>>> For the chairs,
> >>>> Thomas
> >>>>
> >>>> _______________________________________________
> >>>> sfc mailing list
> >>>> sfc@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>
> >>> _______________________________________________
> >>> sfc mailing list
> >>> sfc@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/sfc
> >>>
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
> >


From nobody Tue Apr 12 19:29:09 2016
Return-Path: <akatlas@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA37312D7A6 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 19:29:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.699
X-Spam-Level: 
X-Spam-Status: No, score=-102.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KAhTSuWBJr6d for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 19:29:05 -0700 (PDT)
Received: from mail-ob0-x234.google.com (mail-ob0-x234.google.com [IPv6:2607:f8b0:4003:c01::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3B9CB12D526 for <sfc@ietf.org>; Tue, 12 Apr 2016 19:29:05 -0700 (PDT)
Received: by mail-ob0-x234.google.com with SMTP id j9so24160858obd.3 for <sfc@ietf.org>; Tue, 12 Apr 2016 19:29:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc; bh=oVPaq8wg2eYgByWcfsi1xnofLMqtzqwE884z/61EPCU=; b=y5Bq68lCG30TzCJra81KxAEN44ZD0QhjfnCbxcUet5F9HGvENdEG4b6h0Zv3s00vWL 4I/oeHVHvLgvMPjf9gIgPyBxiGLxuRsbO+s2xivBHRhZy2L3Diq5An+V+4kMOkrFHMdP 0P/55pQpc/5gxa/NuvRfLOTdJJAvRfRToWdsUmwWBD+8jDlL1RmB5dAq7ogXTw4yzRGw iqza/KzEr+yu7deVAxojBnsIM+sgbClveEwiv0wQ+ZGvWgUPGR6NP7j4O3nrrjmbs9EL tJCXkwdFvupWdabiItIPFmynAl1xjIRBKQzETIeawtbzu/G0FNvz3jnV8dRE8fvVz4SH bhrw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc; bh=oVPaq8wg2eYgByWcfsi1xnofLMqtzqwE884z/61EPCU=; b=eCWuXcEhViWceJxPR4Yfrw4agUBmiGXurbsBizQLkA+BJ6UmHmdpnJCRYyAeL9U1IM zleATVn1Z+h8chYgzYTn865ufVBhrDpL2NiORKyE1s4plKV6LiuM+otwmrY79YikWyPc B77JPB1d6nliZqD5nDSE951PJA1M3STZbLVldGmJpkFo11Nssy2NHL3d3W/Xue4HsT2z ZZqAkP8DR4e2obyWMdAYzjcosoZdNNVgyGGjHEMxDVTMD8GzhCOH/LlLy4f0OKrCdhEz Hho1wl123YEMsnVmN0uUQRaa8Sx6gCnZe5prFKHjNy4B5McJR7v1rG0vUBenRQOEweB5 XZPg==
X-Gm-Message-State: AOPr4FVYvpgjpKWY0da/G+ND/Pmz2ifKSZmJd/1c+bZckWIzvr7DoXnVGcFTem5Faj8dw0xrdKikraud8uT9Mg==
MIME-Version: 1.0
X-Received: by 10.182.165.99 with SMTP id yx3mr3324564obb.20.1460514544608; Tue, 12 Apr 2016 19:29:04 -0700 (PDT)
Received: by 10.60.115.168 with HTTP; Tue, 12 Apr 2016 19:29:04 -0700 (PDT)
In-Reply-To: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com>
Date: Tue, 12 Apr 2016 22:29:04 -0400
Message-ID: <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com>
From: Alia Atlas <akatlas@gmail.com>
To: Xuxiaohu <xuxiaohu@huawei.com>, Martin Stiemerling <mls.ietf@gmail.com>,  "jguichar@cisco.com" <jguichar@cisco.com>
Content-Type: multipart/alternative; boundary=001a11c2ea6a9ef1a40530548a36
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ZbQ_flXxRNUia5Hn56O6I7Le1hQ>
Cc: Thomas Narten <narten@us.ibm.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 02:29:07 -0000

--001a11c2ea6a9ef1a40530548a36
Content-Type: text/plain; charset=UTF-8

Xiaohu, Joel, and SFC WG group,

The first nibble question is quite relevant if it is expected that the NSH
header might be directly under
an MPLS label stack.  This issue arose rather unpleasantly for pseudo-wires
a long time ago and the
reasoning for it is much better documented, as Carlos pointed out in a
different thread, in RFC 4928 Section 3.

At the time that PWE3 was working on the control word and whether it was to
be mandatory (RFC 4385), it was clear that
there were devices that looked at the first nibble of a packet under the
MPLS header as a way to determine
if the packet was IPv4 or IPv6 and obtain flow-diversity from it.  The cost
of also verifying the associated checksum
if available wasn't deemed acceptable for several implementations.  Given
that determining as much entropy as
possible is still really important and that it is non-trivial to
negotiate/indicate the capability for including
an Entropy Label in the MPLS stack, I have no reason to believe that this
shortcut of looking at the first nibble
is no longer used or deployed.   Feel free to contact me off-list if you
believe this to be the case.

It is clear from the NSH base header:

  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

that this consideration has been completely ignored.  In fact, an NSH base
header might have any value
of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH were ever
defined, suddenly the traffic might
be subject to startling reordering if an MPLS transport were to be
considered.

Given a claim of NSH being transport-agnostic and repeated emphasis that
MPLS, as well as UDP,
is a valid transport for NSH, I do think this is a significant oversight
and needs, at a minimum, discussion and
explanation, and  - quite likely -  correction.

While I am on the topic of details of the NSH encapsulation, I would
request that Section 8 of draft-ietf-rtgwg-dt-encap-01
be read and considered!   I am not excited by having many different and
unique Next Protocol fields defined.
For instance, I note the definition of a nearly identical Next Protocol
field in https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe .

While I am, of course, willing to reason to detailed and well-thought out
explanations for why each and every new
encapsulation needs its very own IANA-defined Next Protocol field, this
seems to me to be highly likely to require
consolidation so that the same Next Protocol field can be used between the
various encapsulations.

I will work on giving a through review of NSH as soon as practical.  I do
realize that there are multiple implementations
and while details of how the "Next Protocol" field are documented shouldn't
have a significant impact there, the
discussion about the first nibble is likely to.

Regards,
Alia


On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <xuxiaohu@huawei.com> wrote:

> Joel,
>
> > -----Original Message-----
> > From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> > Sent: Wednesday, April 13, 2016 9:45 AM
> > To: Xuxiaohu; Thomas Narten; sfc@ietf.org
> > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >
> > Xu,
> >       I do not believe that there is an MPLS specification that requires
> that all
> > content other than IP must have a first nibble of 0 or 1.
>
> When encapsulating NSH over MPLS directly, the first nibble of the NSH
> must not be 4 or 6.
>
> > There are specifications where it is discussed as desirable.
> >
> > It is in fact pretty trivial for us to change the format so that the
> first three bits are
> > 0, but it burns several valuable flag bits.  It is an SFC working group
> decision,
>
> That's the reason why I raised the first nibble question.
>
> Best regards,
> Xiaohu
>
> > not, as far as I can tell, a violation of the MPLS specification.
> >
> > Yours,
> > Joel
> >
> > On 4/12/16 9:41 PM, Xuxiaohu wrote:
> > > Hi Thomas,
> > >
> > > It said in the NSH draft:
> > >
> > >    "6.  Transport Agnostic: NSH is transport independent and is carried
> > >         in an overlay, over existing underlays.  If an existing overlay
> > >         topology provides the required service path connectivity, that
> > >         existing overlay may be used."
> > >
> > > That means the NSH should be able to be transported over MPLS. However,
> > according to the current NSH format definition, it's not safe to carry
> the NSH
> > over MPLS due to the first nibble issue. Therefore, I believe this issue
> needs to be
> > addressed before publication.
> > >
> > > Best regards,
> > > Xiaohu
> > >
> > >> -----Original Message-----
> > >> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
> > >> Sent: Thursday, March 31, 2016 10:48 AM
> > >> To: sfc@ietf.org
> > >> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> > >>
> > >> Dear WG:
> > >>
> > >> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> > >> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> > >>
> > >> The editors of the NSH document have indicated that they have
> > >> addressed all known comments and that there are no open issues with
> > >> the current version of the document.
> > >>
> > >> Substantive comments to the list please, editorial comments can go
> > >> directly to the document editors.
> > >>
> > >> We'll also get a brief update from the editors at next week's
> > >> meeting. If there are any remaining issues with the document, raising
> > >> them before the meeting would be especially helpful.
> > >>
> > >> For the chairs,
> > >> Thomas
> > >>
> > >> _______________________________________________
> > >> sfc mailing list
> > >> sfc@ietf.org
> > >> https://www.ietf.org/mailman/listinfo/sfc
> > >
> > > _______________________________________________
> > > sfc mailing list
> > > sfc@ietf.org
> > > https://www.ietf.org/mailman/listinfo/sfc
> > >
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>

--001a11c2ea6a9ef1a40530548a36
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Xiaohu, Joel, and SFC WG group,<div><br></div><div>The fir=
st nibble question is quite relevant if it is expected that the NSH header =
might be directly under</div><div>an MPLS label stack.=C2=A0 This issue aro=
se rather unpleasantly for pseudo-wires a long time ago and the</div><div>r=
easoning for it is much better documented, as Carlos pointed out in a diffe=
rent thread, in RFC 4928 Section 3.</div><div><br></div><div>At the time th=
at PWE3 was working on the control word and whether it was to be mandatory =
(RFC 4385), it was clear that</div><div>there were devices that looked at t=
he first nibble of a packet under the MPLS header as a way to determine</di=
v><div>if the packet was IPv4 or IPv6 and obtain flow-diversity from it.=C2=
=A0 The cost of also verifying the associated checksum</div><div>if availab=
le wasn&#39;t deemed acceptable for several implementations.=C2=A0 Given th=
at determining as much entropy as</div><div>possible is still really import=
ant and that it is non-trivial to negotiate/indicate the capability for inc=
luding</div><div>an Entropy Label in the MPLS stack, I have no reason to be=
lieve that this shortcut of looking at the first nibble</div><div>is no lon=
ger used or deployed. =C2=A0 Feel free to contact me off-list if you believ=
e this to be the case.</div><div><br></div><div>It is clear from the NSH ba=
se header:</div><div><pre style=3D"overflow:auto;font-family:&#39;PT Mono&#=
39;,Monaco,monospace;font-size:14px;padding:10px;margin-top:0px;margin-bott=
om:10.5px;line-height:1.214;color:rgb(0,0,0);word-wrap:break-word;border:1p=
x solid rgb(204,204,204);border-radius:4px;background-color:rgb(255,253,245=
)">  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</pre=
></div><div>that this consideration has been completely ignored.=C2=A0 In f=
act, an NSH base header might have any value</div><div>of 0b0000, 0b0001, 0=
b0010, 0b0010 and if a version 01 for NSH were ever defined, suddenly the t=
raffic might</div><div>be subject to startling reordering if an MPLS transp=
ort were to be considered.</div><div><br></div><div>Given a claim of NSH be=
ing transport-agnostic and repeated emphasis that MPLS, as well as UDP,</di=
v><div>is a valid transport for NSH, I do think this is a significant overs=
ight and needs, at a minimum, discussion and</div><div>explanation, and =C2=
=A0- quite likely - =C2=A0correction.</div><div><br></div><div>While I am o=
n the topic of details of the NSH encapsulation, I would request that Secti=
on 8 of draft-ietf-rtgwg-dt-encap-01</div><div>be read and considered! =C2=
=A0 I am not excited by having many different and unique Next Protocol fiel=
ds defined.</div><div>For instance, I note the definition of a nearly ident=
ical Next Protocol field in <a href=3D"https://datatracker.ietf.org/doc/dra=
ft-ietf-nvo3-vxlan-gpe">https://datatracker.ietf.org/doc/draft-ietf-nvo3-vx=
lan-gpe</a> .</div><div><br></div><div>While I am, of course, willing to re=
ason to detailed and well-thought out explanations for why each and every n=
ew</div><div>encapsulation needs its very own IANA-defined Next Protocol fi=
eld, this seems to me to be highly likely to require</div><div>consolidatio=
n so that the same Next Protocol field can be used between the various enca=
psulations.</div><div><br></div><div>I will work on giving a through review=
 of NSH as soon as practical.=C2=A0 I do realize that there are multiple im=
plementations</div><div>and while details of how the &quot;Next Protocol&qu=
ot; field are documented shouldn&#39;t have a significant impact there, the=
</div><div>discussion about the first nibble is likely to.</div><div><br></=
div><div>Regards,</div><div>Alia</div><div><br></div></div><div class=3D"gm=
ail_extra"><br><div class=3D"gmail_quote">On Tue, Apr 12, 2016 at 9:53 PM, =
Xuxiaohu <span dir=3D"ltr">&lt;<a href=3D"mailto:xuxiaohu@huawei.com" targe=
t=3D"_blank">xuxiaohu@huawei.com</a>&gt;</span> wrote:<br><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">Joel,<br>
<span class=3D""><br>
&gt; -----Original Message-----<br>
&gt; From: Joel M. Halpern [mailto:<a href=3D"mailto:jmh@joelhalpern.com">j=
mh@joelhalpern.com</a>]<br>
&gt; Sent: Wednesday, April 13, 2016 9:45 AM<br>
&gt; To: Xuxiaohu; Thomas Narten; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.=
org</a><br>
&gt; Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
&gt;<br>
&gt; Xu,<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0I do not believe that there is an MPLS speci=
fication that requires that all<br>
&gt; content other than IP must have a first nibble of 0 or 1.<br>
<br>
</span>When encapsulating NSH over MPLS directly, the first nibble of the N=
SH must not be 4 or 6.<br>
<span class=3D""><br>
&gt; There are specifications where it is discussed as desirable.<br>
&gt;<br>
&gt; It is in fact pretty trivial for us to change the format so that the f=
irst three bits are<br>
&gt; 0, but it burns several valuable flag bits.=C2=A0 It is an SFC working=
 group decision,<br>
<br>
</span>That&#39;s the reason why I raised the first nibble question.<br>
<br>
Best regards,<br>
Xiaohu<br>
<div class=3D"HOEnZb"><div class=3D"h5"><br>
&gt; not, as far as I can tell, a violation of the MPLS specification.<br>
&gt;<br>
&gt; Yours,<br>
&gt; Joel<br>
&gt;<br>
&gt; On 4/12/16 9:41 PM, Xuxiaohu wrote:<br>
&gt; &gt; Hi Thomas,<br>
&gt; &gt;<br>
&gt; &gt; It said in the NSH draft:<br>
&gt; &gt;<br>
&gt; &gt;=C2=A0 =C2=A0 &quot;6.=C2=A0 Transport Agnostic: NSH is transport =
independent and is carried<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0in an overlay, over existing und=
erlays.=C2=A0 If an existing overlay<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0topology provides the required s=
ervice path connectivity, that<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0existing overlay may be used.&qu=
ot;<br>
&gt; &gt;<br>
&gt; &gt; That means the NSH should be able to be transported over MPLS. Ho=
wever,<br>
&gt; according to the current NSH format definition, it&#39;s not safe to c=
arry the NSH<br>
&gt; over MPLS due to the first nibble issue. Therefore, I believe this iss=
ue needs to be<br>
&gt; addressed before publication.<br>
&gt; &gt;<br>
&gt; &gt; Best regards,<br>
&gt; &gt; Xiaohu<br>
&gt; &gt;<br>
&gt; &gt;&gt; -----Original Message-----<br>
&gt; &gt;&gt; From: sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>] On Behalf Of Thomas Narten<br>
&gt; &gt;&gt; Sent: Thursday, March 31, 2016 10:48 AM<br>
&gt; &gt;&gt; To: <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
&gt; &gt;&gt; Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; Dear WG:<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; This note begins a WG last call on draft-ietf-sfc-nsh-04.txt<=
br>
&gt; &gt;&gt; (<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sfc-n=
sh/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc/=
draft-ietf-sfc-nsh/</a>).<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; The editors of the NSH document have indicated that they have=
<br>
&gt; &gt;&gt; addressed all known comments and that there are no open issue=
s with<br>
&gt; &gt;&gt; the current version of the document.<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; Substantive comments to the list please, editorial comments c=
an go<br>
&gt; &gt;&gt; directly to the document editors.<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; We&#39;ll also get a brief update from the editors at next we=
ek&#39;s<br>
&gt; &gt;&gt; meeting. If there are any remaining issues with the document,=
 raising<br>
&gt; &gt;&gt; them before the meeting would be especially helpful.<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; For the chairs,<br>
&gt; &gt;&gt; Thomas<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; _______________________________________________<br>
&gt; &gt;&gt; sfc mailing list<br>
&gt; &gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
&gt; &gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"=
noreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a>=
<br>
&gt; &gt;<br>
&gt; &gt; _______________________________________________<br>
&gt; &gt; sfc mailing list<br>
&gt; &gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
&gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"nore=
ferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt; &gt;<br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
</div></div></blockquote></div><br></div>

--001a11c2ea6a9ef1a40530548a36--


From nobody Tue Apr 12 20:08:37 2016
Return-Path: <agmalis@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2995712D78B for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 20:08:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zCWs3g2Al2ny for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 20:08:34 -0700 (PDT)
Received: from mail-ob0-x233.google.com (mail-ob0-x233.google.com [IPv6:2607:f8b0:4003:c01::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4097912D9F6 for <sfc@ietf.org>; Tue, 12 Apr 2016 20:08:34 -0700 (PDT)
Received: by mail-ob0-x233.google.com with SMTP id tz8so24711690obc.0 for <sfc@ietf.org>; Tue, 12 Apr 2016 20:08:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=C/IbNnnhb2G5QK/Iu1jV2UFZEHn5c99NQo8+jWd5LYk=; b=kgB8zm87V9QCULTG+Q2Sn8IkLkRyfdDOQlFNlfsbYooSe7C8rqp43hRhtsBQJxXIbx MRUt5Bro111TMBzCDkm2Vskjb+xt32601MzoCAQ6CdHevjC9m87VuEIfVKGITb/HWeDS LiEZ+AZT/cQ5ZaPYKRlxJnZiBrC4DyvMj9H2Ol93QwfwNHlflZ5eVlVHGj6pxWYQvBcV 8mYAWdETZRiiaDNbttGcBQGchTvSQMEJh3zJNw9QRkGh+A/0XOHmt5jNj7IVPBKy6yb+ PIllJ+Knm5EfmWaPtfr8YrL/4XBInbDTU3DEMTZb2mx4RlLeIFjGFizG5/h9e8VI6hQZ aLYw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=C/IbNnnhb2G5QK/Iu1jV2UFZEHn5c99NQo8+jWd5LYk=; b=m+AayxusuSCtIvkedRzh+prLQWrVVVLKEPGZJ6+5PUlIth4gcug/oao7s5ccsQEzOw UAhNkLtCQLkFo2UHHi5JMJtdRRiORph1pvzr8I4XRg8JjXsLU66jm8yIEy/EZYGtqXvw uQAaPZshQBkojjEs9EGWh4wQAVlxoqlUJOVYczJYx89QnIcgb1MQZ7esXGCD/UE/zRAC iGkLi5Ctyznn3J7+AJQO2+RQI+MyYLQ5n1COGZbUF6amkZOSVatgiXaANWM6JPeluyLp IdTe9BIwbLjfWnLn43wK7QJls6hk06/lHZ/9EIz4c7CWHKI4KUZPJozQoDqjf4oXAVsI ASdw==
X-Gm-Message-State: AOPr4FV7Foi10ve1lHf/0kcDBcGERTHUbNtieTCtqXO6GL0p7t3UDIY/bEIriH++SUJljHfdP8x4Q9SUyxLFBQ==
X-Received: by 10.60.128.229 with SMTP id nr5mr3322034oeb.56.1460516913681; Tue, 12 Apr 2016 20:08:33 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.182.242.35 with HTTP; Tue, 12 Apr 2016 20:08:14 -0700 (PDT)
In-Reply-To: <BC7C623C-EE3D-4DC3-B8C6-0F86A536D6D3@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <CAA=duU0jSG7J8ChoHP8zB4SWL2x9_YBHPx3vYovmGRmmpti9Lw@mail.gmail.com> <BC7C623C-EE3D-4DC3-B8C6-0F86A536D6D3@cisco.com>
From: "Andrew G. Malis" <agmalis@gmail.com>
Date: Tue, 12 Apr 2016 23:08:14 -0400
Message-ID: <CAA=duU3PMD5Pcaft96gmmEx6rMhN-Wx-nzsdmTBe4M2S4kaZMw@mail.gmail.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>
Content-Type: multipart/alternative; boundary=047d7b2e3f74d41b7a0530551757
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/FJHXo2oba97k2jjpss6SqVrrhEg>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 03:08:36 -0000

--047d7b2e3f74d41b7a0530551757
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Paul,

The editorial correction was only one of my objections, there are others in
my email as well.

Cheers,
Andy

On Tue, Apr 12, 2016 at 9:05 PM, Paul Quinn (paulq) <paulq@cisco.com> wrote=
:

> Andy,
>
>
>
> On Apr 12, 2016, at 5:18 PM, Andrew G. Malis <agmalis@gmail.com> wrote:
>
> Thomas,
>
> I do NOT support this WG last call.
>
> Back in November, I reported a bug in section 14.2.3 that was acknowledge=
d
> on the WG list, but was never corrected in the text. To repeat my report:
>
>
> First off, my apologies if we missed including your editorial update.  We
> certainly will.  However, with all due respect, I'm not sure that warrant=
s
> objecting to last call.  Carlos, in his email of support, also raised
> several editorial changes, which will be reflected in the new version.
>
>
> There=E2=80=99s a bug with section 14.2.3. The text should be corrected a=
s follows:
>
> OLD:
>
> 14.2.3.  TLV Class Registry
>
>    IANA is requested to set up a registry of "TLV Types".  These are 16-
>    bit values.  Registry entries are assigned by using the "IETF Review"
>    policy defined in RFC 5226 [RFC5226].
>
> NEW:
>
> 14.2.3.  TLV Class Registry
>
>    IANA is requested to set up a registry of "TLV Classes".  These are 16=
-
>    bit values.  Registry entries are assigned by using the "IETF Review"
>    policy defined in RFC 5226 [RFC5226].
>
>
> This leaves me curious as to what other acknowledged comments on the draf=
t
> may have been also left out of the editing process.
>
> I also note that although the TLV Class registry is being created, there
> are no values to be allocated within the registry. I believe that this is
> contrary to IANA policy. Or if not, it=E2=80=99s at least questionable.
>
> Section 11 still lists open items for WG resolution.
>
> I also agree with the interoperability concerns raised by others on the
> list.
>
> Thanks,
> Andy
>
>
> On Wed, Mar 30, 2016 at 10:48 PM, Thomas Narten <narten@us.ibm.com> wrote=
:
>
>> Dear WG:
>>
>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>
>> The editors of the NSH document have indicated that they have
>> addressed all known comments and that there are no open issues with
>> the current version of the document.
>>
>> Substantive comments to the list please, editorial comments can go
>> directly to the document editors.
>>
>> We'll also get a brief update from the editors at next week's
>> meeting. If there are any remaining issues with the document, raising
>> them before the meeting would be especially helpful.
>>
>> For the chairs,
>> Thomas
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>
>
>

--047d7b2e3f74d41b7a0530551757
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Paul,<div><br></div><div>The editorial correction was only=
 one of my objections, there are others in my email as well.</div><div><br>=
</div><div>Cheers,</div><div>Andy</div></div><div class=3D"gmail_extra"><br=
><div class=3D"gmail_quote">On Tue, Apr 12, 2016 at 9:05 PM, Paul Quinn (pa=
ulq) <span dir=3D"ltr">&lt;<a href=3D"mailto:paulq@cisco.com" target=3D"_bl=
ank">paulq@cisco.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_qu=
ote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex=
">



<div style=3D"word-wrap:break-word">
Andy,
<div><br>
</div>
<div><br>
</div>
<div><br>
<div><span class=3D"">
<blockquote type=3D"cite">
<div>On Apr 12, 2016, at 5:18 PM, Andrew G. Malis &lt;<a href=3D"mailto:agm=
alis@gmail.com" target=3D"_blank">agmalis@gmail.com</a>&gt; wrote:</div>
<br>
<div>
<div dir=3D"ltr">Thomas,
<div><br>
</div>
<div>I do NOT support this WG last call.</div>
<div><br>
</div>
<div>Back in November, I reported a bug in section 14.2.3 that was acknowle=
dged on the WG list, but was never corrected in the text. To repeat my repo=
rt:</div>
<div><br>
</div>
</div>
</div>
</blockquote>
<div><br>
</div>
</span><div>First off, my apologies if we missed including your editorial u=
pdate.=C2=A0 We certainly will.=C2=A0 However, with all due respect, I&#39;=
m not sure that warrants objecting to last call.=C2=A0 Carlos, in his email=
 of support, also raised several editorial changes, which
 will be reflected in the new version. =C2=A0</div><div><div class=3D"h5">
<div><br>
</div>
<br>
<blockquote type=3D"cite">
<div>
<div dir=3D"ltr">
<div>
<div>There=E2=80=99s a bug with section 14.2.3. The text should be correcte=
d as follows:</div>
<div><br>
</div>
<div>OLD:=C2=A0</div>
<div><br>
</div>
<div>14.2.3.=C2=A0 TLV Class Registry</div>
<div><br>
</div>
<div>=C2=A0 =C2=A0IANA is requested to set up a registry of &quot;TLV Types=
&quot;.=C2=A0 These are 16-</div>
<div>=C2=A0 =C2=A0bit values.=C2=A0 Registry entries are assigned by using =
the &quot;IETF Review&quot;</div>
<div>=C2=A0 =C2=A0policy defined in RFC 5226 [RFC5226].</div>
<div><br>
</div>
<div>NEW:</div>
<div><br>
</div>
<div>14.2.3.=C2=A0 TLV Class Registry</div>
<div><br>
</div>
<div>=C2=A0 =C2=A0IANA is requested to set up a registry of &quot;TLV Class=
es&quot;.=C2=A0 These are 16-</div>
<div>=C2=A0 =C2=A0bit values.=C2=A0 Registry entries are assigned by using =
the &quot;IETF Review&quot;</div>
<div>=C2=A0 =C2=A0policy defined in RFC 5226 [RFC5226].</div>
<div><br>
</div>
<div><br>
</div>
</div>
<div>This leaves me curious as to what other acknowledged comments on the d=
raft may have been also left out of the editing process.</div>
<div><br>
</div>
<div>I also note that although the TLV Class registry is being created, the=
re are no values to be allocated within the registry. I believe that this i=
s contrary to IANA policy. Or if not, it=E2=80=99s at least questionable.</=
div>
<div><br>
</div>
<div>Section 11 still lists open items for WG resolution.</div>
<div><br>
</div>
<div>I also agree with the interoperability concerns raised by others on th=
e list.</div>
<div><br>
</div>
<div>Thanks,</div>
<div>Andy</div>
<div><br>
</div>
</div>
<div class=3D"gmail_extra"><br>
<div class=3D"gmail_quote">On Wed, Mar 30, 2016 at 10:48 PM, Thomas Narten =
<span dir=3D"ltr">
&lt;<a href=3D"mailto:narten@us.ibm.com" target=3D"_blank">narten@us.ibm.co=
m</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
Dear WG:<br>
<br>
This note begins a WG last call on draft-ietf-sfc-nsh-04.txt<br>
(<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/" rel=3D"no=
referrer" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-sfc=
-nsh/</a>).<br>
<br>
The editors of the NSH document have indicated that they have<br>
addressed all known comments and that there are no open issues with<br>
the current version of the document.<br>
<br>
Substantive comments to the list please, editorial comments can go<br>
directly to the document editors.<br>
<br>
We&#39;ll also get a brief update from the editors at next week&#39;s<br>
meeting. If there are any remaining issues with the document, raising<br>
them before the meeting would be especially helpful.<br>
<br>
For the chairs,<br>
Thomas<br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
</blockquote>
</div>
<br>
</div>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a><br>
</div>
</blockquote>
</div></div></div>
<br>
</div>
</div>

</blockquote></div><br></div>

--047d7b2e3f74d41b7a0530551757--


From nobody Tue Apr 12 20:33:28 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D6CC212DA92 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 20:33:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AWtg2I9g8Z-o for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 20:33:25 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0D31C12DA82 for <sfc@ietf.org>; Tue, 12 Apr 2016 20:33:25 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id BBBE91C02DE; Tue, 12 Apr 2016 20:33:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1460518404; bh=28mCiqDUiz9g/J6OEfz5qy2vmKGnrZDj3QMthFFBcd0=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=BEVxccDvDg77fwqW9KVrXk8LmLPsro3e44+e1M2WiA9KHb3SGLJFMZXuRbpHnwWCj kUgju+hkjKGy8sHzTofQB5Zb1PCct7iJ4E5v0mZbZYhs3GcjuoLaHOMDjAD/o+pkPw Xm1lVJM/mBOz14fHXpzKZYcs7YvCzSq5M5rFUZLQ=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id AECFD1C024F; Tue, 12 Apr 2016 20:33:23 -0700 (PDT)
To: Alia Atlas <akatlas@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, Martin Stiemerling <mls.ietf@gmail.com>, "jguichar@cisco.com" <jguichar@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <570DBDFF.4070305@joelhalpern.com>
Date: Tue, 12 Apr 2016 23:33:19 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/J55NxsHuv_GxGFAgyksUSi3hpCQ>
Cc: Thomas Narten <narten@us.ibm.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 03:33:27 -0000

With regard to MPLS encapsulation, I am not objecting to considering if 
we want to rearrange things to make it simpler to carry NSH in MPLS.

Given that the IETF has not ratified a standards track RFC stating that 
it is required for MPLS carriage to avoid the values, I was objecting 
the Xu overstating the situation.

It is not actually hard to avoid the values.  If we feel it is 
imnportant (and I am tempted to agree that it is worth considering) we 
can rearrange some reserved bits so that the first three bits are 0, the 
next two are the version, and the remaining bits are flags.  Makes us a 
little starved for flags, but if we agree that MPLS has stolen three 
bits of header, so be it.

There are other answers.  We could, for example, agree that when NSH is 
carried over MPLS, a dummy 0 label is inserted after the bottom of 
stack.  No worse than many things MPLS has done.  (I could argue both 
sides of which answer is right, and not persuade myself of either one.)

On the next protocol IDs, the last time we looked we could not find an 
ID registration that was reasonably small and covered the needed 
meanings.  I note that even the section you point to concludes that 
there may well be good reasons for using a separate ID space.

Yours,
Joel

On 4/12/16 10:29 PM, Alia Atlas wrote:
> Xiaohu, Joel, and SFC WG group,
>
> The first nibble question is quite relevant if it is expected that the
> NSH header might be directly under
> an MPLS label stack.  This issue arose rather unpleasantly for
> pseudo-wires a long time ago and the
> reasoning for it is much better documented, as Carlos pointed out in a
> different thread, in RFC 4928 Section 3.
>
> At the time that PWE3 was working on the control word and whether it was
> to be mandatory (RFC 4385), it was clear that
> there were devices that looked at the first nibble of a packet under the
> MPLS header as a way to determine
> if the packet was IPv4 or IPv6 and obtain flow-diversity from it.  The
> cost of also verifying the associated checksum
> if available wasn't deemed acceptable for several implementations.
> Given that determining as much entropy as
> possible is still really important and that it is non-trivial to
> negotiate/indicate the capability for including
> an Entropy Label in the MPLS stack, I have no reason to believe that
> this shortcut of looking at the first nibble
> is no longer used or deployed.   Feel free to contact me off-list if you
> believe this to be the case.
>
> It is clear from the NSH base header:
>
>    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>       |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol |
>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>
> that this consideration has been completely ignored.  In fact, an NSH
> base header might have any value
> of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH were ever
> defined, suddenly the traffic might
> be subject to startling reordering if an MPLS transport were to be
> considered.
>
> Given a claim of NSH being transport-agnostic and repeated emphasis that
> MPLS, as well as UDP,
> is a valid transport for NSH, I do think this is a significant oversight
> and needs, at a minimum, discussion and
> explanation, and  - quite likely -  correction.
>
> While I am on the topic of details of the NSH encapsulation, I would
> request that Section 8 of draft-ietf-rtgwg-dt-encap-01
> be read and considered!   I am not excited by having many different and
> unique Next Protocol fields defined.
> For instance, I note the definition of a nearly identical Next Protocol
> field in https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe .
>
> While I am, of course, willing to reason to detailed and well-thought
> out explanations for why each and every new
> encapsulation needs its very own IANA-defined Next Protocol field, this
> seems to me to be highly likely to require
> consolidation so that the same Next Protocol field can be used between
> the various encapsulations.
>
> I will work on giving a through review of NSH as soon as practical.  I
> do realize that there are multiple implementations
> and while details of how the "Next Protocol" field are documented
> shouldn't have a significant impact there, the
> discussion about the first nibble is likely to.
>
> Regards,
> Alia
>
>
> On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <xuxiaohu@huawei.com
> <mailto:xuxiaohu@huawei.com>> wrote:
>
>     Joel,
>
>     > -----Original Message-----
>     > From: Joel M. Halpern [mailto:jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>]
>     > Sent: Wednesday, April 13, 2016 9:45 AM
>     > To: Xuxiaohu; Thomas Narten;sfc@ietf.org <mailto:sfc@ietf.org>
>     > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>     >
>     > Xu,
>     >       I do not believe that there is an MPLS specification that requires that all
>     > content other than IP must have a first nibble of 0 or 1.
>
>     When encapsulating NSH over MPLS directly, the first nibble of the
>     NSH must not be 4 or 6.
>
>     > There are specifications where it is discussed as desirable.
>     >
>     > It is in fact pretty trivial for us to change the format so that the first three bits are
>     > 0, but it burns several valuable flag bits.  It is an SFC working group decision,
>
>     That's the reason why I raised the first nibble question.
>
>     Best regards,
>     Xiaohu
>
>      > not, as far as I can tell, a violation of the MPLS specification.
>      >
>      > Yours,
>      > Joel
>      >
>      > On 4/12/16 9:41 PM, Xuxiaohu wrote:
>      > > Hi Thomas,
>      > >
>      > > It said in the NSH draft:
>      > >
>      > >    "6.  Transport Agnostic: NSH is transport independent and is
>     carried
>      > >         in an overlay, over existing underlays.  If an existing
>     overlay
>      > >         topology provides the required service path
>     connectivity, that
>      > >         existing overlay may be used."
>      > >
>      > > That means the NSH should be able to be transported over MPLS.
>     However,
>      > according to the current NSH format definition, it's not safe to
>     carry the NSH
>      > over MPLS due to the first nibble issue. Therefore, I believe
>     this issue needs to be
>      > addressed before publication.
>      > >
>      > > Best regards,
>      > > Xiaohu
>      > >
>      > >> -----Original Message-----
>      > >> From: sfc [mailto:sfc-bounces@ietf.org
>     <mailto:sfc-bounces@ietf.org>] On Behalf Of Thomas Narten
>      > >> Sent: Thursday, March 31, 2016 10:48 AM
>      > >> To: sfc@ietf.org <mailto:sfc@ietf.org>
>      > >> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>      > >>
>      > >> Dear WG:
>      > >>
>      > >> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>      > >> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>      > >>
>      > >> The editors of the NSH document have indicated that they have
>      > >> addressed all known comments and that there are no open issues
>     with
>      > >> the current version of the document.
>      > >>
>      > >> Substantive comments to the list please, editorial comments can go
>      > >> directly to the document editors.
>      > >>
>      > >> We'll also get a brief update from the editors at next week's
>      > >> meeting. If there are any remaining issues with the document,
>     raising
>      > >> them before the meeting would be especially helpful.
>      > >>
>      > >> For the chairs,
>      > >> Thomas
>      > >>
>      > >> _______________________________________________
>      > >> sfc mailing list
>      > >> sfc@ietf.org <mailto:sfc@ietf.org>
>      > >> https://www.ietf.org/mailman/listinfo/sfc
>      > >
>      > > _______________________________________________
>      > > sfc mailing list
>      > > sfc@ietf.org <mailto:sfc@ietf.org>
>      > > https://www.ietf.org/mailman/listinfo/sfc
>      > >
>
>     _______________________________________________
>     sfc mailing list
>     sfc@ietf.org <mailto:sfc@ietf.org>
>     https://www.ietf.org/mailman/listinfo/sfc
>
>


From nobody Tue Apr 12 20:43:47 2016
Return-Path: <akatlas@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B7DE712DE32 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 20:43:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.699
X-Spam-Level: 
X-Spam-Status: No, score=-102.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RoTHsZrIVzq1 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 20:43:42 -0700 (PDT)
Received: from mail-oi0-x22d.google.com (mail-oi0-x22d.google.com [IPv6:2607:f8b0:4003:c06::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4783712DE18 for <sfc@ietf.org>; Tue, 12 Apr 2016 20:43:42 -0700 (PDT)
Received: by mail-oi0-x22d.google.com with SMTP id s79so48220174oie.1 for <sfc@ietf.org>; Tue, 12 Apr 2016 20:43:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc; bh=xq7GHNWTnZ/OCeSQFcuJDUNH2FteejNIVI3EbJ83MkY=; b=MlX/cYawh78sR0EtvgiP8POiM5gSS+yM+9iKzlLIvB3dl9ypo2f+jkzWQ+wWp3X8kh aQMu0kzMsMJ02TNe8dG2HTpaQaosZs54Hyyamqi0Bd72JUCXjTOgYN5sQeh0x1zMBXuw +8kxbyeW4gdUb7jqS0EMSbP8SeOt6mIRV3iocv5jb/C2anVYiWRI3hKn3RVyMus0BC2l k0W/QThtGwhyzWIzZpraPNlEkrhYreAJ/vhb3x836lOdwKYGkUpEkZO6QGbKdO98mMQ+ e9wxaIvFk+S0Qe0IUagT3vDDJOWLGI30FqUZFZ2dCcDSARMSjG/wBJWzXdTbY/L4lzN1 faaQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc; bh=xq7GHNWTnZ/OCeSQFcuJDUNH2FteejNIVI3EbJ83MkY=; b=A2TPN0Vn6Wzdq7i/n5gaT/rkB+1LBwS+AK10/uRjVKou3cL303SlO6EYQlkBrlx0kQ 2JvOeRAD0vu3simaEQ4RyvOFJgALW7OYrzdwUFgYlhwN2L7oviVtY+mQaSQuffn8hnTZ FN1Es7Lptkf9D1uIb9xl2gmQ7WGRkjozK0n9u2RHd7k985UMUKaOpqEhgHlfsgRTpvtG tD4x6cPeAUAgjvqihEEkwpQky8kL05njPppfmb3rx1vnKeu3IvPG/d9vkUD27QfU51MW KMHF7wQdhS+Fk73+yBu23uSQaoGWu5Duuv7KmS8p69wx1hY3msizcySL5QJ619b1o2N9 KhKw==
X-Gm-Message-State: AOPr4FU3YyvY2ZJnUts2GStR/5IVyEhDpsTohhfHFZbkcD4M66Q1aFfQ6JzP+8W5rUqK5zooRMWPjKQBrMC8Zg==
MIME-Version: 1.0
X-Received: by 10.157.22.206 with SMTP id s14mr3139790ots.143.1460519021660; Tue, 12 Apr 2016 20:43:41 -0700 (PDT)
Received: by 10.60.115.168 with HTTP; Tue, 12 Apr 2016 20:43:41 -0700 (PDT)
In-Reply-To: <570DBDFF.4070305@joelhalpern.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <570DBDFF.4070305@joelhalpern.com>
Date: Tue, 12 Apr 2016 23:43:41 -0400
Message-ID: <CAG4d1rf119cJhSV2hy7CDsSYw6bStfjH59QSoxM-Gy6CAbG88g@mail.gmail.com>
From: Alia Atlas <akatlas@gmail.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Content-Type: multipart/alternative; boundary=001a1140bc0c7953f10530559540
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/1X_iqaABX3ze2Neu9flAacnedeg>
Cc: Thomas Narten <narten@us.ibm.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, "sfc@ietf.org" <sfc@ietf.org>, "jguichar@cisco.com" <jguichar@cisco.com>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 03:43:46 -0000

--001a1140bc0c7953f10530559540
Content-Type: text/plain; charset=UTF-8

Joel,

Agreed on the first nibble question that there are multiple ways of
handling.  There is a BCP about it, which isn't quite standards track but
pretty darn close.   At the very least, the issue needs to be discussed and
addressed.

For the "Next Protocol" field, it looks like that may need to be a
discussion between NVO3, SFC and possibly others.  I think that'll just be a
documentation issue, as far as implementations are concerned - but I do
think that having a common "Next Protocol" field will be important for ease
in the future.

All things subject to debate of course - particularly at 11:38pm  local
time.

Regards,
Alia

On Tue, Apr 12, 2016 at 11:33 PM, Joel M. Halpern <jmh@joelhalpern.com>
wrote:

> With regard to MPLS encapsulation, I am not objecting to considering if we
> want to rearrange things to make it simpler to carry NSH in MPLS.
>
> Given that the IETF has not ratified a standards track RFC stating that it
> is required for MPLS carriage to avoid the values, I was objecting the Xu
> overstating the situation.
>
> It is not actually hard to avoid the values.  If we feel it is imnportant
> (and I am tempted to agree that it is worth considering) we can rearrange
> some reserved bits so that the first three bits are 0, the next two are the
> version, and the remaining bits are flags.  Makes us a little starved for
> flags, but if we agree that MPLS has stolen three bits of header, so be it.
>
> There are other answers.  We could, for example, agree that when NSH is
> carried over MPLS, a dummy 0 label is inserted after the bottom of stack.
> No worse than many things MPLS has done.  (I could argue both sides of
> which answer is right, and not persuade myself of either one.)
>
> On the next protocol IDs, the last time we looked we could not find an ID
> registration that was reasonably small and covered the needed meanings.  I
> note that even the section you point to concludes that there may well be
> good reasons for using a separate ID space.
>
> Yours,
> Joel
>
>
> On 4/12/16 10:29 PM, Alia Atlas wrote:
>
>> Xiaohu, Joel, and SFC WG group,
>>
>> The first nibble question is quite relevant if it is expected that the
>> NSH header might be directly under
>> an MPLS label stack.  This issue arose rather unpleasantly for
>> pseudo-wires a long time ago and the
>> reasoning for it is much better documented, as Carlos pointed out in a
>> different thread, in RFC 4928 Section 3.
>>
>> At the time that PWE3 was working on the control word and whether it was
>> to be mandatory (RFC 4385), it was clear that
>> there were devices that looked at the first nibble of a packet under the
>> MPLS header as a way to determine
>> if the packet was IPv4 or IPv6 and obtain flow-diversity from it.  The
>> cost of also verifying the associated checksum
>> if available wasn't deemed acceptable for several implementations.
>> Given that determining as much entropy as
>> possible is still really important and that it is non-trivial to
>> negotiate/indicate the capability for including
>> an Entropy Label in the MPLS stack, I have no reason to believe that
>> this shortcut of looking at the first nibble
>> is no longer used or deployed.   Feel free to contact me off-list if you
>> believe this to be the case.
>>
>> It is clear from the NSH base header:
>>
>>    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>       |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol |
>>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>
>> that this consideration has been completely ignored.  In fact, an NSH
>> base header might have any value
>> of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH were ever
>> defined, suddenly the traffic might
>> be subject to startling reordering if an MPLS transport were to be
>> considered.
>>
>> Given a claim of NSH being transport-agnostic and repeated emphasis that
>> MPLS, as well as UDP,
>> is a valid transport for NSH, I do think this is a significant oversight
>> and needs, at a minimum, discussion and
>> explanation, and  - quite likely -  correction.
>>
>> While I am on the topic of details of the NSH encapsulation, I would
>> request that Section 8 of draft-ietf-rtgwg-dt-encap-01
>> be read and considered!   I am not excited by having many different and
>> unique Next Protocol fields defined.
>> For instance, I note the definition of a nearly identical Next Protocol
>> field in https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe .
>>
>> While I am, of course, willing to reason to detailed and well-thought
>> out explanations for why each and every new
>> encapsulation needs its very own IANA-defined Next Protocol field, this
>> seems to me to be highly likely to require
>> consolidation so that the same Next Protocol field can be used between
>> the various encapsulations.
>>
>> I will work on giving a through review of NSH as soon as practical.  I
>> do realize that there are multiple implementations
>> and while details of how the "Next Protocol" field are documented
>> shouldn't have a significant impact there, the
>> discussion about the first nibble is likely to.
>>
>> Regards,
>> Alia
>>
>>
>> On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <xuxiaohu@huawei.com
>> <mailto:xuxiaohu@huawei.com>> wrote:
>>
>>     Joel,
>>
>>     > -----Original Message-----
>>     > From: Joel M. Halpern [mailto:jmh@joelhalpern.com <mailto:
>> jmh@joelhalpern.com>]
>>     > Sent: Wednesday, April 13, 2016 9:45 AM
>>     > To: Xuxiaohu; Thomas Narten;sfc@ietf.org <mailto:sfc@ietf.org>
>>     > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>     >
>>     > Xu,
>>     >       I do not believe that there is an MPLS specification that
>> requires that all
>>     > content other than IP must have a first nibble of 0 or 1.
>>
>>     When encapsulating NSH over MPLS directly, the first nibble of the
>>     NSH must not be 4 or 6.
>>
>>     > There are specifications where it is discussed as desirable.
>>     >
>>     > It is in fact pretty trivial for us to change the format so that
>> the first three bits are
>>     > 0, but it burns several valuable flag bits.  It is an SFC working
>> group decision,
>>
>>     That's the reason why I raised the first nibble question.
>>
>>     Best regards,
>>     Xiaohu
>>
>>      > not, as far as I can tell, a violation of the MPLS specification.
>>      >
>>      > Yours,
>>      > Joel
>>      >
>>      > On 4/12/16 9:41 PM, Xuxiaohu wrote:
>>      > > Hi Thomas,
>>      > >
>>      > > It said in the NSH draft:
>>      > >
>>      > >    "6.  Transport Agnostic: NSH is transport independent and is
>>     carried
>>      > >         in an overlay, over existing underlays.  If an existing
>>     overlay
>>      > >         topology provides the required service path
>>     connectivity, that
>>      > >         existing overlay may be used."
>>      > >
>>      > > That means the NSH should be able to be transported over MPLS.
>>     However,
>>      > according to the current NSH format definition, it's not safe to
>>     carry the NSH
>>      > over MPLS due to the first nibble issue. Therefore, I believe
>>     this issue needs to be
>>      > addressed before publication.
>>      > >
>>      > > Best regards,
>>      > > Xiaohu
>>      > >
>>      > >> -----Original Message-----
>>      > >> From: sfc [mailto:sfc-bounces@ietf.org
>>     <mailto:sfc-bounces@ietf.org>] On Behalf Of Thomas Narten
>>      > >> Sent: Thursday, March 31, 2016 10:48 AM
>>      > >> To: sfc@ietf.org <mailto:sfc@ietf.org>
>>      > >> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>      > >>
>>      > >> Dear WG:
>>      > >>
>>      > >> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>      > >> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>      > >>
>>      > >> The editors of the NSH document have indicated that they have
>>      > >> addressed all known comments and that there are no open issues
>>     with
>>      > >> the current version of the document.
>>      > >>
>>      > >> Substantive comments to the list please, editorial comments can
>> go
>>      > >> directly to the document editors.
>>      > >>
>>      > >> We'll also get a brief update from the editors at next week's
>>      > >> meeting. If there are any remaining issues with the document,
>>     raising
>>      > >> them before the meeting would be especially helpful.
>>      > >>
>>      > >> For the chairs,
>>      > >> Thomas
>>      > >>
>>      > >> _______________________________________________
>>      > >> sfc mailing list
>>      > >> sfc@ietf.org <mailto:sfc@ietf.org>
>>      > >> https://www.ietf.org/mailman/listinfo/sfc
>>      > >
>>      > > _______________________________________________
>>      > > sfc mailing list
>>      > > sfc@ietf.org <mailto:sfc@ietf.org>
>>      > > https://www.ietf.org/mailman/listinfo/sfc
>>      > >
>>
>>     _______________________________________________
>>     sfc mailing list
>>     sfc@ietf.org <mailto:sfc@ietf.org>
>>     https://www.ietf.org/mailman/listinfo/sfc
>>
>>
>>

--001a1140bc0c7953f10530559540
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Joel,<div><br></div><div>Agreed on the first nibble questi=
on that there are multiple ways of handling.=C2=A0 There is a BCP about it,=
 which isn&#39;t quite standards track but pretty darn close. =C2=A0 At the=
 very least, the issue needs to be discussed and addressed.<br><div class=
=3D"gmail_extra"><br></div><div class=3D"gmail_extra">For the &quot;Next Pr=
otocol&quot; field, it looks like that may need to be a discussion between =
NVO3, SFC and possibly others.=C2=A0 I think that&#39;ll just be a</div><di=
v class=3D"gmail_extra">documentation issue, as far as implementations are =
concerned - but I do think that having a common &quot;Next Protocol&quot; f=
ield will be important for ease in the future.</div><div class=3D"gmail_ext=
ra"><br></div><div class=3D"gmail_extra">All things subject to debate of co=
urse - particularly at 11:38pm =C2=A0local time.</div><div class=3D"gmail_e=
xtra"><br></div><div class=3D"gmail_extra">Regards,</div><div class=3D"gmai=
l_extra">Alia</div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote=
">On Tue, Apr 12, 2016 at 11:33 PM, Joel M. Halpern <span dir=3D"ltr">&lt;<=
a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com=
</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin=
:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">With regard to MPL=
S encapsulation, I am not objecting to considering if we want to rearrange =
things to make it simpler to carry NSH in MPLS.<br>
<br>
Given that the IETF has not ratified a standards track RFC stating that it =
is required for MPLS carriage to avoid the values, I was objecting the Xu o=
verstating the situation.<br>
<br>
It is not actually hard to avoid the values.=C2=A0 If we feel it is imnport=
ant (and I am tempted to agree that it is worth considering) we can rearran=
ge some reserved bits so that the first three bits are 0, the next two are =
the version, and the remaining bits are flags.=C2=A0 Makes us a little star=
ved for flags, but if we agree that MPLS has stolen three bits of header, s=
o be it.<br>
<br>
There are other answers.=C2=A0 We could, for example, agree that when NSH i=
s carried over MPLS, a dummy 0 label is inserted after the bottom of stack.=
=C2=A0 No worse than many things MPLS has done.=C2=A0 (I could argue both s=
ides of which answer is right, and not persuade myself of either one.)<br>
<br>
On the next protocol IDs, the last time we looked we could not find an ID r=
egistration that was reasonably small and covered the needed meanings.=C2=
=A0 I note that even the section you point to concludes that there may well=
 be good reasons for using a separate ID space.<br>
<br>
Yours,<br>
Joel<div><div class=3D"h5"><br>
<br>
On 4/12/16 10:29 PM, Alia Atlas wrote:<br>
</div></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bo=
rder-left:1px #ccc solid;padding-left:1ex"><div><div class=3D"h5">
Xiaohu, Joel, and SFC WG group,<br>
<br>
The first nibble question is quite relevant if it is expected that the<br>
NSH header might be directly under<br>
an MPLS label stack.=C2=A0 This issue arose rather unpleasantly for<br>
pseudo-wires a long time ago and the<br>
reasoning for it is much better documented, as Carlos pointed out in a<br>
different thread, in RFC 4928 Section 3.<br>
<br>
At the time that PWE3 was working on the control word and whether it was<br=
>
to be mandatory (RFC 4385), it was clear that<br>
there were devices that looked at the first nibble of a packet under the<br=
>
MPLS header as a way to determine<br>
if the packet was IPv4 or IPv6 and obtain flow-diversity from it.=C2=A0 The=
<br>
cost of also verifying the associated checksum<br>
if available wasn&#39;t deemed acceptable for several implementations.<br>
Given that determining as much entropy as<br>
possible is still really important and that it is non-trivial to<br>
negotiate/indicate the capability for including<br>
an Entropy Label in the MPLS stack, I have no reason to believe that<br>
this shortcut of looking at the first nibble<br>
is no longer used or deployed.=C2=A0 =C2=A0Feel free to contact me off-list=
 if you<br>
believe this to be the case.<br>
<br>
It is clear from the NSH base header:<br>
<br>
=C2=A0 =C2=A00 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 =
1<br>
=C2=A0 =C2=A0 =C2=A0 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-=
+-+-+-+-+-+<br>
=C2=A0 =C2=A0 =C2=A0 |Ver|O|C|R|R|R|R|R|R|=C2=A0 =C2=A0Length=C2=A0 |=C2=A0=
 =C2=A0 MD Type=C2=A0 =C2=A0 | Next Protocol |<br>
=C2=A0 =C2=A0 =C2=A0 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-=
+-+-+-+-+-+<br>
<br>
that this consideration has been completely ignored.=C2=A0 In fact, an NSH<=
br>
base header might have any value<br>
of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH were ever<br>
defined, suddenly the traffic might<br>
be subject to startling reordering if an MPLS transport were to be<br>
considered.<br>
<br>
Given a claim of NSH being transport-agnostic and repeated emphasis that<br=
>
MPLS, as well as UDP,<br>
is a valid transport for NSH, I do think this is a significant oversight<br=
>
and needs, at a minimum, discussion and<br>
explanation, and=C2=A0 - quite likely -=C2=A0 correction.<br>
<br>
While I am on the topic of details of the NSH encapsulation, I would<br>
request that Section 8 of draft-ietf-rtgwg-dt-encap-01<br>
be read and considered!=C2=A0 =C2=A0I am not excited by having many differe=
nt and<br>
unique Next Protocol fields defined.<br>
For instance, I note the definition of a nearly identical Next Protocol<br>
field in <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-=
gpe" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc/=
draft-ietf-nvo3-vxlan-gpe</a> .<br>
<br>
While I am, of course, willing to reason to detailed and well-thought<br>
out explanations for why each and every new<br>
encapsulation needs its very own IANA-defined Next Protocol field, this<br>
seems to me to be highly likely to require<br>
consolidation so that the same Next Protocol field can be used between<br>
the various encapsulations.<br>
<br>
I will work on giving a through review of NSH as soon as practical.=C2=A0 I=
<br>
do realize that there are multiple implementations<br>
and while details of how the &quot;Next Protocol&quot; field are documented=
<br>
shouldn&#39;t have a significant impact there, the<br>
discussion about the first nibble is likely to.<br>
<br>
Regards,<br>
Alia<br>
<br>
<br>
On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu &lt;<a href=3D"mailto:xuxiaohu@hu=
awei.com" target=3D"_blank">xuxiaohu@huawei.com</a><br></div></div><span cl=
ass=3D"">
&lt;mailto:<a href=3D"mailto:xuxiaohu@huawei.com" target=3D"_blank">xuxiaoh=
u@huawei.com</a>&gt;&gt; wrote:<br>
<br>
=C2=A0 =C2=A0 Joel,<br>
<br>
=C2=A0 =C2=A0 &gt; -----Original Message-----<br></span><span class=3D"">
=C2=A0 =C2=A0 &gt; From: Joel M. Halpern [mailto:<a href=3D"mailto:jmh@joel=
halpern.com" target=3D"_blank">jmh@joelhalpern.com</a> &lt;mailto:<a href=
=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a>&g=
t;]<br>
=C2=A0 =C2=A0 &gt; Sent: Wednesday, April 13, 2016 9:45 AM<br></span><div><=
div class=3D"h5">
=C2=A0 =C2=A0 &gt; To: Xuxiaohu; Thomas <a href=3D"mailto:Narten%3Bsfc@ietf=
.org" target=3D"_blank">Narten;sfc@ietf.org</a> &lt;mailto:<a href=3D"mailt=
o:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt;<br>
=C2=A0 =C2=A0 &gt; Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-0=
4.txt<br>
=C2=A0 =C2=A0 &gt;<br>
=C2=A0 =C2=A0 &gt; Xu,<br>
=C2=A0 =C2=A0 &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0I do not believe that there is=
 an MPLS specification that requires that all<br>
=C2=A0 =C2=A0 &gt; content other than IP must have a first nibble of 0 or 1=
.<br>
<br>
=C2=A0 =C2=A0 When encapsulating NSH over MPLS directly, the first nibble o=
f the<br>
=C2=A0 =C2=A0 NSH must not be 4 or 6.<br>
<br>
=C2=A0 =C2=A0 &gt; There are specifications where it is discussed as desira=
ble.<br>
=C2=A0 =C2=A0 &gt;<br>
=C2=A0 =C2=A0 &gt; It is in fact pretty trivial for us to change the format=
 so that the first three bits are<br>
=C2=A0 =C2=A0 &gt; 0, but it burns several valuable flag bits.=C2=A0 It is =
an SFC working group decision,<br>
<br>
=C2=A0 =C2=A0 That&#39;s the reason why I raised the first nibble question.=
<br>
<br>
=C2=A0 =C2=A0 Best regards,<br>
=C2=A0 =C2=A0 Xiaohu<br>
<br>
=C2=A0 =C2=A0 =C2=A0&gt; not, as far as I can tell, a violation of the MPLS=
 specification.<br>
=C2=A0 =C2=A0 =C2=A0&gt;<br>
=C2=A0 =C2=A0 =C2=A0&gt; Yours,<br>
=C2=A0 =C2=A0 =C2=A0&gt; Joel<br>
=C2=A0 =C2=A0 =C2=A0&gt;<br>
=C2=A0 =C2=A0 =C2=A0&gt; On 4/12/16 9:41 PM, Xuxiaohu wrote:<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt; Hi Thomas,<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt; It said in the NSH draft:<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;=C2=A0 =C2=A0 &quot;6.=C2=A0 Transport Agnosti=
c: NSH is transport independent and is<br>
=C2=A0 =C2=A0 carried<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0in an overla=
y, over existing underlays.=C2=A0 If an existing<br>
=C2=A0 =C2=A0 overlay<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0topology pro=
vides the required service path<br>
=C2=A0 =C2=A0 connectivity, that<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0existing ove=
rlay may be used.&quot;<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt; That means the NSH should be able to be trans=
ported over MPLS.<br>
=C2=A0 =C2=A0 However,<br>
=C2=A0 =C2=A0 =C2=A0&gt; according to the current NSH format definition, it=
&#39;s not safe to<br>
=C2=A0 =C2=A0 carry the NSH<br>
=C2=A0 =C2=A0 =C2=A0&gt; over MPLS due to the first nibble issue. Therefore=
, I believe<br>
=C2=A0 =C2=A0 this issue needs to be<br>
=C2=A0 =C2=A0 =C2=A0&gt; addressed before publication.<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt; Best regards,<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt; Xiaohu<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; -----Original Message-----<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; From: sfc [mailto:<a href=3D"mailto:sfc-b=
ounces@ietf.org" target=3D"_blank">sfc-bounces@ietf.org</a><br>
=C2=A0 =C2=A0 &lt;mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"=
_blank">sfc-bounces@ietf.org</a>&gt;] On Behalf Of Thomas Narten<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; Sent: Thursday, March 31, 2016 10:48 AM<b=
r></div></div><span class=3D"">
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; To: <a href=3D"mailto:sfc@ietf.org" targe=
t=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" ta=
rget=3D"_blank">sfc@ietf.org</a>&gt;<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; Subject: [sfc] WG last call for draft-iet=
f-sfc-nsh-04.txt<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; Dear WG:<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; This note begins a WG last call on draft-=
ietf-sfc-nsh-04.txt<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; (<a href=3D"https://datatracker.ietf.org/=
doc/draft-ietf-sfc-nsh/" rel=3D"noreferrer" target=3D"_blank">https://datat=
racker.ietf.org/doc/draft-ietf-sfc-nsh/</a>).<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; The editors of the NSH document have indi=
cated that they have<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; addressed all known comments and that the=
re are no open issues<br>
=C2=A0 =C2=A0 with<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; the current version of the document.<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; Substantive comments to the list please, =
editorial comments can go<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; directly to the document editors.<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; We&#39;ll also get a brief update from th=
e editors at next week&#39;s<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; meeting. If there are any remaining issue=
s with the document,<br>
=C2=A0 =C2=A0 raising<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; them before the meeting would be especial=
ly helpful.<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; For the chairs,<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; Thomas<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; _________________________________________=
______<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; sfc mailing list<br></span>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; <a href=3D"mailto:sfc@ietf.org" target=3D=
"_blank">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=
=3D"_blank">sfc@ietf.org</a>&gt;<span class=3D""><br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;&gt; <a href=3D"https://www.ietf.org/mailman/l=
istinfo/sfc" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/mail=
man/listinfo/sfc</a><br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt; _____________________________________________=
__<br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt; sfc mailing list<br></span>
=C2=A0 =C2=A0 =C2=A0&gt; &gt; <a href=3D"mailto:sfc@ietf.org" target=3D"_bl=
ank">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"=
_blank">sfc@ietf.org</a>&gt;<span class=3D""><br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt; <a href=3D"https://www.ietf.org/mailman/listi=
nfo/sfc" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/mailman/=
listinfo/sfc</a><br>
=C2=A0 =C2=A0 =C2=A0&gt; &gt;<br>
<br>
=C2=A0 =C2=A0 _______________________________________________<br>
=C2=A0 =C2=A0 sfc mailing list<br></span>
=C2=A0 =C2=A0 <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.or=
g</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf=
.org</a>&gt;<br>
=C2=A0 =C2=A0 <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"=
noreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a>=
<br>
<br>
<br>
</blockquote>
</blockquote></div><br></div></div></div>

--001a1140bc0c7953f10530559540--


From nobody Tue Apr 12 20:45:34 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65D9912DE33 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 20:45:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id udsZi2ZPUVj3 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 20:45:32 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9950F12DD11 for <sfc@ietf.org>; Tue, 12 Apr 2016 20:45:32 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 6D49F1C02DE for <sfc@ietf.org>; Tue, 12 Apr 2016 20:45:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1460519132; bh=Gw/zFlbnxyMqsdRDZ/GsvI4lby8AiYMapVSOD6tdAI8=; h=To:From:Subject:Date:From; b=GmTX3FDr4mS/i770WRfIPH/yQRLmiZUBR+IpI52pxqkeqQY6GojQdKhd1wthiyQkl kPDUayqgjic/mbbxmSG5sLwryLU8vUYoqtZo2pzBEzDs3n/IREVsORo5LxSyYb45JX j0qVsQ8b0ZBrQ6HZOiakYb7w27sdi+7+ee9iHuX8=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 065E61C024F for <sfc@ietf.org>; Tue, 12 Apr 2016 20:45:31 -0700 (PDT)
To: "sfc@ietf.org" <sfc@ietf.org>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <570DC0D7.8050209@joelhalpern.com>
Date: Tue, 12 Apr 2016 23:45:27 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/QvrYbfRcNXp_Y2LDCKx1_RfRI9M>
Subject: [sfc] regarding NSH draft last call
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 03:45:33 -0000

I support publishing this document, with the agreed editorial fixes.

It is not perfect, but all of the alternatives I have seen discussed 
seem worse.  (I want a pony, a unicorn, a griffin, and some other mythic 
animals too...)
I can live with it as it is, and support its publication as an RFC.

Yours,
Joel


From nobody Tue Apr 12 21:31:52 2016
Return-Path: <loa@pi.nu>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5EED612E059 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 21:31:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level: 
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oEjn_PEq2IW2 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 21:31:49 -0700 (PDT)
Received: from pipi.pi.nu (pipi.pi.nu [83.168.239.141]) (using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 15B2C12E058 for <sfc@ietf.org>; Tue, 12 Apr 2016 21:31:49 -0700 (PDT)
Received: from [192.168.1.2] (unknown [122.53.41.246]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: loa@pi.nu) by pipi.pi.nu (Postfix) with ESMTPSA id 5455018013CB; Wed, 13 Apr 2016 06:31:45 +0200 (CEST)
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Alia Atlas <akatlas@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, Martin Stiemerling <mls.ietf@gmail.com>, "jguichar@cisco.com" <jguichar@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <570DBDFF.4070305@joelhalpern.com>
From: Loa Andersson <loa@pi.nu>
Message-ID: <570DCBA7.9040204@pi.nu>
Date: Wed, 13 Apr 2016 12:31:35 +0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <570DBDFF.4070305@joelhalpern.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/HRgY9Hvm6-TDFVNqdsHdcrQycYM>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 04:31:51 -0000

Joel,


On 2016-04-13 11:33, Joel M. Halpern wrote:
> With regard to MPLS encapsulation, I am not objecting to considering if
> we want to rearrange things to make it simpler to carry NSH in MPLS.
>
> Given that the IETF has not ratified a standards track RFC stating that
> it is required for MPLS carriage to avoid the values, I was objecting
> the Xu overstating the situation.

RFC 2026 says:

    Some RFCs standardize the results of community deliberations about
    statements of principle or conclusions about what is the best way to
    perform some operations or IETF process function.  These RFCs form
    the specification has been adopted as a BCP,

I guess that the operative word is the "standardize" in the first
sentence. RFC 4928 and standardize treatment of the first nibble after
the label stack in MPLS networks.

/Loa


>
> It is not actually hard to avoid the values.  If we feel it is
> imnportant (and I am tempted to agree that it is worth considering) we
> can rearrange some reserved bits so that the first three bits are 0, the
> next two are the version, and the remaining bits are flags.  Makes us a
> little starved for flags, but if we agree that MPLS has stolen three
> bits of header, so be it.
>
> There are other answers.  We could, for example, agree that when NSH is
> carried over MPLS, a dummy 0 label is inserted after the bottom of
> stack.  No worse than many things MPLS has done.  (I could argue both
> sides of which answer is right, and not persuade myself of either one.)
>
> On the next protocol IDs, the last time we looked we could not find an
> ID registration that was reasonably small and covered the needed
> meanings.  I note that even the section you point to concludes that
> there may well be good reasons for using a separate ID space.
>
> Yours,
> Joel
>
> On 4/12/16 10:29 PM, Alia Atlas wrote:
>> Xiaohu, Joel, and SFC WG group,
>>
>> The first nibble question is quite relevant if it is expected that the
>> NSH header might be directly under
>> an MPLS label stack.  This issue arose rather unpleasantly for
>> pseudo-wires a long time ago and the
>> reasoning for it is much better documented, as Carlos pointed out in a
>> different thread, in RFC 4928 Section 3.
>>
>> At the time that PWE3 was working on the control word and whether it was
>> to be mandatory (RFC 4385), it was clear that
>> there were devices that looked at the first nibble of a packet under the
>> MPLS header as a way to determine
>> if the packet was IPv4 or IPv6 and obtain flow-diversity from it.  The
>> cost of also verifying the associated checksum
>> if available wasn't deemed acceptable for several implementations.
>> Given that determining as much entropy as
>> possible is still really important and that it is non-trivial to
>> negotiate/indicate the capability for including
>> an Entropy Label in the MPLS stack, I have no reason to believe that
>> this shortcut of looking at the first nibble
>> is no longer used or deployed.   Feel free to contact me off-list if you
>> believe this to be the case.
>>
>> It is clear from the NSH base header:
>>
>>    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>       |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol |
>>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>
>> that this consideration has been completely ignored.  In fact, an NSH
>> base header might have any value
>> of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH were ever
>> defined, suddenly the traffic might
>> be subject to startling reordering if an MPLS transport were to be
>> considered.
>>
>> Given a claim of NSH being transport-agnostic and repeated emphasis that
>> MPLS, as well as UDP,
>> is a valid transport for NSH, I do think this is a significant oversight
>> and needs, at a minimum, discussion and
>> explanation, and  - quite likely -  correction.
>>
>> While I am on the topic of details of the NSH encapsulation, I would
>> request that Section 8 of draft-ietf-rtgwg-dt-encap-01
>> be read and considered!   I am not excited by having many different and
>> unique Next Protocol fields defined.
>> For instance, I note the definition of a nearly identical Next Protocol
>> field in https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe .
>>
>> While I am, of course, willing to reason to detailed and well-thought
>> out explanations for why each and every new
>> encapsulation needs its very own IANA-defined Next Protocol field, this
>> seems to me to be highly likely to require
>> consolidation so that the same Next Protocol field can be used between
>> the various encapsulations.
>>
>> I will work on giving a through review of NSH as soon as practical.  I
>> do realize that there are multiple implementations
>> and while details of how the "Next Protocol" field are documented
>> shouldn't have a significant impact there, the
>> discussion about the first nibble is likely to.
>>
>> Regards,
>> Alia
>>
>>
>> On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <xuxiaohu@huawei.com
>> <mailto:xuxiaohu@huawei.com>> wrote:
>>
>>     Joel,
>>
>>     > -----Original Message-----
>>     > From: Joel M. Halpern [mailto:jmh@joelhalpern.com
>> <mailto:jmh@joelhalpern.com>]
>>     > Sent: Wednesday, April 13, 2016 9:45 AM
>>     > To: Xuxiaohu; Thomas Narten;sfc@ietf.org <mailto:sfc@ietf.org>
>>     > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>     >
>>     > Xu,
>>     >       I do not believe that there is an MPLS specification that
>> requires that all
>>     > content other than IP must have a first nibble of 0 or 1.
>>
>>     When encapsulating NSH over MPLS directly, the first nibble of the
>>     NSH must not be 4 or 6.
>>
>>     > There are specifications where it is discussed as desirable.
>>     >
>>     > It is in fact pretty trivial for us to change the format so that
>> the first three bits are
>>     > 0, but it burns several valuable flag bits.  It is an SFC
>> working group decision,
>>
>>     That's the reason why I raised the first nibble question.
>>
>>     Best regards,
>>     Xiaohu
>>
>>      > not, as far as I can tell, a violation of the MPLS specification.
>>      >
>>      > Yours,
>>      > Joel
>>      >
>>      > On 4/12/16 9:41 PM, Xuxiaohu wrote:
>>      > > Hi Thomas,
>>      > >
>>      > > It said in the NSH draft:
>>      > >
>>      > >    "6.  Transport Agnostic: NSH is transport independent and is
>>     carried
>>      > >         in an overlay, over existing underlays.  If an existing
>>     overlay
>>      > >         topology provides the required service path
>>     connectivity, that
>>      > >         existing overlay may be used."
>>      > >
>>      > > That means the NSH should be able to be transported over MPLS.
>>     However,
>>      > according to the current NSH format definition, it's not safe to
>>     carry the NSH
>>      > over MPLS due to the first nibble issue. Therefore, I believe
>>     this issue needs to be
>>      > addressed before publication.
>>      > >
>>      > > Best regards,
>>      > > Xiaohu
>>      > >
>>      > >> -----Original Message-----
>>      > >> From: sfc [mailto:sfc-bounces@ietf.org
>>     <mailto:sfc-bounces@ietf.org>] On Behalf Of Thomas Narten
>>      > >> Sent: Thursday, March 31, 2016 10:48 AM
>>      > >> To: sfc@ietf.org <mailto:sfc@ietf.org>
>>      > >> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>      > >>
>>      > >> Dear WG:
>>      > >>
>>      > >> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>      > >> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>      > >>
>>      > >> The editors of the NSH document have indicated that they have
>>      > >> addressed all known comments and that there are no open issues
>>     with
>>      > >> the current version of the document.
>>      > >>
>>      > >> Substantive comments to the list please, editorial comments
>> can go
>>      > >> directly to the document editors.
>>      > >>
>>      > >> We'll also get a brief update from the editors at next week's
>>      > >> meeting. If there are any remaining issues with the document,
>>     raising
>>      > >> them before the meeting would be especially helpful.
>>      > >>
>>      > >> For the chairs,
>>      > >> Thomas
>>      > >>
>>      > >> _______________________________________________
>>      > >> sfc mailing list
>>      > >> sfc@ietf.org <mailto:sfc@ietf.org>
>>      > >> https://www.ietf.org/mailman/listinfo/sfc
>>      > >
>>      > > _______________________________________________
>>      > > sfc mailing list
>>      > > sfc@ietf.org <mailto:sfc@ietf.org>
>>      > > https://www.ietf.org/mailman/listinfo/sfc
>>      > >
>>
>>     _______________________________________________
>>     sfc mailing list
>>     sfc@ietf.org <mailto:sfc@ietf.org>
>>     https://www.ietf.org/mailman/listinfo/sfc
>>
>>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Apr 12 23:06:03 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2926B12E252 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 23:06:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VttKuY8-K0Tw for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 23:06:00 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 00FC612E250 for <sfc@ietf.org>; Tue, 12 Apr 2016 23:06:00 -0700 (PDT)
Received: from omfedm07.si.francetelecom.fr (unknown [xx.xx.xx.3]) by omfedm12.si.francetelecom.fr (ESMTP service) with ESMTP id 2FE9B18C2F2; Wed, 13 Apr 2016 08:05:58 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.58]) by omfedm07.si.francetelecom.fr (ESMTP service) with ESMTP id 0BFB54C072; Wed, 13 Apr 2016 08:05:58 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM33.corporate.adroot.infra.ftgroup ([fe80::3881:fc15:b4b2:9017%19]) with mapi id 14.03.0279.002; Wed, 13 Apr 2016 08:05:57 +0200
From: <mohamed.boucadair@orange.com>
To: sfc issue tracker <trac+sfc@tools.ietf.org>, "draft-ietf-sfc-nsh@tools.ietf.org" <draft-ietf-sfc-nsh@tools.ietf.org>, "paulq@cisco.com" <paulq@cisco.com>
Thread-Topic: [sfc] #19 (nsh): Mandatory context headers
Thread-Index: AQHRlOwp2Siymh3M80uC+JH03z21y5+Hataw
Date: Wed, 13 Apr 2016 06:05:57 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D5747D@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <067.cab2ac7351c39145b242787570b38828@tools.ietf.org> <082.7d97c9f6976fc689f2b380a40263328d@tools.ietf.org>
In-Reply-To: <082.7d97c9f6976fc689f2b380a40263328d@tools.ietf.org>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.13.41517
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Np0HzOjEDsXDzlxHavNIw00onOU>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #19 (nsh): Mandatory context headers
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 06:06:02 -0000

Hi Paul,

I object to close this issue.

Unless I'm mistaken, the consensus should be declared by the chairs otherwi=
se this is biased. I'm not the only one who raised this concern, BTW.

Cheers,
Med

> -----Message d'origine-----
> De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de sfc issue tracker
> Envoy=E9=A0: mardi 12 avril 2016 20:50
> =C0=A0: draft-ietf-sfc-nsh@tools.ietf.org; paulq@cisco.com
> Cc=A0: sfc@ietf.org
> Objet=A0: Re: [sfc] #19 (nsh): Mandatory context headers
>=20
> #19: Mandatory context headers
>=20
> Changes (by paulq@cisco.com):
>=20
>  * status:  new =3D> closed
>  * resolution:   =3D> wontfix
>=20
>=20
> Comment:
>=20
>  This was discussed on list, no consensus for change.  Will leave as is.
>=20
> --
> -------------------------------------+-----------------------------------=
-
> -
>  Reporter:                           |       Owner:  draft-ietf-sfc-
>   mohamed.boucadair@orange.com       |  nsh@tools.ietf.org
>      Type:  defect                   |      Status:  closed
>  Priority:  major                    |   Milestone:
> Component:  nsh                      |     Version:
>  Severity:  -                        |  Resolution:  wontfix
>  Keywords:                           |
> -------------------------------------+-----------------------------------=
-
> -
>=20
> Ticket URL: <https://trac.tools.ietf.org/wg/sfc/trac/ticket/19#comment:1>
> sfc <https://tools.ietf.org/sfc/>
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Apr 12 23:08:13 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 593E712E280 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 23:08:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.915
X-Spam-Level: 
X-Spam-Status: No, score=-2.915 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WiFj7RjMkpMI for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 23:08:09 -0700 (PDT)
Received: from relais-inet.orange.com (relais-nor34.orange.com [80.12.70.34]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A2DD12E27F for <sfc@ietf.org>; Tue, 12 Apr 2016 23:08:09 -0700 (PDT)
Received: from opfednr06.francetelecom.fr (unknown [xx.xx.xx.70]) by opfednr24.francetelecom.fr (ESMTP service) with ESMTP id 2FE99402C3; Wed, 13 Apr 2016 08:08:08 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.61]) by opfednr06.francetelecom.fr (ESMTP service) with ESMTP id 0657F1A0062; Wed, 13 Apr 2016 08:08:08 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7E.corporate.adroot.infra.ftgroup ([fe80::b91c:ea2c:ac8a:7462%19]) with mapi id 14.03.0279.002; Wed, 13 Apr 2016 08:08:05 +0200
From: <mohamed.boucadair@orange.com>
To: BOUCADAIR Mohamed IMT/OLN <mohamed.boucadair@orange.com>, "sfc issue tracker" <trac+sfc@tools.ietf.org>, "draft-ietf-sfc-nsh@tools.ietf.org" <draft-ietf-sfc-nsh@tools.ietf.org>, "paulq@cisco.com" <paulq@cisco.com>
Thread-Topic: [sfc] #19 (nsh): Mandatory context headers
Thread-Index: AQHRlOwp2Siymh3M80uC+JH03z21y5+HatawgAAAgzA=
Date: Wed, 13 Apr 2016 06:08:04 +0000
Message-ID: <39d0ecfa-7087-4043-a5de-06682db9dcc3@OPEXCLILM7E.corporate.adroot.infra.ftgroup>
References: <067.cab2ac7351c39145b242787570b38828@tools.ietf.org> <082.7d97c9f6976fc689f2b380a40263328d@tools.ietf.org> <787AE7BB302AE849A7480A190F8B933008D5747D@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D5747D@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/WHrDG01KYfPrzVw1xMYkQ1Yi2SA>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #19 (nsh): Mandatory context headers
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 06:08:11 -0000

Re-,

I checked the tracker but I didn't found any answer to the technical issue =
that I'm recalling here:

"
For type 1, why are there four mandatory context headers, rather than 2, 3,=
 5, 10, etc.?
"

Can you please let me know where this answer to the main issue was provided=
?

Thank you.

Cheers,
Med

> -----Message d'origine-----
> De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de
> mohamed.boucadair@orange.com
> Envoy=E9=A0: mercredi 13 avril 2016 08:06
> =C0=A0: sfc issue tracker; draft-ietf-sfc-nsh@tools.ietf.org; paulq@cisco=
.com
> Cc=A0: sfc@ietf.org
> Objet=A0: Re: [sfc] #19 (nsh): Mandatory context headers
>=20
> Hi Paul,
>=20
> I object to close this issue.
>=20
> Unless I'm mistaken, the consensus should be declared by the chairs
> otherwise this is biased. I'm not the only one who raised this concern,
> BTW.
>=20
> Cheers,
> Med
>=20
> > -----Message d'origine-----
> > De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de sfc issue tracke=
r
> > Envoy=E9=A0: mardi 12 avril 2016 20:50
> > =C0=A0: draft-ietf-sfc-nsh@tools.ietf.org; paulq@cisco.com
> > Cc=A0: sfc@ietf.org
> > Objet=A0: Re: [sfc] #19 (nsh): Mandatory context headers
> >
> > #19: Mandatory context headers
> >
> > Changes (by paulq@cisco.com):
> >
> >  * status:  new =3D> closed
> >  * resolution:   =3D> wontfix
> >
> >
> > Comment:
> >
> >  This was discussed on list, no consensus for change.  Will leave as is=
.
> >
> > --
> > -------------------------------------+---------------------------------=
-
> --
> > -
> >  Reporter:                           |       Owner:  draft-ietf-sfc-
> >   mohamed.boucadair@orange.com       |  nsh@tools.ietf.org
> >      Type:  defect                   |      Status:  closed
> >  Priority:  major                    |   Milestone:
> > Component:  nsh                      |     Version:
> >  Severity:  -                        |  Resolution:  wontfix
> >  Keywords:                           |
> > -------------------------------------+---------------------------------=
-
> --
> > -
> >
> > Ticket URL:
> <https://trac.tools.ietf.org/wg/sfc/trac/ticket/19#comment:1>
> > sfc <https://tools.ietf.org/sfc/>
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Apr 12 23:10:23 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0974612E04D for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 23:10:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.915
X-Spam-Level: 
X-Spam-Status: No, score=-2.915 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VB3ecMDtpF92 for <sfc@ietfa.amsl.com>; Tue, 12 Apr 2016 23:10:20 -0700 (PDT)
Received: from relais-inet.orange.com (relais-nor36.orange.com [80.12.70.36]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 58CAE12D938 for <sfc@ietf.org>; Tue, 12 Apr 2016 23:10:20 -0700 (PDT)
Received: from opfednr02.francetelecom.fr (unknown [xx.xx.xx.66]) by opfednr22.francetelecom.fr (ESMTP service) with ESMTP id E1A8B202B9; Wed, 13 Apr 2016 08:10:18 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.66]) by opfednr02.francetelecom.fr (ESMTP service) with ESMTP id 9D3D0120065; Wed, 13 Apr 2016 08:10:18 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILMA1.corporate.adroot.infra.ftgroup ([fe80::95e2:eb4b:3053:fabf%19]) with mapi id 14.03.0279.002; Wed, 13 Apr 2016 08:10:18 +0200
From: <mohamed.boucadair@orange.com>
To: sfc issue tracker <trac+sfc@tools.ietf.org>, "draft-ietf-sfc-nsh@tools.ietf.org" <draft-ietf-sfc-nsh@tools.ietf.org>, "paulq@cisco.com" <paulq@cisco.com>
Thread-Topic: [sfc] #18 (nsh): Mandatory to implement MD Type
Thread-Index: AQHRlOyExpLf+bA/u02ck+ys4jTQ1p+Ha+Sg
Date: Wed, 13 Apr 2016 06:10:17 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D574CB@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <067.9df4155255e7f9166fd94d4f85865aa0@tools.ietf.org> <082.049e70547d966ac79d10e9bc1b371b0b@tools.ietf.org>
In-Reply-To: <082.049e70547d966ac79d10e9bc1b371b0b@tools.ietf.org>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/t9AscSJsaVBCdu0u1jaE7CZZQ3c>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #18 (nsh): Mandatory to implement MD Type
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 06:10:22 -0000

Re-,

I disagree with this resolution.=20

I suggest to reopen the issue as it is still pending. Thank you.

Cheers,
Med

> -----Message d'origine-----
> De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de sfc issue tracker
> Envoy=E9=A0: mardi 12 avril 2016 20:53
> =C0=A0: draft-ietf-sfc-nsh@tools.ietf.org; paulq@cisco.com
> Cc=A0: sfc@ietf.org
> Objet=A0: Re: [sfc] #18 (nsh): Mandatory to implement MD Type
>=20
> #18: Mandatory to implement MD Type
>=20
> Changes (by paulq@cisco.com):
>=20
>  * status:  new =3D> closed
>  * resolution:   =3D> wontfix
>=20
>=20
> Comment:
>=20
>  Discussed on list -- changes to draft to make type support more clear.
> No
>  consensus to change key word.
>=20
> --
> -------------------------------------+-----------------------------------=
-
> -
>  Reporter:                           |       Owner:  draft-ietf-sfc-
>   mohamed.boucadair@orange.com       |  nsh@tools.ietf.org
>      Type:  defect                   |      Status:  closed
>  Priority:  major                    |   Milestone:
> Component:  nsh                      |     Version:
>  Severity:  -                        |  Resolution:  wontfix
>  Keywords:                           |
> -------------------------------------+-----------------------------------=
-
> -
>=20
> Ticket URL: <https://trac.tools.ietf.org/wg/sfc/trac/ticket/18#comment:1>
> sfc <https://tools.ietf.org/sfc/>
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Apr 13 00:21:43 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE60612D95A for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 00:21:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fYjzYd0nZB44 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 00:21:35 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6FBA412D8AE for <sfc@ietf.org>; Wed, 13 Apr 2016 00:21:35 -0700 (PDT)
Received: from omfedm07.si.francetelecom.fr (unknown [xx.xx.xx.3]) by omfedm13.si.francetelecom.fr (ESMTP service) with ESMTP id C79DA3241B6; Wed, 13 Apr 2016 09:21:33 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.69]) by omfedm07.si.francetelecom.fr (ESMTP service) with ESMTP id A4CC34C06F; Wed, 13 Apr 2016 09:21:33 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILMA2.corporate.adroot.infra.ftgroup ([fe80::bc1c:ad2f:eda3:8c3d%18]) with mapi id 14.03.0279.002; Wed, 13 Apr 2016 09:21:33 +0200
From: <mohamed.boucadair@orange.com>
To: sfc issue tracker <trac+sfc@tools.ietf.org>, "draft-ietf-sfc-nsh@tools.ietf.org" <draft-ietf-sfc-nsh@tools.ietf.org>, "paulq@cisco.com" <paulq@cisco.com>
Thread-Topic: [sfc] #3 (nsh): Critical Metadata
Thread-Index: AQHRcNyA2PryLLBRNkeOc4DpJmTOJJ+Hwr0Q
Date: Wed, 13 Apr 2016 07:21:32 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D5756C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <067.9c65f9ec41260d7f098b9c209486a5bb@tools.ietf.org> <082.793c209f6bcc9c774ecb42cd104a5480@tools.ietf.org>
In-Reply-To: <082.793c209f6bcc9c774ecb42cd104a5480@tools.ietf.org>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.3.14.165416
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/7r4IEBlxaVJPHsPn3kjbEMwiAOk>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #3 (nsh): Critical Metadata
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 07:21:42 -0000

SGkgUGF1bCwgDQoNCkknbSBhZnJhaWQgdGhpcyBpc3N1ZSBpcyBzdGlsbCBwZW5kaW5nLg0KDQpJ
J20gcmVpdGVyYXRpbmcgdGhlIGlzc3VlIGhlcmUgdG8gaG9wZWZ1bGx5IGhhdmUgc29tZSBkaXNj
dXNzaW9uLiANCg0KVGhlIGRyYWZ0IHNheXMgdGhlIGZvbGxvd2luZzogDQoNCiAgIEMgYml0OiBJ
bmRpY2F0ZXMgdGhhdCBhIGNyaXRpY2FsIG1ldGFkYXRhIFRMViBpcyBwcmVzZW50IChzZWUgU2Vj
dGlvbg0KICAgMy40LjIpLiAgVGhpcyBiaXQgYWN0cyBhcyBhbiBpbmRpY2F0aW9uIGZvciBoYXJk
d2FyZSBpbXBsZW1lbnRlcnMgdG8NCiAgIGRlY2lkZSBob3cgdG8gaGFuZGxlIHRoZSBwcmVzZW5j
ZSBvZiBhIGNyaXRpY2FsIFRMViB3aXRob3V0DQogICBuZWNlc3NhcmlseSBuZWVkaW5nIHRvIHBh
cnNlIGFsbCBUTFZzIHByZXNlbnQuICBUaGUgQyBiaXQgTVVTVCBiZSBzZXQNCiAgIHRvIDB4MCB3
aGVuIE1EIFR5cGU9IDB4MSBhbmQgTUFZIGJlIHVzZWQgd2l0aCBNRCBUeXBlID0gMHgyIGFuZCBN
VVNUDQogICBiZSBzZXQgdG8gMHgxIGlmIG9uZSBvciBtb3JlIGNyaXRpY2FsIFRMVnMgYXJlIHBy
ZXNlbnQuDQoNCiogRmlyc3QsIHRoZXJlIGlzIG5vdCBzdWNoIFNlY3Rpb24gMy40LjIgaW4gdGhl
IGRvY3VtZW50Lg0KKiBPYnZpb3VzbHksIHRoaXMgZmxhZyBhcHBsaWVzIG9ubHkgZm9yIE1EIzIg
Z2l2ZW4gdGhhdCB0aGUgdGV4dCBpcyBhYm91dCBtZXRhZGF0YSBUTFZzLiANCiogSG93IHRoaXMg
ZmxhZyBoZWxwcyBhbiBpbXBsZW1lbnRhdGlvbiBub3QgdG8gcGFyc2UgYWxsIFRMVnM/DQoqIElz
bid0IHRoaXMgZmxhZyByZWR1bmRhbnQgd2l0aCB0aGUgIkNyaXRpY2FsIEJpdCIgeW91IGFyZSBk
ZWZpbmluZyBmb3IgVExWcz8NCiogQXJlIHRoZXJlIFRMVnMgdGhhdCBtdXN0IGJlIG1hbmRhdG9y
eS10by1wcm9jZXNzIGJ5IGRlc2lnbj8gSXNuJ3QgdGhpcyBhIGxvY2FsIGRlcGxveW1lbnQgZGVj
aXNpb24/IEEgVExWIG1heSBiZSBtYW5kYXRvcnktdG8tcHJvY2VzcyBmb3IgYSBnaXZlbiBjaGFp
biBidXQgb3B0aW9uYWwgZm9yIGFub3RoZXIgb25lLiANCiogQWxsIFRMVnMgYXJlIGJ5IGRlZmlu
aXRpb24gY2FuZGlkYXRlIHRvIGJlIG1hbmRhdG9yeS10by1wcm9jZXNzIG9mIG9wdGlvbmFsLXRv
LXByb2Nlc3MgKGFzIGEgZnVuY3Rpb24gb2YgdGhlIGRlcGxveW1lbnQgY29udGV4dCwgc2Vydmlj
ZSBjaGFpbiwgZXRjLikuIERlZmluaW5nIHNwZWNpZmljIHJhbmdlcyBmb3IgZWFjaCBkb2VzIG5v
dCBtYWtlIHNlbnNlIElNTy4gRldJVywgSSdtIHJlZmVycmluZyB0byB0aGlzIHBhcnQgb2YgdGhl
IHRleHQ6IA0KDQoiIFRoaXMgZWZmZWN0aXZlbHkgYWxsb2NhdGVzIFR5cGUgdmFsdWVzIDAgdG8g
MTI3DQogICBmb3Igbm9uLWNyaXRpY2FsIG9wdGlvbnMgYW5kIFR5cGUgdmFsdWVzIDEyOCB0byAy
NTUgZm9yIGNyaXRpY2FsDQogICBvcHRpb25zLiINCiANCiogVGhlIHNldCBvZiBtYW5kYXRvcnkt
dG8tcHJvY2VzcyBUTFZzIHNob3VsZCBiZSBpbnN0cnVjdGVkIHZpYSBjb250cm9sIHBsYW5lLiBU
aGlzIHNob3VsZCBiZSBhZGRlZCB0byB0aGUgZG9jdW1lbnQuIA0KKiBBcmVuJ3QgdGhlcmUgaW1w
bGljYXRpb25zIG9uIHRoZSB2YWx1ZSBvZiBDLWJpdCB3aGVuIGEgbWV0YWRhdGEgaXMgaW5qZWN0
ZWQgb3Igc3RyaXBlZCBieSBpbnRlcm1lZGlhdGUgU0ZDLWF3YXJlIG5vZGVzPyBBbiBpbXBsZW1l
bnRhdGlvbiBvYnZpb3VzbHkgbmVlZHMgdG8gcmVleGFtaW5lIHRoZSBzZXQgb2YgVExWIHRvIGNo
ZWNrIHRoYXQgYXQgbGVhc3Qgb25lIGNyaXRpY2FsIFRMViBpcyBzdGlsbCBwcmVzZW50IHRvIGRl
Y2lkZSB3aGV0aGVyIHJld3JpdGluZyB0aGUgQyBiaXQgaXMgbmVlZGVkLiBJcyBpdCB3b3J0aCB0
byBleGVjdXRlIHRoYXQgY2hlY2s/DQoqIEhvdyBhbiBpbXBsZW1lbnRhdGlvbiBpcyBleHBlY3Rl
ZCB0byBiZWhhdmUgaWYgdGhlIEMgYml0IGlzIHNldCBidXQgbm8gbWFuZGF0b3J5LXRvLXByb2Nl
c3MgVExWIGlzIGZvdW5kPw0KDQpUaGFuayB5b3UuDQoNCkNoZWVycywNCk1lZA0KDQo+IC0tLS0t
TWVzc2FnZSBkJ29yaWdpbmUtLS0tLQ0KPiBEZcKgOiBzZmMgaXNzdWUgdHJhY2tlciBbbWFpbHRv
OnRyYWMrc2ZjQHRvb2xzLmlldGYub3JnXQ0KPiBFbnZvecOpwqA6IHZlbmRyZWRpIDI2IGbDqXZy
aWVyIDIwMTYgMjI6MjcNCj4gw4DCoDogZHJhZnQtaWV0Zi1zZmMtbnNoQHRvb2xzLmlldGYub3Jn
OyBCT1VDQURBSVIgTW9oYW1lZCBJTVQvT0xOOw0KPiBwYXVscUBjaXNjby5jb20NCj4gQ2PCoDog
c2ZjQGlldGYub3JnDQo+IE9iamV0wqA6IFJlOiBbc2ZjXSAjMyAobnNoKTogQ3JpdGljYWwgTWV0
YWRhdGENCj4gDQo+ICMzOiBDcml0aWNhbCBNZXRhZGF0YQ0KPiANCj4gQ2hhbmdlcyAoYnkgcGF1
bHFAY2lzY28uY29tKToNCj4gDQo+ICAqIHN0YXR1czogIG5ldyA9PiBjbG9zZWQNCj4gICogcmVz
b2x1dGlvbjogICA9PiB3b250Zml4DQo+IA0KPiANCj4gQ29tbWVudDoNCj4gDQo+ICBSZXBseTog
IGl0IGlzIHVuY2xlYXIgd2hhdCBzdWdnZXN0ZWQgYWN0aW9uIGlzIGJlaW5nIHJlcXVlc3RlZC4g
IElmDQo+ICBmdXJ0aGVyIGNsYXJpZmljYXRpb24gb2YgY3JpdGljYWwgbWV0YWRhdGEgaW4gcmVx
dWlyZWQsIHRleHQgY2FuIGJlIGFkZGVkDQo+ICB0byB0aGUgZHJhZnQsIHN1YmplY3QgdG8gV0cg
cmV2aWV3Lg0KPiANCj4gLS0NCj4gLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LSstLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCj4gLQ0KPiAgUmVwb3J0ZXI6
ICAgICAgICAgICAgICAgICAgICAgICAgICAgfCAgICAgICBPd25lcjogIGRyYWZ0LWlldGYtc2Zj
LQ0KPiAgIG1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb20gICAgICAgfCAgbnNoQHRvb2xzLmll
dGYub3JnDQo+ICAgICAgVHlwZTogIGRlZmVjdCAgICAgICAgICAgICAgICAgICB8ICAgICAgU3Rh
dHVzOiAgY2xvc2VkDQo+ICBQcmlvcml0eTogIG1ham9yICAgICAgICAgICAgICAgICAgICB8ICAg
TWlsZXN0b25lOg0KPiBDb21wb25lbnQ6ICBuc2ggICAgICAgICAgICAgICAgICAgICAgfCAgICAg
VmVyc2lvbjoNCj4gIFNldmVyaXR5OiAgLSAgICAgICAgICAgICAgICAgICAgICAgIHwgIFJlc29s
dXRpb246ICB3b250Zml4DQo+ICBLZXl3b3JkczogICAgICAgICAgICAgICAgICAgICAgICAgICB8
DQo+IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0rLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tDQo+IC0NCj4gDQo+IFRpY2tldCBVUkw6IDxodHRwczovL3Ry
YWMudG9vbHMuaWV0Zi5vcmcvd2cvc2ZjL3RyYWMvdGlja2V0LzMjY29tbWVudDoyPg0KPiBzZmMg
PGh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcvc2ZjLz4NCg0K


From nobody Wed Apr 13 00:33:38 2016
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 65A9612DDD9; Wed, 13 Apr 2016 00:33:36 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.19.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20160413073336.6079.80149.idtracker@ietfa.amsl.com>
Date: Wed, 13 Apr 2016 00:33:36 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/HdO4pIrkBxAbH_6f9enjlLe53E8>
Cc: sfc@ietf.org
Subject: [sfc] I-D Action: draft-ietf-sfc-use-case-mobility-06.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 07:33:36 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Service Function Chaining of the IETF.

        Title           : Service Function Chaining Use Cases in Mobile Networks
        Authors         : Walter Haeffner
                          Jeffrey Napper
                          Martin Stiemerling
                          Diego R. Lopez
                          Jim Uttaro
	Filename        : draft-ietf-sfc-use-case-mobility-06.txt
	Pages           : 26
	Date            : 2016-04-13

Abstract:
   This document provides some exemplary use cases for service function
   chaining in mobile service provider networks.  The objective of this
   draft is not to cover all conceivable service chains in detail.
   Rather, the intention is to localize and explain the application
   domain of service chaining within mobile networks as far as it is
   required to complement the problem statement [RFC7498] and
   architecture framework [ietf-sfc-arch] of the working group.

   Service function chains typically reside in a LAN segment which links
   the mobile access network to the actual application platforms located
   in the carrier's datacenters or somewhere else in the Internet.
   Service function chains (SFC) ensure a fair distribution of network
   resources according to agreed service policies, enhance the
   performance of service delivery or take care of security and privacy.
   SFCs may also include Value Added Services (VAS).  Commonly, SFCs are
   typical middle box based services.

   General considerations and specific use cases are presented in this
   document to demonstrate the different technical requirements of these
   goals for service function chaining in mobile service provider
   networks.

   The specification of service function chaining for mobile networks
   must take into account an interaction between service function chains
   and the 3GPP Policy and Charging Control (PCC) environment.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sfc-use-case-mobility/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-sfc-use-case-mobility-06

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-use-case-mobility-06


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Wed Apr 13 00:36:08 2016
Return-Path: <jenapper@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E808A12D802; Wed, 13 Apr 2016 00:36:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X4UxdHpuk87n; Wed, 13 Apr 2016 00:36:05 -0700 (PDT)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4533512D773; Wed, 13 Apr 2016 00:36:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4196; q=dns/txt; s=iport; t=1460532965; x=1461742565; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=8crdD3rYwf0j6UarBFVkn3UvFcEnQ1SxgyJ0S+KVXWs=; b=IunyfwEyPO1T5f1jxtP4gqJ4zUAIjV7QbUsiTUBz9qsLnOms3pL3WeV3 IKf6Hn1nK6cfsHaGHCx64p9QzbRKmDp3I7yN1uxB+5sVIeE7wP+qMfr8l RjAoacwBYvxS1FadFFjVBcIIoWnxtPNn/rg5sDXlNfXMoNP141AjD4VNX w=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0D3AQCb9g1X/5NdJa1egzdTfQa6ZAENg?= =?us-ascii?q?XYXC4VsAhyBJTgUAQEBAQEBAWUnhEIBAQQBAQEgETMHCxACAQgSCAIRFQICAiU?= =?us-ascii?q?LFQIOAgQBDQWIKA6wLJIZAQEBAQEBAQEBAQEBAQEBAQEBAQEBFXyFJYF1glaEf?= =?us-ascii?q?oJBK4IrBZgIAYV2iBaBZ06EAIhbjyYBHgEBQoNnbIh8fgEBAQ?=
X-IronPort-AV: E=Sophos;i="5.24,478,1454976000"; d="scan'208";a="259280189"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 Apr 2016 07:36:04 +0000
Received: from XCH-ALN-002.cisco.com (xch-aln-002.cisco.com [173.36.7.12]) by rcdn-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id u3D7a4SF001607 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 07:36:04 GMT
Received: from xch-rcd-005.cisco.com (173.37.102.15) by XCH-ALN-002.cisco.com (173.36.7.12) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 13 Apr 2016 02:36:03 -0500
Received: from xch-rcd-005.cisco.com ([173.37.102.15]) by XCH-RCD-005.cisco.com ([173.37.102.15]) with mapi id 15.00.1104.009; Wed, 13 Apr 2016 02:36:02 -0500
From: "Jeffrey Napper (jenapper)" <jenapper@cisco.com>
To: "internet-drafts@ietf.org" <internet-drafts@ietf.org>, "i-d-announce@ietf.org" <i-d-announce@ietf.org>
Thread-Topic: [sfc] I-D Action: draft-ietf-sfc-use-case-mobility-06.txt
Thread-Index: AQHRlVbQzE3uNggYfUqBgv8TVW9P/J+H+O0A
Date: Wed, 13 Apr 2016 07:36:02 +0000
Message-ID: <286E5994-B0AA-4D0D-81A5-D3BE6440DD5F@cisco.com>
References: <20160413073336.6079.80149.idtracker@ietfa.amsl.com>
In-Reply-To: <20160413073336.6079.80149.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.61.235.128]
Content-Type: text/plain; charset="utf-8"
Content-ID: <FF1ACEC3DD5F384DB6E09FCB55E3DA0D@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/jsxcA0LRvgHHGUuTHB1_USaUYpY>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] I-D Action: draft-ietf-sfc-use-case-mobility-06.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 07:36:07 -0000
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From nobody Wed Apr 13 00:48:06 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2FDE412DFCD for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 00:48:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.915
X-Spam-Level: 
X-Spam-Status: No, score=-2.915 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mR-ueEBo7g60 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 00:48:02 -0700 (PDT)
Received: from relais-inet.orange.com (relais-nor35.orange.com [80.12.70.35]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 84BF712DFBD for <sfc@ietf.org>; Wed, 13 Apr 2016 00:48:02 -0700 (PDT)
Received: from opfednr02.francetelecom.fr (unknown [xx.xx.xx.66]) by opfednr24.francetelecom.fr (ESMTP service) with ESMTP id C4EFB40307; Wed, 13 Apr 2016 09:48:00 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.2]) by opfednr02.francetelecom.fr (ESMTP service) with ESMTP id 91EED12005B; Wed, 13 Apr 2016 09:48:00 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM21.corporate.adroot.infra.ftgroup ([fe80::e92a:c932:907e:8f06%19]) with mapi id 14.03.0279.002; Wed, 13 Apr 2016 09:48:00 +0200
From: <mohamed.boucadair@orange.com>
To: sfc issue tracker <trac+sfc@tools.ietf.org>, "draft-ietf-sfc-nsh@tools.ietf.org" <draft-ietf-sfc-nsh@tools.ietf.org>, "paulq@cisco.com" <paulq@cisco.com>
Thread-Topic: [sfc] #10 (nsh): O bit
Thread-Index: AQHRcN7/T+qlRBf4V0quI1RlrGLgU5+HyoFw
Date: Wed, 13 Apr 2016 07:47:59 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D575AF@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <067.78e3cad1267e838836b8aa31364bf52f@tools.ietf.org> <082.7faf2f0b4545924030d740d19fcb524f@tools.ietf.org>
In-Reply-To: <082.7faf2f0b4545924030d740d19fcb524f@tools.ietf.org>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/MrVQs2jRycFY1wwADXmh5AmQ4bw>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #10 (nsh): O bit
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 07:48:05 -0000

Paul,=20

I don't see how citing RFC 7498 (as suggested in your reply below) is relat=
ed to this issue.=20

Furthermore, I see this reply in the tracker:=20

"Reserving a bit for OAM is acceptable, and done in other protocol specific=
ations. OAM-specific drafts exist and will leverage the presence of the bit=
. Further, over time new OAM uses may arise, having the explicit ability to=
 support them day-0 is key. The O bit was agreed upon by the WG during adop=
tion, and there is no consensus to remove it. I propose that a reference be=
 added to the OAM framework draft."

* I see that you suggest to add a reference to the OAM framework draft, but=
 still there is no such change in the text. I agree with adding draft-ietf-=
sfc-oam-framework as an informative reference. Thanks.
* The text does not say what an implementer needs to. The text "MUST examin=
e the payload and take appropriate action" is vague and underspecified. I s=
uggest to make this change:

OLD:=20

   O bit: when set to 0x1 indicates that this packet is an operations
   and management (OAM) packet.  The receiving SFF and SFs nodes MUST
   examine the payload and take appropriate action (e.g. return status
   information).

   OAM message specifics and handling details are outside the scope of
   this document.

NEW:

   O bit: when set to 0x1 indicates that this packet is an operations
   and management (OAM) packet.  It is out of scope of this document
   to define the behaviors of SFFs and SF for processing this bit. =20
   OAM message specifics and handling details are outside the scope of
   this document. The reader may refer to [I-D.ietf-sfc-oam-framework]
   for an OAM SFC framework.=20

   This bit is set by default to 0x0.=20

   Intermediate SFFs and SFs MUST NOT change the value of this bit when
   forwarding the packet to the next hop.

Thank you.

Cheers,
Med

> -----Message d'origine-----
> De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de sfc issue tracker
> Envoy=E9=A0: vendredi 26 f=E9vrier 2016 22:45
> =C0=A0: draft-ietf-sfc-nsh@tools.ietf.org; paulq@cisco.com
> Cc=A0: sfc@ietf.org
> Objet=A0: Re: [sfc] #10 (nsh): O bit
>=20
> #10: O bit
>=20
> Changes (by paulq@cisco.com):
>=20
>  * status:  new =3D> closed
>  * resolution:   =3D> wontfix
>=20
>=20
> Comment:
>=20
>  Reply: The current version of the draft states:  "A short reference is
>  included below, RFC 7498 [RFC7498], provides a
>  more comprehensive review of the SFC Problem Statement."  That seems lik=
e
>  a reasonable approach, and propose marking this item as resolved.
>=20
> --
> -------------------------------------+-----------------------------------=
-
> -
>  Reporter:                           |       Owner:  draft-ietf-sfc-
>   mohamed.boucadair@orange.com       |  nsh@tools.ietf.org
>      Type:  defect                   |      Status:  closed
>  Priority:  major                    |   Milestone:
> Component:  nsh                      |     Version:
>  Severity:  -                        |  Resolution:  wontfix
>  Keywords:                           |
> -------------------------------------+-----------------------------------=
-
> -
>=20
> Ticket URL: <https://trac.tools.ietf.org/wg/sfc/trac/ticket/10#comment:1>
> sfc <https://tools.ietf.org/sfc/>
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Apr 13 01:11:29 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7BBE712DADB for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 01:11:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IVQFg7s3j04c for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 01:11:27 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CF99B12D9FF for <sfc@ietf.org>; Wed, 13 Apr 2016 01:11:26 -0700 (PDT)
Received: from omfedm05.si.francetelecom.fr (unknown [xx.xx.xx.1]) by omfedm13.si.francetelecom.fr (ESMTP service) with ESMTP id 270333245C1; Wed, 13 Apr 2016 10:11:25 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.57]) by omfedm05.si.francetelecom.fr (ESMTP service) with ESMTP id 04A5235C05A; Wed, 13 Apr 2016 10:11:25 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM23.corporate.adroot.infra.ftgroup ([fe80::787e:db0c:23c4:71b3%19]) with mapi id 14.03.0279.002; Wed, 13 Apr 2016 10:11:24 +0200
From: <mohamed.boucadair@orange.com>
To: sfc issue tracker <trac+sfc@tools.ietf.org>, "draft-ietf-sfc-nsh@tools.ietf.org" <draft-ietf-sfc-nsh@tools.ietf.org>, "paulq@cisco.com" <paulq@cisco.com>
Thread-Topic: [sfc] #9 (nsh): Remove Section 2.2
Thread-Index: AQHRczL0uiaYRX9jfk6KcVaLfYsYEp+H0FPA
Date: Wed, 13 Apr 2016 08:11:23 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D57606@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <067.899935ca6705bc1c7b688cce09a8131c@tools.ietf.org> <082.b205b32ae1f2cbf88a233de956fba3eb@tools.ietf.org>
In-Reply-To: <082.b205b32ae1f2cbf88a233de956fba3eb@tools.ietf.org>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.3.14.165416
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/AdAoea6Et5LyOmyb4VwEs059jL4>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #9 (nsh): Remove Section 2.2
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 08:11:28 -0000

Re-,

No need to recall this is a minor comment. Citing RFC7498 would be sufficie=
nt rather than a copy/paste text from that RFC.

I see that Carlos raised a similar comment with Section 2.1 vs. RFC 7665.

Cheers,
Med

> -----Message d'origine-----
> De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de sfc issue tracker
> Envoy=E9=A0: lundi 29 f=E9vrier 2016 21:51
> =C0=A0: draft-ietf-sfc-nsh@tools.ietf.org; paulq@cisco.com
> Cc=A0: sfc@ietf.org
> Objet=A0: Re: [sfc] #9 (nsh): Remove Section 2.2
>=20
> #9: Remove Section 2.2
>=20
> Changes (by paulq@cisco.com):
>=20
>  * status:  new =3D> closed
>  * resolution:   =3D> wontfix
>=20
>=20
> Comment:
>=20
>  Reply: The current version of the draft states:  "A short reference is
>  included below, RFC 7498 [RFC7498], provides a
>  more comprehensive review of the SFC Problem Statement."  That seems lik=
e
>  a reasonable approach, and propose marking this item as resolved.
>=20
> --
> -------------------------------------+-----------------------------------=
-
> -
>  Reporter:                           |       Owner:  draft-ietf-sfc-
>   mohamed.boucadair@orange.com       |  nsh@tools.ietf.org
>      Type:  enhancement              |      Status:  closed
>  Priority:  minor                    |   Milestone:
> Component:  nsh                      |     Version:
>  Severity:  -                        |  Resolution:  wontfix
>  Keywords:                           |
> -------------------------------------+-----------------------------------=
-
> -
>=20
> Ticket URL: <https://trac.tools.ietf.org/wg/sfc/trac/ticket/9#comment:1>
> sfc <https://tools.ietf.org/sfc/>
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Apr 13 05:17:25 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8262212DBED for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 05:17:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X-mCUZuqXSQY for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 05:17:21 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 91D5112DCAF for <sfc@ietf.org>; Wed, 13 Apr 2016 05:17:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=14934; q=dns/txt; s=iport; t=1460549841; x=1461759441; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=NB+7+kedf9tAxNEM3AKxKX/H0eJFM4j57BCq1hfq5UA=; b=g4EeXpDbHbLrazU5g2TRDwQ9+A9DN6X5OBGjLeDLLdQUr037bQki8T1V Zv3zfwIshV+ee0e68Lwxjd0INQu6C3BNPHKMbHM9E5NEz9y+FxCe88HL8 FDvUufuexWdVEN7e0gheRZuWFZMz4uFW86xtQ2vmH9WpdqrIZ8NMI1/0G Y=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DhAgBkNw5X/49dJa1egzdTfQaub4Zlh?= =?us-ascii?q?HMOgXQXAQqFbAKBRTgUAQEBAQEBAWUnhEEBAQEDAQEBARoGSwsFCwIBCBgnAwI?= =?us-ascii?q?CIQYLFBECBA4FDg2HeAMKCA6wRY0MDYUtAQEBAQEBAQEBAQEBAQEBAQEBAQEBD?= =?us-ascii?q?QQEhiGBdYJWgkGCK4JTK4IrBZMbhDwxAYMjgWZthiGBdYFnhE6IW4YggSuHWwE?= =?us-ascii?q?eAUODZ2yIfH4BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,479,1454976000";  d="asc'?scan'208,217";a="93094096"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 Apr 2016 12:17:20 +0000
Received: from XCH-RTP-019.cisco.com (xch-rtp-019.cisco.com [64.101.220.159]) by rcdn-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id u3DCHJYA009485 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 12:17:20 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-019.cisco.com (64.101.220.159) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 13 Apr 2016 08:17:19 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Wed, 13 Apr 2016 08:17:19 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: "Andrew G. Malis" <agmalis@gmail.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfXjVJMNJL6xkKtVPhZYT1+65+HLsqAgAD7LAA=
Date: Wed, 13 Apr 2016 12:17:19 +0000
Message-ID: <1AD36AEC-96C1-488F-AA47-F15A27D7310E@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <CAA=duU0jSG7J8ChoHP8zB4SWL2x9_YBHPx3vYovmGRmmpti9Lw@mail.gmail.com>
In-Reply-To: <CAA=duU0jSG7J8ChoHP8zB4SWL2x9_YBHPx3vYovmGRmmpti9Lw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.232.81]
Content-Type: multipart/signed; boundary="Apple-Mail=_9F8A7663-39D7-42C1-A704-953781F82A9F"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/9WRXbv0Js_Axu10uEg-s3FQhLvY>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 12:17:24 -0000

--Apple-Mail=_9F8A7663-39D7-42C1-A704-953781F82A9F
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_5B5FFEEE-9DAD-4FB1-9EB9-6EB63CDDB1D4"


--Apple-Mail=_5B5FFEEE-9DAD-4FB1-9EB9-6EB63CDDB1D4
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi, Andy,

> On Apr 12, 2016, at 5:18 PM, Andrew G. Malis <agmalis@gmail.com> =
wrote:
>=20
> Thomas,
>=20
> I do NOT support this WG last call.
>=20

I=E2=80=99d like to better understand the basis for your note.

The NSH draft is the only WG document with a solution to the SFC =
encapsulation, satisfying a WG important milestone and deliverable.

As such, please find some comments and questions below:

> Back in November, I reported a bug in section 14.2.3 that was =
acknowledged on the WG list, but was never corrected in the text. To =
repeat my report:
>=20
> There=E2=80=99s a bug with section 14.2.3. The text should be =
corrected as follows:
>=20
> OLD:
>=20
> 14.2.3.  TLV Class Registry
>=20
>    IANA is requested to set up a registry of "TLV Types".  These are =
16-
>    bit values.  Registry entries are assigned by using the "IETF =
Review"
>    policy defined in RFC 5226 [RFC5226].
>=20
> NEW:
>=20
> 14.2.3.  TLV Class Registry
>=20
>    IANA is requested to set up a registry of "TLV Classes".  These are =
16-
>    bit values.  Registry entries are assigned by using the "IETF =
Review"
>    policy defined in RFC 5226 [RFC5226].
>=20

Thank you for checking! I have the same routine of checking whether my =
review comments and suggestions had been incorporated, and that improves =
document quality.

This one is clearly a small editorial, which ought to be fixed. While it =
may be disconcerting or disappointing, the good thing is that it has an =
easy fix, and does not look like a publication showstopper... This is =
why we do WG LCs, and have several levels of review in the IETF.

>=20
> This leaves me curious as to what other acknowledged comments on the =
draft may have been also left out of the editing process.
>=20

I=E2=80=99m not sure how useful this comment is. Are you aware of other =
acked-but-unfixed comments? If so, please do raise them. Otherwise, this =
is not an actionable comment, it only creates FUD.

> I also note that although the TLV Class registry is being created, =
there are no values to be allocated within the registry. I believe that =
this is contrary to IANA policy. Or if not, it=E2=80=99s at least =
questionable.
>=20

Questioning is good. I also have the same tendency.

In this case, there=E2=80=99s no IANA policy against creating registries =
with unallocated values. I just checked =
draft-leiba-cotton-iana-5226bis-11. Do you have a different pointer?

Regarding questioning it, I=E2=80=99ve seen it many times. I=E2=80=99ve =
done it in some of my RFCs as well, e.g., =
https://tools.ietf.org/html/rfc4884#section-10

> Section 11 still lists open items for WG resolution.
>=20

Tracking this back, this is from draft-quinn-=E2=80=A6-old. This section =
should be removed.

Another good catch.

Thus far, I counted two editorials which should be fixed.

> I also agree with the interoperability concerns raised by others on =
the list.
>=20

This seems to be too generic of a comment. The open source and =
implementation report presented in Buenos Aires seems to speak louder =
than this one-liner.

I believe we should take interoperability most seriously. That=E2=80=99s =
why we are here.

Consequently, do you have specific interop concerns that have not been =
mentioned as part of the WGLC?

Thanks!

=E2=80=94 Carlos.

> Thanks,
> Andy
>=20
>=20
> On Wed, Mar 30, 2016 at 10:48 PM, Thomas Narten <narten@us.ibm.com =
<mailto:narten@us.ibm.com>> wrote:
> Dear WG:
>=20
> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/ =
<https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/>).
>=20
> The editors of the NSH document have indicated that they have
> addressed all known comments and that there are no open issues with
> the current version of the document.
>=20
> Substantive comments to the list please, editorial comments can go
> directly to the document editors.
>=20
> We'll also get a brief update from the editors at next week's
> meeting. If there are any remaining issues with the document, raising
> them before the meeting would be especially helpful.
>=20
> For the chairs,
> Thomas
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org <mailto:sfc@ietf.org>
> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


--Apple-Mail=_5B5FFEEE-9DAD-4FB1-9EB9-6EB63CDDB1D4
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">Hi, Andy,<div class=3D""><br class=3D""><div><blockquote =
type=3D"cite" class=3D""><div class=3D"">On Apr 12, 2016, at 5:18 PM, =
Andrew G. Malis &lt;<a href=3D"mailto:agmalis@gmail.com" =
class=3D"">agmalis@gmail.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><meta =
http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dutf-8" =
class=3D""><div dir=3D"ltr" class=3D"">Thomas,<div class=3D""><br =
class=3D""></div><div class=3D"">I do NOT support this WG last =
call.</div><div class=3D""><br =
class=3D""></div></div></div></blockquote><div><br =
class=3D""></div><div>I=E2=80=99d like to better understand the basis =
for your note.&nbsp;</div><div><br class=3D""></div><div>The NSH draft =
is the only WG document with a solution to the SFC encapsulation, =
satisfying a WG important milestone and deliverable.</div><div><br =
class=3D""></div><div>As such, please find some comments and questions =
below:</div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D""><div dir=3D"ltr" class=3D""><div class=3D"">Back in November, =
I reported a bug in section 14.2.3 that was acknowledged on the WG list, =
but was never corrected in the text. To repeat my report:</div><div =
class=3D""><br class=3D""></div><div class=3D""><div class=3D"">There=E2=80=
=99s a bug with section 14.2.3. The text should be corrected as =
follows:</div><div class=3D""><br class=3D""></div><div =
class=3D"">OLD:&nbsp;</div><div class=3D""><br class=3D""></div><div =
class=3D"">14.2.3.&nbsp; TLV Class Registry</div><div class=3D""><br =
class=3D""></div><div class=3D"">&nbsp; &nbsp;IANA is requested to set =
up a registry of "TLV Types".&nbsp; These are 16-</div><div =
class=3D"">&nbsp; &nbsp;bit values.&nbsp; Registry entries are assigned =
by using the "IETF Review"</div><div class=3D"">&nbsp; &nbsp;policy =
defined in RFC 5226 [RFC5226].</div><div class=3D""><br =
class=3D""></div><div class=3D"">NEW:</div><div class=3D""><br =
class=3D""></div><div class=3D"">14.2.3.&nbsp; TLV Class =
Registry</div><div class=3D""><br class=3D""></div><div class=3D"">&nbsp; =
&nbsp;IANA is requested to set up a registry of "TLV Classes".&nbsp; =
These are 16-</div><div class=3D"">&nbsp; &nbsp;bit values.&nbsp; =
Registry entries are assigned by using the "IETF Review"</div><div =
class=3D"">&nbsp; &nbsp;policy defined in RFC 5226 [RFC5226].</div><div =
class=3D""><br class=3D""></div></div></div></div></blockquote><div><br =
class=3D""></div><div>Thank you for checking! I have the same routine of =
checking whether my review comments and suggestions had been =
incorporated, and that improves document quality.</div><div><br =
class=3D""></div><div>This one is clearly a small editorial, which ought =
to be fixed. While it may be disconcerting or disappointing, the good =
thing is that it has an easy fix, and does not look like a publication =
showstopper... This is why we do WG LCs, and have several levels of =
review in the IETF.</div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D""><div dir=3D"ltr" class=3D""><div =
class=3D""><div class=3D""><br class=3D""></div></div><div class=3D"">This=
 leaves me curious as to what other acknowledged comments on the draft =
may have been also left out of the editing process.</div><div =
class=3D""><br class=3D""></div></div></div></blockquote><div><br =
class=3D""></div><div>I=E2=80=99m not sure how useful this comment is. =
Are you aware of other acked-but-unfixed comments? If so, please do =
raise them. Otherwise, this is not an actionable comment, it only =
creates FUD.</div><br class=3D""><blockquote type=3D"cite" class=3D""><div=
 class=3D""><div dir=3D"ltr" class=3D""><div class=3D"">I also note that =
although the TLV Class registry is being created, there are no values to =
be allocated within the registry. I believe that this is contrary to =
IANA policy. Or if not, it=E2=80=99s at least questionable.</div><div =
class=3D""><br class=3D""></div></div></div></blockquote><div><br =
class=3D""></div><div>Questioning is good. I also have the same =
tendency.</div><div><br class=3D""></div><div>In this case, there=E2=80=99=
s no IANA policy against creating registries with unallocated values. I =
just checked&nbsp;draft-leiba-cotton-iana-5226bis-11. Do you have a =
different pointer?</div><div><br class=3D""></div><div>Regarding =
questioning it, I=E2=80=99ve seen it many times. I=E2=80=99ve done it in =
some of my RFCs as well, e.g.,&nbsp;<a =
href=3D"https://tools.ietf.org/html/rfc4884#section-10" =
class=3D"">https://tools.ietf.org/html/rfc4884#section-10</a></div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
dir=3D"ltr" class=3D""><div class=3D"">Section 11 still lists open items =
for WG resolution.</div><div class=3D""><br =
class=3D""></div></div></div></blockquote><div><br =
class=3D""></div><div>Tracking this back, this is from =
draft-quinn-=E2=80=A6-old. This section should be removed.</div><div><br =
class=3D""></div><div>Another good catch.</div><div><br =
class=3D""></div><div>Thus far, I counted two editorials which should be =
fixed.</div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D""><div dir=3D"ltr" class=3D""><div class=3D"">I also agree with =
the interoperability concerns raised by others on the list.</div><div =
class=3D""><br class=3D""></div></div></div></blockquote><div><br =
class=3D""></div><div>This seems to be too generic of a comment. The =
open source and implementation report presented in Buenos Aires seems to =
speak louder than this one-liner.</div><div><br class=3D""></div><div>I =
believe we should take interoperability most seriously. That=E2=80=99s =
why we are here.</div><div><br class=3D""></div><div>Consequently, do =
you have specific interop concerns that have not been mentioned as part =
of the WGLC?</div><div><br class=3D""></div><div>Thanks!</div><div><br =
class=3D""></div><div>=E2=80=94 Carlos.</div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D""><div dir=3D"ltr" class=3D""><div =
class=3D"">Thanks,</div><div class=3D"">Andy</div><div class=3D""><br =
class=3D""></div></div><div class=3D"gmail_extra"><br class=3D""><div =
class=3D"gmail_quote">On Wed, Mar 30, 2016 at 10:48 PM, Thomas Narten =
<span dir=3D"ltr" class=3D"">&lt;<a href=3D"mailto:narten@us.ibm.com" =
target=3D"_blank" class=3D"">narten@us.ibm.com</a>&gt;</span> wrote:<br =
class=3D""><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex">Dear WG:<br class=3D"">
<br class=3D"">
This note begins a WG last call on draft-ietf-sfc-nsh-04.txt<br =
class=3D"">
(<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/" =
rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/</a>).<br =
class=3D"">
<br class=3D"">
The editors of the NSH document have indicated that they have<br =
class=3D"">
addressed all known comments and that there are no open issues with<br =
class=3D"">
the current version of the document.<br class=3D"">
<br class=3D"">
Substantive comments to the list please, editorial comments can go<br =
class=3D"">
directly to the document editors.<br class=3D"">
<br class=3D"">
We'll also get a brief update from the editors at next week's<br =
class=3D"">
meeting. If there are any remaining issues with the document, raising<br =
class=3D"">
them before the meeting would be especially helpful.<br class=3D"">
<br class=3D"">
For the chairs,<br class=3D"">
Thomas<br class=3D"">
<br class=3D"">
_______________________________________________<br class=3D"">
sfc mailing list<br class=3D"">
<a href=3D"mailto:sfc@ietf.org" class=3D"">sfc@ietf.org</a><br class=3D"">=

<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" =
target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br class=3D"">
</blockquote></div><br class=3D""></div>
_______________________________________________<br class=3D"">sfc =
mailing list<br class=3D""><a href=3D"mailto:sfc@ietf.org" =
class=3D"">sfc@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc<br =
class=3D""></div></blockquote></div><br class=3D""></div></body></html>=

--Apple-Mail=_5B5FFEEE-9DAD-4FB1-9EB9-6EB63CDDB1D4--

--Apple-Mail=_9F8A7663-39D7-42C1-A704-953781F82A9F
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=BqFo
-----END PGP SIGNATURE-----

--Apple-Mail=_9F8A7663-39D7-42C1-A704-953781F82A9F--


From nobody Wed Apr 13 05:18:22 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5662412DBED for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 05:18:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QnBYPjrFW_Ig for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 05:18:18 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B57DB12DAC5 for <sfc@ietf.org>; Wed, 13 Apr 2016 05:18:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5827; q=dns/txt; s=iport; t=1460549898; x=1461759498; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=28mVdaHodOwWCm6sHx317wtlU9GT31HYGJgq/1OuPkk=; b=Sp8/ejaSj45HVxFxd7PcUxOflLdZnMLUmo3pc8jHwn/bnQ7t8TlneczH 4Njd4spEFBT/3hh+VQ3saYc+thHwWfDzPPTPvJmmfi7kBmz3gJWz9ej4O ej6u6RDbAXE0zzb8V1R5XvQfLE9Mep1zEqaktfT51WKJedTjlMhSVEF8n g=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DDAgClNw5X/4kNJK1egzdTfQa6Rw6Bd?= =?us-ascii?q?BcLhWwCgUU4FAEBAQEBAQFlJ4RBAQEBAwEBAQEgSwsFCwIBCA4KJwMCAicLFBE?= =?us-ascii?q?CBA4FDogSCA6wRZJGAQEBAQEBAQEBAQEBAQEBAQEBAQEBDQQEhiGBdYJWhC2DE?= =?us-ascii?q?iuCKwWHcpAWAYMjgWZtiBaPEI8mAR4BQ4NnbAGIe34BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,479,1454976000";  d="asc'?scan'208";a="260758849"
Received: from alln-core-4.cisco.com ([173.36.13.137]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 13 Apr 2016 12:18:17 +0000
Received: from XCH-RTP-008.cisco.com (xch-rtp-008.cisco.com [64.101.220.148]) by alln-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id u3DCIHcB023314 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 12:18:17 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-008.cisco.com (64.101.220.148) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 13 Apr 2016 08:18:16 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Wed, 13 Apr 2016 08:18:16 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Med Boucadair <mohamed.boucadair@orange.com>
Thread-Topic: [sfc] #10 (nsh): O bit
Thread-Index: AQHRcN7/T+qlRBf4V0quI1RlrGLgU5+HyoFwgACT7AA=
Date: Wed, 13 Apr 2016 12:18:16 +0000
Message-ID: <DF1F15A5-533C-4EA4-B520-9097D472969E@cisco.com>
References: <067.78e3cad1267e838836b8aa31364bf52f@tools.ietf.org> <082.7faf2f0b4545924030d740d19fcb524f@tools.ietf.org> <787AE7BB302AE849A7480A190F8B933008D575AF@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D575AF@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.232.81]
Content-Type: multipart/signed; boundary="Apple-Mail=_22B8F0C3-9666-4A0C-B2CE-987FD842B168"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/X9vzb1J-kRPJGR5LX1qsa1kP-y0>
Cc: "draft-ietf-sfc-nsh@tools.ietf.org" <draft-ietf-sfc-nsh@tools.ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #10 (nsh): O bit
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 12:18:21 -0000

--Apple-Mail=_22B8F0C3-9666-4A0C-B2CE-987FD842B168
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

WG,

> On Apr 13, 2016, at 3:47 AM, mohamed.boucadair@orange.com wrote:
>=20
> Paul,
>=20
> I don't see how citing RFC 7498 (as suggested in your reply below) is =
related to this issue.
>=20
> Furthermore, I see this reply in the tracker:
>=20
> "Reserving a bit for OAM is acceptable, and done in other protocol =
specifications. OAM-specific drafts exist and will leverage the presence =
of the bit. Further, over time new OAM uses may arise, having the =
explicit ability to support them day-0 is key. The O bit was agreed upon =
by the WG during adoption, and there is no consensus to remove it. I =
propose that a reference be added to the OAM framework draft."
>=20
> * I see that you suggest to add a reference to the OAM framework =
draft, but still there is no such change in the text. I agree with =
adding draft-ietf-sfc-oam-framework as an informative reference. Thanks.
> * The text does not say what an implementer needs to. The text "MUST =
examine the payload and take appropriate action" is vague and =
underspecified. I suggest to make this change:
>=20
> OLD:
>=20
>   O bit: when set to 0x1 indicates that this packet is an operations
>   and management (OAM) packet.  The receiving SFF and SFs nodes MUST
>   examine the payload and take appropriate action (e.g. return status
>   information).
>=20
>   OAM message specifics and handling details are outside the scope of
>   this document.
>=20
> NEW:
>=20
>   O bit: when set to 0x1 indicates that this packet is an operations
>   and management (OAM) packet.  It is out of scope of this document
>   to define the behaviors of SFFs and SF for processing this bit.
>   OAM message specifics and handling details are outside the scope of
>   this document. The reader may refer to [I-D.ietf-sfc-oam-framework]
>   for an OAM SFC framework.
>=20
>   This bit is set by default to 0x0.
>=20
>   Intermediate SFFs and SFs MUST NOT change the value of this bit when
>   forwarding the packet to the next hop.
>=20

I do not feel there=E2=80=99s a problem with OLD.

However, I can propose a new NEW (since I=E2=80=99ve been looking at the =
OAM side):

~~~
  O bit: Setting this bit indicates an Operations,
  Administration, and Maintenance
  (OAM) packet.  The actual format and processing of SFC OAM messages
  is outside the scope of this specification (see =
[I-D.ietf-sfc-oam-framework]).

  For data (i.e., not OAM) packets, the O bit MUST be cleared and MUST =
NOT
  be modified along the SFP.
~~~

This is still probably more restrictive than needed, but would =
accommodate all the concerns.

What do you think?

Thanks,

=E2=80=94 Carlos.

> Thank you.
>=20
> Cheers,
> Med
>=20
>> -----Message d'origine-----
>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de sfc issue =
tracker
>> Envoy=C3=A9 : vendredi 26 f=C3=A9vrier 2016 22:45
>> =C3=80 : draft-ietf-sfc-nsh@tools.ietf.org; paulq@cisco.com
>> Cc : sfc@ietf.org
>> Objet : Re: [sfc] #10 (nsh): O bit
>>=20
>> #10: O bit
>>=20
>> Changes (by paulq@cisco.com):
>>=20
>> * status:  new =3D> closed
>> * resolution:   =3D> wontfix
>>=20
>>=20
>> Comment:
>>=20
>> Reply: The current version of the draft states:  "A short reference =
is
>> included below, RFC 7498 [RFC7498], provides a
>> more comprehensive review of the SFC Problem Statement."  That seems =
like
>> a reasonable approach, and propose marking this item as resolved.
>>=20
>> --
>> =
-------------------------------------+------------------------------------=

>> -
>> Reporter:                           |       Owner:  draft-ietf-sfc-
>>  mohamed.boucadair@orange.com       |  nsh@tools.ietf.org
>>     Type:  defect                   |      Status:  closed
>> Priority:  major                    |   Milestone:
>> Component:  nsh                      |     Version:
>> Severity:  -                        |  Resolution:  wontfix
>> Keywords:                           |
>> =
-------------------------------------+------------------------------------=

>> -
>>=20
>> Ticket URL: =
<https://trac.tools.ietf.org/wg/sfc/trac/ticket/10#comment:1>
>> sfc <https://tools.ietf.org/sfc/>
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


--Apple-Mail=_22B8F0C3-9666-4A0C-B2CE-987FD842B168
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=a8xG
-----END PGP SIGNATURE-----

--Apple-Mail=_22B8F0C3-9666-4A0C-B2CE-987FD842B168--


From nobody Wed Apr 13 05:18:58 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2D9A512D7E5 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 05:18:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ySnWy4KecA3z for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 05:18:55 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EEC1012D6C3 for <sfc@ietf.org>; Wed, 13 Apr 2016 05:18:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9920; q=dns/txt; s=iport; t=1460549933; x=1461759533; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=g4qty51as7Q3JB2yOOBAUHvEnrnflWj+6V6UT4RqSx4=; b=O3YL8+5zBOS7cRSHIc/md6v2DWU4w/EQbRXRTR+wRMkmsfXgLDPplxAU pK6RHw4etSOzbWGEpf497G+ahubQq/TpxxKEnDk7epw4nXUTS5cBaWxDX 8UlNl/QfS4XUGsRCDMsb6o64ipzq5zGYqG+lhpAjqolE7qILR+00R7kkX 4=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DfAgD2OA5X/49dJa1egzdTfQa1VIRzD?= =?us-ascii?q?oF0FwEKhWwCgUU4FAEBAQEBAQFlJ4RBAQEBAwEBAQEgSQILBQsCAQgOCicDAgI?= =?us-ascii?q?nCxQRAgQOBQ6IEggOsEaSRgEBAQEBAQEBAQEBAQEBAQEBAQEBAQ0EBIYhgXUIg?= =?us-ascii?q?UyBAoQtP4JTK4IrBYdyiymEbQGDI4FmbYgWjxCPJgEeAUODZ2wBiHt+AQEB?=
X-IronPort-AV: E=Sophos;i="5.24,479,1454976000";  d="asc'?scan'208,217";a="260759058"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 Apr 2016 12:18:53 +0000
Received: from XCH-RTP-009.cisco.com (xch-rtp-009.cisco.com [64.101.220.149]) by rcdn-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id u3DCIqki010849 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 12:18:52 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-009.cisco.com (64.101.220.149) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 13 Apr 2016 08:18:51 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Wed, 13 Apr 2016 08:18:51 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Med Boucadair <mohamed.boucadair@orange.com>
Thread-Topic: [sfc] #19 (nsh): Mandatory context headers
Thread-Index: AQHRlOwrLWfyyxPo40ad4UCkzMlGz5+HrkyAgABoMIA=
Date: Wed, 13 Apr 2016 12:18:51 +0000
Message-ID: <1C23AFBF-A060-4489-994B-044957A28278@cisco.com>
References: <067.cab2ac7351c39145b242787570b38828@tools.ietf.org> <082.7d97c9f6976fc689f2b380a40263328d@tools.ietf.org> <787AE7BB302AE849A7480A190F8B933008D5747D@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D5747D@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.232.81]
Content-Type: multipart/signed; boundary="Apple-Mail=_3A0505B6-3144-4CD4-A1DE-EB36EA897ADF"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/NaVvRL_fNVtdicGvwGVCv1gdt6s>
Cc: "draft-ietf-sfc-nsh@tools.ietf.org" <draft-ietf-sfc-nsh@tools.ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #19 (nsh): Mandatory context headers
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 12:18:57 -0000

--Apple-Mail=_3A0505B6-3144-4CD4-A1DE-EB36EA897ADF
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_D16614D6-1AD0-4FD4-8452-303650B2083E"


--Apple-Mail=_D16614D6-1AD0-4FD4-8452-303650B2083E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Med,

The Ticket reads:
>  For type 1, why are there four mandatory context headers, rather than =
2, 3, 5, 10, etc.?
> The draft contains no particular justification for this choice.
>=20

Do you find that 2 or 6 is better than 4?

What exactly are you objecting to?

I do not disagree that adding a sentence that reads =E2=80=9CIt was =
found that using 4 context headers was the best trade-off between foo =
and bar, satisfying baz=E2=80=9D would not hurt. But at the same time, =
it does not seem anything is gained either.

Thanks,

=E2=80=94 Carlos.


> On Apr 13, 2016, at 2:05 AM, mohamed.boucadair@orange.com wrote:
>=20
> Hi Paul,
>=20
> I object to close this issue.
>=20
> Unless I'm mistaken, the consensus should be declared by the chairs =
otherwise this is biased. I'm not the only one who raised this concern, =
BTW.
>=20
> Cheers,
> Med
>=20
>> -----Message d'origine-----
>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de sfc issue =
tracker
>> Envoy=C3=A9 : mardi 12 avril 2016 20:50
>> =C3=80 : draft-ietf-sfc-nsh@tools.ietf.org; paulq@cisco.com
>> Cc : sfc@ietf.org
>> Objet : Re: [sfc] #19 (nsh): Mandatory context headers
>>=20
>> #19: Mandatory context headers
>>=20
>> Changes (by paulq@cisco.com):
>>=20
>> * status:  new =3D> closed
>> * resolution:   =3D> wontfix
>>=20
>>=20
>> Comment:
>>=20
>> This was discussed on list, no consensus for change.  Will leave as =
is.
>>=20
>> --
>> =
-------------------------------------+------------------------------------=

>> -
>> Reporter:                           |       Owner:  draft-ietf-sfc-
>>  mohamed.boucadair@orange.com       |  nsh@tools.ietf.org
>>     Type:  defect                   |      Status:  closed
>> Priority:  major                    |   Milestone:
>> Component:  nsh                      |     Version:
>> Severity:  -                        |  Resolution:  wontfix
>> Keywords:                           |
>> =
-------------------------------------+------------------------------------=

>> -
>>=20
>> Ticket URL: =
<https://trac.tools.ietf.org/wg/sfc/trac/ticket/19#comment:1>
>> sfc <https://tools.ietf.org/sfc/>
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


--Apple-Mail=_D16614D6-1AD0-4FD4-8452-303650B2083E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">Med,<div class=3D""><br class=3D""></div><div class=3D"">The =
Ticket reads:</div><div class=3D""><blockquote type=3D"cite" class=3D""><p=
 class=3D"">&nbsp;For type 1, why are there four mandatory context =
headers, rather than 2, 3, 5, 10, etc.? <br class=3D"">
</p><p class=3D"">
The draft contains no particular justification for this =
choice.</p></blockquote></div><div class=3D"">Do you find that 2 or 6 is =
better than 4?</div><div class=3D""><br class=3D""></div><div =
class=3D"">What exactly are you objecting to?</div><div class=3D""><br =
class=3D""></div><div class=3D"">I do not disagree that adding a =
sentence that reads =E2=80=9CIt was found that using 4 context headers =
was the best trade-off between foo and bar, satisfying baz=E2=80=9D =
would not hurt. But at the same time, it does not seem anything is =
gained either.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Thanks,</div><div class=3D""><br class=3D""></div><div =
class=3D"">=E2=80=94 Carlos.</div><div class=3D""><br =
class=3D""></div><div class=3D""><br class=3D""><div><blockquote =
type=3D"cite" class=3D""><div class=3D"">On Apr 13, 2016, at 2:05 AM, <a =
href=3D"mailto:mohamed.boucadair@orange.com" =
class=3D"">mohamed.boucadair@orange.com</a> wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div class=3D"">Hi =
Paul,<br class=3D""><br class=3D"">I object to close this issue.<br =
class=3D""><br class=3D"">Unless I'm mistaken, the consensus should be =
declared by the chairs otherwise this is biased. I'm not the only one =
who raised this concern, BTW.<br class=3D""><br class=3D"">Cheers,<br =
class=3D"">Med<br class=3D""><br class=3D""><blockquote type=3D"cite" =
class=3D"">-----Message d'origine-----<br class=3D"">De&nbsp;: sfc [<a =
href=3D"mailto:sfc-bounces@ietf.org" =
class=3D"">mailto:sfc-bounces@ietf.org</a>] De la part de sfc issue =
tracker<br class=3D"">Envoy=C3=A9&nbsp;: mardi 12 avril 2016 20:50<br =
class=3D"">=C3=80&nbsp;: <a =
href=3D"mailto:draft-ietf-sfc-nsh@tools.ietf.org" =
class=3D"">draft-ietf-sfc-nsh@tools.ietf.org</a>; <a =
href=3D"mailto:paulq@cisco.com" class=3D"">paulq@cisco.com</a><br =
class=3D"">Cc&nbsp;: <a href=3D"mailto:sfc@ietf.org" =
class=3D"">sfc@ietf.org</a><br class=3D"">Objet&nbsp;: Re: [sfc] #19 =
(nsh): Mandatory context headers<br class=3D""><br class=3D"">#19: =
Mandatory context headers<br class=3D""><br class=3D"">Changes (by <a =
href=3D"mailto:paulq@cisco.com" class=3D"">paulq@cisco.com</a>):<br =
class=3D""><br class=3D""> * status: &nbsp;new =3D&gt; closed<br =
class=3D""> * resolution: &nbsp;&nbsp;=3D&gt; wontfix<br class=3D""><br =
class=3D""><br class=3D"">Comment:<br class=3D""><br class=3D""> This =
was discussed on list, no consensus for change. &nbsp;Will leave as =
is.<br class=3D""><br class=3D"">--<br =
class=3D"">-------------------------------------+-------------------------=
-----------<br class=3D"">-<br class=3D""> Reporter: =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;| &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Owner: =
&nbsp;draft-ietf-sfc-<br class=3D""> &nbsp;<a =
href=3D"mailto:mohamed.boucadair@orange.com" =
class=3D"">mohamed.boucadair@orange.com</a> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;| &nbsp;<a =
href=3D"mailto:nsh@tools.ietf.org" class=3D"">nsh@tools.ietf.org</a><br =
class=3D""> &nbsp;&nbsp;&nbsp;&nbsp;Type: &nbsp;defect =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;| =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Status: &nbsp;closed<br class=3D""> =
Priority: &nbsp;major =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;| &nbsp;&nbsp;Milestone:<br =
class=3D"">Component: &nbsp;nsh =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;| =
&nbsp;&nbsp;&nbsp;&nbsp;Version:<br class=3D""> Severity: &nbsp;- =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;| =
&nbsp;Resolution: &nbsp;wontfix<br class=3D""> Keywords: =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;|<br =
class=3D"">-------------------------------------+-------------------------=
-----------<br class=3D"">-<br class=3D""><br class=3D"">Ticket URL: =
&lt;<a =
href=3D"https://trac.tools.ietf.org/wg/sfc/trac/ticket/19#comment:1" =
class=3D"">https://trac.tools.ietf.org/wg/sfc/trac/ticket/19#comment:1</a>=
&gt;<br class=3D"">sfc &lt;<a href=3D"https://tools.ietf.org/sfc/" =
class=3D"">https://tools.ietf.org/sfc/</a>&gt;<br class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">sfc mailing list<br class=3D""><a href=3D"mailto:sfc@ietf.org" =
class=3D"">sfc@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc<br =
class=3D""></blockquote><br =
class=3D"">_______________________________________________<br =
class=3D"">sfc mailing list<br class=3D""><a href=3D"mailto:sfc@ietf.org" =
class=3D"">sfc@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc<br =
class=3D""></div></div></blockquote></div><br =
class=3D""></div></body></html>=

--Apple-Mail=_D16614D6-1AD0-4FD4-8452-303650B2083E--

--Apple-Mail=_3A0505B6-3144-4CD4-A1DE-EB36EA897ADF
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=3SIE
-----END PGP SIGNATURE-----

--Apple-Mail=_3A0505B6-3144-4CD4-A1DE-EB36EA897ADF--


From nobody Wed Apr 13 05:34:19 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A971E12D627 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 05:34:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BGce590QwXf8 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 05:34:16 -0700 (PDT)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1311C12D5B2 for <sfc@ietf.org>; Wed, 13 Apr 2016 05:34:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4319; q=dns/txt; s=iport; t=1460550855; x=1461760455; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=OaakUDE8q3tFCFqJwo+x72oaTsXhFz/yW00KFKWygXk=; b=mgdYJkok/u/6fYKfYKevnn5tKd15quoIUYch7n0RhutYCGJjn2uiklau T/fiHO+fujI+bFDq1cF4uUstcoBBjPhkUq0sQmCLnNSoexbAOfpEDbiDZ QaG5qBkjnkh1m82c1BS6+tlgrkG+CNM2KFrHkR3ORo/ejwOmrFzMwRAPo M=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DEAgDXOw5X/4sNJK1egzdTfQa6Rw6Bd?= =?us-ascii?q?BcLhWwCgT84FAEBAQEBAQFlJ4RBAQEBAwEBAQEaBkQHCwUHBAIBCBEEAQEBJwM?= =?us-ascii?q?CAicLFAkIAgQOBQ6IEggOsEmSRwEBAQEBAQEBAQEBAQEBAQEBAQEBAQ0EBIYhg?= =?us-ascii?q?XUIgk6HPyuCKwWYCAGDI4FmbYgWgWeETohbhiCJBgEeAUOCBBmBSmyIfH4BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,479,1454976000";  d="asc'?scan'208";a="259393604"
Received: from alln-core-6.cisco.com ([173.36.13.139]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 13 Apr 2016 12:34:14 +0000
Received: from XCH-RTP-017.cisco.com (xch-rtp-017.cisco.com [64.101.220.157]) by alln-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id u3DCYE91015187 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 12:34:14 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-017.cisco.com (64.101.220.157) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 13 Apr 2016 08:34:13 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Wed, 13 Apr 2016 08:34:13 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Xuxiaohu <xuxiaohu@huawei.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfXjVJMNJL6xkKtVPhZYT1+65+HeFQAgAC2XIA=
Date: Wed, 13 Apr 2016 12:34:13 +0000
Message-ID: <580D9AC9-8382-4A9F-84B7-45287DFF389D@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com>
In-Reply-To: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.232.81]
Content-Type: multipart/signed; boundary="Apple-Mail=_6EB45D30-7C59-4CDA-84A0-2096CC5C9A26"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/tT2duQN7O1lfieP5iI9ItXLSKns>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 12:34:17 -0000

--Apple-Mail=_6EB45D30-7C59-4CDA-84A0-2096CC5C9A26
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Xiaohu,

I think you are missing the point with this comment.

The fact that NSH should be able to be transported over MPLS does not =
mean that the NSH document (or the SFC WG) need to specify exactly how =
this happens, given each transport-specific constrains.

Transporting NSH over ethernet needs to include a trailing FCS. =
Transporting NSH over VxLAN-GPE needs a VXLAN-GPE NP assigned in that =
document. If someone wants to transport NSH over Frame Relay, they need =
a document specifying the actual encap format, an NLPID, etc.

All of these transports for NSH are possible. All of these need =
encap-specific specifications.

To carry NSH over MPLS, then specifics like the TTL value, =
ECMP-prevention, etc. needs to be specified.  It is possible. It should =
not be defined here.

As I understand, this issue should NOT be addressed in any SFC document. =
Certainly not before NSH publication (otherwise, there=E2=80=99s a =
potentially never-ending list of transports to specify).

Thanks,

=E2=80=94 Carlos.

> On Apr 12, 2016, at 9:41 PM, Xuxiaohu <xuxiaohu@huawei.com> wrote:
>=20
> Hi Thomas,
>=20
> It said in the NSH draft:
>=20
>  "6.  Transport Agnostic: NSH is transport independent and is carried
>       in an overlay, over existing underlays.  If an existing overlay
>       topology provides the required service path connectivity, that
>       existing overlay may be used."
>=20
> That means the NSH should be able to be transported over MPLS. =
However, according to the current NSH format definition, it's not safe =
to carry the NSH over MPLS due to the first nibble issue. Therefore, I =
believe this issue needs to be addressed before publication.
>=20
> Best regards,
> Xiaohu
>=20
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
>> Sent: Thursday, March 31, 2016 10:48 AM
>> To: sfc@ietf.org
>> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>=20
>> Dear WG:
>>=20
>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>=20
>> The editors of the NSH document have indicated that they have =
addressed all
>> known comments and that there are no open issues with the current =
version of
>> the document.
>>=20
>> Substantive comments to the list please, editorial comments can go =
directly to
>> the document editors.
>>=20
>> We'll also get a brief update from the editors at next week's =
meeting. If there are
>> any remaining issues with the document, raising them before the =
meeting would
>> be especially helpful.
>>=20
>> For the chairs,
>> Thomas
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


--Apple-Mail=_6EB45D30-7C59-4CDA-84A0-2096CC5C9A26
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org

iQIcBAEBCAAGBQJXDjzFAAoJEIXgpQGOZny90boP/AjFxthkFgaWqh3nfij7PqyR
Y8c90wyPy5sTccOU6M87TPVxioz+/yulC1ELhOXOJUF+NgKwGsonb3JczIpNmJp5
r3TBQf3W1/wNNjoPfKJk//JXx52ZXqWNjkINddaGh+kg02EhHQXpVQeODvnFqNDN
FlfVmJu3uB6pxRQv7gsw4JsF18FfXQN6zLFasD4CLYTdCuSljki8BN5oDsvt5bh+
gKxGnztK8buUQXflV0vZok0LpOdEB08P5yfAHS4++nezK7WMUQ4oWD+hwkEHOVHo
iYZuhsOjeTy2A0YSndB6n9i4gIGIB28F1eCwlhzb623bQ2enOXzHQKs1xVJrWsYA
GRc0rw/nIbPArJ5sMWahoPveKXgzB+/gKk86oXwwZtKOkewdElsM4xem+xKr0VFI
q/dkDpcq4kbZAzqNZ+5cUPXgMoyCrakJVmBemrg87Ws3doVhfOob2XMDsUlT+2Ca
3h5P+c9UNhObiZ5sf/1XHJ7YSNit9AW1ne84EFx+eh1RXPjqZyjLZanRvsTyt7s7
9NSNv3kTwFFu2HbKrIeR4T8nQHsgn4GgRWy7/gSiot11dJNDUHWmrP22xs/c/ZHR
4oku0flB0l4Ftirq3gF9nYGfCcq+r9OLI+/ov/Xi5JMIfd28zADE5i6wEk3VNoev
0CDaqEZyQc0Cf+G47W23
=Ds1E
-----END PGP SIGNATURE-----

--Apple-Mail=_6EB45D30-7C59-4CDA-84A0-2096CC5C9A26--


From nobody Wed Apr 13 05:38:27 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AB3812E0E5 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 05:38:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.618
X-Spam-Level: 
X-Spam-Status: No, score=-2.618 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oHJ-HCOFn7PK for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 05:38:25 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 920A812E109 for <sfc@ietf.org>; Wed, 13 Apr 2016 05:38:24 -0700 (PDT)
Received: from omfedm05.si.francetelecom.fr (unknown [xx.xx.xx.1]) by omfedm13.si.francetelecom.fr (ESMTP service) with ESMTP id 15305324590; Wed, 13 Apr 2016 14:38:23 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.57]) by omfedm05.si.francetelecom.fr (ESMTP service) with ESMTP id E334035C05A; Wed, 13 Apr 2016 14:38:22 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM23.corporate.adroot.infra.ftgroup ([fe80::787e:db0c:23c4:71b3%19]) with mapi id 14.03.0279.002; Wed, 13 Apr 2016 14:38:22 +0200
From: <mohamed.boucadair@orange.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Thread-Topic: [sfc] #19 (nsh): Mandatory context headers
Thread-Index: AQHRlOwrLWfyyxPo40ad4UCkzMlGz5+HrkyAgABoMID//8D3IA==
Date: Wed, 13 Apr 2016 12:38:22 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D57988@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <067.cab2ac7351c39145b242787570b38828@tools.ietf.org> <082.7d97c9f6976fc689f2b380a40263328d@tools.ietf.org> <787AE7BB302AE849A7480A190F8B933008D5747D@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <1C23AFBF-A060-4489-994B-044957A28278@cisco.com>
In-Reply-To: <1C23AFBF-A060-4489-994B-044957A28278@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B933008D57988OPEXCLILMA3corp_"
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.13.112417
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/cqesRN2Z7YmbI3UIyEbTaTNTjrk>
Cc: "draft-ietf-sfc-nsh@tools.ietf.org" <draft-ietf-sfc-nsh@tools.ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #19 (nsh): Mandatory context headers
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 12:38:27 -0000

--_000_787AE7BB302AE849A7480A190F8B933008D57988OPEXCLILMA3corp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_787AE7BB302AE849A7480A190F8B933008D57988OPEXCLILMA3corp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_787AE7BB302AE849A7480A190F8B933008D57988OPEXCLILMA3corp_--


From nobody Wed Apr 13 05:41:18 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45BF112E055 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 05:41:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.915
X-Spam-Level: 
X-Spam-Status: No, score=-2.915 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jHyTIx9dWaVC for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 05:41:15 -0700 (PDT)
Received: from relais-inet.orange.com (relais-nor34.orange.com [80.12.70.34]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1239F12E02E for <sfc@ietf.org>; Wed, 13 Apr 2016 05:41:15 -0700 (PDT)
Received: from opfednr00.francetelecom.fr (unknown [xx.xx.xx.64]) by opfednr26.francetelecom.fr (ESMTP service) with ESMTP id A685F20124; Wed, 13 Apr 2016 14:41:13 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.60]) by opfednr00.francetelecom.fr (ESMTP service) with ESMTP id 67FA41A0072; Wed, 13 Apr 2016 14:41:13 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7F.corporate.adroot.infra.ftgroup ([fe80::c1d7:e278:e357:11ad%19]) with mapi id 14.03.0279.002; Wed, 13 Apr 2016 14:41:13 +0200
From: <mohamed.boucadair@orange.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Thread-Topic: [sfc] #10 (nsh): O bit
Thread-Index: AQHRcN7/T+qlRBf4V0quI1RlrGLgU5+HyoFwgACT7AD//8LjYA==
Date: Wed, 13 Apr 2016 12:41:12 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D579A3@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <067.78e3cad1267e838836b8aa31364bf52f@tools.ietf.org> <082.7faf2f0b4545924030d740d19fcb524f@tools.ietf.org> <787AE7BB302AE849A7480A190F8B933008D575AF@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <DF1F15A5-533C-4EA4-B520-9097D472969E@cisco.com>
In-Reply-To: <DF1F15A5-533C-4EA4-B520-9097D472969E@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/HEJPVCMIgo7nd1Hc2fGfjck48Pc>
Cc: "draft-ietf-sfc-nsh@tools.ietf.org" <draft-ietf-sfc-nsh@tools.ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #10 (nsh): O bit
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 12:41:17 -0000
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From nobody Wed Apr 13 05:52:04 2016
Return-Path: <ju1738@att.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D63912DF8D for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 05:52:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3mrHl6b92v47 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 05:52:00 -0700 (PDT)
Received: from mx0a-00191d01.pphosted.com (mx0a-00191d01.pphosted.com [67.231.149.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E4C912DE1E for <sfc@ietf.org>; Wed, 13 Apr 2016 05:52:00 -0700 (PDT)
Received: from pps.filterd (m0048589.ppops.net [127.0.0.1]) by m0048589.ppops.net-00191d01. (8.16.0.11/8.16.0.11) with SMTP id u3DCY59C023421; Wed, 13 Apr 2016 08:34:59 -0400
Received: from alpi155.enaf.aldc.att.com (sbcsmtp7.sbc.com [144.160.229.24]) by m0048589.ppops.net-00191d01. with ESMTP id 229j345gba-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 13 Apr 2016 08:34:58 -0400
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id u3DCYvFo020947; Wed, 13 Apr 2016 08:34:57 -0400
Received: from mlpi408.sfdc.sbc.com (mlpi408.sfdc.sbc.com [130.9.128.240]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id u3DCYj2P020733 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 13 Apr 2016 08:34:53 -0400
Received: from MISOUT7MSGHUBAB.ITServices.sbc.com (MISOUT7MSGHUBAB.itservices.sbc.com [130.9.129.146]) by mlpi408.sfdc.sbc.com (RSA Interceptor); Wed, 13 Apr 2016 12:34:37 GMT
Received: from MISOUT7MSGUSRCD.ITServices.sbc.com ([169.254.4.181]) by MISOUT7MSGHUBAB.ITServices.sbc.com ([130.9.129.146]) with mapi id 14.03.0248.002; Wed, 13 Apr 2016 08:34:36 -0400
From: "UTTARO, JAMES" <ju1738@att.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Alia Atlas <akatlas@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, Martin Stiemerling <mls.ietf@gmail.com>, "jguichar@cisco.com" <jguichar@cisco.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfgQCYv/wVVMUagOUO32rRCGp+HM4aggABFsQCAAAKVgIAACdAAgAAR9ICAAFPVwA==
Date: Wed, 13 Apr 2016 12:34:36 +0000
Message-ID: <B17A6910EEDD1F45980687268941550F135F188C@MISOUT7MSGUSRCD.ITServices.sbc.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <570DBDFF.4070305@joelhalpern.com>
In-Reply-To: <570DBDFF.4070305@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.91.76.120]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-RSA-Inspected: yes
X-RSA-Classifications: DAM Allow Patterns, public
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2016-04-13_08:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1603180000 definitions=main-1604130182
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/eUslZy_Td5Dahnx1-Z8RS5zqxZk>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 12:52:02 -0000

+1

This is the type of approach I have been suggesting in my various threads. =
Before re-inventing the wheel maybe we could add some spokes to an existing=
 one.=20

Jim Uttaro

"This email and any files transmitted with it are AT&T property, are confid=
ential, and are intended solely for the use of the individual or entity to =
whom this email is addressed. If you are not one of the named recipient(s) =
or otherwise have reason to believe that you have received this message in =
error, please notify the sender and delete this message immediately from yo=
ur computer. Any other use, retention, dissemination, forwarding, printing,=
 or copying of this email is strictly prohibited."

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
Sent: Tuesday, April 12, 2016 11:33 PM
To: Alia Atlas <akatlas@gmail.com>; Xuxiaohu <xuxiaohu@huawei.com>; Martin =
Stiemerling <mls.ietf@gmail.com>; jguichar@cisco.com
Cc: Thomas Narten <narten@us.ibm.com>; Joel M. Halpern <jmh@joelhalpern.com=
>; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

With regard to MPLS encapsulation, I am not objecting to considering if=20
we want to rearrange things to make it simpler to carry NSH in MPLS.

Given that the IETF has not ratified a standards track RFC stating that=20
it is required for MPLS carriage to avoid the values, I was objecting=20
the Xu overstating the situation.

It is not actually hard to avoid the values.  If we feel it is=20
imnportant (and I am tempted to agree that it is worth considering) we=20
can rearrange some reserved bits so that the first three bits are 0, the=20
next two are the version, and the remaining bits are flags.  Makes us a=20
little starved for flags, but if we agree that MPLS has stolen three=20
bits of header, so be it.

There are other answers.  We could, for example, agree that when NSH is=20
carried over MPLS, a dummy 0 label is inserted after the bottom of=20
stack.  No worse than many things MPLS has done.  (I could argue both=20
sides of which answer is right, and not persuade myself of either one.)

On the next protocol IDs, the last time we looked we could not find an=20
ID registration that was reasonably small and covered the needed=20
meanings.  I note that even the section you point to concludes that=20
there may well be good reasons for using a separate ID space.

Yours,
Joel

On 4/12/16 10:29 PM, Alia Atlas wrote:
> Xiaohu, Joel, and SFC WG group,
>
> The first nibble question is quite relevant if it is expected that the
> NSH header might be directly under
> an MPLS label stack.  This issue arose rather unpleasantly for
> pseudo-wires a long time ago and the
> reasoning for it is much better documented, as Carlos pointed out in a
> different thread, in RFC 4928 Section 3.
>
> At the time that PWE3 was working on the control word and whether it was
> to be mandatory (RFC 4385), it was clear that
> there were devices that looked at the first nibble of a packet under the
> MPLS header as a way to determine
> if the packet was IPv4 or IPv6 and obtain flow-diversity from it.  The
> cost of also verifying the associated checksum
> if available wasn't deemed acceptable for several implementations.
> Given that determining as much entropy as
> possible is still really important and that it is non-trivial to
> negotiate/indicate the capability for including
> an Entropy Label in the MPLS stack, I have no reason to believe that
> this shortcut of looking at the first nibble
> is no longer used or deployed.   Feel free to contact me off-list if you
> believe this to be the case.
>
> It is clear from the NSH base header:
>
>    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>       |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol |
>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>
> that this consideration has been completely ignored.  In fact, an NSH
> base header might have any value
> of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH were ever
> defined, suddenly the traffic might
> be subject to startling reordering if an MPLS transport were to be
> considered.
>
> Given a claim of NSH being transport-agnostic and repeated emphasis that
> MPLS, as well as UDP,
> is a valid transport for NSH, I do think this is a significant oversight
> and needs, at a minimum, discussion and
> explanation, and  - quite likely -  correction.
>
> While I am on the topic of details of the NSH encapsulation, I would
> request that Section 8 of draft-ietf-rtgwg-dt-encap-01
> be read and considered!   I am not excited by having many different and
> unique Next Protocol fields defined.
> For instance, I note the definition of a nearly identical Next Protocol
> field in https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe .
>
> While I am, of course, willing to reason to detailed and well-thought
> out explanations for why each and every new
> encapsulation needs its very own IANA-defined Next Protocol field, this
> seems to me to be highly likely to require
> consolidation so that the same Next Protocol field can be used between
> the various encapsulations.
>
> I will work on giving a through review of NSH as soon as practical.  I
> do realize that there are multiple implementations
> and while details of how the "Next Protocol" field are documented
> shouldn't have a significant impact there, the
> discussion about the first nibble is likely to.
>
> Regards,
> Alia
>
>
> On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <xuxiaohu@huawei.com
> <mailto:xuxiaohu@huawei.com>> wrote:
>
>     Joel,
>
>     > -----Original Message-----
>     > From: Joel M. Halpern [mailto:jmh@joelhalpern.com <mailto:jmh@joelh=
alpern.com>]
>     > Sent: Wednesday, April 13, 2016 9:45 AM
>     > To: Xuxiaohu; Thomas Narten;sfc@ietf.org <mailto:sfc@ietf.org>
>     > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>     >
>     > Xu,
>     >       I do not believe that there is an MPLS specification that req=
uires that all
>     > content other than IP must have a first nibble of 0 or 1.
>
>     When encapsulating NSH over MPLS directly, the first nibble of the
>     NSH must not be 4 or 6.
>
>     > There are specifications where it is discussed as desirable.
>     >
>     > It is in fact pretty trivial for us to change the format so that th=
e first three bits are
>     > 0, but it burns several valuable flag bits.  It is an SFC working g=
roup decision,
>
>     That's the reason why I raised the first nibble question.
>
>     Best regards,
>     Xiaohu
>
>      > not, as far as I can tell, a violation of the MPLS specification.
>      >
>      > Yours,
>      > Joel
>      >
>      > On 4/12/16 9:41 PM, Xuxiaohu wrote:
>      > > Hi Thomas,
>      > >
>      > > It said in the NSH draft:
>      > >
>      > >    "6.  Transport Agnostic: NSH is transport independent and is
>     carried
>      > >         in an overlay, over existing underlays.  If an existing
>     overlay
>      > >         topology provides the required service path
>     connectivity, that
>      > >         existing overlay may be used."
>      > >
>      > > That means the NSH should be able to be transported over MPLS.
>     However,
>      > according to the current NSH format definition, it's not safe to
>     carry the NSH
>      > over MPLS due to the first nibble issue. Therefore, I believe
>     this issue needs to be
>      > addressed before publication.
>      > >
>      > > Best regards,
>      > > Xiaohu
>      > >
>      > >> -----Original Message-----
>      > >> From: sfc [mailto:sfc-bounces@ietf.org
>     <mailto:sfc-bounces@ietf.org>] On Behalf Of Thomas Narten
>      > >> Sent: Thursday, March 31, 2016 10:48 AM
>      > >> To: sfc@ietf.org <mailto:sfc@ietf.org>
>      > >> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>      > >>
>      > >> Dear WG:
>      > >>
>      > >> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>      > >> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>      > >>
>      > >> The editors of the NSH document have indicated that they have
>      > >> addressed all known comments and that there are no open issues
>     with
>      > >> the current version of the document.
>      > >>
>      > >> Substantive comments to the list please, editorial comments can=
 go
>      > >> directly to the document editors.
>      > >>
>      > >> We'll also get a brief update from the editors at next week's
>      > >> meeting. If there are any remaining issues with the document,
>     raising
>      > >> them before the meeting would be especially helpful.
>      > >>
>      > >> For the chairs,
>      > >> Thomas
>      > >>
>      > >> _______________________________________________
>      > >> sfc mailing list
>      > >> sfc@ietf.org <mailto:sfc@ietf.org>
>      > >> https://www.ietf.org/mailman/listinfo/sfc
>      > >
>      > > _______________________________________________
>      > > sfc mailing list
>      > > sfc@ietf.org <mailto:sfc@ietf.org>
>      > > https://www.ietf.org/mailman/listinfo/sfc
>      > >
>
>     _______________________________________________
>     sfc mailing list
>     sfc@ietf.org <mailto:sfc@ietf.org>
>     https://www.ietf.org/mailman/listinfo/sfc
>
>

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Apr 13 05:53:38 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BB1912E1B8 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 05:53:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y7ecjTfrtEuO for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 05:53:33 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7FF9712E195 for <sfc@ietf.org>; Wed, 13 Apr 2016 05:53:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=22612; q=dns/txt; s=iport; t=1460552013; x=1461761613; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=VhrDMWF9890I+iFcXHLL9GTiMzSvOlN1KpDKu79PTXw=; b=RAfq74vynw3Qbf6O8bw2Iih0pfew6awsz6YP6RcilLETLYj03zbc0P3+ PAReJNnfkwb/8IXLdjVijs5Ex7IfoWe76ZYxguYihJ8+i4W1t2g+QS7Z7 6SDQn0TUVp7EcpGBlJI2tDJRREoHnZdvf/3GxjFW/OZPrcIe4y+9Ey1vK E=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DjAgDUPw5X/4gNJK1egmtMU30Grm+GZ?= =?us-ascii?q?YRzDoF0FwEKghgBg1MCgTw4FAEBAQEBAQFlJ4RBAQEBAwEBAQEaBkQHCwUHBAI?= =?us-ascii?q?BCA4DBAEBAScDAgIhBgsUCQgCBA4FDogFAwoIDrBTjQ8NhS0BAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBAQEBAQENBASGIYF1gVSBAoJBgiuCUyuCKwWTG4Q8MQGDI4FmbYJzgy6?= =?us-ascii?q?BdYFnhE6DKIUzhiCBK4dbAR4BQ4IEGYFKbIh8fgEBAQ?=
X-IronPort-AV: E=Sophos;i="5.24,479,1454976000";  d="asc'?scan'208,217";a="96685117"
Received: from alln-core-3.cisco.com ([173.36.13.136]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 13 Apr 2016 12:53:31 +0000
Received: from XCH-RTP-006.cisco.com (xch-rtp-006.cisco.com [64.101.220.146]) by alln-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id u3DCrVw6031661 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 12:53:31 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-006.cisco.com (64.101.220.146) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 13 Apr 2016 08:53:30 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Wed, 13 Apr 2016 08:53:30 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Alia Atlas <akatlas@gmail.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfXjVJMNJL6xkKtVPhZYT1+65+HeFQAgAAA4wCAAAKVgIAACdAAgACudQA=
Date: Wed, 13 Apr 2016 12:53:30 +0000
Message-ID: <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com>
In-Reply-To: <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.232.81]
Content-Type: multipart/signed; boundary="Apple-Mail=_FC1A4095-5033-48A5-8471-34E21B58DA0B"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/X4zUSlrwQx2wOQ0pIyJe5IH_Jik>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 12:53:37 -0000

--Apple-Mail=_FC1A4095-5033-48A5-8471-34E21B58DA0B
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_359C67C0-E654-4DEC-8444-203AFD147DFA"


--Apple-Mail=_359C67C0-E654-4DEC-8444-203AFD147DFA
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Alia,

Thanks for looking into this.

It is relevant. I believe ECMP-prevention (anti-aliasing with 0x4 and =
0x6) is necessary for traffic over MPLS expecting in-order delivery.

Transporting NSH over MPLS, however, does not necessarily imply =
transporting NSH *directly* following the bottom LSE. There are other =
ways, as it was done with PWs.

I think showing that it is possible to appropriately (i.e., respecting =
BCPs) transport NSH over MPLS is very important. This may or may not =
have implications on the NSH base header. I believe however that such =
actual formal specification (beyond showing its possible) should not =
gate NSH.

Thanks!

=E2=80=94 Carlos.


> On Apr 12, 2016, at 10:29 PM, Alia Atlas <akatlas@gmail.com> wrote:
>=20
> Xiaohu, Joel, and SFC WG group,
>=20
> The first nibble question is quite relevant if it is expected that the =
NSH header might be directly under
> an MPLS label stack.  This issue arose rather unpleasantly for =
pseudo-wires a long time ago and the
> reasoning for it is much better documented, as Carlos pointed out in a =
different thread, in RFC 4928 Section 3.
>=20
> At the time that PWE3 was working on the control word and whether it =
was to be mandatory (RFC 4385), it was clear that
> there were devices that looked at the first nibble of a packet under =
the MPLS header as a way to determine
> if the packet was IPv4 or IPv6 and obtain flow-diversity from it.  The =
cost of also verifying the associated checksum
> if available wasn't deemed acceptable for several implementations.  =
Given that determining as much entropy as
> possible is still really important and that it is non-trivial to =
negotiate/indicate the capability for including
> an Entropy Label in the MPLS stack, I have no reason to believe that =
this shortcut of looking at the first nibble
> is no longer used or deployed.   Feel free to contact me off-list if =
you believe this to be the case.
>=20
> It is clear from the NSH base header:
>   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>      |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol |
>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> that this consideration has been completely ignored.  In fact, an NSH =
base header might have any value
> of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH were =
ever defined, suddenly the traffic might
> be subject to startling reordering if an MPLS transport were to be =
considered.
>=20
> Given a claim of NSH being transport-agnostic and repeated emphasis =
that MPLS, as well as UDP,
> is a valid transport for NSH, I do think this is a significant =
oversight and needs, at a minimum, discussion and
> explanation, and  - quite likely -  correction.
>=20
> While I am on the topic of details of the NSH encapsulation, I would =
request that Section 8 of draft-ietf-rtgwg-dt-encap-01
> be read and considered!   I am not excited by having many different =
and unique Next Protocol fields defined.
> For instance, I note the definition of a nearly identical Next =
Protocol field in =
https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe =
<https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe> .
>=20
> While I am, of course, willing to reason to detailed and well-thought =
out explanations for why each and every new
> encapsulation needs its very own IANA-defined Next Protocol field, =
this seems to me to be highly likely to require
> consolidation so that the same Next Protocol field can be used between =
the various encapsulations.
>=20
> I will work on giving a through review of NSH as soon as practical.  I =
do realize that there are multiple implementations
> and while details of how the "Next Protocol" field are documented =
shouldn't have a significant impact there, the
> discussion about the first nibble is likely to.
>=20
> Regards,
> Alia
>=20
>=20
> On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <xuxiaohu@huawei.com =
<mailto:xuxiaohu@huawei.com>> wrote:
> Joel,
>=20
> > -----Original Message-----
> > From: Joel M. Halpern [mailto:jmh@joelhalpern.com =
<mailto:jmh@joelhalpern.com>]
> > Sent: Wednesday, April 13, 2016 9:45 AM
> > To: Xuxiaohu; Thomas Narten; sfc@ietf.org <mailto:sfc@ietf.org>
> > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >
> > Xu,
> >       I do not believe that there is an MPLS specification that =
requires that all
> > content other than IP must have a first nibble of 0 or 1.
>=20
> When encapsulating NSH over MPLS directly, the first nibble of the NSH =
must not be 4 or 6.
>=20
> > There are specifications where it is discussed as desirable.
> >
> > It is in fact pretty trivial for us to change the format so that the =
first three bits are
> > 0, but it burns several valuable flag bits.  It is an SFC working =
group decision,
>=20
> That's the reason why I raised the first nibble question.
>=20
> Best regards,
> Xiaohu
>=20
> > not, as far as I can tell, a violation of the MPLS specification.
> >
> > Yours,
> > Joel
> >
> > On 4/12/16 9:41 PM, Xuxiaohu wrote:
> > > Hi Thomas,
> > >
> > > It said in the NSH draft:
> > >
> > >    "6.  Transport Agnostic: NSH is transport independent and is =
carried
> > >         in an overlay, over existing underlays.  If an existing =
overlay
> > >         topology provides the required service path connectivity, =
that
> > >         existing overlay may be used."
> > >
> > > That means the NSH should be able to be transported over MPLS. =
However,
> > according to the current NSH format definition, it's not safe to =
carry the NSH
> > over MPLS due to the first nibble issue. Therefore, I believe this =
issue needs to be
> > addressed before publication.
> > >
> > > Best regards,
> > > Xiaohu
> > >
> > >> -----Original Message-----
> > >> From: sfc [mailto:sfc-bounces@ietf.org =
<mailto:sfc-bounces@ietf.org>] On Behalf Of Thomas Narten
> > >> Sent: Thursday, March 31, 2016 10:48 AM
> > >> To: sfc@ietf.org <mailto:sfc@ietf.org>
> > >> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> > >>
> > >> Dear WG:
> > >>
> > >> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> > >> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/ =
<https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/>).
> > >>
> > >> The editors of the NSH document have indicated that they have
> > >> addressed all known comments and that there are no open issues =
with
> > >> the current version of the document.
> > >>
> > >> Substantive comments to the list please, editorial comments can =
go
> > >> directly to the document editors.
> > >>
> > >> We'll also get a brief update from the editors at next week's
> > >> meeting. If there are any remaining issues with the document, =
raising
> > >> them before the meeting would be especially helpful.
> > >>
> > >> For the chairs,
> > >> Thomas
> > >>
> > >> _______________________________________________
> > >> sfc mailing list
> > >> sfc@ietf.org <mailto:sfc@ietf.org>
> > >> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
> > >
> > > _______________________________________________
> > > sfc mailing list
> > > sfc@ietf.org <mailto:sfc@ietf.org>
> > > https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
> > >
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org <mailto:sfc@ietf.org>
> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


--Apple-Mail=_359C67C0-E654-4DEC-8444-203AFD147DFA
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">Alia,<div class=3D""><br class=3D""></div><div =
class=3D"">Thanks for looking into this.</div><div class=3D""><br =
class=3D""></div><div class=3D"">It is relevant. I believe =
ECMP-prevention (anti-aliasing with 0x4 and 0x6) is necessary for =
traffic over MPLS expecting in-order delivery.&nbsp;</div><div =
class=3D""><br class=3D""></div><div class=3D"">Transporting NSH over =
MPLS, however, does not necessarily imply transporting NSH *directly* =
following the bottom LSE. There are other ways, as it was done with =
PWs.&nbsp;</div><div class=3D""><br class=3D""></div><div class=3D"">I =
think showing that it is possible to appropriately (i.e., respecting =
BCPs) transport NSH over MPLS is very important. This may or may not =
have implications on the NSH base header. I believe however that such =
actual formal specification (beyond showing its possible) should not =
gate NSH.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Thanks!</div><div class=3D""><br class=3D""></div><div =
class=3D"">=E2=80=94 Carlos.</div><div class=3D""><br =
class=3D""></div><div class=3D""><br class=3D""><div><blockquote =
type=3D"cite" class=3D""><div class=3D"">On Apr 12, 2016, at 10:29 PM, =
Alia Atlas &lt;<a href=3D"mailto:akatlas@gmail.com" =
class=3D"">akatlas@gmail.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><meta =
http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dutf-8" =
class=3D""><div dir=3D"ltr" class=3D"">Xiaohu, Joel, and SFC WG =
group,<div class=3D""><br class=3D""></div><div class=3D"">The first =
nibble question is quite relevant if it is expected that the NSH header =
might be directly under</div><div class=3D"">an MPLS label stack.&nbsp; =
This issue arose rather unpleasantly for pseudo-wires a long time ago =
and the</div><div class=3D"">reasoning for it is much better documented, =
as Carlos pointed out in a different thread, in RFC 4928 Section =
3.</div><div class=3D""><br class=3D""></div><div class=3D"">At the time =
that PWE3 was working on the control word and whether it was to be =
mandatory (RFC 4385), it was clear that</div><div class=3D"">there were =
devices that looked at the first nibble of a packet under the MPLS =
header as a way to determine</div><div class=3D"">if the packet was IPv4 =
or IPv6 and obtain flow-diversity from it.&nbsp; The cost of also =
verifying the associated checksum</div><div class=3D"">if available =
wasn't deemed acceptable for several implementations.&nbsp; Given that =
determining as much entropy as</div><div class=3D"">possible is still =
really important and that it is non-trivial to negotiate/indicate the =
capability for including</div><div class=3D"">an Entropy Label in the =
MPLS stack, I have no reason to believe that this shortcut of looking at =
the first nibble</div><div class=3D"">is no longer used or deployed. =
&nbsp; Feel free to contact me off-list if you believe this to be the =
case.</div><div class=3D""><br class=3D""></div><div class=3D"">It is =
clear from the NSH base header:</div><div class=3D""><pre =
style=3D"overflow: auto; font-family: 'PT Mono', Monaco, monospace; =
font-size: 14px; padding: 10px; margin-top: 0px; margin-bottom: 10.5px; =
line-height: 1.214; word-wrap: break-word; border: 1px solid rgb(204, =
204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; =
border-bottom-right-radius: 4px; border-bottom-left-radius: 4px; =
background-color: rgb(255, 253, 245);" class=3D"">  0 1 2 3 4 5 6 7 8 9 =
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol |
     =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</pre></d=
iv><div class=3D"">that this consideration has been completely =
ignored.&nbsp; In fact, an NSH base header might have any =
value</div><div class=3D"">of 0b0000, 0b0001, 0b0010, 0b0010 and if a =
version 01 for NSH were ever defined, suddenly the traffic =
might</div><div class=3D"">be subject to startling reordering if an MPLS =
transport were to be considered.</div><div class=3D""><br =
class=3D""></div><div class=3D"">Given a claim of NSH being =
transport-agnostic and repeated emphasis that MPLS, as well as =
UDP,</div><div class=3D"">is a valid transport for NSH, I do think this =
is a significant oversight and needs, at a minimum, discussion =
and</div><div class=3D"">explanation, and &nbsp;- quite likely - =
&nbsp;correction.</div><div class=3D""><br class=3D""></div><div =
class=3D"">While I am on the topic of details of the NSH encapsulation, =
I would request that Section 8 of draft-ietf-rtgwg-dt-encap-01</div><div =
class=3D"">be read and considered! &nbsp; I am not excited by having =
many different and unique Next Protocol fields defined.</div><div =
class=3D"">For instance, I note the definition of a nearly identical =
Next Protocol field in <a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe" =
class=3D"">https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe</a> =
.</div><div class=3D""><br class=3D""></div><div class=3D"">While I am, =
of course, willing to reason to detailed and well-thought out =
explanations for why each and every new</div><div class=3D"">encapsulation=
 needs its very own IANA-defined Next Protocol field, this seems to me =
to be highly likely to require</div><div class=3D"">consolidation so =
that the same Next Protocol field can be used between the various =
encapsulations.</div><div class=3D""><br class=3D""></div><div =
class=3D"">I will work on giving a through review of NSH as soon as =
practical.&nbsp; I do realize that there are multiple =
implementations</div><div class=3D"">and while details of how the "Next =
Protocol" field are documented shouldn't have a significant impact =
there, the</div><div class=3D"">discussion about the first nibble is =
likely to.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Regards,</div><div class=3D"">Alia</div><div class=3D""><br =
class=3D""></div></div><div class=3D"gmail_extra"><br class=3D""><div =
class=3D"gmail_quote">On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <span =
dir=3D"ltr" class=3D"">&lt;<a href=3D"mailto:xuxiaohu@huawei.com" =
target=3D"_blank" class=3D"">xuxiaohu@huawei.com</a>&gt;</span> =
wrote:<br class=3D""><blockquote class=3D"gmail_quote" style=3D"margin:0 =
0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Joel,<br class=3D"">=

<span class=3D""><br class=3D"">
&gt; -----Original Message-----<br class=3D"">
&gt; From: Joel M. Halpern [mailto:<a href=3D"mailto:jmh@joelhalpern.com" =
class=3D"">jmh@joelhalpern.com</a>]<br class=3D"">
&gt; Sent: Wednesday, April 13, 2016 9:45 AM<br class=3D"">
&gt; To: Xuxiaohu; Thomas Narten; <a href=3D"mailto:sfc@ietf.org" =
class=3D"">sfc@ietf.org</a><br class=3D"">
&gt; Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br =
class=3D"">
&gt;<br class=3D"">
&gt; Xu,<br class=3D"">
&gt;&nbsp; &nbsp; &nbsp; &nbsp;I do not believe that there is an MPLS =
specification that requires that all<br class=3D"">
&gt; content other than IP must have a first nibble of 0 or 1.<br =
class=3D"">
<br class=3D"">
</span>When encapsulating NSH over MPLS directly, the first nibble of =
the NSH must not be 4 or 6.<br class=3D"">
<span class=3D""><br class=3D"">
&gt; There are specifications where it is discussed as desirable.<br =
class=3D"">
&gt;<br class=3D"">
&gt; It is in fact pretty trivial for us to change the format so that =
the first three bits are<br class=3D"">
&gt; 0, but it burns several valuable flag bits.&nbsp; It is an SFC =
working group decision,<br class=3D"">
<br class=3D"">
</span>That's the reason why I raised the first nibble question.<br =
class=3D"">
<br class=3D"">
Best regards,<br class=3D"">
Xiaohu<br class=3D"">
<div class=3D"HOEnZb"><div class=3D"h5"><br class=3D"">
&gt; not, as far as I can tell, a violation of the MPLS =
specification.<br class=3D"">
&gt;<br class=3D"">
&gt; Yours,<br class=3D"">
&gt; Joel<br class=3D"">
&gt;<br class=3D"">
&gt; On 4/12/16 9:41 PM, Xuxiaohu wrote:<br class=3D"">
&gt; &gt; Hi Thomas,<br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt; It said in the NSH draft:<br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt;&nbsp; &nbsp; "6.&nbsp; Transport Agnostic: NSH is transport =
independent and is carried<br class=3D"">
&gt; &gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;in an overlay, over existing =
underlays.&nbsp; If an existing overlay<br class=3D"">
&gt; &gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;topology provides the =
required service path connectivity, that<br class=3D"">
&gt; &gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;existing overlay may be =
used."<br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt; That means the NSH should be able to be transported over MPLS. =
However,<br class=3D"">
&gt; according to the current NSH format definition, it's not safe to =
carry the NSH<br class=3D"">
&gt; over MPLS due to the first nibble issue. Therefore, I believe this =
issue needs to be<br class=3D"">
&gt; addressed before publication.<br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt; Best regards,<br class=3D"">
&gt; &gt; Xiaohu<br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt;&gt; -----Original Message-----<br class=3D"">
&gt; &gt;&gt; From: sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" =
class=3D"">sfc-bounces@ietf.org</a>] On Behalf Of Thomas Narten<br =
class=3D"">
&gt; &gt;&gt; Sent: Thursday, March 31, 2016 10:48 AM<br class=3D"">
&gt; &gt;&gt; To: <a href=3D"mailto:sfc@ietf.org" =
class=3D"">sfc@ietf.org</a><br class=3D"">
&gt; &gt;&gt; Subject: [sfc] WG last call for =
draft-ietf-sfc-nsh-04.txt<br class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; Dear WG:<br class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; This note begins a WG last call on =
draft-ietf-sfc-nsh-04.txt<br class=3D"">
&gt; &gt;&gt; (<a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/" =
rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/</a>).<br =
class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; The editors of the NSH document have indicated that they =
have<br class=3D"">
&gt; &gt;&gt; addressed all known comments and that there are no open =
issues with<br class=3D"">
&gt; &gt;&gt; the current version of the document.<br class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; Substantive comments to the list please, editorial =
comments can go<br class=3D"">
&gt; &gt;&gt; directly to the document editors.<br class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; We'll also get a brief update from the editors at next =
week's<br class=3D"">
&gt; &gt;&gt; meeting. If there are any remaining issues with the =
document, raising<br class=3D"">
&gt; &gt;&gt; them before the meeting would be especially helpful.<br =
class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; For the chairs,<br class=3D"">
&gt; &gt;&gt; Thomas<br class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; _______________________________________________<br =
class=3D"">
&gt; &gt;&gt; sfc mailing list<br class=3D"">
&gt; &gt;&gt; <a href=3D"mailto:sfc@ietf.org" =
class=3D"">sfc@ietf.org</a><br class=3D"">
&gt; &gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" =
rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt; _______________________________________________<br class=3D"">
&gt; &gt; sfc mailing list<br class=3D"">
&gt; &gt; <a href=3D"mailto:sfc@ietf.org" class=3D"">sfc@ietf.org</a><br =
class=3D"">
&gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" =
rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br class=3D"">
&gt; &gt;<br class=3D"">
<br class=3D"">
_______________________________________________<br class=3D"">
sfc mailing list<br class=3D"">
<a href=3D"mailto:sfc@ietf.org" class=3D"">sfc@ietf.org</a><br class=3D"">=

<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" =
target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br class=3D"">
</div></div></blockquote></div><br class=3D""></div>
_______________________________________________<br class=3D"">sfc =
mailing list<br class=3D""><a href=3D"mailto:sfc@ietf.org" =
class=3D"">sfc@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc<br =
class=3D""></div></blockquote></div><br class=3D""></div></body></html>=

--Apple-Mail=_359C67C0-E654-4DEC-8444-203AFD147DFA--

--Apple-Mail=_FC1A4095-5033-48A5-8471-34E21B58DA0B
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org

iQIcBAEBCAAGBQJXDkFIAAoJEIXgpQGOZny9IoQQAIhb/4ozCeh+4b7Ecs794MrF
6lQpH3fDidqC0WpJfoaR61QYqrorqx1XMn6lZ0EMUfnaTbka7tp1IPENyVGV/Ar6
iqiGuDjDoaFhn0jWOuJZ/6uZup0EMIVNaUv9AHnkiqmbLrPZDulgBsR4GbHi9eS4
hAQR1F7CT1FFPJ2lGdlodUacL7yLOWm9vDwxbjj8nkCFmcXX+c6EA/xaudsYERjy
m4bsLNnJWX65gfDNMu0gOa+8rW1RL2pgAa/hFpnfeLBTF2otlKiSxYm/4Vov/88N
+Ja+tNpGzuYPgAEGMkM0upO0lqedlULxAoUBSCLWez0exBxQAoaP6wu2JTwoPa6Q
15ayIYsPIjY8Z8qT+CLHnBjsbCcAJYjwux+apuaq/lPaQcBQS7gpOVNYJH4NstpC
8V8VebKDVvQ3GgpL8fczQWDIyTQMEmlnHeLkeYM0AZYm88VzYRwuMDqH+9atp3CV
+ZTo0ynZm4SnVzfZ+E0UOFgOZD80/J4t+FLc/uv4zqpEoK4hFbm1TPsLtTlGdNle
xr34Oo99+RbnrL6n2IRPRv9X7d89rNHmi9Ejqxx0t6aer8pcz+eJdNQAKKlmuczm
acGsMN+04rQnQUZ+1nswVip8Gs485F1Qzs+Fvm3Z8iXN027a2P5VKvpWC7ui+b6G
mv83xOwrHIx9GBN4UFpR
=TAxN
-----END PGP SIGNATURE-----

--Apple-Mail=_FC1A4095-5033-48A5-8471-34E21B58DA0B--


From nobody Wed Apr 13 06:09:34 2016
Return-Path: <tnadeau@lucidvision.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC3F612D0E4 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 06:09:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.997
X-Spam-Level: 
X-Spam-Status: No, score=-2.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.996, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=lucidvision.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sjB2u2qlrzL8 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 06:09:29 -0700 (PDT)
Received: from lucidvision.com (lucidvision.com [64.71.170.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CD0B112D156 for <sfc@ietf.org>; Wed, 13 Apr 2016 06:09:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lucidvision.com; s=default; t=1460552948; bh=oLTkn0v695rUIJ4QZOELVSYWmiZ3BLBQzF7oxjFuekc=; h=Subject:From:In-Reply-To:Date:Cc:References:To; b=iHGr0JxeDwPkTYe7OQmnIsLBsIVvRndduv7WkviFPJdo4bi3LOnWJdESr43yJ9EPH u6D40YqfYuuXy7XgI8uEBkoL5oClf2zyXKfxvcUk4x+NMvyVor7v3qOMAeudOcYTTR Llm/d+C/QA+2SHLo5tggDIazPkH82PQEZRmnL4ww=
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=50.255.148.181; 
Content-Type: multipart/alternative; boundary="Apple-Mail=_C4698002-69CD-4811-B0CE-815E069634B8"
Mime-Version: 1.0 (Mac OS X Mail 9.2 \(3112\))
From: Nadeau Thomas <tnadeau@lucidvision.com>
In-Reply-To: <BC7C623C-EE3D-4DC3-B8C6-0F86A536D6D3@cisco.com>
Date: Wed, 13 Apr 2016 09:09:05 -0400
Message-Id: <0021DFAE-22C5-4FBB-A976-6DCED454DBDB@lucidvision.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <CAA=duU0jSG7J8ChoHP8zB4SWL2x9_YBHPx3vYovmGRmmpti9Lw@mail.gmail.com> <BC7C623C-EE3D-4DC3-B8C6-0F86A536D6D3@cisco.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>
X-Mailer: Apple Mail (2.3112)
X-Authenticated-User: tnadeau@lucidvision.com 
X-Info: aspam skipped due to (g_smite_skip_relay)
X-Encryption: SSL encrypted
X-MyRbl: Color=Unknown ip=50.255.148.181
X-IP-stats: Notspam Incoming Last 1, First 334, in=3605, out=0, spam=0 Known=true ip=50.255.148.181
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/qBypSLuSYxGa5xJDXnJ7mbMqIXI>
Cc: Thomas Narten <narten@us.ibm.com>, "Andrew G. Malis" <agmalis@gmail.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 13:09:34 -0000

--Apple-Mail=_C4698002-69CD-4811-B0CE-815E069634B8
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8


	I agree with Paul. WG LC is exactly the time to address any =
loose ends such as this. There was no concerted effort to avoid/ignore =
your suggested updates as far as I know.

	=E2=80=94Tom


> On Apr 12, 2016:9:05 PM, at 9:05 PM, Paul Quinn (paulq) =
<paulq@cisco.com> wrote:
>=20
> Andy,
>=20
>=20
>=20
>> On Apr 12, 2016, at 5:18 PM, Andrew G. Malis <agmalis@gmail.com =
<mailto:agmalis@gmail.com>> wrote:
>>=20
>> Thomas,
>>=20
>> I do NOT support this WG last call.
>>=20
>> Back in November, I reported a bug in section 14.2.3 that was =
acknowledged on the WG list, but was never corrected in the text. To =
repeat my report:
>>=20
>=20
> First off, my apologies if we missed including your editorial update.  =
We certainly will.  However, with all due respect, I'm not sure that =
warrants objecting to last call.  Carlos, in his email of support, also =
raised several editorial changes, which will be reflected in the new =
version. =20
>=20
>=20
>> There=E2=80=99s a bug with section 14.2.3. The text should be =
corrected as follows:
>>=20
>> OLD:=20
>>=20
>> 14.2.3.  TLV Class Registry
>>=20
>>    IANA is requested to set up a registry of "TLV Types".  These are =
16-
>>    bit values.  Registry entries are assigned by using the "IETF =
Review"
>>    policy defined in RFC 5226 [RFC5226].
>>=20
>> NEW:
>>=20
>> 14.2.3.  TLV Class Registry
>>=20
>>    IANA is requested to set up a registry of "TLV Classes".  These =
are 16-
>>    bit values.  Registry entries are assigned by using the "IETF =
Review"
>>    policy defined in RFC 5226 [RFC5226].
>>=20
>>=20
>> This leaves me curious as to what other acknowledged comments on the =
draft may have been also left out of the editing process.
>>=20
>> I also note that although the TLV Class registry is being created, =
there are no values to be allocated within the registry. I believe that =
this is contrary to IANA policy. Or if not, it=E2=80=99s at least =
questionable.
>>=20
>> Section 11 still lists open items for WG resolution.
>>=20
>> I also agree with the interoperability concerns raised by others on =
the list.
>>=20
>> Thanks,
>> Andy
>>=20
>>=20
>> On Wed, Mar 30, 2016 at 10:48 PM, Thomas Narten <narten@us.ibm.com =
<mailto:narten@us.ibm.com>> wrote:
>> Dear WG:
>>=20
>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/ =
<https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/>).
>>=20
>> The editors of the NSH document have indicated that they have
>> addressed all known comments and that there are no open issues with
>> the current version of the document.
>>=20
>> Substantive comments to the list please, editorial comments can go
>> directly to the document editors.
>>=20
>> We'll also get a brief update from the editors at next week's
>> meeting. If there are any remaining issues with the document, raising
>> them before the meeting would be especially helpful.
>>=20
>> For the chairs,
>> Thomas
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org <mailto:sfc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org <mailto:sfc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


--Apple-Mail=_C4698002-69CD-4811-B0CE-815E069634B8
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D""><div class=3D""><br class=3D""></div><span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span>I agree =
with Paul. WG LC is exactly the time to address any loose ends such as =
this. There was no concerted effort to avoid/ignore your suggested =
updates as far as I know.<div class=3D""><br class=3D""></div><div =
class=3D""><span class=3D"Apple-tab-span" style=3D"white-space:pre">	=
</span>=E2=80=94Tom</div><div class=3D""><br class=3D""></div><div =
class=3D""><br class=3D""><div><blockquote type=3D"cite" class=3D""><div =
class=3D"">On Apr 12, 2016:9:05 PM, at 9:05 PM, Paul Quinn (paulq) =
&lt;<a href=3D"mailto:paulq@cisco.com" class=3D"">paulq@cisco.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><div class=3D"">

<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dutf-8" =
class=3D"">

<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space;" class=3D"">
Andy,
<div class=3D""><br class=3D"">
</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D""><br class=3D"">
<div class=3D"">
<blockquote type=3D"cite" class=3D"">
<div class=3D"">On Apr 12, 2016, at 5:18 PM, Andrew G. Malis &lt;<a =
href=3D"mailto:agmalis@gmail.com" class=3D"">agmalis@gmail.com</a>&gt; =
wrote:</div>
<br class=3D"Apple-interchange-newline">
<div class=3D"">
<div dir=3D"ltr" class=3D"">Thomas,
<div class=3D""><br class=3D"">
</div>
<div class=3D"">I do NOT support this WG last call.</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">Back in November, I reported a bug in section 14.2.3 =
that was acknowledged on the WG list, but was never corrected in the =
text. To repeat my report:</div>
<div class=3D""><br class=3D"">
</div>
</div>
</div>
</blockquote>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">First off, my apologies if we missed including your =
editorial update. &nbsp;We certainly will. &nbsp;However, with all due =
respect, I'm not sure that warrants objecting to last call. =
&nbsp;Carlos, in his email of support, also raised several editorial =
changes, which
 will be reflected in the new version. &nbsp;</div>
<div class=3D""><br class=3D"">
</div>
<br class=3D"">
<blockquote type=3D"cite" class=3D"">
<div class=3D"">
<div dir=3D"ltr" class=3D"">
<div class=3D"">
<div class=3D"">There=E2=80=99s a bug with section 14.2.3. The text =
should be corrected as follows:</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">OLD:&nbsp;</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">14.2.3.&nbsp; TLV Class Registry</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">&nbsp; &nbsp;IANA is requested to set up a registry of =
"TLV Types".&nbsp; These are 16-</div>
<div class=3D"">&nbsp; &nbsp;bit values.&nbsp; Registry entries are =
assigned by using the "IETF Review"</div>
<div class=3D"">&nbsp; &nbsp;policy defined in RFC 5226 [RFC5226].</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">NEW:</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">14.2.3.&nbsp; TLV Class Registry</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">&nbsp; &nbsp;IANA is requested to set up a registry of =
"TLV Classes".&nbsp; These are 16-</div>
<div class=3D"">&nbsp; &nbsp;bit values.&nbsp; Registry entries are =
assigned by using the "IETF Review"</div>
<div class=3D"">&nbsp; &nbsp;policy defined in RFC 5226 [RFC5226].</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D""><br class=3D"">
</div>
</div>
<div class=3D"">This leaves me curious as to what other acknowledged =
comments on the draft may have been also left out of the editing =
process.</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">I also note that although the TLV Class registry is =
being created, there are no values to be allocated within the registry. =
I believe that this is contrary to IANA policy. Or if not, it=E2=80=99s =
at least questionable.</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">Section 11 still lists open items for WG =
resolution.</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">I also agree with the interoperability concerns raised =
by others on the list.</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">Thanks,</div>
<div class=3D"">Andy</div>
<div class=3D""><br class=3D"">
</div>
</div>
<div class=3D"gmail_extra"><br class=3D"">
<div class=3D"gmail_quote">On Wed, Mar 30, 2016 at 10:48 PM, Thomas =
Narten <span dir=3D"ltr" class=3D"">
&lt;<a href=3D"mailto:narten@us.ibm.com" target=3D"_blank" =
class=3D"">narten@us.ibm.com</a>&gt;</span> wrote:<br class=3D"">
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex">
Dear WG:<br class=3D"">
<br class=3D"">
This note begins a WG last call on draft-ietf-sfc-nsh-04.txt<br =
class=3D"">
(<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/" =
rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/</a>).<br =
class=3D"">
<br class=3D"">
The editors of the NSH document have indicated that they have<br =
class=3D"">
addressed all known comments and that there are no open issues with<br =
class=3D"">
the current version of the document.<br class=3D"">
<br class=3D"">
Substantive comments to the list please, editorial comments can go<br =
class=3D"">
directly to the document editors.<br class=3D"">
<br class=3D"">
We'll also get a brief update from the editors at next week's<br =
class=3D"">
meeting. If there are any remaining issues with the document, raising<br =
class=3D"">
them before the meeting would be especially helpful.<br class=3D"">
<br class=3D"">
For the chairs,<br class=3D"">
Thomas<br class=3D"">
<br class=3D"">
_______________________________________________<br class=3D"">
sfc mailing list<br class=3D"">
<a href=3D"mailto:sfc@ietf.org" class=3D"">sfc@ietf.org</a><br class=3D"">=

<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" =
target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br class=3D"">
</blockquote>
</div>
<br class=3D"">
</div>
_______________________________________________<br class=3D"">
sfc mailing list<br class=3D"">
<a href=3D"mailto:sfc@ietf.org" class=3D"">sfc@ietf.org</a><br class=3D"">=

<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br class=3D"">
</div>
</blockquote>
</div>
<br class=3D"">
</div>
</div>

_______________________________________________<br class=3D"">sfc =
mailing list<br class=3D""><a href=3D"mailto:sfc@ietf.org" =
class=3D"">sfc@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc<br =
class=3D""></div></blockquote></div><br class=3D""></div></body></html>=

--Apple-Mail=_C4698002-69CD-4811-B0CE-815E069634B8--


From nobody Wed Apr 13 06:13:11 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8AF9F12D7F2 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 06:13:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level: 
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ux7XeBJNIOV6 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 06:13:07 -0700 (PDT)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id 944FC12D7CA for <sfc@ietf.org>; Wed, 13 Apr 2016 06:13:07 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Wed, 13 Apr 2016 09:13:06 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>, Ron Parker <Ron_Parker@affirmednetworks.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfOeSAX3MU5GUyUYGxYNRxnVJ+GxnOggABNP4CAAFnrgIAAhoug
Date: Wed, 13 Apr 2016 13:13:06 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F1D4A7@wtl-exchp-2.sandvine.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <E8355113905631478EFF04F5AA706E9830F1BBAC@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D77F0B6@MBX021-W3-CA-2.exch021.domain.local> <14F8542B-9EE1-40DF-8DA2-E6E5048A16A3@cisco.com>
In-Reply-To: <14F8542B-9EE1-40DF-8DA2-E6E5048A16A3@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/cq-Xr_bYiGKtgBritRc9GFAM1ic>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 13:13:09 -0000

Paul,
Are you unhappy with the metadata constraints I suggested below?
Perhaps qualified by "In the absence of out-of-band configuration..." ?

I believe that the schemes proposed in these drafts satisfy the constraints=
:
- draft-sfc-nsh-dc-allocation-4,=20
- draft-napper-sfc-nsh-broadband-allocation-00=20

(I thought there were more allocation schemes, but I guess they expired.)

I'll update it here:

   In the absence of out-of-band configuration to indicate otherwise,
   metadata used in NSH headers must meet the condition that
   a transport-layer-stateful Service Function can save away
   metadata values that it has witnessed.  An injected packet can
   therefore be assigned a clone of metadata taken from an earlier
   packet going in the same direction.  For example, a Service Function
   can send a TCP packet using metadata cloned from another TCP packet
   of the same connection and direction.
=20
   Note that the Service Function need not know the meaning of the
   metadata; it just needs to know it is safe to clone in this manner.


-Dave



-----Original Message-----
From: Paul Quinn (paulq) [mailto:paulq@cisco.com]=20
Sent: Tuesday, April 12, 2016 9:03 PM
To: Ron Parker
Cc: Dave Dolson; Thomas Narten; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Ron, Dave,

The draft describes the metadata as opaque, and really NSH is just the enve=
lop for it.  The same can be said for the TLV as well -- there's no spec in=
 NSH, not should there be.  In both cases, the metadata can/should/(must?) =
be define in auxiliary drafts.  There are several drafts re: metadata that =
can be discussed and eventually standardized.  It also bears mentioning tha=
t the control plane, today in opensource, defines the type 1 semantics.  Th=
at schemes works well, and mixed implementations can play together.

So, perhaps the best way forward:

1.  Agree on the envelop and the use of that envelop
2.  As a WG, adopt --> standardize the opaque data, and the TLVs
3.  As a WG, work on more detailed of use of the control plane to, when nee=
ded, define semantics

Thoughts?

Thanks,
Paul


> On Apr 12, 2016, at 3:41 PM, Ron Parker <Ron_Parker@affirmednetworks.com>=
 wrote:
>=20
> Dave,
>=20
> I, too, have raised this issue on the thread.   I think you hit the nail =
on the head regarding interoperability, which is the primary reason for hav=
ing a specification, at all.    My mental model for the type-1 mandatory co=
ntext headers is that of a composite 16-byte locally defined scratchpad.   =
I struggle with having its definition completely undefined in the document =
and still making it mandatory.   =20
>=20
> Much of the justification offered has been to be friendly to hardware.   =
Surely hardware needs to know the exact format and meaning of these 16 byte=
s.
>=20
>   Ron
>=20
>=20
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
> Sent: Tuesday, April 12, 2016 3:29 PM
> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
>=20
> The NSH draft indicates that MD-Type 1 MUST be supported, yet the Mandato=
ry Context Header fields are not defined in the document.
>=20
> Issues with metadata semantics have been raised various times on this lis=
t and in drafts, and never satisfactorily addressed.
> Examples:
> https://tools.ietf.org/html/draft-vallamkonda-sfc-metadata-model-00.txt
> https://www.ietf.org/archive/id/draft-wang-sfc-md-type-issues-00.txt
> https://www.ietf.org/archive/id/draft-penno-sfc-packet-02.txt
> https://mailarchive.ietf.org/arch/msg/sfc/2YvBakDgJ_hjY-BGvgWdcTTUDIs
>=20
>=20
> So I don't feel this draft sufficiently explains the MD-Type 1 metadata w=
ell enough to explain how one can make an interoperable implementation.
>=20
> The draft references metadata allocation drafts, but they have not been a=
dopted yet, so (as I understand it) these "works in progress" cannot suppor=
t draft-ietf-sfc-nsh.
>=20
>=20
> I think it might be acceptable to say that the metadata must be undirecti=
onally clonable (or better phrase).
> In other words,
>=20
>   Metadata used in NSH headers must been the condition that
>   a transport-layer-stateful Service Function can save away
>   metadata values that it has witnessed.  An injected packet can
>   therefore be assigned a clone of metadata taken from an earlier
>   packet going in the same direction.  For example, a Service Function
>   can send a TCP packet using metadata cloned from another TCP packet
>   of the same connection and direction.
>=20
>   Note that the Service Function need not know the meaning of the
>   metadata; it just needs to know it is safe to clone in this manner.
>=20
>=20
>=20
> Another alternative would be to import one of the metadata allocation sch=
emes into this draft as MD-Type 1, and allow IANA to allocate MD-types for =
other schemes.
>=20
>=20
>=20
> -Dave
>=20
>=20
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
> Sent: Wednesday, March 30, 2016 10:48 PM
> To: sfc@ietf.org
> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Dear WG:
>=20
> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt (https://dat=
atracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>=20
> The editors of the NSH document have indicated that they have addressed a=
ll known comments and that there are no open issues with the current versio=
n of the document.
>=20
> Substantive comments to the list please, editorial comments can go direct=
ly to the document editors.
>=20
> We'll also get a brief update from the editors at next week's meeting. If=
 there are any remaining issues with the document, raising them before the =
meeting would be especially helpful.
>=20
> For the chairs,
> Thomas
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Apr 13 06:13:29 2016
Return-Path: <akatlas@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4389D12D8D7 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 06:13:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.699
X-Spam-Level: 
X-Spam-Status: No, score=-102.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PgQMfA6Pkrr7 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 06:13:25 -0700 (PDT)
Received: from mail-ob0-x235.google.com (mail-ob0-x235.google.com [IPv6:2607:f8b0:4003:c01::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5237812D7F2 for <sfc@ietf.org>; Wed, 13 Apr 2016 06:13:23 -0700 (PDT)
Received: by mail-ob0-x235.google.com with SMTP id tz8so32711019obc.0 for <sfc@ietf.org>; Wed, 13 Apr 2016 06:13:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc; bh=4K1EL1inTHnN/ziWeA8t0dJZ4K6d+lCftNbZZ1DZyNM=; b=o3hHEifXyKg0B3gi64RbDS+tegVuuJIFjSfrOvIdA8fLbBY4U6azcRQKhXu6eJ8jh8 e5D7Ys8QpvlS2/eVtb+YDDvQ91EDcyjuBOFdrEw9AnLu/mOLa4uCW5kHs0jfTSku8JHM j3nOBNiHk9jTJklEc8sl4KZ5x9F2HOsq1oQ2Pj9CyPMfjrjexvAo+b7Ux3fhytTNcwWC CLXVSbRufPlruCpN0HOU1ckOdKKYDZt7I9Bw7hzteru1loykb4IpqvZOxNDJ15NVwx0S GRUtQT+R3NsPMgDsQUZ3cEMazmwr0HSDYqD4D2BLTeS8XLGn+DirLVl9eYE8DO0kPurm TnFA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc; bh=4K1EL1inTHnN/ziWeA8t0dJZ4K6d+lCftNbZZ1DZyNM=; b=ODi01XQe5vW3aotgB2fLtUtOhPQI5soUIadEIlIhUjudbz+kdgsT1qYDAjLHbx9EJc 8I1GTLjRviFkvp/oZEvVPnTpJCSyfR5OfNs/1IyOiEPWS6zyAIgdamFeowucucLpGWL7 kkpzS/rHBye76Hsklm95bfRAgD6vI/PInJlTuimPOmyT0u2SwPPEFjiGq2ECeLsuflfB uptYtthg9TQJfcAYM7aPOgF+bV0FjZxLROVr4x4lybiEODBtSdgNuKXrXCTdorM0q+D8 GrUQyWUAPtdTdizEF0aFRKEfIELKE4eZNdlOFMExHetByEE133EXHU9q4oJHbglA1hyy CiWw==
X-Gm-Message-State: AOPr4FWdI1oz+DaGrKKvtzxjckLVGF4zyw2UdUD39lZDABfxEjVsErZtt2eXzam00sZuJfKXnoCWCZbnKxdRig==
MIME-Version: 1.0
X-Received: by 10.182.38.233 with SMTP id j9mr4280062obk.57.1460553202657; Wed, 13 Apr 2016 06:13:22 -0700 (PDT)
Received: by 10.60.115.168 with HTTP; Wed, 13 Apr 2016 06:13:22 -0700 (PDT)
In-Reply-To: <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com>
Date: Wed, 13 Apr 2016 09:13:22 -0400
Message-ID: <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com>
From: Alia Atlas <akatlas@gmail.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Content-Type: multipart/alternative; boundary=001a11c33936d2187b05305d8a60
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/tEISq_cvB0TaKfvdQx6fangnmgQ>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 13:13:28 -0000

--001a11c33936d2187b05305d8a60
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Carlos,

As we all know, it is possible to do many many things with technology -
once we figure out how.
Saying that there are approaches other than reorganizing the first nibble
is fine.  Claiming that we'll
be anywhere near interoperability or standardization without it being
clarified does not seem plausible.

For instance, I will note that the description of 0 (Explicit NULL) is
still defined in RFC3032 as implying
the packet underneath is IPv4.  I really did think that we'd talked in MPLS
about fixing this - and maybe
Loa or others can give us the reference - but that's what the IANA pointer
has right now.

I understand the desire to get NSH done - deeply!

I also hate late surprises and am trying to clear time to do a more
thorough review of NSH as well as
requesting other focused reviews.

This issue is not new - and the issues I saw in a quick look are those that
are thoroughly documented
in draft-ietf-rtgwg-dt-encap-01
<https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-encap/> which
considered NSH as one of the encapsulations.

It seems clear that there *are* transport-specific issues and we need a
place and a way to capture them.

Regards,
Alia

On Wed, Apr 13, 2016 at 8:53 AM, Carlos Pignataro (cpignata) <
cpignata@cisco.com> wrote:

> Alia,
>
> Thanks for looking into this.
>
> It is relevant. I believe ECMP-prevention (anti-aliasing with 0x4 and 0x6=
)
> is necessary for traffic over MPLS expecting in-order delivery.
>
> Transporting NSH over MPLS, however, does not necessarily imply
> transporting NSH *directly* following the bottom LSE. There are other way=
s,
> as it was done with PWs.
>
> I think showing that it is possible to appropriately (i.e., respecting
> BCPs) transport NSH over MPLS is very important. This may or may not have
> implications on the NSH base header. I believe however that such actual
> formal specification (beyond showing its possible) should not gate NSH.
>
> Thanks!
>
> =E2=80=94 Carlos.
>
>
> On Apr 12, 2016, at 10:29 PM, Alia Atlas <akatlas@gmail.com> wrote:
>
> Xiaohu, Joel, and SFC WG group,
>
> The first nibble question is quite relevant if it is expected that the NS=
H
> header might be directly under
> an MPLS label stack.  This issue arose rather unpleasantly for
> pseudo-wires a long time ago and the
> reasoning for it is much better documented, as Carlos pointed out in a
> different thread, in RFC 4928 Section 3.
>
> At the time that PWE3 was working on the control word and whether it was
> to be mandatory (RFC 4385), it was clear that
> there were devices that looked at the first nibble of a packet under the
> MPLS header as a way to determine
> if the packet was IPv4 or IPv6 and obtain flow-diversity from it.  The
> cost of also verifying the associated checksum
> if available wasn't deemed acceptable for several implementations.  Given
> that determining as much entropy as
> possible is still really important and that it is non-trivial to
> negotiate/indicate the capability for including
> an Entropy Label in the MPLS stack, I have no reason to believe that this
> shortcut of looking at the first nibble
> is no longer used or deployed.   Feel free to contact me off-list if you
> believe this to be the case.
>
> It is clear from the NSH base header:
>
>   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>      |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol |
>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>
> that this consideration has been completely ignored.  In fact, an NSH bas=
e
> header might have any value
> of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH were ever
> defined, suddenly the traffic might
> be subject to startling reordering if an MPLS transport were to be
> considered.
>
> Given a claim of NSH being transport-agnostic and repeated emphasis that
> MPLS, as well as UDP,
> is a valid transport for NSH, I do think this is a significant oversight
> and needs, at a minimum, discussion and
> explanation, and  - quite likely -  correction.
>
> While I am on the topic of details of the NSH encapsulation, I would
> request that Section 8 of draft-ietf-rtgwg-dt-encap-01
> be read and considered!   I am not excited by having many different and
> unique Next Protocol fields defined.
> For instance, I note the definition of a nearly identical Next Protocol
> field in https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe .
>
> While I am, of course, willing to reason to detailed and well-thought out
> explanations for why each and every new
> encapsulation needs its very own IANA-defined Next Protocol field, this
> seems to me to be highly likely to require
> consolidation so that the same Next Protocol field can be used between th=
e
> various encapsulations.
>
> I will work on giving a through review of NSH as soon as practical.  I do
> realize that there are multiple implementations
> and while details of how the "Next Protocol" field are documented
> shouldn't have a significant impact there, the
> discussion about the first nibble is likely to.
>
> Regards,
> Alia
>
>
> On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <xuxiaohu@huawei.com> wrote:
>
>> Joel,
>>
>> > -----Original Message-----
>> > From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
>> > Sent: Wednesday, April 13, 2016 9:45 AM
>> > To: Xuxiaohu; Thomas Narten; sfc@ietf.org
>> > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>> >
>> > Xu,
>> >       I do not believe that there is an MPLS specification that
>> requires that all
>> > content other than IP must have a first nibble of 0 or 1.
>>
>> When encapsulating NSH over MPLS directly, the first nibble of the NSH
>> must not be 4 or 6.
>>
>> > There are specifications where it is discussed as desirable.
>> >
>> > It is in fact pretty trivial for us to change the format so that the
>> first three bits are
>> > 0, but it burns several valuable flag bits.  It is an SFC working grou=
p
>> decision,
>>
>> That's the reason why I raised the first nibble question.
>>
>> Best regards,
>> Xiaohu
>>
>> > not, as far as I can tell, a violation of the MPLS specification.
>> >
>> > Yours,
>> > Joel
>> >
>> > On 4/12/16 9:41 PM, Xuxiaohu wrote:
>> > > Hi Thomas,
>> > >
>> > > It said in the NSH draft:
>> > >
>> > >    "6.  Transport Agnostic: NSH is transport independent and is
>> carried
>> > >         in an overlay, over existing underlays.  If an existing
>> overlay
>> > >         topology provides the required service path connectivity, th=
at
>> > >         existing overlay may be used."
>> > >
>> > > That means the NSH should be able to be transported over MPLS.
>> However,
>> > according to the current NSH format definition, it's not safe to carry
>> the NSH
>> > over MPLS due to the first nibble issue. Therefore, I believe this
>> issue needs to be
>> > addressed before publication.
>> > >
>> > > Best regards,
>> > > Xiaohu
>> > >
>> > >> -----Original Message-----
>> > >> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
>> > >> Sent: Thursday, March 31, 2016 10:48 AM
>> > >> To: sfc@ietf.org
>> > >> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>> > >>
>> > >> Dear WG:
>> > >>
>> > >> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>> > >> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>> > >>
>> > >> The editors of the NSH document have indicated that they have
>> > >> addressed all known comments and that there are no open issues with
>> > >> the current version of the document.
>> > >>
>> > >> Substantive comments to the list please, editorial comments can go
>> > >> directly to the document editors.
>> > >>
>> > >> We'll also get a brief update from the editors at next week's
>> > >> meeting. If there are any remaining issues with the document, raisi=
ng
>> > >> them before the meeting would be especially helpful.
>> > >>
>> > >> For the chairs,
>> > >> Thomas
>> > >>
>> > >> _______________________________________________
>> > >> sfc mailing list
>> > >> sfc@ietf.org
>> > >> https://www.ietf.org/mailman/listinfo/sfc
>> > >
>> > > _______________________________________________
>> > > sfc mailing list
>> > > sfc@ietf.org
>> > > https://www.ietf.org/mailman/listinfo/sfc
>> > >
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>
>
>

--001a11c33936d2187b05305d8a60
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Carlos,<div><br></div><div>As we all know, it is possible =
to do many many things with technology - once we figure out how.</div><div>=
Saying that there are approaches other than reorganizing the first nibble i=
s fine.=C2=A0 Claiming that we&#39;ll</div><div>be anywhere near interopera=
bility or standardization without it being clarified does not seem plausibl=
e.</div><div><br></div><div>For instance, I will note that the description =
of 0 (Explicit NULL) is still defined in RFC3032 as implying</div><div>the =
packet underneath is IPv4.=C2=A0 I really did think that we&#39;d talked in=
 MPLS about fixing this - and maybe</div><div>Loa or others can give us the=
 reference - but that&#39;s what the IANA pointer has right now.</div><div>=
<br></div><div>I understand the desire to get NSH done - deeply! =C2=A0</di=
v><div><br></div><div>I also hate late surprises and am trying to clear tim=
e to do a more thorough review of NSH as well as</div><div>requesting other=
 focused reviews.</div><div><br></div><div>This issue is not new - and the =
issues I saw in a quick look are those that are thoroughly documented</div>=
<div>in=C2=A0<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-rtgwg-d=
t-encap/" style=3D"color:rgb(39,22,115);outline:0px;font-family:&#39;PT Ser=
if&#39;,Palatino,&#39;Neue Swift&#39;,serif;font-size:15px;line-height:21.4=
286px;background-color:rgb(249,249,249)">draft-ietf-rtgwg-dt-encap-01</a><s=
pan style=3D"font-family:&#39;PT Serif&#39;,Palatino,&#39;Neue Swift&#39;,s=
erif;font-size:15px;line-height:21.4286px;background-color:rgb(249,249,249)=
">=C2=A0</span>which considered NSH as one of the encapsulations.</div><div=
><br></div><div>It seems clear that there <b>are</b>=C2=A0transport-specifi=
c issues and we need a place and a way to capture them.</div><div><br></div=
><div>Regards,</div><div>Alia</div></div><div class=3D"gmail_extra"><br><di=
v class=3D"gmail_quote">On Wed, Apr 13, 2016 at 8:53 AM, Carlos Pignataro (=
cpignata) <span dir=3D"ltr">&lt;<a href=3D"mailto:cpignata@cisco.com" targe=
t=3D"_blank">cpignata@cisco.com</a>&gt;</span> wrote:<br><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex"><div style=3D"word-wrap:break-word">Alia,<div><br></div><div>=
Thanks for looking into this.</div><div><br></div><div>It is relevant. I be=
lieve ECMP-prevention (anti-aliasing with 0x4 and 0x6) is necessary for tra=
ffic over MPLS expecting in-order delivery.=C2=A0</div><div><br></div><div>=
Transporting NSH over MPLS, however, does not necessarily imply transportin=
g NSH *directly* following the bottom LSE. There are other ways, as it was =
done with PWs.=C2=A0</div><div><br></div><div>I think showing that it is po=
ssible to appropriately (i.e., respecting BCPs) transport NSH over MPLS is =
very important. This may or may not have implications on the NSH base heade=
r. I believe however that such actual formal specification (beyond showing =
its possible) should not gate NSH.</div><div><br></div><div>Thanks!</div><s=
pan class=3D"HOEnZb"><font color=3D"#888888"><div><br></div><div>=E2=80=94 =
Carlos.</div></font></span><div><div class=3D"h5"><div><br></div><div><br><=
div><blockquote type=3D"cite"><div>On Apr 12, 2016, at 10:29 PM, Alia Atlas=
 &lt;<a href=3D"mailto:akatlas@gmail.com" target=3D"_blank">akatlas@gmail.c=
om</a>&gt; wrote:</div><br><div><div dir=3D"ltr">Xiaohu, Joel, and SFC WG g=
roup,<div><br></div><div>The first nibble question is quite relevant if it =
is expected that the NSH header might be directly under</div><div>an MPLS l=
abel stack.=C2=A0 This issue arose rather unpleasantly for pseudo-wires a l=
ong time ago and the</div><div>reasoning for it is much better documented, =
as Carlos pointed out in a different thread, in RFC 4928 Section 3.</div><d=
iv><br></div><div>At the time that PWE3 was working on the control word and=
 whether it was to be mandatory (RFC 4385), it was clear that</div><div>the=
re were devices that looked at the first nibble of a packet under the MPLS =
header as a way to determine</div><div>if the packet was IPv4 or IPv6 and o=
btain flow-diversity from it.=C2=A0 The cost of also verifying the associat=
ed checksum</div><div>if available wasn&#39;t deemed acceptable for several=
 implementations.=C2=A0 Given that determining as much entropy as</div><div=
>possible is still really important and that it is non-trivial to negotiate=
/indicate the capability for including</div><div>an Entropy Label in the MP=
LS stack, I have no reason to believe that this shortcut of looking at the =
first nibble</div><div>is no longer used or deployed. =C2=A0 Feel free to c=
ontact me off-list if you believe this to be the case.</div><div><br></div>=
<div>It is clear from the NSH base header:</div><div><pre style=3D"overflow=
:auto;font-family:&#39;PT Mono&#39;,Monaco,monospace;font-size:14px;padding=
:10px;margin-top:0px;margin-bottom:10.5px;line-height:1.214;word-wrap:break=
-word;border:1px solid rgb(204,204,204);border-top-left-radius:4px;border-t=
op-right-radius:4px;border-bottom-right-radius:4px;border-bottom-left-radiu=
s:4px;background-color:rgb(255,253,245)">  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 =
6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</pre=
></div><div>that this consideration has been completely ignored.=C2=A0 In f=
act, an NSH base header might have any value</div><div>of 0b0000, 0b0001, 0=
b0010, 0b0010 and if a version 01 for NSH were ever defined, suddenly the t=
raffic might</div><div>be subject to startling reordering if an MPLS transp=
ort were to be considered.</div><div><br></div><div>Given a claim of NSH be=
ing transport-agnostic and repeated emphasis that MPLS, as well as UDP,</di=
v><div>is a valid transport for NSH, I do think this is a significant overs=
ight and needs, at a minimum, discussion and</div><div>explanation, and =C2=
=A0- quite likely - =C2=A0correction.</div><div><br></div><div>While I am o=
n the topic of details of the NSH encapsulation, I would request that Secti=
on 8 of draft-ietf-rtgwg-dt-encap-01</div><div>be read and considered! =C2=
=A0 I am not excited by having many different and unique Next Protocol fiel=
ds defined.</div><div>For instance, I note the definition of a nearly ident=
ical Next Protocol field in <a href=3D"https://datatracker.ietf.org/doc/dra=
ft-ietf-nvo3-vxlan-gpe" target=3D"_blank">https://datatracker.ietf.org/doc/=
draft-ietf-nvo3-vxlan-gpe</a> .</div><div><br></div><div>While I am, of cou=
rse, willing to reason to detailed and well-thought out explanations for wh=
y each and every new</div><div>encapsulation needs its very own IANA-define=
d Next Protocol field, this seems to me to be highly likely to require</div=
><div>consolidation so that the same Next Protocol field can be used betwee=
n the various encapsulations.</div><div><br></div><div>I will work on givin=
g a through review of NSH as soon as practical.=C2=A0 I do realize that the=
re are multiple implementations</div><div>and while details of how the &quo=
t;Next Protocol&quot; field are documented shouldn&#39;t have a significant=
 impact there, the</div><div>discussion about the first nibble is likely to=
.</div><div><br></div><div>Regards,</div><div>Alia</div><div><br></div></di=
v><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Tue, Apr 12,=
 2016 at 9:53 PM, Xuxiaohu <span dir=3D"ltr">&lt;<a href=3D"mailto:xuxiaohu=
@huawei.com" target=3D"_blank">xuxiaohu@huawei.com</a>&gt;</span> wrote:<br=
><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1=
px #ccc solid;padding-left:1ex">Joel,<br>
<span><br>
&gt; -----Original Message-----<br>
&gt; From: Joel M. Halpern [mailto:<a href=3D"mailto:jmh@joelhalpern.com" t=
arget=3D"_blank">jmh@joelhalpern.com</a>]<br>
&gt; Sent: Wednesday, April 13, 2016 9:45 AM<br>
&gt; To: Xuxiaohu; Thomas Narten; <a href=3D"mailto:sfc@ietf.org" target=3D=
"_blank">sfc@ietf.org</a><br>
&gt; Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
&gt;<br>
&gt; Xu,<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0I do not believe that there is an MPLS speci=
fication that requires that all<br>
&gt; content other than IP must have a first nibble of 0 or 1.<br>
<br>
</span>When encapsulating NSH over MPLS directly, the first nibble of the N=
SH must not be 4 or 6.<br>
<span><br>
&gt; There are specifications where it is discussed as desirable.<br>
&gt;<br>
&gt; It is in fact pretty trivial for us to change the format so that the f=
irst three bits are<br>
&gt; 0, but it burns several valuable flag bits.=C2=A0 It is an SFC working=
 group decision,<br>
<br>
</span>That&#39;s the reason why I raised the first nibble question.<br>
<br>
Best regards,<br>
Xiaohu<br>
<div><div><br>
&gt; not, as far as I can tell, a violation of the MPLS specification.<br>
&gt;<br>
&gt; Yours,<br>
&gt; Joel<br>
&gt;<br>
&gt; On 4/12/16 9:41 PM, Xuxiaohu wrote:<br>
&gt; &gt; Hi Thomas,<br>
&gt; &gt;<br>
&gt; &gt; It said in the NSH draft:<br>
&gt; &gt;<br>
&gt; &gt;=C2=A0 =C2=A0 &quot;6.=C2=A0 Transport Agnostic: NSH is transport =
independent and is carried<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0in an overlay, over existing und=
erlays.=C2=A0 If an existing overlay<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0topology provides the required s=
ervice path connectivity, that<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0existing overlay may be used.&qu=
ot;<br>
&gt; &gt;<br>
&gt; &gt; That means the NSH should be able to be transported over MPLS. Ho=
wever,<br>
&gt; according to the current NSH format definition, it&#39;s not safe to c=
arry the NSH<br>
&gt; over MPLS due to the first nibble issue. Therefore, I believe this iss=
ue needs to be<br>
&gt; addressed before publication.<br>
&gt; &gt;<br>
&gt; &gt; Best regards,<br>
&gt; &gt; Xiaohu<br>
&gt; &gt;<br>
&gt; &gt;&gt; -----Original Message-----<br>
&gt; &gt;&gt; From: sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" tar=
get=3D"_blank">sfc-bounces@ietf.org</a>] On Behalf Of Thomas Narten<br>
&gt; &gt;&gt; Sent: Thursday, March 31, 2016 10:48 AM<br>
&gt; &gt;&gt; To: <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@iet=
f.org</a><br>
&gt; &gt;&gt; Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; Dear WG:<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; This note begins a WG last call on draft-ietf-sfc-nsh-04.txt<=
br>
&gt; &gt;&gt; (<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sfc-n=
sh/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc/=
draft-ietf-sfc-nsh/</a>).<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; The editors of the NSH document have indicated that they have=
<br>
&gt; &gt;&gt; addressed all known comments and that there are no open issue=
s with<br>
&gt; &gt;&gt; the current version of the document.<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; Substantive comments to the list please, editorial comments c=
an go<br>
&gt; &gt;&gt; directly to the document editors.<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; We&#39;ll also get a brief update from the editors at next we=
ek&#39;s<br>
&gt; &gt;&gt; meeting. If there are any remaining issues with the document,=
 raising<br>
&gt; &gt;&gt; them before the meeting would be especially helpful.<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; For the chairs,<br>
&gt; &gt;&gt; Thomas<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; _______________________________________________<br>
&gt; &gt;&gt; sfc mailing list<br>
&gt; &gt;&gt; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.or=
g</a><br>
&gt; &gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"=
noreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a>=
<br>
&gt; &gt;<br>
&gt; &gt; _______________________________________________<br>
&gt; &gt; sfc mailing list<br>
&gt; &gt; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a=
><br>
&gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"nore=
ferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt; &gt;<br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
</div></div></blockquote></div><br></div>
_______________________________________________<br>sfc mailing list<br><a h=
ref=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br><a href=
=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">https://ww=
w.ietf.org/mailman/listinfo/sfc</a><br></div></blockquote></div><br></div><=
/div></div></div></blockquote></div><br></div>

--001a11c33936d2187b05305d8a60--


From nobody Wed Apr 13 06:31:02 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47FA912D8F0 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 06:31:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ce5leoWpKe0p for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 06:30:59 -0700 (PDT)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A957A12D97B for <sfc@ietf.org>; Wed, 13 Apr 2016 06:30:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=23741; q=dns/txt; s=iport; t=1460554258; x=1461763858; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=nFf7NDcRroHy0zOqR7wGP1zRTYIMkIBWrHO62Ax2WRM=; b=hiuzB7hOa81NTNBzx1JMC0hPvgkdyOcLmDQLKg/iDQTvpguScZBjzpLz /9s+Cmv4JogXGgCYxcEazlmiH7Rv68+X7ho0su/N/TE38eeW89kjrmiPo Y4DTR2fyFpgRSZSVoEBdTj/iFK42SOBjNToExZKQk5jk7lhHqRFyOTV47 E=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DFAgDWSQ5X/51dJa1egmtMU30GukcOg?= =?us-ascii?q?XQXAQqFbAKBPDgUAQEBAQEBAWUnhEEBAQEDAQEBASBJAgsFCwIBCA4KIAcDAgI?= =?us-ascii?q?nCxQRAgQOBQ6IEggOsFGSRwEBAQEBAQEBAQEBAQEBAQEBAQEBAQ0EBIYhgXUIg?= =?us-ascii?q?UyBAoQgAQELPwmCSiuCKwWHcosphG0BgyOBZm2IFo8QjyYBHgFDg2dsAYhFNn4?= =?us-ascii?q?BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,479,1454976000";  d="asc'?scan'208,217";a="261041570"
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 Apr 2016 13:30:55 +0000
Received: from XCH-RTP-006.cisco.com (xch-rtp-006.cisco.com [64.101.220.146]) by rcdn-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id u3DDUt5m001375 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 13:30:55 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-006.cisco.com (64.101.220.146) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 13 Apr 2016 09:30:54 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Wed, 13 Apr 2016 09:30:54 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Med Boucadair <mohamed.boucadair@orange.com>
Thread-Topic: [sfc] #19 (nsh): Mandatory context headers
Thread-Index: AQHRlOwrLWfyyxPo40ad4UCkzMlGz5+HrkyAgABoMID//8D3IIAAUyeA
Date: Wed, 13 Apr 2016 13:30:54 +0000
Message-ID: <DDAE441E-5C7E-4699-BDCF-8060328FF352@cisco.com>
References: <067.cab2ac7351c39145b242787570b38828@tools.ietf.org> <082.7d97c9f6976fc689f2b380a40263328d@tools.ietf.org> <787AE7BB302AE849A7480A190F8B933008D5747D@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <1C23AFBF-A060-4489-994B-044957A28278@cisco.com> <787AE7BB302AE849A7480A190F8B933008D57988@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D57988@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.117.115.56]
Content-Type: multipart/signed; boundary="Apple-Mail=_262E20B7-B332-4B2D-A240-C5A4FF04DCEE"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/6_CalKT9fyk5XV_LdZUeQeXUQhg>
Cc: "draft-ietf-sfc-nsh@tools.ietf.org" <draft-ietf-sfc-nsh@tools.ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #19 (nsh): Mandatory context headers
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 13:31:01 -0000

--Apple-Mail=_262E20B7-B332-4B2D-A240-C5A4FF04DCEE
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_84837C87-78D2-492E-873D-78982FAE49B5"


--Apple-Mail=_84837C87-78D2-492E-873D-78982FAE49B5
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8


> On Apr 13, 2016, at 8:38 AM, mohamed.boucadair@orange.com wrote:
>=20
> Carlos,
>=20
> I=E2=80=99m seeking to understand the rationale for fixing 4 mandatory =
context headers in the spec. Why not selecting 0, 1, 2, =E2=80=A610?
>=20
> I=E2=80=99m not asking for text, I=E2=80=99d like to understand.
>=20

My recollection is that this was already discussed on the list.

A quick search results in:
https://www.ietf.org/mail-archive/web/sfc/current/msg04087.html

Where it seems to me this was answered, and there was no follow-up =
requesting further clarification. Hence, seems like the answer clarified =
the query.

> Am I allowed to raise concerns I have with the draft or all is already =
frozen?
>=20


Of course you (anyone) can (should!) raise concerns. It=E2=80=99s not a =
question of being =E2=80=9Callowed=E2=80=9D to.

It is also appropriate to follow-up and follow-through with the =
responses to those concerns.

Thanks,

=E2=80=94 Carlos.

> I think the issue is clear enough.
>=20
> Cheers,
> Med
>=20
> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com]
> Envoy=C3=A9 : mercredi 13 avril 2016 14:19
> =C3=80 : BOUCADAIR Mohamed IMT/OLN
> Cc : sfc issue tracker; draft-ietf-sfc-nsh@tools.ietf.org; Paul Quinn =
(paulq); sfc@ietf.org
> Objet : Re: [sfc] #19 (nsh): Mandatory context headers
>=20
> Med,
>=20
> The Ticket reads:
>  For type 1, why are there four mandatory context headers, rather than =
2, 3, 5, 10, etc.?
> The draft contains no particular justification for this choice.
> Do you find that 2 or 6 is better than 4?
>=20
> What exactly are you objecting to?
>=20
> I do not disagree that adding a sentence that reads =E2=80=9CIt was =
found that using 4 context headers was the best trade-off between foo =
and bar, satisfying baz=E2=80=9D would not hurt. But at the same time, =
it does not seem anything is gained either.
>=20
> Thanks,
>=20
> =E2=80=94 Carlos.
>=20
>=20
> On Apr 13, 2016, at 2:05 AM, mohamed.boucadair@orange.com =
<mailto:mohamed.boucadair@orange.com> wrote:
>=20
> Hi Paul,
>=20
> I object to close this issue.
>=20
> Unless I'm mistaken, the consensus should be declared by the chairs =
otherwise this is biased. I'm not the only one who raised this concern, =
BTW.
>=20
> Cheers,
> Med
>=20
>=20
> -----Message d'origine-----
> De : sfc [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>] =
De la part de sfc issue tracker
> Envoy=C3=A9 : mardi 12 avril 2016 20:50
> =C3=80 : draft-ietf-sfc-nsh@tools.ietf.org =
<mailto:draft-ietf-sfc-nsh@tools.ietf.org>; paulq@cisco.com =
<mailto:paulq@cisco.com>
> Cc : sfc@ietf.org <mailto:sfc@ietf.org>
> Objet : Re: [sfc] #19 (nsh): Mandatory context headers
>=20
> #19: Mandatory context headers
>=20
> Changes (by paulq@cisco.com <mailto:paulq@cisco.com>):
>=20
> * status:  new =3D> closed
> * resolution:   =3D> wontfix
>=20
>=20
> Comment:
>=20
> This was discussed on list, no consensus for change.  Will leave as =
is.
>=20
> --
> =
-------------------------------------+------------------------------------=

> -
> Reporter:                           |       Owner:  draft-ietf-sfc-
>  mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>    =
   |  nsh@tools.ietf.org <mailto:nsh@tools.ietf.org>
>     Type:  defect                   |      Status:  closed
> Priority:  major                    |   Milestone:
> Component:  nsh                      |     Version:
> Severity:  -                        |  Resolution:  wontfix
> Keywords:                           |
> =
-------------------------------------+------------------------------------=

> -
>=20
> Ticket URL: =
<https://trac.tools.ietf.org/wg/sfc/trac/ticket/19#comment:1 =
<https://trac.tools.ietf.org/wg/sfc/trac/ticket/19#comment:1>>
> sfc <https://tools.ietf.org/sfc/ <https://tools.ietf.org/sfc/>>
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org <mailto:sfc@ietf.org>
> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org <mailto:sfc@ietf.org>
> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>

--Apple-Mail=_84837C87-78D2-492E-873D-78982FAE49B5
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D""><br class=3D""><div><blockquote type=3D"cite" class=3D""><div =
class=3D"">On Apr 13, 2016, at 8:38 AM, <a =
href=3D"mailto:mohamed.boucadair@orange.com" =
class=3D"">mohamed.boucadair@orange.com</a> wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: =
0px;"><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D""><span lang=3D"EN-US" =
style=3D"font-size: 10pt; font-family: 'Courier New';" =
class=3D"">Carlos,<o:p class=3D""></o:p></span></div><div style=3D"margin:=
 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; =
font-family: 'Courier New';" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; font-family: =
'Courier New';" class=3D"">I=E2=80=99m seeking to understand the =
rationale for fixing 4 mandatory context headers in the spec. Why not =
selecting 0, 1, 2, =E2=80=A610?<o:p class=3D""></o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
10pt; font-family: 'Courier New';" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; font-family: =
'Courier New';" class=3D"">I=E2=80=99m not asking for text, I=E2=80=99d =
like to understand.<o:p class=3D""></o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
10pt; font-family: 'Courier New';" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div></div></div></blockquote><div><br =
class=3D""></div><div>My recollection is that this was already discussed =
on the list.</div><div><br class=3D""></div><div>A quick search results =
in:</div><div><a =
href=3D"https://www.ietf.org/mail-archive/web/sfc/current/msg04087.html" =
class=3D"">https://www.ietf.org/mail-archive/web/sfc/current/msg04087.html=
</a></div><div><br class=3D""></div><div>Where it seems to me this was =
answered, and there was no follow-up requesting further clarification. =
Hence, seems like the answer clarified the query.</div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: =
0px;"><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D""><span lang=3D"EN-US" =
style=3D"font-size: 10pt; font-family: 'Courier New';" class=3D"">Am I =
allowed to raise concerns I have with the draft or all is already =
frozen?<o:p class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; font-family: =
'Courier New';" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div></div></div></blockquote><div><br =
class=3D""></div><div><br class=3D""></div><div>Of course you (anyone) =
can (should!) raise concerns. It=E2=80=99s not a question of being =
=E2=80=9Callowed=E2=80=9D to.&nbsp;</div><div><br class=3D""></div><div>It=
 is also appropriate to follow-up and follow-through with the responses =
to those concerns.</div><div><br =
class=3D""></div><div>Thanks,</div><div><br class=3D""></div><div>=E2=80=94=
 Carlos.</div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D""><div class=3D"WordSection1" style=3D"page: WordSection1; =
font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;"><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 10pt; font-family: 'Courier New';" =
class=3D"">I think the issue is clear enough.<o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 10pt; font-family: 'Courier New';" =
class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; =
font-family: 'Courier New';" class=3D"">Cheers,<o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 10pt; font-family: 'Courier New';" =
class=3D"">Med<o:p class=3D""></o:p></span></div><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; =
font-family: 'Courier New';" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"border-style: none =
none none solid; border-left-color: blue; border-left-width: 1.5pt; =
padding: 0cm 0cm 0cm 4pt;" class=3D""><div class=3D""><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0cm 0cm;" class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><b class=3D""><span style=3D"font-size: =
10pt; font-family: Tahoma, sans-serif;" =
class=3D"">De&nbsp;:</span></b><span style=3D"font-size: 10pt; =
font-family: Tahoma, sans-serif;" class=3D""><span =
class=3D"Apple-converted-space">&nbsp;</span>Carlos Pignataro (cpignata) =
[<a href=3D"mailto:cpignata@cisco.com" =
class=3D"">mailto:cpignata@cisco.com</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><br class=3D""><b =
class=3D"">Envoy=C3=A9&nbsp;:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>mercredi 13 avril 2016 =
14:19<br class=3D""><b class=3D"">=C3=80&nbsp;:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>BOUCADAIR Mohamed =
IMT/OLN<br class=3D""><b class=3D"">Cc&nbsp;:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>sfc issue tracker; <a =
href=3D"mailto:draft-ietf-sfc-nsh@tools.ietf.org" =
class=3D"">draft-ietf-sfc-nsh@tools.ietf.org</a>; Paul Quinn (paulq); <a =
href=3D"mailto:sfc@ietf.org" class=3D"">sfc@ietf.org</a><br class=3D""><b =
class=3D"">Objet&nbsp;:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [sfc] #19 (nsh): =
Mandatory context headers<o:p =
class=3D""></o:p></span></div></div></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D"">Med,<o:p class=3D""></o:p></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D"">The Ticket reads:<o:p class=3D""></o:p></div></div><div=
 class=3D""><blockquote style=3D"margin-top: 5pt; margin-bottom: 5pt;" =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D"">&nbsp;For type 1, why =
are there four mandatory context headers, rather than 2, 3, 5, 10, =
etc.?<o:p class=3D""></o:p></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D"">The =
draft contains no particular justification for this choice.<o:p =
class=3D""></o:p></div></blockquote></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">Do you find that 2 or 6 is better than =
4?<o:p class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D"">What exactly are you =
objecting to?<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D"">I do not disagree that adding a sentence that reads =
=E2=80=9CIt was found that using 4 context headers was the best =
trade-off between foo and bar, satisfying baz=E2=80=9D would not hurt. =
But at the same time, it does not seem anything is gained either.<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">Thanks,<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">=E2=80=94 Carlos.<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><o:p class=3D"">&nbsp;</o:p></div><div =
class=3D""><blockquote style=3D"margin-top: 5pt; margin-bottom: 5pt;" =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D"">On =
Apr 13, 2016, at 2:05 AM,<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:mohamed.boucadair@orange.com" style=3D"color: purple; =
text-decoration: underline;" =
class=3D"">mohamed.boucadair@orange.com</a><span =
class=3D"Apple-converted-space">&nbsp;</span>wrote:<o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">Hi Paul,<br class=3D""><br class=3D"">I =
object to close this issue.<br class=3D""><br class=3D"">Unless I'm =
mistaken, the consensus should be declared by the chairs otherwise this =
is biased. I'm not the only one who raised this concern, BTW.<br =
class=3D""><br class=3D"">Cheers,<br class=3D"">Med<br class=3D""><br =
class=3D""><br class=3D""><o:p class=3D""></o:p></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">-----Message d'origine-----<br =
class=3D"">De&nbsp;: sfc [<a href=3D"mailto:sfc-bounces@ietf.org" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">mailto:sfc-bounces@ietf.org</a>] De la part de sfc issue =
tracker<br class=3D"">Envoy=C3=A9&nbsp;: mardi 12 avril 2016 20:50<br =
class=3D"">=C3=80&nbsp;:<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:draft-ietf-sfc-nsh@tools.ietf.org" style=3D"color: =
purple; text-decoration: underline;" =
class=3D"">draft-ietf-sfc-nsh@tools.ietf.org</a>;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:paulq@cisco.com" style=3D"color: purple; text-decoration: =
underline;" class=3D"">paulq@cisco.com</a><br class=3D"">Cc&nbsp;:<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:sfc@ietf.org" style=3D"color: purple; text-decoration: =
underline;" class=3D"">sfc@ietf.org</a><br class=3D"">Objet&nbsp;: Re: =
[sfc] #19 (nsh): Mandatory context headers<br class=3D""><br =
class=3D"">#19: Mandatory context headers<br class=3D""><br =
class=3D"">Changes (by<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:paulq@cisco.com" style=3D"color: purple; text-decoration: =
underline;" class=3D"">paulq@cisco.com</a>):<br class=3D""><br =
class=3D"">* status: &nbsp;new =3D&gt; closed<br class=3D"">* =
resolution: &nbsp;&nbsp;=3D&gt; wontfix<br class=3D""><br class=3D""><br =
class=3D"">Comment:<br class=3D""><br class=3D"">This was discussed on =
list, no consensus for change. &nbsp;Will leave as is.<br class=3D""><br =
class=3D"">--<br =
class=3D"">-------------------------------------+-------------------------=
-----------<br class=3D"">-<br class=3D"">Reporter: =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;| &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Owner: =
&nbsp;draft-ietf-sfc-<br class=3D"">&nbsp;<a =
href=3D"mailto:mohamed.boucadair@orange.com" style=3D"color: purple; =
text-decoration: underline;" =
class=3D"">mohamed.boucadair@orange.com</a><span =
class=3D"Apple-converted-space">&nbsp;</span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;| &nbsp;<a href=3D"mailto:nsh@tools.ietf.org" style=3D"color: =
purple; text-decoration: underline;" class=3D"">nsh@tools.ietf.org</a><br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;Type: &nbsp;defect =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;| =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Status: &nbsp;closed<br class=3D"">Priority:=
 &nbsp;major =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;| &nbsp;&nbsp;Milestone:<br =
class=3D"">Component: &nbsp;nsh =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;| =
&nbsp;&nbsp;&nbsp;&nbsp;Version:<br class=3D"">Severity: &nbsp;- =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;| =
&nbsp;Resolution: &nbsp;wontfix<br class=3D"">Keywords: =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;|<br =
class=3D"">-------------------------------------+-------------------------=
-----------<br class=3D"">-<br class=3D""><br class=3D"">Ticket URL: =
&lt;<a =
href=3D"https://trac.tools.ietf.org/wg/sfc/trac/ticket/19#comment:1" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://trac.tools.ietf.org/wg/sfc/trac/ticket/19#comment:1</a>=
&gt;<br class=3D"">sfc &lt;<a href=3D"https://tools.ietf.org/sfc/" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://tools.ietf.org/sfc/</a>&gt;<br class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">sfc mailing list<br class=3D""><a href=3D"mailto:sfc@ietf.org" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">sfc@ietf.org</a><br class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/sfc" style=3D"color: =
purple; text-decoration: underline;" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><o:p =
class=3D""></o:p></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">sfc mailing list<br class=3D""><a href=3D"mailto:sfc@ietf.org" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">sfc@ietf.org</a><br class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/sfc" style=3D"color: =
purple; text-decoration: underline;" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a></div></div></div>=
</blockquote></div></div></div></div></div></blockquote></div><br =
class=3D""></body></html>=

--Apple-Mail=_84837C87-78D2-492E-873D-78982FAE49B5--

--Apple-Mail=_262E20B7-B332-4B2D-A240-C5A4FF04DCEE
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=YawB
-----END PGP SIGNATURE-----

--Apple-Mail=_262E20B7-B332-4B2D-A240-C5A4FF04DCEE--


From nobody Wed Apr 13 06:39:00 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 52BE612D79F for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 06:38:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.618
X-Spam-Level: 
X-Spam-Status: No, score=-2.618 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rTCawwRx9w87 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 06:38:57 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E10D12DC36 for <sfc@ietf.org>; Wed, 13 Apr 2016 06:38:56 -0700 (PDT)
Received: from omfedm05.si.francetelecom.fr (unknown [xx.xx.xx.1]) by omfedm09.si.francetelecom.fr (ESMTP service) with ESMTP id 6CC102DC3DB; Wed, 13 Apr 2016 15:38:54 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.2]) by omfedm05.si.francetelecom.fr (ESMTP service) with ESMTP id 3CBEB35C079; Wed, 13 Apr 2016 15:38:54 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM21.corporate.adroot.infra.ftgroup ([fe80::e92a:c932:907e:8f06%19]) with mapi id 14.03.0279.002; Wed, 13 Apr 2016 15:38:54 +0200
From: <mohamed.boucadair@orange.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Thread-Topic: [sfc] #19 (nsh): Mandatory context headers
Thread-Index: AQHRlOwrLWfyyxPo40ad4UCkzMlGz5+HrkyAgABoMID//8D3IIAAUyeA//++n5A=
Date: Wed, 13 Apr 2016 13:38:52 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D57AE5@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <067.cab2ac7351c39145b242787570b38828@tools.ietf.org> <082.7d97c9f6976fc689f2b380a40263328d@tools.ietf.org> <787AE7BB302AE849A7480A190F8B933008D5747D@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <1C23AFBF-A060-4489-994B-044957A28278@cisco.com> <787AE7BB302AE849A7480A190F8B933008D57988@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <DDAE441E-5C7E-4699-BDCF-8060328FF352@cisco.com>
In-Reply-To: <DDAE441E-5C7E-4699-BDCF-8060328FF352@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B933008D57AE5OPEXCLILMA3corp_"
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.13.105417
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/N7mWSZtEqXaCviMbGclaVozsWIs>
Cc: "draft-ietf-sfc-nsh@tools.ietf.org" <draft-ietf-sfc-nsh@tools.ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #19 (nsh): Mandatory context headers
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 13:38:59 -0000

--_000_787AE7BB302AE849A7480A190F8B933008D57AE5OPEXCLILMA3corp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_787AE7BB302AE849A7480A190F8B933008D57AE5OPEXCLILMA3corp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTQgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl
PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6
Q2FsaWJyaTsNCglwYW5vc2UtMToyIDE1IDUgMiAyIDIgNCAzIDIgNDt9DQpAZm9udC1mYWNlDQoJ
e2ZvbnQtZmFtaWx5OlRhaG9tYTsNCglwYW5vc2UtMToyIDExIDYgNCAzIDUgNCA0IDIgNDt9DQov
KiBTdHlsZSBEZWZpbml0aW9ucyAqLw0KcC5Nc29Ob3JtYWwsIGxpLk1zb05vcm1hbCwgZGl2Lk1z
b05vcm1hbA0KCXttYXJnaW46MGNtOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNp
emU6MTIuMHB0Ow0KCWZvbnQtZmFtaWx5OiJUaW1lcyBOZXcgUm9tYW4iLCJzZXJpZiI7fQ0KYTps
aW5rLCBzcGFuLk1zb0h5cGVybGluaw0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6
Ymx1ZTsNCgl0ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30NCmE6dmlzaXRlZCwgc3Bhbi5Nc29I
eXBlcmxpbmtGb2xsb3dlZA0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6cHVycGxl
Ow0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KcC5Nc29BY2V0YXRlLCBsaS5Nc29BY2V0
YXRlLCBkaXYuTXNvQWNldGF0ZQ0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJbXNvLXN0eWxl
LWxpbms6IlRleHRlIGRlIGJ1bGxlcyBDYXIiOw0KCW1hcmdpbjowY207DQoJbWFyZ2luLWJvdHRv
bTouMDAwMXB0Ow0KCWZvbnQtc2l6ZTo4LjBwdDsNCglmb250LWZhbWlseToiVGFob21hIiwic2Fu
cy1zZXJpZiI7fQ0Kc3Bhbi5hcHBsZS1jb252ZXJ0ZWQtc3BhY2UNCgl7bXNvLXN0eWxlLW5hbWU6
YXBwbGUtY29udmVydGVkLXNwYWNlO30NCnNwYW4uVGV4dGVkZWJ1bGxlc0Nhcg0KCXttc28tc3R5
bGUtbmFtZToiVGV4dGUgZGUgYnVsbGVzIENhciI7DQoJbXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0K
CW1zby1zdHlsZS1saW5rOiJUZXh0ZSBkZSBidWxsZXMiOw0KCWZvbnQtZmFtaWx5OiJUYWhvbWEi
LCJzYW5zLXNlcmlmIjt9DQpzcGFuLkVtYWlsU3R5bGUyMA0KCXttc28tc3R5bGUtdHlwZTpwZXJz
b25hbC1yZXBseTsNCglmb250LWZhbWlseToiQ291cmllciBOZXciOw0KCWNvbG9yOmJsYWNrOw0K
CWZvbnQtd2VpZ2h0Om5vcm1hbDsNCglmb250LXN0eWxlOm5vcm1hbDt9DQouTXNvQ2hwRGVmYXVs
dA0KCXttc28tc3R5bGUtdHlwZTpleHBvcnQtb25seTsNCglmb250LXNpemU6MTAuMHB0O30NCkBw
YWdlIFdvcmRTZWN0aW9uMQ0KCXtzaXplOjYxMi4wcHQgNzkyLjBwdDsNCgltYXJnaW46NzAuODVw
dCA3MC44NXB0IDcwLjg1cHQgNzAuODVwdDt9DQpkaXYuV29yZFNlY3Rpb24xDQoJe3BhZ2U6V29y
ZFNlY3Rpb24xO30NCi0tPjwvc3R5bGU+PCEtLVtpZiBndGUgbXNvIDldPjx4bWw+DQo8bzpzaGFw
ZWRlZmF1bHRzIHY6ZXh0PSJlZGl0IiBzcGlkbWF4PSIxMDI2IiAvPg0KPC94bWw+PCFbZW5kaWZd
LS0+PCEtLVtpZiBndGUgbXNvIDldPjx4bWw+DQo8bzpzaGFwZWxheW91dCB2OmV4dD0iZWRpdCI+
DQo8bzppZG1hcCB2OmV4dD0iZWRpdCIgZGF0YT0iMSIgLz4NCjwvbzpzaGFwZWxheW91dD48L3ht
bD48IVtlbmRpZl0tLT4NCjwvaGVhZD4NCjxib2R5IGxhbmc9IkZSIiBsaW5rPSJibHVlIiB2bGlu
az0icHVycGxlIj4NCjxkaXYgY2xhc3M9IldvcmRTZWN0aW9uMSI+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3Vy
aWVyIE5ldyZxdW90Oztjb2xvcjpibGFjayI+UmUtLDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFt
aWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7O2NvbG9yOmJsYWNrIj48bzpwPiZuYnNwOzwvbzpw
Pjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5
bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDs7
Y29sb3I6YmxhY2siPk5vIG5lZWQgdG8gc2VuZCBtZSBpbmZvcm1hdGlvbiB0aGF0IEkgYWxyZWFk
eSBrbm93Lg0KPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw
YW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90
O0NvdXJpZXIgTmV3JnF1b3Q7O2NvbG9yOmJsYWNrIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48
L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQt
c2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDs7Y29sb3I6Ymxh
Y2siPlN0aWxsLCBJIGRvbuKAmXQgc2VlIGFueSB0ZWNobmljYWwganVzdGlmaWNhdGlvbiB0byB0
aGUgaW5pdGlhbCBjb25jZXJuLiBXZSBhbGwga25vdyB0aGF0IHdlIGRvbuKAmXQgc29sdmUgdGVj
aG5pY2FsIGlzc3VlcyB3aXRoIHJoZXRvcmljLg0KPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAu
MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7O2NvbG9yOmJsYWNrIj48bzpw
PiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5n
PSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmll
ciBOZXcmcXVvdDs7Y29sb3I6YmxhY2siPkNoZWVycyw8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZTox
MC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDs7Y29sb3I6YmxhY2siPk1l
ZDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9
IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVy
IE5ldyZxdW90Oztjb2xvcjpibGFjayI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPGRp
diBzdHlsZT0iYm9yZGVyOm5vbmU7Ym9yZGVyLWxlZnQ6c29saWQgYmx1ZSAxLjVwdDtwYWRkaW5n
OjBjbSAwY20gMGNtIDQuMHB0Ij4NCjxkaXY+DQo8ZGl2IHN0eWxlPSJib3JkZXI6bm9uZTtib3Jk
ZXItdG9wOnNvbGlkICNCNUM0REYgMS4wcHQ7cGFkZGluZzozLjBwdCAwY20gMGNtIDBjbSI+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIj48Yj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250
LWZhbWlseTomcXVvdDtUYWhvbWEmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+RGUmbmJz
cDs6PC9zcGFuPjwvYj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTom
cXVvdDtUYWhvbWEmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+IENhcmxvcyBQaWduYXRh
cm8gKGNwaWduYXRhKSBbbWFpbHRvOmNwaWduYXRhQGNpc2NvLmNvbV0NCjxicj4NCjxiPkVudm95
w6kmbmJzcDs6PC9iPiBtZXJjcmVkaSAxMyBhdnJpbCAyMDE2IDE1OjMxPGJyPg0KPGI+w4AmbmJz
cDs6PC9iPiBCT1VDQURBSVIgTW9oYW1lZCBJTVQvT0xOPGJyPg0KPGI+Q2MmbmJzcDs6PC9iPiBz
ZmMgaXNzdWUgdHJhY2tlcjsgZHJhZnQtaWV0Zi1zZmMtbnNoQHRvb2xzLmlldGYub3JnOyBQYXVs
IFF1aW5uIChwYXVscSk7IHNmY0BpZXRmLm9yZzxicj4NCjxiPk9iamV0Jm5ic3A7OjwvYj4gUmU6
IFtzZmNdICMxOSAobnNoKTogTWFuZGF0b3J5IGNvbnRleHQgaGVhZGVyczxvOnA+PC9vOnA+PC9z
cGFuPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNw
OzwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0K
PGRpdj4NCjxibG9ja3F1b3RlIHN0eWxlPSJtYXJnaW4tdG9wOjUuMHB0O21hcmdpbi1ib3R0b206
NS4wcHQiPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPk9uIEFwciAxMywgMjAxNiwgYXQg
ODozOCBBTSwgPGEgaHJlZj0ibWFpbHRvOm1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb20iPg0K
bW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbTwvYT4gd3JvdGU6PG86cD48L286cD48L3A+DQo8
L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPGRpdj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZv
bnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDsiPkNhcmxv
cyw8L3NwYW4+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1p
bHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDsiPiZuYnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4N
CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBz
dHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90
OyI+SeKAmW0gc2Vla2luZyB0byB1bmRlcnN0YW5kIHRoZSByYXRpb25hbGUgZm9yIGZpeGluZyA0
IG1hbmRhdG9yeSBjb250ZXh0IGhlYWRlcnMgaW4gdGhlIHNwZWMuIFdoeSBub3Qgc2VsZWN0aW5n
IDAsIDEsIDIsIOKApjEwPzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEw
LjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90OyI+Jm5ic3A7PC9zcGFuPjxv
OnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g
bGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nv
dXJpZXIgTmV3JnF1b3Q7Ij5J4oCZbSBub3QgYXNraW5nIGZvciB0ZXh0LCBJ4oCZZCBsaWtlIHRv
IHVuZGVyc3RhbmQuPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0
O2ZvbnQtZmFtaWx5OiZxdW90O0NvdXJpZXIgTmV3JnF1b3Q7Ij4mbmJzcDs8L3NwYW4+PG86cD48
L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9ibG9ja3F1b3RlPg0KPGRpdj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+TXkgcmVjb2xsZWN0aW9uIGlzIHRoYXQgdGhpcyB3YXMgYWxyZWFkeSBk
aXNjdXNzZWQgb24gdGhlIGxpc3QuPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiPkEgcXVpY2sgc2VhcmNoIHJlc3VsdHMgaW46PG86cD48L286cD48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48YSBocmVmPSJodHRwczov
L3d3dy5pZXRmLm9yZy9tYWlsLWFyY2hpdmUvd2ViL3NmYy9jdXJyZW50L21zZzA0MDg3Lmh0bWwi
Pmh0dHBzOi8vd3d3LmlldGYub3JnL21haWwtYXJjaGl2ZS93ZWIvc2ZjL2N1cnJlbnQvbXNnMDQw
ODcuaHRtbDwvYT48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z
b05vcm1hbCI+V2hlcmUgaXQgc2VlbXMgdG8gbWUgdGhpcyB3YXMgYW5zd2VyZWQsIGFuZCB0aGVy
ZSB3YXMgbm8gZm9sbG93LXVwIHJlcXVlc3RpbmcgZnVydGhlciBjbGFyaWZpY2F0aW9uLiBIZW5j
ZSwgc2VlbXMgbGlrZSB0aGUgYW5zd2VyIGNsYXJpZmllZCB0aGUgcXVlcnkuPG86cD48L286cD48
L3A+DQo8L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxicj4NCjxicj4NCjxvOnA+PC9vOnA+
PC9wPg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1V
UyIgc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcm
cXVvdDsiPkFtIEkgYWxsb3dlZCB0byByYWlzZSBjb25jZXJucyBJIGhhdmUgd2l0aCB0aGUgZHJh
ZnQgb3IgYWxsIGlzIGFscmVhZHkgZnJvemVuPzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2
Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0i
Zm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90OyI+Jm5i
c3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCI+T2YgY291cnNlIHlvdSAoYW55b25lKSBjYW4gKHNob3VsZCEpIHJh
aXNlIGNvbmNlcm5zLiBJdOKAmXMgbm90IGEgcXVlc3Rpb24gb2YgYmVpbmcg4oCcYWxsb3dlZOKA
nSB0by4mbmJzcDs8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z
b05vcm1hbCI+SXQgaXMgYWxzbyBhcHByb3ByaWF0ZSB0byBmb2xsb3ctdXAgYW5kIGZvbGxvdy10
aHJvdWdoIHdpdGggdGhlIHJlc3BvbnNlcyB0byB0aG9zZSBjb25jZXJucy48bzpwPjwvbzpwPjwv
cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+
PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+VGhhbmtzLDxvOnA+PC9v
OnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8
L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj7igJQgQ2FybG9z
LjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48YnI+DQo8YnI+
DQo8bzpwPjwvbzpwPjwvcD4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw
YW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90
O0NvdXJpZXIgTmV3JnF1b3Q7Ij5JIHRoaW5rIHRoZSBpc3N1ZSBpcyBjbGVhciBlbm91Z2guPC9z
cGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZx
dW90O0NvdXJpZXIgTmV3JnF1b3Q7Ij4mbmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9
ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDsiPkNo
ZWVycyw8L3NwYW4+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv
Tm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1m
YW1pbHk6JnF1b3Q7Q291cmllciBOZXcmcXVvdDsiPk1lZDwvc3Bhbj48bzpwPjwvbzpwPjwvcD4N
CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBz
dHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtDb3VyaWVyIE5ldyZxdW90
OyI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2IHN0eWxlPSJib3Jk
ZXI6bm9uZTtib3JkZXItbGVmdDpzb2xpZCBibHVlIDEuNXB0O3BhZGRpbmc6MGNtIDBjbSAwY20g
NC4wcHQiPg0KPGRpdj4NCjxkaXYgc3R5bGU9ImJvcmRlcjpub25lO2JvcmRlci10b3A6c29saWQg
I0I1QzRERiAxLjBwdDtwYWRkaW5nOjMuMHB0IDBjbSAwY20gMGNtIj4NCjxkaXY+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj48Yj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWls
eTomcXVvdDtUYWhvbWEmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+RGUmbmJzcDs6PC9z
cGFuPjwvYj48c3BhbiBjbGFzcz0iYXBwbGUtY29udmVydGVkLXNwYWNlIj48c3BhbiBzdHlsZT0i
Zm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtUYWhvbWEmcXVvdDssJnF1b3Q7c2Fu
cy1zZXJpZiZxdW90OyI+Jm5ic3A7PC9zcGFuPjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXpl
OjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtUYWhvbWEmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZx
dW90OyI+Q2FybG9zDQogUGlnbmF0YXJvIChjcGlnbmF0YSkgWzxhIGhyZWY9Im1haWx0bzpjcGln
bmF0YUBjaXNjby5jb20iPm1haWx0bzpjcGlnbmF0YUBjaXNjby5jb208L2E+XTxzcGFuIGNsYXNz
PSJhcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnI+DQo8Yj5FbnZvecOpJm5i
c3A7OjwvYj48c3BhbiBjbGFzcz0iYXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+
bWVyY3JlZGkgMTMgYXZyaWwgMjAxNiAxNDoxOTxicj4NCjxiPsOAJm5ic3A7OjwvYj48c3BhbiBj
bGFzcz0iYXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+Qk9VQ0FEQUlSIE1vaGFt
ZWQgSU1UL09MTjxicj4NCjxiPkNjJm5ic3A7OjwvYj48c3BhbiBjbGFzcz0iYXBwbGUtY29udmVy
dGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+c2ZjIGlzc3VlIHRyYWNrZXI7IDxhIGhyZWY9Im1haWx0
bzpkcmFmdC1pZXRmLXNmYy1uc2hAdG9vbHMuaWV0Zi5vcmciPg0KZHJhZnQtaWV0Zi1zZmMtbnNo
QHRvb2xzLmlldGYub3JnPC9hPjsgUGF1bCBRdWlubiAocGF1bHEpOyA8YSBocmVmPSJtYWlsdG86
c2ZjQGlldGYub3JnIj4NCnNmY0BpZXRmLm9yZzwvYT48YnI+DQo8Yj5PYmpldCZuYnNwOzo8L2I+
PHNwYW4gY2xhc3M9ImFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPlJlOiBbc2Zj
XSAjMTkgKG5zaCk6IE1hbmRhdG9yeSBjb250ZXh0IGhlYWRlcnM8L3NwYW4+PG86cD48L286cD48
L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
Jm5ic3A7PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij5NZWQsPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z
b05vcm1hbCI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxk
aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5UaGUgVGlja2V0IHJlYWRzOjxvOnA+PC9vOnA+PC9w
Pg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXY+DQo8YmxvY2txdW90ZSBzdHlsZT0ibWFyZ2luLXRvcDo1
LjBwdDttYXJnaW4tYm90dG9tOjUuMHB0Ij4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4m
bmJzcDtGb3IgdHlwZSAxLCB3aHkgYXJlIHRoZXJlIGZvdXIgbWFuZGF0b3J5IGNvbnRleHQgaGVh
ZGVycywgcmF0aGVyIHRoYW4gMiwgMywgNSwgMTAsIGV0Yy4/PG86cD48L286cD48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5UaGUgZHJhZnQgY29udGFpbnMgbm8gcGFy
dGljdWxhciBqdXN0aWZpY2F0aW9uIGZvciB0aGlzIGNob2ljZS48bzpwPjwvbzpwPjwvcD4NCjwv
ZGl2Pg0KPC9ibG9ja3F1b3RlPg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPkRvIHlvdSBmaW5kIHRoYXQgMiBvciA2IGlzIGJldHRlciB0aGFuIDQ/PG86cD48L286
cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij4mbmJzcDs8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdj4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiPldoYXQgZXhhY3RseSBhcmUgeW91IG9iamVjdGluZyB0bz88bzpw
PjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+SSBkbyBub3QgZGlzYWdyZWUgdGhhdCBhZGRpbmcgYSBz
ZW50ZW5jZSB0aGF0IHJlYWRzIOKAnEl0IHdhcyBmb3VuZCB0aGF0IHVzaW5nIDQgY29udGV4dCBo
ZWFkZXJzIHdhcyB0aGUgYmVzdCB0cmFkZS1vZmYgYmV0d2VlbiBmb28gYW5kIGJhciwgc2F0aXNm
eWluZyBiYXrigJ0gd291bGQgbm90IGh1cnQuIEJ1dCBhdCB0aGUgc2FtZSB0aW1lLCBpdCBkb2Vz
IG5vdCBzZWVtIGFueXRoaW5nIGlzIGdhaW5lZCBlaXRoZXIuPG86cD48L286cD48L3A+DQo8L2Rp
dj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4mbmJzcDs8bzpw
PjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPlRoYW5rcyw8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPGRp
dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8
L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+4oCUIENhcmxvcy48bzpw
PjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxk
aXY+DQo8YmxvY2txdW90ZSBzdHlsZT0ibWFyZ2luLXRvcDo1LjBwdDttYXJnaW4tYm90dG9tOjUu
MHB0Ij4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+T24gQXByIDEzLCAyMDE2
LCBhdCAyOjA1IEFNLDxzcGFuIGNsYXNzPSJhcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwv
c3Bhbj48YSBocmVmPSJtYWlsdG86bW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbSI+PHNwYW4g
c3R5bGU9ImNvbG9yOnB1cnBsZSI+bW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbTwvc3Bhbj48
L2E+PHNwYW4gY2xhc3M9ImFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPndyb3Rl
OjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIj4mbmJzcDs8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+DQo8ZGl2Pg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCI+SGkgUGF1bCw8YnI+DQo8YnI+DQpJIG9iamVjdCB0byBjbG9z
ZSB0aGlzIGlzc3VlLjxicj4NCjxicj4NClVubGVzcyBJJ20gbWlzdGFrZW4sIHRoZSBjb25zZW5z
dXMgc2hvdWxkIGJlIGRlY2xhcmVkIGJ5IHRoZSBjaGFpcnMgb3RoZXJ3aXNlIHRoaXMgaXMgYmlh
c2VkLiBJJ20gbm90IHRoZSBvbmx5IG9uZSB3aG8gcmFpc2VkIHRoaXMgY29uY2VybiwgQlRXLjxi
cj4NCjxicj4NCkNoZWVycyw8YnI+DQpNZWQ8YnI+DQo8YnI+DQo8YnI+DQo8YnI+DQo8bzpwPjwv
bzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPi0tLS0tTWVzc2Fn
ZSBkJ29yaWdpbmUtLS0tLTxicj4NCkRlJm5ic3A7OiBzZmMgWzxhIGhyZWY9Im1haWx0bzpzZmMt
Ym91bmNlc0BpZXRmLm9yZyI+PHNwYW4gc3R5bGU9ImNvbG9yOnB1cnBsZSI+bWFpbHRvOnNmYy1i
b3VuY2VzQGlldGYub3JnPC9zcGFuPjwvYT5dIERlIGxhIHBhcnQgZGUgc2ZjIGlzc3VlIHRyYWNr
ZXI8YnI+DQpFbnZvecOpJm5ic3A7OiBtYXJkaSAxMiBhdnJpbCAyMDE2IDIwOjUwPGJyPg0Kw4Am
bmJzcDs6PHNwYW4gY2xhc3M9ImFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxh
IGhyZWY9Im1haWx0bzpkcmFmdC1pZXRmLXNmYy1uc2hAdG9vbHMuaWV0Zi5vcmciPjxzcGFuIHN0
eWxlPSJjb2xvcjpwdXJwbGUiPmRyYWZ0LWlldGYtc2ZjLW5zaEB0b29scy5pZXRmLm9yZzwvc3Bh
bj48L2E+OzxzcGFuIGNsYXNzPSJhcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48
YSBocmVmPSJtYWlsdG86cGF1bHFAY2lzY28uY29tIj48c3BhbiBzdHlsZT0iY29sb3I6cHVycGxl
Ij5wYXVscUBjaXNjby5jb208L3NwYW4+PC9hPjxicj4NCkNjJm5ic3A7OjxzcGFuIGNsYXNzPSJh
cHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YSBocmVmPSJtYWlsdG86c2ZjQGll
dGYub3JnIj48c3BhbiBzdHlsZT0iY29sb3I6cHVycGxlIj5zZmNAaWV0Zi5vcmc8L3NwYW4+PC9h
Pjxicj4NCk9iamV0Jm5ic3A7OiBSZTogW3NmY10gIzE5IChuc2gpOiBNYW5kYXRvcnkgY29udGV4
dCBoZWFkZXJzPGJyPg0KPGJyPg0KIzE5OiBNYW5kYXRvcnkgY29udGV4dCBoZWFkZXJzPGJyPg0K
PGJyPg0KQ2hhbmdlcyAoYnk8c3BhbiBjbGFzcz0iYXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJz
cDs8L3NwYW4+PGEgaHJlZj0ibWFpbHRvOnBhdWxxQGNpc2NvLmNvbSI+PHNwYW4gc3R5bGU9ImNv
bG9yOnB1cnBsZSI+cGF1bHFAY2lzY28uY29tPC9zcGFuPjwvYT4pOjxicj4NCjxicj4NCiogc3Rh
dHVzOiAmbmJzcDtuZXcgPSZndDsgY2xvc2VkPGJyPg0KKiByZXNvbHV0aW9uOiAmbmJzcDsmbmJz
cDs9Jmd0OyB3b250Zml4PGJyPg0KPGJyPg0KPGJyPg0KQ29tbWVudDo8YnI+DQo8YnI+DQpUaGlz
IHdhcyBkaXNjdXNzZWQgb24gbGlzdCwgbm8gY29uc2Vuc3VzIGZvciBjaGFuZ2UuICZuYnNwO1dp
bGwgbGVhdmUgYXMgaXMuPGJyPg0KPGJyPg0KLS08YnI+DQotLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tJiM0MzstLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS08
YnI+DQotPGJyPg0KUmVwb3J0ZXI6ICZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw
OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu
YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw
OyZuYnNwO3wgJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7T3duZXI6ICZuYnNw
O2RyYWZ0LWlldGYtc2ZjLTxicj4NCiZuYnNwOzxhIGhyZWY9Im1haWx0bzptb2hhbWVkLmJvdWNh
ZGFpckBvcmFuZ2UuY29tIj48c3BhbiBzdHlsZT0iY29sb3I6cHVycGxlIj5tb2hhbWVkLmJvdWNh
ZGFpckBvcmFuZ2UuY29tPC9zcGFuPjwvYT48c3BhbiBjbGFzcz0iYXBwbGUtY29udmVydGVkLXNw
YWNlIj4mbmJzcDs8L3NwYW4+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7fCAm
bmJzcDs8YSBocmVmPSJtYWlsdG86bnNoQHRvb2xzLmlldGYub3JnIj48c3BhbiBzdHlsZT0iY29s
b3I6cHVycGxlIj5uc2hAdG9vbHMuaWV0Zi5vcmc8L3NwYW4+PC9hPjxicj4NCiZuYnNwOyZuYnNw
OyZuYnNwOyZuYnNwO1R5cGU6ICZuYnNwO2RlZmVjdCAmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm
bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz
cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDt8ICZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw
O1N0YXR1czogJm5ic3A7Y2xvc2VkPGJyPg0KUHJpb3JpdHk6ICZuYnNwO21ham9yICZuYnNwOyZu
YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw
OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwO3wgJm5ic3A7
Jm5ic3A7TWlsZXN0b25lOjxicj4NCkNvbXBvbmVudDogJm5ic3A7bnNoICZuYnNwOyZuYnNwOyZu
YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw
OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwO3wg
Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7VmVyc2lvbjo8YnI+DQpTZXZlcml0eTogJm5ic3A7LSAm
bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz
cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm
bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDt8ICZuYnNwO1Jlc29sdXRpb246ICZuYnNwO3dvbnRmaXg8
YnI+DQpLZXl3b3JkczogJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7
Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i
c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7
fDxicj4NCi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0mIzQzOy0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLTxicj4NCi08YnI+DQo8YnI+DQpUaWNrZXQgVVJM
OiAmbHQ7PGEgaHJlZj0iaHR0cHM6Ly90cmFjLnRvb2xzLmlldGYub3JnL3dnL3NmYy90cmFjL3Rp
Y2tldC8xOSNjb21tZW50OjEiPjxzcGFuIHN0eWxlPSJjb2xvcjpwdXJwbGUiPmh0dHBzOi8vdHJh
Yy50b29scy5pZXRmLm9yZy93Zy9zZmMvdHJhYy90aWNrZXQvMTkjY29tbWVudDoxPC9zcGFuPjwv
YT4mZ3Q7PGJyPg0Kc2ZjICZsdDs8YSBocmVmPSJodHRwczovL3Rvb2xzLmlldGYub3JnL3NmYy8i
PjxzcGFuIHN0eWxlPSJjb2xvcjpwdXJwbGUiPmh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcvc2ZjLzwv
c3Bhbj48L2E+Jmd0Ozxicj4NCjxicj4NCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fPGJyPg0Kc2ZjIG1haWxpbmcgbGlzdDxicj4NCjxhIGhyZWY9Im1haWx0
bzpzZmNAaWV0Zi5vcmciPjxzcGFuIHN0eWxlPSJjb2xvcjpwdXJwbGUiPnNmY0BpZXRmLm9yZzwv
c3Bhbj48L2E+PGJyPg0KPGEgaHJlZj0iaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0
aW5mby9zZmMiPjxzcGFuIHN0eWxlPSJjb2xvcjpwdXJwbGUiPmh0dHBzOi8vd3d3LmlldGYub3Jn
L21haWxtYW4vbGlzdGluZm8vc2ZjPC9zcGFuPjwvYT48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxicj4NCl9fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fPGJyPg0Kc2ZjIG1haWxpbmcgbGlzdDxicj4NCjxhIGhy
ZWY9Im1haWx0bzpzZmNAaWV0Zi5vcmciPjxzcGFuIHN0eWxlPSJjb2xvcjpwdXJwbGUiPnNmY0Bp
ZXRmLm9yZzwvc3Bhbj48L2E+PGJyPg0KPGEgaHJlZj0iaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFp
bG1hbi9saXN0aW5mby9zZmMiPjxzcGFuIHN0eWxlPSJjb2xvcjpwdXJwbGUiPmh0dHBzOi8vd3d3
LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjPC9zcGFuPjwvYT48bzpwPjwvbzpwPjwvcD4N
CjwvZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjwvZGl2Pg0KPC9kaXY+DQo8
L2Rpdj4NCjwvZGl2Pg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwv
bzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8L2JvZHk+DQo8L2h0bWw+DQo=

--_000_787AE7BB302AE849A7480A190F8B933008D57AE5OPEXCLILMA3corp_--


From nobody Wed Apr 13 06:43:53 2016
Return-Path: <loa@pi.nu>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A50BB12E154 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 06:43:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level: 
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bkg_Tz6oGP_x for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 06:43:49 -0700 (PDT)
Received: from pipi.pi.nu (pipi.pi.nu [83.168.239.141]) (using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 516E112E0BF for <sfc@ietf.org>; Wed, 13 Apr 2016 06:43:49 -0700 (PDT)
Received: from [192.168.1.2] (unknown [122.53.41.246]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: loa@pi.nu) by pipi.pi.nu (Postfix) with ESMTPSA id 79DB3180158D; Wed, 13 Apr 2016 15:43:45 +0200 (CEST)
To: Alia Atlas <akatlas@gmail.com>, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com>
From: Loa Andersson <loa@pi.nu>
Message-ID: <570E4D07.2060405@pi.nu>
Date: Wed, 13 Apr 2016 21:43:35 +0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/SSQmI44IBr2y9oasnFzEsH73BZY>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 13:43:51 -0000

Alia,

I think you are referring to RFC 4182, it is more than a decade
since it was published.

/Loa

On 2016-04-13 21:13, Alia Atlas wrote:
> Carlos,
>
> As we all know, it is possible to do many many things with technology -
> once we figure out how.
> Saying that there are approaches other than reorganizing the first
> nibble is fine.Â  Claiming that we'll
> be anywhere near interoperability or standardization without it being
> clarified does not seem plausible.
>
> For instance, I will note that the description of 0 (Explicit NULL) is
> still defined in RFC3032 as implying
> the packet underneath is IPv4.Â  I really did think that we'd talked in
> MPLS about fixing this - and maybe
> Loa or others can give us the reference - but that's what the IANA
> pointer has right now.
>
> I understand the desire to get NSH done - deeply! Â
>
> I also hate late surprises and am trying to clear time to do a more
> thorough review of NSH as well as
> requesting other focused reviews.
>
> This issue is not new - and the issues I saw in a quick look are those
> that are thoroughly documented
> inÂ draft-ietf-rtgwg-dt-encap-01
> <https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-encap/>Â which
> considered NSH as one of the encapsulations.
>
> It seems clear that there *are*Â transport-specific issues and we need a
> place and a way to capture them.
>
> Regards,
> Alia
>
> On Wed, Apr 13, 2016 at 8:53 AM, Carlos Pignataro (cpignata)
> <cpignata@cisco.com <mailto:cpignata@cisco.com>> wrote:
>
>     Alia,
>
>     Thanks for looking into this.
>
>     It is relevant. I believe ECMP-prevention (anti-aliasing with 0x4
>     and 0x6) is necessary for traffic over MPLS expecting in-order
>     delivery.Â
>
>     Transporting NSH over MPLS, however, does not necessarily imply
>     transporting NSH *directly* following the bottom LSE. There are
>     other ways, as it was done with PWs.Â
>
>     I think showing that it is possible to appropriately (i.e.,
>     respecting BCPs) transport NSH over MPLS is very important. This may
>     or may not have implications on the NSH base header. I believe
>     however that such actual formal specification (beyond showing its
>     possible) should not gate NSH.
>
>     Thanks!
>
>     â€” Carlos.
>
>
>>     On Apr 12, 2016, at 10:29 PM, Alia Atlas <akatlas@gmail.com
>>     <mailto:akatlas@gmail.com>> wrote:
>>
>>     Xiaohu, Joel, and SFC WG group,
>>
>>     The first nibble question is quite relevant if it is expected that
>>     the NSH header might be directly under
>>     an MPLS label stack.Â  This issue arose rather unpleasantly for
>>     pseudo-wires a long time ago and the
>>     reasoning for it is much better documented, as Carlos pointed out
>>     in a different thread, in RFC 4928 Section 3.
>>
>>     At the time that PWE3 was working on the control word and whether
>>     it was to be mandatory (RFC 4385), it was clear that
>>     there were devices that looked at the first nibble of a packet
>>     under the MPLS header as a way to determine
>>     if the packet was IPv4 or IPv6 and obtain flow-diversity from
>>     it.Â  The cost of also verifying the associated checksum
>>     if available wasn't deemed acceptable for several
>>     implementations.Â  Given that determining as much entropy as
>>     possible is still really important and that it is non-trivial to
>>     negotiate/indicate the capability for including
>>     an Entropy Label in the MPLS stack, I have no reason to believe
>>     that this shortcut of looking at the first nibble
>>     is no longer used or deployed. Â  Feel free to contact me off-list
>>     if you believe this to be the case.
>>
>>     It is clear from the NSH base header:
>>        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>           |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol |
>>           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>     that this consideration has been completely ignored.Â  In fact, an
>>     NSH base header might have any value
>>     of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH were
>>     ever defined, suddenly the traffic might
>>     be subject to startling reordering if an MPLS transport were to be
>>     considered.
>>
>>     Given a claim of NSH being transport-agnostic and repeated
>>     emphasis that MPLS, as well as UDP,
>>     is a valid transport for NSH, I do think this is a significant
>>     oversight and needs, at a minimum, discussion and
>>     explanation, and Â - quite likely - Â correction.
>>
>>     While I am on the topic of details of the NSH encapsulation, I
>>     would request that Section 8 of draft-ietf-rtgwg-dt-encap-01
>>     be read and considered! Â  I am not excited by having many
>>     different and unique Next Protocol fields defined.
>>     For instance, I note the definition of a nearly identical Next
>>     Protocol field in
>>     https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe .
>>
>>     While I am, of course, willing to reason to detailed and
>>     well-thought out explanations for why each and every new
>>     encapsulation needs its very own IANA-defined Next Protocol field,
>>     this seems to me to be highly likely to require
>>     consolidation so that the same Next Protocol field can be used
>>     between the various encapsulations.
>>
>>     I will work on giving a through review of NSH as soon as
>>     practical.Â  I do realize that there are multiple implementations
>>     and while details of how the "Next Protocol" field are documented
>>     shouldn't have a significant impact there, the
>>     discussion about the first nibble is likely to.
>>
>>     Regards,
>>     Alia
>>
>>
>>     On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <xuxiaohu@huawei.com
>>     <mailto:xuxiaohu@huawei.com>> wrote:
>>
>>         Joel,
>>
>>         > -----Original Message-----
>>         > From: Joel M. Halpern [mailto:jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>]
>>         > Sent: Wednesday, April 13, 2016 9:45 AM
>>         > To: Xuxiaohu; Thomas Narten;sfc@ietf.org <mailto:sfc@ietf.org>
>>         > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>         >
>>         > Xu,
>>         >Â  Â  Â  Â I do not believe that there is an MPLS specification that requires that all
>>         > content other than IP must have a first nibble of 0 or 1.
>>
>>         When encapsulating NSH over MPLS directly, the first nibble of
>>         the NSH must not be 4 or 6.
>>
>>         > There are specifications where it is discussed as desirable.
>>         >
>>         > It is in fact pretty trivial for us to change the format so that the first three bits are
>>         > 0, but it burns several valuable flag bits.Â  It is an SFC working group decision,
>>
>>         That's the reason why I raised the first nibble question.
>>
>>         Best regards,
>>         Xiaohu
>>
>>         > not, as far as I can tell, a violation of the MPLS
>>         specification.
>>         >
>>         > Yours,
>>         > Joel
>>         >
>>         > On 4/12/16 9:41 PM, Xuxiaohu wrote:
>>         > > Hi Thomas,
>>         > >
>>         > > It said in the NSH draft:
>>         > >
>>         > >Â  Â  "6.Â  Transport Agnostic: NSH is transport
>>         independent and is carried
>>         > >Â  Â  Â  Â  Â in an overlay, over existing underlays.Â  If
>>         an existing overlay
>>         > >Â  Â  Â  Â  Â topology provides the required service path
>>         connectivity, that
>>         > >Â  Â  Â  Â  Â existing overlay may be used."
>>         > >
>>         > > That means the NSH should be able to be transported over
>>         MPLS. However,
>>         > according to the current NSH format definition, it's not
>>         safe to carry the NSH
>>         > over MPLS due to the first nibble issue. Therefore, I
>>         believe this issue needs to be
>>         > addressed before publication.
>>         > >
>>         > > Best regards,
>>         > > Xiaohu
>>         > >
>>         > >> -----Original Message-----
>>         > >> From: sfc [mailto:sfc-bounces@ietf.org
>>         <mailto:sfc-bounces@ietf.org>] On Behalf Of Thomas Narten
>>         > >> Sent: Thursday, March 31, 2016 10:48 AM
>>         > >> To: sfc@ietf.org <mailto:sfc@ietf.org>
>>         > >> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>         > >>
>>         > >> Dear WG:
>>         > >>
>>         > >> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>         > >> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>         > >>
>>         > >> The editors of the NSH document have indicated that they have
>>         > >> addressed all known comments and that there are no open
>>         issues with
>>         > >> the current version of the document.
>>         > >>
>>         > >> Substantive comments to the list please, editorial
>>         comments can go
>>         > >> directly to the document editors.
>>         > >>
>>         > >> We'll also get a brief update from the editors at next week's
>>         > >> meeting. If there are any remaining issues with the
>>         document, raising
>>         > >> them before the meeting would be especially helpful.
>>         > >>
>>         > >> For the chairs,
>>         > >> Thomas
>>         > >>
>>         > >> _______________________________________________
>>         > >> sfc mailing list
>>         > >> sfc@ietf.org <mailto:sfc@ietf.org>
>>         > >> https://www.ietf.org/mailman/listinfo/sfc
>>         > >
>>         > > _______________________________________________
>>         > > sfc mailing list
>>         > > sfc@ietf.org <mailto:sfc@ietf.org>
>>         > > https://www.ietf.org/mailman/listinfo/sfc
>>         > >
>>
>>         _______________________________________________
>>         sfc mailing list
>>         sfc@ietf.org <mailto:sfc@ietf.org>
>>         https://www.ietf.org/mailman/listinfo/sfc
>>
>>
>>     _______________________________________________
>>     sfc mailing list
>>     sfc@ietf.org <mailto:sfc@ietf.org>
>>     https://www.ietf.org/mailman/listinfo/sfc
>
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Wed Apr 13 06:56:09 2016
Return-Path: <akatlas@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C287F12DE03 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 06:56:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.699
X-Spam-Level: 
X-Spam-Status: No, score=-102.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HKB3ku6eaCMT for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 06:55:58 -0700 (PDT)
Received: from mail-ob0-x231.google.com (mail-ob0-x231.google.com [IPv6:2607:f8b0:4003:c01::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6B55712DB93 for <sfc@ietf.org>; Wed, 13 Apr 2016 06:55:58 -0700 (PDT)
Received: by mail-ob0-x231.google.com with SMTP id j9so33472661obd.3 for <sfc@ietf.org>; Wed, 13 Apr 2016 06:55:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc; bh=WOPlD+NC7NjTsW+y2MZxYvjFdO7OL8XFU3ph0NAuP7Y=; b=HvWdYF5kKpA1afkDNVTz4avjAPr6goQ+X+Ts35He8B9OGe00hOtKV3Po39rnjpF4We xApk51GCHZDRZYu1G1tqKW/IpuVZl/0tkkyu067PBg3erNKtOI3K/BLOSLp1du4YB5do yZPG+XrlCMCD2XWO9JqM6e3i2813Eb+6+SzXsHlL8SPmL8RTRWZwKQIzVPfsEakysS6a q9dxqFsNulOOQFaL/ihGSzkK/SCa7ndjG5V8ldaJh6TtXzA2w0lgfBfDojQNIjF/iTPa Oj44tBBfFOQ+CXju+pNLsKpAVTg2ABNkkLx6hG90cibkmgh30uOMh5f51zEIvX6aVNvg tSnw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc; bh=WOPlD+NC7NjTsW+y2MZxYvjFdO7OL8XFU3ph0NAuP7Y=; b=Rx5baroNjM6XaJw5qhik7ULG/PCnlDrSeClng2IeZdfQDzeLVR0UlQ6nFXcda8ZX7q uR9w18eh0BrWDJ6SfnczSZnL/YTnVeW/pR3sMMVMRmm8A9ytebgdTk2ezTrENoI1YQ15 A9ClRYhRQhBrMUb+dHl3l9musogfR9JmJ6GTMXI/tzV0BrIxGZkKc/9LrAasQVJLau0s eu+xl0F9n0jEEeX38ywGOjBze2nH5Ki/+MW+oHLy9Mj63IiqKmKdFsuMiQ2NYc54pPxe vIUbhXI+a+hWZrMZQA6Rv/BuVKZuiRvRH8Rn6rVHkB03N8tyWiYt6W6iCKtleNNFQ/Gx IJNQ==
X-Gm-Message-State: AOPr4FW2mH/pNoob9T36hAQGriZiLtzTrj2fEYOjWwoCRnI6yS72nLcF5+MBVPAbS5TUBAwMfNwxSHBZ4tsbOw==
MIME-Version: 1.0
X-Received: by 10.182.38.233 with SMTP id j9mr4392291obk.57.1460555757650; Wed, 13 Apr 2016 06:55:57 -0700 (PDT)
Received: by 10.60.115.168 with HTTP; Wed, 13 Apr 2016 06:55:57 -0700 (PDT)
Received: by 10.60.115.168 with HTTP; Wed, 13 Apr 2016 06:55:57 -0700 (PDT)
In-Reply-To: <CAG4d1rc=DpsXV3=p9dYX3tom0XLDb_uXJxHbVNennvXf8phoSQ@mail.gmail.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <570E4D07.2060405@pi.nu> <CAG4d1rcT1JmnGT-NWkYjd0uQm-kbm5-w7tfnJVs9W07L9Cir1A@mail.gmail.com> <CAG4d1rc=DpsXV3=p9dYX3tom0XLDb_uXJxHbVNennvXf8phoSQ@mail.gmail.com>
Date: Wed, 13 Apr 2016 09:55:57 -0400
Message-ID: <CAG4d1rf_KOjjRh9NV40j-SKbxe0Yw82LBPnpVuAoNThm9ZdOjQ@mail.gmail.com>
From: Alia Atlas <akatlas@gmail.com>
To: Loa Andersson <loa@pi.nu>
Content-Type: multipart/alternative; boundary=001a11c339361c170a05305e23c4
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/EXyTUkMi1XiEy_fEsK1fJqSEoJI>
Cc: Thomas Narten <narten@us.ibm.com>, "Carlos Pignataro \(cpignata\)" <cpignata@cisco.com>, sfc@ietf.org, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 13:56:07 -0000

--001a11c339361c170a05305e23c4
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Loa,

Thanks!   I knew it was out there.

Regardless,  the first nibble question can't be resolved by adding more
labels to the stack!    The whole issue is looking at the S bit to guess
what's under the MPLS label stack.  That's why PWE3 uses code-words.

There needs to be an answer beyond handwaving that something can be
invented.

Of all the implementations, what transports is NSH carried over?  Do we
have any diversity?

Regards,
Alia
On Apr 13, 2016 9:43 AM, "Loa Andersson" <loa@pi.nu> wrote:

Alia,

I think you are referring to RFC 4182, it is more than a decade
since it was published.

/Loa


On 2016-04-13 21:13, Alia Atlas wrote:

> Carlos,
>
> As we all know, it is possible to do many many things with technology -
> once we figure out how.
> Saying that there are approaches other than reorganizing the first
> nibble is fine.=C3=82  Claiming that we'll
>
> be anywhere near interoperability or standardization without it being
> clarified does not seem plausible.
>
> For instance, I will note that the description of 0 (Explicit NULL) is
> still defined in RFC3032 as implying
> the packet underneath is IPv4.=C3=82  I really did think that we'd talked=
 in
>
> MPLS about fixing this - and maybe
> Loa or others can give us the reference - but that's what the IANA
> pointer has right now.
>
> I understand the desire to get NSH done - deeply! =C3=82
>
>
> I also hate late surprises and am trying to clear time to do a more
> thorough review of NSH as well as
> requesting other focused reviews.
>
> This issue is not new - and the issues I saw in a quick look are those
> that are thoroughly documented
> in=C3=82 draft-ietf-rtgwg-dt-encap-01
> <https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-encap/>=C3=82 which
>
> considered NSH as one of the encapsulations.
>
> It seems clear that there *are*=C3=82 transport-specific issues and we ne=
ed a
>
> place and a way to capture them.
>
> Regards,
> Alia
>
> On Wed, Apr 13, 2016 at 8:53 AM, Carlos Pignataro (cpignata)
> <cpignata@cisco.com <mailto:cpignata@cisco.com>> wrote:
>
>     Alia,
>
>     Thanks for looking into this.
>
>     It is relevant. I believe ECMP-prevention (anti-aliasing with 0x4
>     and 0x6) is necessary for traffic over MPLS expecting in-order
>     delivery.=C3=82
>
>
>     Transporting NSH over MPLS, however, does not necessarily imply
>     transporting NSH *directly* following the bottom LSE. There are
>     other ways, as it was done with PWs.=C3=82
>
>
>     I think showing that it is possible to appropriately (i.e.,
>     respecting BCPs) transport NSH over MPLS is very important. This may
>     or may not have implications on the NSH base header. I believe
>     however that such actual formal specification (beyond showing its
>     possible) should not gate NSH.
>
>     Thanks!
>
>     =C3=A2=E2=82=AC=E2=80=9D Carlos.
>
>
>     On Apr 12, 2016, at 10:29 PM, Alia Atlas <akatlas@gmail.com
>>     <mailto:akatlas@gmail.com>> wrote:
>>
>>     Xiaohu, Joel, and SFC WG group,
>>
>>     The first nibble question is quite relevant if it is expected that
>>     the NSH header might be directly under
>>     an MPLS label stack.=C3=82  This issue arose rather unpleasantly for
>>
>>     pseudo-wires a long time ago and the
>>     reasoning for it is much better documented, as Carlos pointed out
>>     in a different thread, in RFC 4928 Section 3.
>>
>>     At the time that PWE3 was working on the control word and whether
>>     it was to be mandatory (RFC 4385), it was clear that
>>     there were devices that looked at the first nibble of a packet
>>     under the MPLS header as a way to determine
>>     if the packet was IPv4 or IPv6 and obtain flow-diversity from
>>     it.=C3=82  The cost of also verifying the associated checksum
>>
>>     if available wasn't deemed acceptable for several
>>     implementations.=C3=82  Given that determining as much entropy as
>>
>>     possible is still really important and that it is non-trivial to
>>     negotiate/indicate the capability for including
>>     an Entropy Label in the MPLS stack, I have no reason to believe
>>     that this shortcut of looking at the first nibble
>>     is no longer used or deployed. =C3=82  Feel free to contact me off-l=
ist
>>
>>     if you believe this to be the case.
>>
>>     It is clear from the NSH base header:
>>        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>
>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>           |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protoco=
l
>> |
>>
>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>     that this consideration has been completely ignored.=C3=82  In fact,=
 an
>>
>>     NSH base header might have any value
>>     of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH were
>>     ever defined, suddenly the traffic might
>>     be subject to startling reordering if an MPLS transport were to be
>>     considered.
>>
>>     Given a claim of NSH being transport-agnostic and repeated
>>     emphasis that MPLS, as well as UDP,
>>     is a valid transport for NSH, I do think this is a significant
>>     oversight and needs, at a minimum, discussion and
>>     explanation, and =C3=82 - quite likely - =C3=82 correction.
>>
>>
>>     While I am on the topic of details of the NSH encapsulation, I
>>     would request that Section 8 of draft-ietf-rtgwg-dt-encap-01
>>     be read and considered! =C3=82  I am not excited by having many
>>
>>     different and unique Next Protocol fields defined.
>>     For instance, I note the definition of a nearly identical Next
>>     Protocol field in
>>     https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe .
>>
>>     While I am, of course, willing to reason to detailed and
>>     well-thought out explanations for why each and every new
>>     encapsulation needs its very own IANA-defined Next Protocol field,
>>     this seems to me to be highly likely to require
>>     consolidation so that the same Next Protocol field can be used
>>     between the various encapsulations.
>>
>>     I will work on giving a through review of NSH as soon as
>>     practical.=C3=82  I do realize that there are multiple implementatio=
ns
>>
>>     and while details of how the "Next Protocol" field are documented
>>     shouldn't have a significant impact there, the
>>     discussion about the first nibble is likely to.
>>
>>     Regards,
>>     Alia
>>
>>
>>     On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <xuxiaohu@huawei.com
>>     <mailto:xuxiaohu@huawei.com>> wrote:
>>
>>         Joel,
>>
>>         > -----Original Message-----
>>         > From: Joel M. Halpern [mailto:jmh@joelhalpern.com <mailto:
>> jmh@joelhalpern.com>]
>>         > Sent: Wednesday, April 13, 2016 9:45 AM
>>         > To: Xuxiaohu; Thomas Narten;sfc@ietf.org <mailto:sfc@ietf.org>
>>         > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>         >
>>         > Xu,
>>         >=C3=82  =C3=82  =C3=82  =C3=82 I do not believe that there is a=
n MPLS specification
>> that requires that all
>>
>>         > content other than IP must have a first nibble of 0 or 1.
>>
>>         When encapsulating NSH over MPLS directly, the first nibble of
>>         the NSH must not be 4 or 6.
>>
>>         > There are specifications where it is discussed as desirable.
>>         >
>>         > It is in fact pretty trivial for us to change the format so
>> that the first three bits are
>>         > 0, but it burns several valuable flag bits.=C3=82  It is an SF=
C
>> working group decision,
>>
>>
>>         That's the reason why I raised the first nibble question.
>>
>>         Best regards,
>>         Xiaohu
>>
>>         > not, as far as I can tell, a violation of the MPLS
>>         specification.
>>         >
>>         > Yours,
>>         > Joel
>>         >
>>         > On 4/12/16 9:41 PM, Xuxiaohu wrote:
>>         > > Hi Thomas,
>>         > >
>>         > > It said in the NSH draft:
>>         > >
>>         > >=C3=82  =C3=82  "6.=C3=82  Transport Agnostic: NSH is transpo=
rt
>>         independent and is carried
>>         > >=C3=82  =C3=82  =C3=82  =C3=82  =C3=82 in an overlay, over ex=
isting underlays.=C3=82  If
>>         an existing overlay
>>         > >=C3=82  =C3=82  =C3=82  =C3=82  =C3=82 topology provides the =
required service path
>>         connectivity, that
>>         > >=C3=82  =C3=82  =C3=82  =C3=82  =C3=82 existing overlay may b=
e used."
>>
>>         > >
>>         > > That means the NSH should be able to be transported over
>>         MPLS. However,
>>         > according to the current NSH format definition, it's not
>>         safe to carry the NSH
>>         > over MPLS due to the first nibble issue. Therefore, I
>>         believe this issue needs to be
>>         > addressed before publication.
>>         > >
>>         > > Best regards,
>>         > > Xiaohu
>>         > >
>>         > >> -----Original Message-----
>>         > >> From: sfc [mailto:sfc-bounces@ietf.org
>>         <mailto:sfc-bounces@ietf.org>] On Behalf Of Thomas Narten
>>         > >> Sent: Thursday, March 31, 2016 10:48 AM
>>         > >> To: sfc@ietf.org <mailto:sfc@ietf.org>
>>         > >> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>         > >>
>>         > >> Dear WG:
>>         > >>
>>         > >> This note begins a WG last call on draft-ietf-sfc-nsh-04.tx=
t
>>         > >> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>         > >>
>>         > >> The editors of the NSH document have indicated that they ha=
ve
>>         > >> addressed all known comments and that there are no open
>>         issues with
>>         > >> the current version of the document.
>>         > >>
>>         > >> Substantive comments to the list please, editorial
>>         comments can go
>>         > >> directly to the document editors.
>>         > >>
>>         > >> We'll also get a brief update from the editors at next week=
's
>>         > >> meeting. If there are any remaining issues with the
>>         document, raising
>>         > >> them before the meeting would be especially helpful.
>>         > >>
>>         > >> For the chairs,
>>         > >> Thomas
>>         > >>
>>         > >> _______________________________________________
>>         > >> sfc mailing list
>>         > >> sfc@ietf.org <mailto:sfc@ietf.org>
>>
>>         > >> https://www.ietf.org/mailman/listinfo/sfc
>>         > >
>>         > > _______________________________________________
>>         > > sfc mailing list
>>         > > sfc@ietf.org <mailto:sfc@ietf.org>
>>
>>         > > https://www.ietf.org/mailman/listinfo/sfc
>>         > >
>>
>>         _______________________________________________
>>         sfc mailing list
>>         sfc@ietf.org <mailto:sfc@ietf.org>
>>
>>         https://www.ietf.org/mailman/listinfo/sfc
>>
>>
>>     _______________________________________________
>>     sfc mailing list
>>     sfc@ietf.org <mailto:sfc@ietf.org>
>>     https://www.ietf.org/mailman/listinfo/sfc
>>
>
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>
>

--001a11c339361c170a05305e23c4
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<p dir=3D"ltr">Loa, </p>
<p dir=3D"ltr">Thanks!=C2=A0=C2=A0 I knew it was out there. </p>
<p dir=3D"ltr">Regardless,=C2=A0 the first nibble question can&#39;t be res=
olved by adding more labels to the stack!=C2=A0=C2=A0=C2=A0 The whole issue=
 is looking at the S bit to guess what&#39;s under the MPLS label stack.=C2=
=A0 That&#39;s why PWE3 uses code-words.</p>
<p dir=3D"ltr">There needs to be an answer beyond handwaving that something=
 can be invented.</p>
<p dir=3D"ltr">Of all the implementations, what transports is NSH carried o=
ver?=C2=A0 Do we have any diversity? </p>
<p dir=3D"ltr">Regards, <br>
Alia </p>
<div class=3D"gmail_quote">On Apr 13, 2016 9:43 AM, &quot;Loa Andersson&quo=
t; &lt;<a href=3D"mailto:loa@pi.nu">loa@pi.nu</a>&gt; wrote:<br type=3D"att=
ribution"><blockquote class=3D"quote" style=3D"margin:0 0 0 .8ex;border-lef=
t:1px #ccc solid;padding-left:1ex">Alia,<br>
<br>
I think you are referring to RFC 4182, it is more than a decade<br>
since it was published.<br>
<br>
/Loa<div class=3D"quoted-text"><br>
<br>
On 2016-04-13 21:13, Alia Atlas wrote:<br>
</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-l=
eft:1px #ccc solid;padding-left:1ex"><div class=3D"quoted-text">
Carlos,<br>
<br>
As we all know, it is possible to do many many things with technology -<br>
once we figure out how.<br>
Saying that there are approaches other than reorganizing the first<br></div=
>
nibble is fine.=C3=82=C2=A0 Claiming that we&#39;ll<div class=3D"quoted-tex=
t"><br>
be anywhere near interoperability or standardization without it being<br>
clarified does not seem plausible.<br>
<br>
For instance, I will note that the description of 0 (Explicit NULL) is<br>
still defined in RFC3032 as implying<br></div>
the packet underneath is IPv4.=C3=82=C2=A0 I really did think that we&#39;d=
 talked in<div class=3D"quoted-text"><br>
MPLS about fixing this - and maybe<br>
Loa or others can give us the reference - but that&#39;s what the IANA<br>
pointer has right now.<br>
<br></div>
I understand the desire to get NSH done - deeply! =C3=82<div class=3D"quote=
d-text"><br>
<br>
I also hate late surprises and am trying to clear time to do a more<br>
thorough review of NSH as well as<br>
requesting other focused reviews.<br>
<br>
This issue is not new - and the issues I saw in a quick look are those<br>
that are thoroughly documented<br></div>
in=C3=82 draft-ietf-rtgwg-dt-encap-01<br>
&lt;<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-encap/"=
 rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc/draf=
t-ietf-rtgwg-dt-encap/</a>&gt;=C3=82 which<div class=3D"quoted-text"><br>
considered NSH as one of the encapsulations.<br>
<br></div>
It seems clear that there *are*=C3=82 transport-specific issues and we need=
 a<div class=3D"quoted-text"><br>
place and a way to capture them.<br>
<br>
Regards,<br>
Alia<br>
<br>
On Wed, Apr 13, 2016 at 8:53 AM, Carlos Pignataro (cpignata)<br></div><div =
class=3D"quoted-text">
&lt;<a href=3D"mailto:cpignata@cisco.com" target=3D"_blank">cpignata@cisco.=
com</a> &lt;mailto:<a href=3D"mailto:cpignata@cisco.com" target=3D"_blank">=
cpignata@cisco.com</a>&gt;&gt; wrote:<br>
<br>
=C2=A0 =C2=A0 Alia,<br>
<br>
=C2=A0 =C2=A0 Thanks for looking into this.<br>
<br>
=C2=A0 =C2=A0 It is relevant. I believe ECMP-prevention (anti-aliasing with=
 0x4<br>
=C2=A0 =C2=A0 and 0x6) is necessary for traffic over MPLS expecting in-orde=
r<br></div>
=C2=A0 =C2=A0 delivery.=C3=82<div class=3D"quoted-text"><br>
<br>
=C2=A0 =C2=A0 Transporting NSH over MPLS, however, does not necessarily imp=
ly<br>
=C2=A0 =C2=A0 transporting NSH *directly* following the bottom LSE. There a=
re<br></div>
=C2=A0 =C2=A0 other ways, as it was done with PWs.=C3=82<div class=3D"quote=
d-text"><br>
<br>
=C2=A0 =C2=A0 I think showing that it is possible to appropriately (i.e.,<b=
r>
=C2=A0 =C2=A0 respecting BCPs) transport NSH over MPLS is very important. T=
his may<br>
=C2=A0 =C2=A0 or may not have implications on the NSH base header. I believ=
e<br>
=C2=A0 =C2=A0 however that such actual formal specification (beyond showing=
 its<br>
=C2=A0 =C2=A0 possible) should not gate NSH.<br>
<br>
=C2=A0 =C2=A0 Thanks!<br>
<br></div>
=C2=A0 =C2=A0 =C3=A2=E2=82=AC=E2=80=9D Carlos.<br>
<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div class=3D"quoted-text">
=C2=A0 =C2=A0 On Apr 12, 2016, at 10:29 PM, Alia Atlas &lt;<a href=3D"mailt=
o:akatlas@gmail.com" target=3D"_blank">akatlas@gmail.com</a><br></div><div =
class=3D"quoted-text">
=C2=A0 =C2=A0 &lt;mailto:<a href=3D"mailto:akatlas@gmail.com" target=3D"_bl=
ank">akatlas@gmail.com</a>&gt;&gt; wrote:<br>
<br>
=C2=A0 =C2=A0 Xiaohu, Joel, and SFC WG group,<br>
<br>
=C2=A0 =C2=A0 The first nibble question is quite relevant if it is expected=
 that<br>
=C2=A0 =C2=A0 the NSH header might be directly under<br></div>
=C2=A0 =C2=A0 an MPLS label stack.=C3=82=C2=A0 This issue arose rather unpl=
easantly for<div class=3D"quoted-text"><br>
=C2=A0 =C2=A0 pseudo-wires a long time ago and the<br>
=C2=A0 =C2=A0 reasoning for it is much better documented, as Carlos pointed=
 out<br>
=C2=A0 =C2=A0 in a different thread, in RFC 4928 Section 3.<br>
<br>
=C2=A0 =C2=A0 At the time that PWE3 was working on the control word and whe=
ther<br>
=C2=A0 =C2=A0 it was to be mandatory (RFC 4385), it was clear that<br>
=C2=A0 =C2=A0 there were devices that looked at the first nibble of a packe=
t<br>
=C2=A0 =C2=A0 under the MPLS header as a way to determine<br>
=C2=A0 =C2=A0 if the packet was IPv4 or IPv6 and obtain flow-diversity from=
<br></div>
=C2=A0 =C2=A0 it.=C3=82=C2=A0 The cost of also verifying the associated che=
cksum<div class=3D"quoted-text"><br>
=C2=A0 =C2=A0 if available wasn&#39;t deemed acceptable for several<br></di=
v>
=C2=A0 =C2=A0 implementations.=C3=82=C2=A0 Given that determining as much e=
ntropy as<div class=3D"quoted-text"><br>
=C2=A0 =C2=A0 possible is still really important and that it is non-trivial=
 to<br>
=C2=A0 =C2=A0 negotiate/indicate the capability for including<br>
=C2=A0 =C2=A0 an Entropy Label in the MPLS stack, I have no reason to belie=
ve<br>
=C2=A0 =C2=A0 that this shortcut of looking at the first nibble<br></div>
=C2=A0 =C2=A0 is no longer used or deployed. =C3=82=C2=A0 Feel free to cont=
act me off-list<div class=3D"quoted-text"><br>
=C2=A0 =C2=A0 if you believe this to be the case.<br>
<br>
=C2=A0 =C2=A0 It is clear from the NSH base header:<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A00 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 =
4 5 6 7 8 9 0 1<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-=
+-+-+-+-+-+-+-+-+-+-+-+-+<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 |Ver|O|C|R|R|R|R|R|R|=C2=A0 =C2=A0Length=
=C2=A0 |=C2=A0 =C2=A0 MD Type=C2=A0 =C2=A0 | Next Protocol |<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-=
+-+-+-+-+-+-+-+-+-+-+-+-+<br></div>
=C2=A0 =C2=A0 that this consideration has been completely ignored.=C3=82=C2=
=A0 In fact, an<div class=3D"quoted-text"><br>
=C2=A0 =C2=A0 NSH base header might have any value<br>
=C2=A0 =C2=A0 of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH=
 were<br>
=C2=A0 =C2=A0 ever defined, suddenly the traffic might<br>
=C2=A0 =C2=A0 be subject to startling reordering if an MPLS transport were =
to be<br>
=C2=A0 =C2=A0 considered.<br>
<br>
=C2=A0 =C2=A0 Given a claim of NSH being transport-agnostic and repeated<br=
>
=C2=A0 =C2=A0 emphasis that MPLS, as well as UDP,<br>
=C2=A0 =C2=A0 is a valid transport for NSH, I do think this is a significan=
t<br>
=C2=A0 =C2=A0 oversight and needs, at a minimum, discussion and<br></div>
=C2=A0 =C2=A0 explanation, and =C3=82 - quite likely - =C3=82 correction.<d=
iv class=3D"quoted-text"><br>
<br>
=C2=A0 =C2=A0 While I am on the topic of details of the NSH encapsulation, =
I<br>
=C2=A0 =C2=A0 would request that Section 8 of draft-ietf-rtgwg-dt-encap-01<=
br></div>
=C2=A0 =C2=A0 be read and considered! =C3=82=C2=A0 I am not excited by havi=
ng many<div class=3D"quoted-text"><br>
=C2=A0 =C2=A0 different and unique Next Protocol fields defined.<br>
=C2=A0 =C2=A0 For instance, I note the definition of a nearly identical Nex=
t<br>
=C2=A0 =C2=A0 Protocol field in<br>
=C2=A0 =C2=A0 <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-nvo3-v=
xlan-gpe" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org=
/doc/draft-ietf-nvo3-vxlan-gpe</a> .<br>
<br>
=C2=A0 =C2=A0 While I am, of course, willing to reason to detailed and<br>
=C2=A0 =C2=A0 well-thought out explanations for why each and every new<br>
=C2=A0 =C2=A0 encapsulation needs its very own IANA-defined Next Protocol f=
ield,<br>
=C2=A0 =C2=A0 this seems to me to be highly likely to require<br>
=C2=A0 =C2=A0 consolidation so that the same Next Protocol field can be use=
d<br>
=C2=A0 =C2=A0 between the various encapsulations.<br>
<br>
=C2=A0 =C2=A0 I will work on giving a through review of NSH as soon as<br><=
/div>
=C2=A0 =C2=A0 practical.=C3=82=C2=A0 I do realize that there are multiple i=
mplementations<div class=3D"quoted-text"><br>
=C2=A0 =C2=A0 and while details of how the &quot;Next Protocol&quot; field =
are documented<br>
=C2=A0 =C2=A0 shouldn&#39;t have a significant impact there, the<br>
=C2=A0 =C2=A0 discussion about the first nibble is likely to.<br>
<br>
=C2=A0 =C2=A0 Regards,<br>
=C2=A0 =C2=A0 Alia<br>
<br>
<br>
=C2=A0 =C2=A0 On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu &lt;<a href=3D"mail=
to:xuxiaohu@huawei.com" target=3D"_blank">xuxiaohu@huawei.com</a><br></div>=
<div class=3D"quoted-text">
=C2=A0 =C2=A0 &lt;mailto:<a href=3D"mailto:xuxiaohu@huawei.com" target=3D"_=
blank">xuxiaohu@huawei.com</a>&gt;&gt; wrote:<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Joel,<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; -----Original Message-----<br></div><div c=
lass=3D"quoted-text">
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; From: Joel M. Halpern [mailto:<a href=3D"m=
ailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a> &lt;ma=
ilto:<a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelhalpe=
rn.com</a>&gt;]<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; Sent: Wednesday, April 13, 2016 9:45 AM<br=
></div><div class=3D"quoted-text">
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; To: Xuxiaohu; Thomas <a href=3D"mailto:Nar=
ten%3Bsfc@ietf.org" target=3D"_blank">Narten;sfc@ietf.org</a> &lt;mailto:<a=
 href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; Subject: Re: [sfc] WG last call for draft-=
ietf-sfc-nsh-04.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; Xu,<br></div>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt;=C3=82=C2=A0 =C3=82=C2=A0 =C3=82=C2=A0 =C3=
=82 I do not believe that there is an MPLS specification that requires that=
 all<div class=3D"quoted-text"><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; content other than IP must have a first ni=
bble of 0 or 1.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 When encapsulating NSH over MPLS directly, the =
first nibble of<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 the NSH must not be 4 or 6.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; There are specifications where it is discu=
ssed as desirable.<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; It is in fact pretty trivial for us to cha=
nge the format so that the first three bits are<br></div>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; 0, but it burns several valuable flag bits=
.=C3=82=C2=A0 It is an SFC working group decision,<div class=3D"quoted-text=
"><br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 That&#39;s the reason why I raised the first ni=
bble question.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Best regards,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Xiaohu<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; not, as far as I can tell, a violation of =
the MPLS<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 specification.<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; Yours,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; Joel<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; On 4/12/16 9:41 PM, Xuxiaohu wrote:<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; Hi Thomas,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; It said in the NSH draft:<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br></div>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;=C3=82=C2=A0 =C3=82=C2=A0 &quot;6.=C3=
=82=C2=A0 Transport Agnostic: NSH is transport<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 independent and is carried<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;=C3=82=C2=A0 =C3=82=C2=A0 =C3=82=C2=A0=
 =C3=82=C2=A0 =C3=82 in an overlay, over existing underlays.=C3=82=C2=A0 If=
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 an existing overlay<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;=C3=82=C2=A0 =C3=82=C2=A0 =C3=82=C2=A0=
 =C3=82=C2=A0 =C3=82 topology provides the required service path<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 connectivity, that<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;=C3=82=C2=A0 =C3=82=C2=A0 =C3=82=C2=A0=
 =C3=82=C2=A0 =C3=82 existing overlay may be used.&quot;<div class=3D"quote=
d-text"><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; That means the NSH should be able to =
be transported over<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 MPLS. However,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; according to the current NSH format defini=
tion, it&#39;s not<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 safe to carry the NSH<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; over MPLS due to the first nibble issue. T=
herefore, I<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 believe this issue needs to be<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; addressed before publication.<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; Best regards,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; Xiaohu<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; -----Original Message-----<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; From: sfc [mailto:<a href=3D"mail=
to:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ietf.org</a><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &lt;mailto:<a href=3D"mailto:sfc-bounces@ietf.o=
rg" target=3D"_blank">sfc-bounces@ietf.org</a>&gt;] On Behalf Of Thomas Nar=
ten<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; Sent: Thursday, March 31, 2016 10=
:48 AM<br></div><div class=3D"quoted-text">
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; To: <a href=3D"mailto:sfc@ietf.or=
g" target=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf=
.org" target=3D"_blank">sfc@ietf.org</a>&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; Subject: [sfc] WG last call for d=
raft-ietf-sfc-nsh-04.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; Dear WG:<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; This note begins a WG last call o=
n draft-ietf-sfc-nsh-04.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; (<a href=3D"https://datatracker.i=
etf.org/doc/draft-ietf-sfc-nsh/" rel=3D"noreferrer" target=3D"_blank">https=
://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/</a>).<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; The editors of the NSH document h=
ave indicated that they have<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; addressed all known comments and =
that there are no open<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 issues with<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; the current version of the docume=
nt.<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; Substantive comments to the list =
please, editorial<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 comments can go<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; directly to the document editors.=
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; We&#39;ll also get a brief update=
 from the editors at next week&#39;s<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; meeting. If there are any remaini=
ng issues with the<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 document, raising<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; them before the meeting would be =
especially helpful.<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; For the chairs,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; Thomas<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; _________________________________=
______________<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; sfc mailing list<br></div>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; <a href=3D"mailto:sfc@ietf.org" t=
arget=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org=
" target=3D"_blank">sfc@ietf.org</a>&gt;<div class=3D"quoted-text"><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; <a href=3D"https://www.ietf.org/m=
ailman/listinfo/sfc" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.=
org/mailman/listinfo/sfc</a><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; _____________________________________=
__________<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; sfc mailing list<br></div>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; <a href=3D"mailto:sfc@ietf.org" targe=
t=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" ta=
rget=3D"_blank">sfc@ietf.org</a>&gt;<div class=3D"quoted-text"><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; <a href=3D"https://www.ietf.org/mailm=
an/listinfo/sfc" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/=
mailman/listinfo/sfc</a><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 _______________________________________________=
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 sfc mailing list<br></div>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 <a href=3D"mailto:sfc@ietf.org" target=3D"_blan=
k">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_b=
lank">sfc@ietf.org</a>&gt;<div class=3D"quoted-text"><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 <a href=3D"https://www.ietf.org/mailman/listinf=
o/sfc" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/mailman/li=
stinfo/sfc</a><br>
<br>
<br>
=C2=A0 =C2=A0 _______________________________________________<br>
=C2=A0 =C2=A0 sfc mailing list<br></div>
=C2=A0 =C2=A0 <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.or=
g</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf=
.org</a>&gt;<br>
=C2=A0 =C2=A0 <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"=
noreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a>=
<br>
</blockquote><div class=3D"quoted-text">
<br>
<br>
<br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
</div></blockquote>
</blockquote></div>

--001a11c339361c170a05305e23c4--


From nobody Wed Apr 13 06:59:27 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A26612D5DD for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 06:59:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3ocVRBYjdpI6 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 06:59:23 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6CC8112D0B9 for <sfc@ietf.org>; Wed, 13 Apr 2016 06:59:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=30577; q=dns/txt; s=iport; t=1460555963; x=1461765563; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=tjn4EKpppVWgPIl2QC+Okw6+8/PF/fAkA2sTKuTU+Yc=; b=FOBPHRIqFKUWtFccWVx8mYQj8uB9gU4OKvnyK8/SQVWzvR3R1ONrL9hD DaqluXml8ZPx1sAG03MBm0dyZfOpXdgvqoc2cTKZntNy7H2VISXjVpIn2 nbTCuc3xfjcfbrV2HIxNMlBIHQU5bNRGGJBV/7STfyO0VI2W8yoRYWCdC U=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DIAgByUA5X/4YNJK1egmtMU30Grm6LW?= =?us-ascii?q?A6BdBcBCoIYAYNTAoE9OBQBAQEBAQEBZSeEQQEBAQMBAQEBGgZEBwsFBwQCAQg?= =?us-ascii?q?OAwQBAQEgBwMCAiEGCxQJCAIEDgUOiAUDCggOsE+NDg2FLQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBAQEBAQ0EBIYhgXUIgUyBAoJBgisJgkorgisFkxuEPDEBgyOBZm2Cc4M?= =?us-ascii?q?ugXWBZ4ROgyiFM4YggSuHWwEeAUOCBBmBSmyIfH4BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,479,1454976000";  d="asc'?scan'208,217";a="91345620"
Received: from alln-core-12.cisco.com ([173.36.13.134]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 13 Apr 2016 13:59:20 +0000
Received: from XCH-RTP-007.cisco.com (xch-rtp-007.cisco.com [64.101.220.147]) by alln-core-12.cisco.com (8.14.5/8.14.5) with ESMTP id u3DDxKfg010008 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 13:59:20 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-007.cisco.com (64.101.220.147) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 13 Apr 2016 09:59:19 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Wed, 13 Apr 2016 09:59:19 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Alia Atlas <akatlas@gmail.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfXjVJMNJL6xkKtVPhZYT1+65+HeFQAgAAA4wCAAAKVgIAACdAAgACudQCAAAWPAIAADNUA
Date: Wed, 13 Apr 2016 13:59:19 +0000
Message-ID: <1CC1CA8E-30CD-4DF1-8247-5B962B0125AA@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com>
In-Reply-To: <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.117.115.56]
Content-Type: multipart/signed; boundary="Apple-Mail=_3E5B0227-188E-41CA-BF81-890BB166019D"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/hCFeoSW-UL2DWC6LHJaDdhP1tco>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 13:59:26 -0000

--Apple-Mail=_3E5B0227-188E-41CA-BF81-890BB166019D
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_2CD9084C-CEAC-43EE-A20A-347EE064E485"


--Apple-Mail=_2CD9084C-CEAC-43EE-A20A-347EE064E485
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Alia,

It seems I was not totally clear before. Let me try again.

My point is that if there are approaches to transport the SFC =
Encapsulation over MPLS, such as defining a CW-like thing starting with =
0x0 (I=E2=80=99m not talking about Explicit Null) or defining an =
=E2=80=9CExplicit NSH=E2=80=9D Label value, or others, we do not need to =
wait for those specifications to become RFCs before advancing the SFC =
encapsulation. Further, that that=E2=80=99s probably work for MPLS and =
not for SFC (to find the best way to transport NSH over MPLS) =E2=80=94 =
although clearly we take your guidance there :-) Yes, clarifications are =
good. But to exemplify, we cannot say IPv6 does not interop because IPv6 =
over Bluetooth Low-Energy or IPv6 over 802.XYZ.alpha.pi is still being =
defined.

Thorough deep reviews as well as focused reviews are good! Thanks. Not =
to go down a tangent, but I had mentioned also that perhaps there was =
not deep SFC representation in the Encap-DT.

Thanks,

=E2=80=94 Carlos.

> On Apr 13, 2016, at 9:13 AM, Alia Atlas <akatlas@gmail.com> wrote:
>=20
> Carlos,
>=20
> As we all know, it is possible to do many many things with technology =
- once we figure out how.
> Saying that there are approaches other than reorganizing the first =
nibble is fine.  Claiming that we'll
> be anywhere near interoperability or standardization without it being =
clarified does not seem plausible.
>=20
> For instance, I will note that the description of 0 (Explicit NULL) is =
still defined in RFC3032 as implying
> the packet underneath is IPv4.  I really did think that we'd talked in =
MPLS about fixing this - and maybe
> Loa or others can give us the reference - but that's what the IANA =
pointer has right now.
>=20
> I understand the desire to get NSH done - deeply!
>=20
> I also hate late surprises and am trying to clear time to do a more =
thorough review of NSH as well as
> requesting other focused reviews.
>=20
> This issue is not new - and the issues I saw in a quick look are those =
that are thoroughly documented
> in draft-ietf-rtgwg-dt-encap-01 =
<https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-encap/> which =
considered NSH as one of the encapsulations.
>=20
> It seems clear that there are transport-specific issues and we need a =
place and a way to capture them.
>=20
> Regards,
> Alia
>=20
> On Wed, Apr 13, 2016 at 8:53 AM, Carlos Pignataro (cpignata) =
<cpignata@cisco.com <mailto:cpignata@cisco.com>> wrote:
> Alia,
>=20
> Thanks for looking into this.
>=20
> It is relevant. I believe ECMP-prevention (anti-aliasing with 0x4 and =
0x6) is necessary for traffic over MPLS expecting in-order delivery.
>=20
> Transporting NSH over MPLS, however, does not necessarily imply =
transporting NSH *directly* following the bottom LSE. There are other =
ways, as it was done with PWs.
>=20
> I think showing that it is possible to appropriately (i.e., respecting =
BCPs) transport NSH over MPLS is very important. This may or may not =
have implications on the NSH base header. I believe however that such =
actual formal specification (beyond showing its possible) should not =
gate NSH.
>=20
> Thanks!
>=20
> =E2=80=94 Carlos.
>=20
>=20
>> On Apr 12, 2016, at 10:29 PM, Alia Atlas <akatlas@gmail.com =
<mailto:akatlas@gmail.com>> wrote:
>>=20
>> Xiaohu, Joel, and SFC WG group,
>>=20
>> The first nibble question is quite relevant if it is expected that =
the NSH header might be directly under
>> an MPLS label stack.  This issue arose rather unpleasantly for =
pseudo-wires a long time ago and the
>> reasoning for it is much better documented, as Carlos pointed out in =
a different thread, in RFC 4928 Section 3.
>>=20
>> At the time that PWE3 was working on the control word and whether it =
was to be mandatory (RFC 4385), it was clear that
>> there were devices that looked at the first nibble of a packet under =
the MPLS header as a way to determine
>> if the packet was IPv4 or IPv6 and obtain flow-diversity from it.  =
The cost of also verifying the associated checksum
>> if available wasn't deemed acceptable for several implementations.  =
Given that determining as much entropy as
>> possible is still really important and that it is non-trivial to =
negotiate/indicate the capability for including
>> an Entropy Label in the MPLS stack, I have no reason to believe that =
this shortcut of looking at the first nibble
>> is no longer used or deployed.   Feel free to contact me off-list if =
you believe this to be the case.
>>=20
>> It is clear from the NSH base header:
>>   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>      =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>      |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol =
|
>>      =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>> that this consideration has been completely ignored.  In fact, an NSH =
base header might have any value
>> of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH were =
ever defined, suddenly the traffic might
>> be subject to startling reordering if an MPLS transport were to be =
considered.
>>=20
>> Given a claim of NSH being transport-agnostic and repeated emphasis =
that MPLS, as well as UDP,
>> is a valid transport for NSH, I do think this is a significant =
oversight and needs, at a minimum, discussion and
>> explanation, and  - quite likely -  correction.
>>=20
>> While I am on the topic of details of the NSH encapsulation, I would =
request that Section 8 of draft-ietf-rtgwg-dt-encap-01
>> be read and considered!   I am not excited by having many different =
and unique Next Protocol fields defined.
>> For instance, I note the definition of a nearly identical Next =
Protocol field in =
https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe =
<https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe> .
>>=20
>> While I am, of course, willing to reason to detailed and well-thought =
out explanations for why each and every new
>> encapsulation needs its very own IANA-defined Next Protocol field, =
this seems to me to be highly likely to require
>> consolidation so that the same Next Protocol field can be used =
between the various encapsulations.
>>=20
>> I will work on giving a through review of NSH as soon as practical.  =
I do realize that there are multiple implementations
>> and while details of how the "Next Protocol" field are documented =
shouldn't have a significant impact there, the
>> discussion about the first nibble is likely to.
>>=20
>> Regards,
>> Alia
>>=20
>>=20
>> On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <xuxiaohu@huawei.com =
<mailto:xuxiaohu@huawei.com>> wrote:
>> Joel,
>>=20
>> > -----Original Message-----
>> > From: Joel M. Halpern [mailto:jmh@joelhalpern.com =
<mailto:jmh@joelhalpern.com>]
>> > Sent: Wednesday, April 13, 2016 9:45 AM
>> > To: Xuxiaohu; Thomas Narten; sfc@ietf.org <mailto:sfc@ietf.org>
>> > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>> >
>> > Xu,
>> >       I do not believe that there is an MPLS specification that =
requires that all
>> > content other than IP must have a first nibble of 0 or 1.
>>=20
>> When encapsulating NSH over MPLS directly, the first nibble of the =
NSH must not be 4 or 6.
>>=20
>> > There are specifications where it is discussed as desirable.
>> >
>> > It is in fact pretty trivial for us to change the format so that =
the first three bits are
>> > 0, but it burns several valuable flag bits.  It is an SFC working =
group decision,
>>=20
>> That's the reason why I raised the first nibble question.
>>=20
>> Best regards,
>> Xiaohu
>>=20
>> > not, as far as I can tell, a violation of the MPLS specification.
>> >
>> > Yours,
>> > Joel
>> >
>> > On 4/12/16 9:41 PM, Xuxiaohu wrote:
>> > > Hi Thomas,
>> > >
>> > > It said in the NSH draft:
>> > >
>> > >    "6.  Transport Agnostic: NSH is transport independent and is =
carried
>> > >         in an overlay, over existing underlays.  If an existing =
overlay
>> > >         topology provides the required service path connectivity, =
that
>> > >         existing overlay may be used."
>> > >
>> > > That means the NSH should be able to be transported over MPLS. =
However,
>> > according to the current NSH format definition, it's not safe to =
carry the NSH
>> > over MPLS due to the first nibble issue. Therefore, I believe this =
issue needs to be
>> > addressed before publication.
>> > >
>> > > Best regards,
>> > > Xiaohu
>> > >
>> > >> -----Original Message-----
>> > >> From: sfc [mailto:sfc-bounces@ietf.org =
<mailto:sfc-bounces@ietf.org>] On Behalf Of Thomas Narten
>> > >> Sent: Thursday, March 31, 2016 10:48 AM
>> > >> To: sfc@ietf.org <mailto:sfc@ietf.org>
>> > >> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>> > >>
>> > >> Dear WG:
>> > >>
>> > >> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>> > >> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/ =
<https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/>).
>> > >>
>> > >> The editors of the NSH document have indicated that they have
>> > >> addressed all known comments and that there are no open issues =
with
>> > >> the current version of the document.
>> > >>
>> > >> Substantive comments to the list please, editorial comments can =
go
>> > >> directly to the document editors.
>> > >>
>> > >> We'll also get a brief update from the editors at next week's
>> > >> meeting. If there are any remaining issues with the document, =
raising
>> > >> them before the meeting would be especially helpful.
>> > >>
>> > >> For the chairs,
>> > >> Thomas
>> > >>
>> > >> _______________________________________________
>> > >> sfc mailing list
>> > >> sfc@ietf.org <mailto:sfc@ietf.org>
>> > >> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>> > >
>> > > _______________________________________________
>> > > sfc mailing list
>> > > sfc@ietf.org <mailto:sfc@ietf.org>
>> > > https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>> > >
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org <mailto:sfc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org <mailto:sfc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>=20
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


--Apple-Mail=_2CD9084C-CEAC-43EE-A20A-347EE064E485
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">Alia,<div class=3D""><br class=3D""></div><div class=3D"">It =
seems I was not totally clear before. Let me try again.</div><div =
class=3D""><br class=3D""></div><div class=3D"">My point is that if =
there are approaches to transport the SFC Encapsulation over MPLS, such =
as defining a CW-like thing starting with 0x0 (I=E2=80=99m not talking =
about Explicit Null) or defining an =E2=80=9CExplicit NSH=E2=80=9D Label =
value, or others, we do not need to wait for those specifications to =
become RFCs before advancing the SFC encapsulation. Further, that =
that=E2=80=99s probably work for MPLS and not for SFC (to find the best =
way to transport NSH over MPLS) =E2=80=94 although clearly we take your =
guidance there :-) Yes, clarifications are good. But to exemplify, we =
cannot say IPv6 does not interop because IPv6 over Bluetooth Low-Energy =
or IPv6 over 802.XYZ.alpha.pi is still being defined.</div><div =
class=3D""><br class=3D""></div><div class=3D"">Thorough deep reviews as =
well as focused reviews are good! Thanks. Not to go down a tangent, but =
I had mentioned also that perhaps there was not deep SFC representation =
in the Encap-DT.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Thanks,</div><div class=3D""><br class=3D""></div><div =
class=3D"">=E2=80=94 Carlos.</div><div class=3D""><br =
class=3D""><div><blockquote type=3D"cite" class=3D""><div class=3D"">On =
Apr 13, 2016, at 9:13 AM, Alia Atlas &lt;<a =
href=3D"mailto:akatlas@gmail.com" class=3D"">akatlas@gmail.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><div class=3D""><meta =
http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dutf-8" =
class=3D""><div dir=3D"ltr" class=3D"">Carlos,<div class=3D""><br =
class=3D""></div><div class=3D"">As we all know, it is possible to do =
many many things with technology - once we figure out how.</div><div =
class=3D"">Saying that there are approaches other than reorganizing the =
first nibble is fine.&nbsp; Claiming that we'll</div><div class=3D"">be =
anywhere near interoperability or standardization without it being =
clarified does not seem plausible.</div><div class=3D""><br =
class=3D""></div><div class=3D"">For instance, I will note that the =
description of 0 (Explicit NULL) is still defined in RFC3032 as =
implying</div><div class=3D"">the packet underneath is IPv4.&nbsp; I =
really did think that we'd talked in MPLS about fixing this - and =
maybe</div><div class=3D"">Loa or others can give us the reference - but =
that's what the IANA pointer has right now.</div><div class=3D""><br =
class=3D""></div><div class=3D"">I understand the desire to get NSH done =
- deeply! &nbsp;</div><div class=3D""><br class=3D""></div><div =
class=3D"">I also hate late surprises and am trying to clear time to do =
a more thorough review of NSH as well as</div><div class=3D"">requesting =
other focused reviews.</div><div class=3D""><br class=3D""></div><div =
class=3D"">This issue is not new - and the issues I saw in a quick look =
are those that are thoroughly documented</div><div class=3D"">in&nbsp;<a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-encap/" =
style=3D"color:rgb(39,22,115);outline:0px;font-family:'PT =
Serif',Palatino,'Neue =
Swift',serif;font-size:15px;line-height:21.4286px;background-color:rgb(249=
,249,249)" class=3D"">draft-ietf-rtgwg-dt-encap-01</a><span =
style=3D"font-family:'PT Serif',Palatino,'Neue =
Swift',serif;font-size:15px;line-height:21.4286px;background-color:rgb(249=
,249,249)" class=3D"">&nbsp;</span>which considered NSH as one of the =
encapsulations.</div><div class=3D""><br class=3D""></div><div =
class=3D"">It seems clear that there <b =
class=3D"">are</b>&nbsp;transport-specific issues and we need a place =
and a way to capture them.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Regards,</div><div class=3D"">Alia</div></div><div =
class=3D"gmail_extra"><br class=3D""><div class=3D"gmail_quote">On Wed, =
Apr 13, 2016 at 8:53 AM, Carlos Pignataro (cpignata) <span dir=3D"ltr" =
class=3D"">&lt;<a href=3D"mailto:cpignata@cisco.com" target=3D"_blank" =
class=3D"">cpignata@cisco.com</a>&gt;</span> wrote:<br =
class=3D""><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex"><div =
style=3D"word-wrap:break-word" class=3D"">Alia,<div class=3D""><br =
class=3D""></div><div class=3D"">Thanks for looking into this.</div><div =
class=3D""><br class=3D""></div><div class=3D"">It is relevant. I =
believe ECMP-prevention (anti-aliasing with 0x4 and 0x6) is necessary =
for traffic over MPLS expecting in-order delivery.&nbsp;</div><div =
class=3D""><br class=3D""></div><div class=3D"">Transporting NSH over =
MPLS, however, does not necessarily imply transporting NSH *directly* =
following the bottom LSE. There are other ways, as it was done with =
PWs.&nbsp;</div><div class=3D""><br class=3D""></div><div class=3D"">I =
think showing that it is possible to appropriately (i.e., respecting =
BCPs) transport NSH over MPLS is very important. This may or may not =
have implications on the NSH base header. I believe however that such =
actual formal specification (beyond showing its possible) should not =
gate NSH.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Thanks!</div><span class=3D"HOEnZb"><font color=3D"#888888" =
class=3D""><div class=3D""><br class=3D""></div><div class=3D"">=E2=80=94 =
Carlos.</div></font></span><div class=3D""><div class=3D"h5"><div =
class=3D""><br class=3D""></div><div class=3D""><br class=3D""><div =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D"">On Apr =
12, 2016, at 10:29 PM, Alia Atlas &lt;<a href=3D"mailto:akatlas@gmail.com"=
 target=3D"_blank" class=3D"">akatlas@gmail.com</a>&gt; wrote:</div><br =
class=3D""><div class=3D""><div dir=3D"ltr" class=3D"">Xiaohu, Joel, and =
SFC WG group,<div class=3D""><br class=3D""></div><div class=3D"">The =
first nibble question is quite relevant if it is expected that the NSH =
header might be directly under</div><div class=3D"">an MPLS label =
stack.&nbsp; This issue arose rather unpleasantly for pseudo-wires a =
long time ago and the</div><div class=3D"">reasoning for it is much =
better documented, as Carlos pointed out in a different thread, in RFC =
4928 Section 3.</div><div class=3D""><br class=3D""></div><div =
class=3D"">At the time that PWE3 was working on the control word and =
whether it was to be mandatory (RFC 4385), it was clear that</div><div =
class=3D"">there were devices that looked at the first nibble of a =
packet under the MPLS header as a way to determine</div><div class=3D"">if=
 the packet was IPv4 or IPv6 and obtain flow-diversity from it.&nbsp; =
The cost of also verifying the associated checksum</div><div class=3D"">if=
 available wasn't deemed acceptable for several implementations.&nbsp; =
Given that determining as much entropy as</div><div class=3D"">possible =
is still really important and that it is non-trivial to =
negotiate/indicate the capability for including</div><div class=3D"">an =
Entropy Label in the MPLS stack, I have no reason to believe that this =
shortcut of looking at the first nibble</div><div class=3D"">is no =
longer used or deployed. &nbsp; Feel free to contact me off-list if you =
believe this to be the case.</div><div class=3D""><br =
class=3D""></div><div class=3D"">It is clear from the NSH base =
header:</div><div class=3D""><pre style=3D"overflow:auto;font-family:'PT =
Mono',Monaco,monospace;font-size:14px;padding:10px;margin-top:0px;margin-b=
ottom:10.5px;line-height:1.214;word-wrap:break-word;border:1px solid =
rgb(204,204,204);border-top-left-radius:4px;border-top-right-radius:4px;bo=
rder-bottom-right-radius:4px;border-bottom-left-radius:4px;background-colo=
r:rgb(255,253,245)" class=3D"">  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 =
0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol |
     =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</pre></d=
iv><div class=3D"">that this consideration has been completely =
ignored.&nbsp; In fact, an NSH base header might have any =
value</div><div class=3D"">of 0b0000, 0b0001, 0b0010, 0b0010 and if a =
version 01 for NSH were ever defined, suddenly the traffic =
might</div><div class=3D"">be subject to startling reordering if an MPLS =
transport were to be considered.</div><div class=3D""><br =
class=3D""></div><div class=3D"">Given a claim of NSH being =
transport-agnostic and repeated emphasis that MPLS, as well as =
UDP,</div><div class=3D"">is a valid transport for NSH, I do think this =
is a significant oversight and needs, at a minimum, discussion =
and</div><div class=3D"">explanation, and &nbsp;- quite likely - =
&nbsp;correction.</div><div class=3D""><br class=3D""></div><div =
class=3D"">While I am on the topic of details of the NSH encapsulation, =
I would request that Section 8 of draft-ietf-rtgwg-dt-encap-01</div><div =
class=3D"">be read and considered! &nbsp; I am not excited by having =
many different and unique Next Protocol fields defined.</div><div =
class=3D"">For instance, I note the definition of a nearly identical =
Next Protocol field in <a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe" =
target=3D"_blank" =
class=3D"">https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe</a> =
.</div><div class=3D""><br class=3D""></div><div class=3D"">While I am, =
of course, willing to reason to detailed and well-thought out =
explanations for why each and every new</div><div class=3D"">encapsulation=
 needs its very own IANA-defined Next Protocol field, this seems to me =
to be highly likely to require</div><div class=3D"">consolidation so =
that the same Next Protocol field can be used between the various =
encapsulations.</div><div class=3D""><br class=3D""></div><div =
class=3D"">I will work on giving a through review of NSH as soon as =
practical.&nbsp; I do realize that there are multiple =
implementations</div><div class=3D"">and while details of how the "Next =
Protocol" field are documented shouldn't have a significant impact =
there, the</div><div class=3D"">discussion about the first nibble is =
likely to.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Regards,</div><div class=3D"">Alia</div><div class=3D""><br =
class=3D""></div></div><div class=3D"gmail_extra"><br class=3D""><div =
class=3D"gmail_quote">On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <span =
dir=3D"ltr" class=3D"">&lt;<a href=3D"mailto:xuxiaohu@huawei.com" =
target=3D"_blank" class=3D"">xuxiaohu@huawei.com</a>&gt;</span> =
wrote:<br class=3D""><blockquote class=3D"gmail_quote" style=3D"margin:0 =
0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Joel,<br class=3D"">=

<span class=3D""><br class=3D"">
&gt; -----Original Message-----<br class=3D"">
&gt; From: Joel M. Halpern [mailto:<a href=3D"mailto:jmh@joelhalpern.com" =
target=3D"_blank" class=3D"">jmh@joelhalpern.com</a>]<br class=3D"">
&gt; Sent: Wednesday, April 13, 2016 9:45 AM<br class=3D"">
&gt; To: Xuxiaohu; Thomas Narten; <a href=3D"mailto:sfc@ietf.org" =
target=3D"_blank" class=3D"">sfc@ietf.org</a><br class=3D"">
&gt; Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br =
class=3D"">
&gt;<br class=3D"">
&gt; Xu,<br class=3D"">
&gt;&nbsp; &nbsp; &nbsp; &nbsp;I do not believe that there is an MPLS =
specification that requires that all<br class=3D"">
&gt; content other than IP must have a first nibble of 0 or 1.<br =
class=3D"">
<br class=3D"">
</span>When encapsulating NSH over MPLS directly, the first nibble of =
the NSH must not be 4 or 6.<br class=3D"">
<span class=3D""><br class=3D"">
&gt; There are specifications where it is discussed as desirable.<br =
class=3D"">
&gt;<br class=3D"">
&gt; It is in fact pretty trivial for us to change the format so that =
the first three bits are<br class=3D"">
&gt; 0, but it burns several valuable flag bits.&nbsp; It is an SFC =
working group decision,<br class=3D"">
<br class=3D"">
</span>That's the reason why I raised the first nibble question.<br =
class=3D"">
<br class=3D"">
Best regards,<br class=3D"">
Xiaohu<br class=3D"">
<div class=3D""><div class=3D""><br class=3D"">
&gt; not, as far as I can tell, a violation of the MPLS =
specification.<br class=3D"">
&gt;<br class=3D"">
&gt; Yours,<br class=3D"">
&gt; Joel<br class=3D"">
&gt;<br class=3D"">
&gt; On 4/12/16 9:41 PM, Xuxiaohu wrote:<br class=3D"">
&gt; &gt; Hi Thomas,<br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt; It said in the NSH draft:<br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt;&nbsp; &nbsp; "6.&nbsp; Transport Agnostic: NSH is transport =
independent and is carried<br class=3D"">
&gt; &gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;in an overlay, over existing =
underlays.&nbsp; If an existing overlay<br class=3D"">
&gt; &gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;topology provides the =
required service path connectivity, that<br class=3D"">
&gt; &gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;existing overlay may be =
used."<br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt; That means the NSH should be able to be transported over MPLS. =
However,<br class=3D"">
&gt; according to the current NSH format definition, it's not safe to =
carry the NSH<br class=3D"">
&gt; over MPLS due to the first nibble issue. Therefore, I believe this =
issue needs to be<br class=3D"">
&gt; addressed before publication.<br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt; Best regards,<br class=3D"">
&gt; &gt; Xiaohu<br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt;&gt; -----Original Message-----<br class=3D"">
&gt; &gt;&gt; From: sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" =
target=3D"_blank" class=3D"">sfc-bounces@ietf.org</a>] On Behalf Of =
Thomas Narten<br class=3D"">
&gt; &gt;&gt; Sent: Thursday, March 31, 2016 10:48 AM<br class=3D"">
&gt; &gt;&gt; To: <a href=3D"mailto:sfc@ietf.org" target=3D"_blank" =
class=3D"">sfc@ietf.org</a><br class=3D"">
&gt; &gt;&gt; Subject: [sfc] WG last call for =
draft-ietf-sfc-nsh-04.txt<br class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; Dear WG:<br class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; This note begins a WG last call on =
draft-ietf-sfc-nsh-04.txt<br class=3D"">
&gt; &gt;&gt; (<a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/" =
rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/</a>).<br =
class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; The editors of the NSH document have indicated that they =
have<br class=3D"">
&gt; &gt;&gt; addressed all known comments and that there are no open =
issues with<br class=3D"">
&gt; &gt;&gt; the current version of the document.<br class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; Substantive comments to the list please, editorial =
comments can go<br class=3D"">
&gt; &gt;&gt; directly to the document editors.<br class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; We'll also get a brief update from the editors at next =
week's<br class=3D"">
&gt; &gt;&gt; meeting. If there are any remaining issues with the =
document, raising<br class=3D"">
&gt; &gt;&gt; them before the meeting would be especially helpful.<br =
class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; For the chairs,<br class=3D"">
&gt; &gt;&gt; Thomas<br class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; _______________________________________________<br =
class=3D"">
&gt; &gt;&gt; sfc mailing list<br class=3D"">
&gt; &gt;&gt; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank" =
class=3D"">sfc@ietf.org</a><br class=3D"">
&gt; &gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" =
rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt; _______________________________________________<br class=3D"">
&gt; &gt; sfc mailing list<br class=3D"">
&gt; &gt; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank" =
class=3D"">sfc@ietf.org</a><br class=3D"">
&gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" =
rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br class=3D"">
&gt; &gt;<br class=3D"">
<br class=3D"">
_______________________________________________<br class=3D"">
sfc mailing list<br class=3D"">
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank" =
class=3D"">sfc@ietf.org</a><br class=3D"">
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" =
target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br class=3D"">
</div></div></blockquote></div><br class=3D""></div>
_______________________________________________<br class=3D"">sfc =
mailing list<br class=3D""><a href=3D"mailto:sfc@ietf.org" =
target=3D"_blank" class=3D"">sfc@ietf.org</a><br class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br =
class=3D""></div></blockquote></div><br =
class=3D""></div></div></div></div></blockquote></div><br =
class=3D""></div>
_______________________________________________<br class=3D"">sfc =
mailing list<br class=3D""><a href=3D"mailto:sfc@ietf.org" =
class=3D"">sfc@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc<br =
class=3D""></div></blockquote></div><br class=3D""></div></body></html>=

--Apple-Mail=_2CD9084C-CEAC-43EE-A20A-347EE064E485--

--Apple-Mail=_3E5B0227-188E-41CA-BF81-890BB166019D
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=URml
-----END PGP SIGNATURE-----

--Apple-Mail=_3E5B0227-188E-41CA-BF81-890BB166019D--


From nobody Wed Apr 13 07:17:11 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0EE8C12D75C for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 07:17:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ssWgPK-yZSR1 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 07:17:07 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DE40B12D57B for <sfc@ietf.org>; Wed, 13 Apr 2016 07:17:07 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 9C6492E1B58; Wed, 13 Apr 2016 07:17:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1460557027; bh=281NgTcVtI1vwUqDZNh/PDWPhnHINnPAnufrKPYDX6w=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=GIRz69hKQKOz/LShb+1kO4rQF5QtrlAFWN07w7if+W9Umum1dyNuW6/JLucfoSqIW FnV/IrVzMWYl3hBQwDorAXltUDAdj9gGgoWifHd+7SFIODXXPpsN+ByhD8SktRtJs9 rvuyDlV7p730fzKZyR4BGwj+KL4FedPnGjGCqWHc=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 789E01C0162; Wed, 13 Apr 2016 07:17:06 -0700 (PDT)
To: Alia Atlas <akatlas@gmail.com>, Loa Andersson <loa@pi.nu>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <570E4D07.2060405@pi.nu> <CAG4d1rcT1JmnGT-NWkYjd0uQm-kbm5-w7tfnJVs9W07L9Cir1A@mail.gmail.com> <CAG4d1rc=DpsXV3=p9dYX3tom0XLDb_uXJxHbVNennvXf8phoSQ@mail.gmail.com> <CAG4d1rf_KOjjRh9NV40j-SKbxe0Yw82LBPnpVuAoNThm9ZdOjQ@mail.gmail.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <570E54DC.5060408@joelhalpern.com>
Date: Wed, 13 Apr 2016 10:17:00 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <CAG4d1rf_KOjjRh9NV40j-SKbxe0Yw82LBPnpVuAoNThm9ZdOjQ@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/4lysSn9lO9jGguZsk0TcjCd24vo>
Cc: Thomas Narten <narten@us.ibm.com>, "Carlos Pignataro \(cpignata\)" <cpignata@cisco.com>, sfc@ietf.org, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 14:17:10 -0000

Yes, Alia, there are many transports out there being used for service 
chaining.  Most of the folks using these farious transports expect to 
support NSH.  Several of these have been brought forward  as 
Internet-Drafts.  Not all.  Which makes sense as standardizing transport 
behavior for NSH is out of scope for the working group.

It does seem that the WG has to decide if they want to adjust the header 
format to slightly simplify carrying one transport.  The difficulty is 
that the WG is not scoped to evaluate the various ways NSH might be 
carried on MPLS, much less to standardize and pick one.

Yours,
Joel

On 4/13/16 9:55 AM, Alia Atlas wrote:
> Loa,
>
> Thanks!   I knew it was out there.
>
> Regardless,  the first nibble question can't be resolved by adding more
> labels to the stack!    The whole issue is looking at the S bit to guess
> what's under the MPLS label stack.  That's why PWE3 uses code-words.
>
> There needs to be an answer beyond handwaving that something can be
> invented.
>
> Of all the implementations, what transports is NSH carried over?  Do we
> have any diversity?
>
> Regards,
> Alia
>
> On Apr 13, 2016 9:43 AM, "Loa Andersson" <loa@pi.nu <mailto:loa@pi.nu>>
> wrote:
>
>     Alia,
>
>     I think you are referring to RFC 4182, it is more than a decade
>     since it was published.
>
>     /Loa
>
>
>     On 2016-04-13 21:13, Alia Atlas wrote:
>
>         Carlos,
>
>         As we all know, it is possible to do many many things with
>         technology -
>         once we figure out how.
>         Saying that there are approaches other than reorganizing the first
>         nibble is fine.Ã‚  Claiming that we'll
>
>         be anywhere near interoperability or standardization without it
>         being
>         clarified does not seem plausible.
>
>         For instance, I will note that the description of 0 (Explicit
>         NULL) is
>         still defined in RFC3032 as implying
>         the packet underneath is IPv4.Ã‚  I really did think that we'd
>         talked in
>
>         MPLS about fixing this - and maybe
>         Loa or others can give us the reference - but that's what the IANA
>         pointer has right now.
>
>         I understand the desire to get NSH done - deeply! Ã‚
>
>
>         I also hate late surprises and am trying to clear time to do a more
>         thorough review of NSH as well as
>         requesting other focused reviews.
>
>         This issue is not new - and the issues I saw in a quick look are
>         those
>         that are thoroughly documented
>         inÃ‚ draft-ietf-rtgwg-dt-encap-01
>         <https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-encap/>Ã‚ which
>
>         considered NSH as one of the encapsulations.
>
>         It seems clear that there *are*Ã‚ transport-specific issues and
>         we need a
>
>         place and a way to capture them.
>
>         Regards,
>         Alia
>
>         On Wed, Apr 13, 2016 at 8:53 AM, Carlos Pignataro (cpignata)
>         <cpignata@cisco.com <mailto:cpignata@cisco.com>
>         <mailto:cpignata@cisco.com <mailto:cpignata@cisco.com>>> wrote:
>
>              Alia,
>
>              Thanks for looking into this.
>
>              It is relevant. I believe ECMP-prevention (anti-aliasing
>         with 0x4
>              and 0x6) is necessary for traffic over MPLS expecting in-order
>              delivery.Ã‚
>
>
>              Transporting NSH over MPLS, however, does not necessarily imply
>              transporting NSH *directly* following the bottom LSE. There are
>              other ways, as it was done with PWs.Ã‚
>
>
>              I think showing that it is possible to appropriately (i.e.,
>              respecting BCPs) transport NSH over MPLS is very important.
>         This may
>              or may not have implications on the NSH base header. I believe
>              however that such actual formal specification (beyond
>         showing its
>              possible) should not gate NSH.
>
>              Thanks!
>
>              Ã¢â‚¬â€ Carlos.
>
>
>                  On Apr 12, 2016, at 10:29 PM, Alia Atlas
>             <akatlas@gmail.com <mailto:akatlas@gmail.com>
>                  <mailto:akatlas@gmail.com <mailto:akatlas@gmail.com>>>
>             wrote:
>
>                  Xiaohu, Joel, and SFC WG group,
>
>                  The first nibble question is quite relevant if it is
>             expected that
>                  the NSH header might be directly under
>                  an MPLS label stack.Ã‚  This issue arose rather
>             unpleasantly for
>
>                  pseudo-wires a long time ago and the
>                  reasoning for it is much better documented, as Carlos
>             pointed out
>                  in a different thread, in RFC 4928 Section 3.
>
>                  At the time that PWE3 was working on the control word
>             and whether
>                  it was to be mandatory (RFC 4385), it was clear that
>                  there were devices that looked at the first nibble of a
>             packet
>                  under the MPLS header as a way to determine
>                  if the packet was IPv4 or IPv6 and obtain
>             flow-diversity from
>                  it.Ã‚  The cost of also verifying the associated checksum
>
>                  if available wasn't deemed acceptable for several
>                  implementations.Ã‚  Given that determining as much
>             entropy as
>
>                  possible is still really important and that it is
>             non-trivial to
>                  negotiate/indicate the capability for including
>                  an Entropy Label in the MPLS stack, I have no reason to
>             believe
>                  that this shortcut of looking at the first nibble
>                  is no longer used or deployed. Ã‚  Feel free to contact
>             me off-list
>
>                  if you believe this to be the case.
>
>                  It is clear from the NSH base header:
>                     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
>             6 7 8 9 0 1
>
>             +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>                        |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    |
>             Next Protocol |
>
>             +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>                  that this consideration has been completely ignored.Ã‚
>             In fact, an
>
>                  NSH base header might have any value
>                  of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01
>             for NSH were
>                  ever defined, suddenly the traffic might
>                  be subject to startling reordering if an MPLS transport
>             were to be
>                  considered.
>
>                  Given a claim of NSH being transport-agnostic and repeated
>                  emphasis that MPLS, as well as UDP,
>                  is a valid transport for NSH, I do think this is a
>             significant
>                  oversight and needs, at a minimum, discussion and
>                  explanation, and Ã‚ - quite likely - Ã‚ correction.
>
>
>                  While I am on the topic of details of the NSH
>             encapsulation, I
>                  would request that Section 8 of
>             draft-ietf-rtgwg-dt-encap-01
>                  be read and considered! Ã‚  I am not excited by having many
>
>                  different and unique Next Protocol fields defined.
>                  For instance, I note the definition of a nearly
>             identical Next
>                  Protocol field in
>             https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe .
>
>                  While I am, of course, willing to reason to detailed and
>                  well-thought out explanations for why each and every new
>                  encapsulation needs its very own IANA-defined Next
>             Protocol field,
>                  this seems to me to be highly likely to require
>                  consolidation so that the same Next Protocol field can
>             be used
>                  between the various encapsulations.
>
>                  I will work on giving a through review of NSH as soon as
>                  practical.Ã‚  I do realize that there are multiple
>             implementations
>
>                  and while details of how the "Next Protocol" field are
>             documented
>                  shouldn't have a significant impact there, the
>                  discussion about the first nibble is likely to.
>
>                  Regards,
>                  Alia
>
>
>                  On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu
>             <xuxiaohu@huawei.com <mailto:xuxiaohu@huawei.com>
>                  <mailto:xuxiaohu@huawei.com
>             <mailto:xuxiaohu@huawei.com>>> wrote:
>
>                      Joel,
>
>                      > -----Original Message-----
>                      > From: Joel M. Halpern [mailto:jmh@joelhalpern.com
>             <mailto:jmh@joelhalpern.com> <mailto:jmh@joelhalpern.com
>             <mailto:jmh@joelhalpern.com>>]
>                      > Sent: Wednesday, April 13, 2016 9:45 AM
>                      > To: Xuxiaohu; Thomas Narten;sfc@ietf.org
>             <mailto:Narten%3Bsfc@ietf.org> <mailto:sfc@ietf.org
>             <mailto:sfc@ietf.org>>
>                      > Subject: Re: [sfc] WG last call for
>             draft-ietf-sfc-nsh-04.txt
>                      >
>                      > Xu,
>                      >Ã‚  Ã‚  Ã‚  Ã‚ I do not believe that there is an MPLS
>             specification that requires that all
>
>                      > content other than IP must have a first nibble of
>             0 or 1.
>
>                      When encapsulating NSH over MPLS directly, the
>             first nibble of
>                      the NSH must not be 4 or 6.
>
>                      > There are specifications where it is discussed as
>             desirable.
>                      >
>                      > It is in fact pretty trivial for us to change the
>             format so that the first three bits are
>                      > 0, but it burns several valuable flag bits.Ã‚  It
>             is an SFC working group decision,
>
>
>                      That's the reason why I raised the first nibble
>             question.
>
>                      Best regards,
>                      Xiaohu
>
>                      > not, as far as I can tell, a violation of the MPLS
>                      specification.
>                      >
>                      > Yours,
>                      > Joel
>                      >
>                      > On 4/12/16 9:41 PM, Xuxiaohu wrote:
>                      > > Hi Thomas,
>                      > >
>                      > > It said in the NSH draft:
>                      > >
>                      > >Ã‚  Ã‚  "6.Ã‚  Transport Agnostic: NSH is transport
>                      independent and is carried
>                      > >Ã‚  Ã‚  Ã‚  Ã‚  Ã‚ in an overlay, over existing
>             underlays.Ã‚  If
>                      an existing overlay
>                      > >Ã‚  Ã‚  Ã‚  Ã‚  Ã‚ topology provides the required
>             service path
>                      connectivity, that
>                      > >Ã‚  Ã‚  Ã‚  Ã‚  Ã‚ existing overlay may be used."
>
>                      > >
>                      > > That means the NSH should be able to be
>             transported over
>                      MPLS. However,
>                      > according to the current NSH format definition,
>             it's not
>                      safe to carry the NSH
>                      > over MPLS due to the first nibble issue. Therefore, I
>                      believe this issue needs to be
>                      > addressed before publication.
>                      > >
>                      > > Best regards,
>                      > > Xiaohu
>                      > >
>                      > >> -----Original Message-----
>                      > >> From: sfc [mailto:sfc-bounces@ietf.org
>             <mailto:sfc-bounces@ietf.org>
>                      <mailto:sfc-bounces@ietf.org
>             <mailto:sfc-bounces@ietf.org>>] On Behalf Of Thomas Narten
>                      > >> Sent: Thursday, March 31, 2016 10:48 AM
>                      > >> To: sfc@ietf.org <mailto:sfc@ietf.org>
>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>                      > >> Subject: [sfc] WG last call for
>             draft-ietf-sfc-nsh-04.txt
>                      > >>
>                      > >> Dear WG:
>                      > >>
>                      > >> This note begins a WG last call on
>             draft-ietf-sfc-nsh-04.txt
>                      > >>
>             (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>                      > >>
>                      > >> The editors of the NSH document have indicated
>             that they have
>                      > >> addressed all known comments and that there
>             are no open
>                      issues with
>                      > >> the current version of the document.
>                      > >>
>                      > >> Substantive comments to the list please, editorial
>                      comments can go
>                      > >> directly to the document editors.
>                      > >>
>                      > >> We'll also get a brief update from the editors
>             at next week's
>                      > >> meeting. If there are any remaining issues
>             with the
>                      document, raising
>                      > >> them before the meeting would be especially
>             helpful.
>                      > >>
>                      > >> For the chairs,
>                      > >> Thomas
>                      > >>
>                      > >> _______________________________________________
>                      > >> sfc mailing list
>                      > >> sfc@ietf.org <mailto:sfc@ietf.org>
>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>
>                      > >> https://www.ietf.org/mailman/listinfo/sfc
>                      > >
>                      > > _______________________________________________
>                      > > sfc mailing list
>                      > > sfc@ietf.org <mailto:sfc@ietf.org>
>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>
>                      > > https://www.ietf.org/mailman/listinfo/sfc
>                      > >
>
>                      _______________________________________________
>                      sfc mailing list
>             sfc@ietf.org <mailto:sfc@ietf.org> <mailto:sfc@ietf.org
>             <mailto:sfc@ietf.org>>
>
>             https://www.ietf.org/mailman/listinfo/sfc
>
>
>                  _______________________________________________
>                  sfc mailing list
>             sfc@ietf.org <mailto:sfc@ietf.org> <mailto:sfc@ietf.org
>             <mailto:sfc@ietf.org>>
>             https://www.ietf.org/mailman/listinfo/sfc
>
>
>
>
>
>         _______________________________________________
>         sfc mailing list
>         sfc@ietf.org <mailto:sfc@ietf.org>
>         https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Wed Apr 13 07:19:06 2016
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E503612DAA0 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 07:19:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3JaXLXjYeAle for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 07:19:01 -0700 (PDT)
Received: from hub021-ca-3.exch021.serverdata.net (hub021-ca-3.exch021.serverdata.net [64.78.22.170]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA8BE12DA11 for <sfc@ietf.org>; Wed, 13 Apr 2016 07:18:56 -0700 (PDT)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-3.exch021.domain.local ([10.254.4.36]) with mapi id 14.03.0266.001;  Wed, 13 Apr 2016 07:18:56 -0700
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Alia Atlas <akatlas@gmail.com>, Loa Andersson <loa@pi.nu>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRlYw8wi+e/upVyUe9BbAn5+Tt/5+IaIkA//+K9cA=
Date: Wed, 13 Apr 2016 14:18:55 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B6D77F7A9@MBX021-W3-CA-2.exch021.domain.local>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <570E4D07.2060405@pi.nu> <CAG4d1rcT1JmnGT-NWkYjd0uQm-kbm5-w7tfnJVs9W07L9Cir1A@mail.gmail.com> <CAG4d1rc=DpsXV3=p9dYX3tom0XLDb_uXJxHbVNennvXf8phoSQ@mail.gmail.com> <CAG4d1rf_KOjjRh9NV40j-SKbxe0Yw82LBPnpVuAoNThm9ZdOjQ@mail.gmail.com> <570E54DC.5060408@joelhalpern.com>
In-Reply-To: <570E54DC.5060408@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/FvNvz9HuR78Rr6I6KAPQB0tLY0Y>
Cc: Thomas Narten <narten@us.ibm.com>, "Carlos Pignataro \(cpignata\)" <cpignata@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 14:19:05 -0000
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From nobody Wed Apr 13 07:19:31 2016
Return-Path: <asayeed@redhat.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2DAA412D093 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 07:19:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kistrt1RNDKV for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 07:19:08 -0700 (PDT)
Received: from mail-qg0-f44.google.com (mail-qg0-f44.google.com [209.85.192.44]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9F81212DA8E for <sfc@ietf.org>; Wed, 13 Apr 2016 07:18:59 -0700 (PDT)
Received: by mail-qg0-f44.google.com with SMTP id f105so44381066qge.2 for <sfc@ietf.org>; Wed, 13 Apr 2016 07:18:59 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=jNFObeLgMuN6GMGutep20PS+qZMy0QRxNA1KyyqtwHs=; b=C+8Z8YHpDcyZaUwXx5wnInqxBvgb4BfQJi/If+miAshYJVGZx+H7nsuf0MHHMVKssn hQhLHiPQyIpw3xBGhblWMt+PqR6c882wcBYo19eWu18JE/XZ7cB1vqXJcSKUp7GtJJXQ 0IEmLjMQLJjbEBkoMnO/TCiLwGDSKSw1k/9dnNF/wBKPC/oQZSXhVQpmCfXknslZuW5O o5aE5Pq7B4z4P4oX7tNTve5eh8thEKG3qhzhIssFK+qmkXOwV2Rw/mDF1rcEhCzQvAOf IFxY0kRmetSEi8EFxdmGzg+N54Qbx8MLTFMhi2POKpKdxwnjpPXVQFIkzTobV+vk0Qwj 9+0w==
X-Gm-Message-State: AOPr4FXVDeKH+y43jOHNoN+j3iosMjUm7RUI9ndZ+TJ2ouuDMBjS32x7lk4Yz0cPAKn/jSZp
X-Received: by 10.140.178.133 with SMTP id y127mr12156964qhy.100.1460557138683;  Wed, 13 Apr 2016 07:18:58 -0700 (PDT)
Received: from wlan-196-176.bos.redhat.com (nat-pool-bos-t.redhat.com. [66.187.233.206]) by smtp.gmail.com with ESMTPSA id 38sm15946204qgn.6.2016.04.13.07.18.56 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 13 Apr 2016 07:18:57 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_A10A29B4-6816-47F7-8B80-EDA162029576"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Azhar Sayeed <asayeed@redhat.com>
In-Reply-To: <1CC1CA8E-30CD-4DF1-8247-5B962B0125AA@cisco.com>
Date: Wed, 13 Apr 2016 10:18:55 -0400
Message-Id: <EEF9C632-E8B5-4DF3-BA68-4EAFFA441434@redhat.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <1CC1CA8E-30CD-4DF1-8247-5B962B0125AA@cisco.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/QDo81t8ewOkejXtO4aQU0yY-Wcs>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>, Jim Guichard <jguichar@cisco.com>, Alia Atlas <akatlas@gmail.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 14:19:30 -0000

--Apple-Mail=_A10A29B4-6816-47F7-8B80-EDA162029576
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Watching this discussion with amusement=20

How many times have had to patch things later after documents were =
published and rev them..since some one has raised the issue of first =
nibble there are two ways of tackling this

1. Address it in this document for most generic transport types - IPv4, =
IPv6, MPLS and Ethernet -=20
2. Write a separate draft that addresses all transport types and how to =
make it happen for various use cases=20

Because no document by itself completely guarantees interoperability - =
we can take any specification; For example MPLS -TE requires RSVP =
protocol specification to guarantee interoperability and on an on..There =
are always dependencies for a complete implementation and that minimal =
set is necessary for Interop

Thanks
Azhar

> On Apr 13, 2016, at 9:59 AM, Carlos Pignataro (cpignata) =
<cpignata@cisco.com> wrote:
>=20
> Alia,
>=20
> It seems I was not totally clear before. Let me try again.
>=20
> My point is that if there are approaches to transport the SFC =
Encapsulation over MPLS, such as defining a CW-like thing starting with =
0x0 (I=E2=80=99m not talking about Explicit Null) or defining an =
=E2=80=9CExplicit NSH=E2=80=9D Label value, or others, we do not need to =
wait for those specifications to become RFCs before advancing the SFC =
encapsulation. Further, that that=E2=80=99s probably work for MPLS and =
not for SFC (to find the best way to transport NSH over MPLS) =E2=80=94 =
although clearly we take your guidance there :-) Yes, clarifications are =
good. But to exemplify, we cannot say IPv6 does not interop because IPv6 =
over Bluetooth Low-Energy or IPv6 over 802.XYZ.alpha.pi is still being =
defined.
>=20
> Thorough deep reviews as well as focused reviews are good! Thanks. Not =
to go down a tangent, but I had mentioned also that perhaps there was =
not deep SFC representation in the Encap-DT.
>=20
> Thanks,
>=20
> =E2=80=94 Carlos.
>=20
>> On Apr 13, 2016, at 9:13 AM, Alia Atlas <akatlas@gmail.com =
<mailto:akatlas@gmail.com>> wrote:
>>=20
>> Carlos,
>>=20
>> As we all know, it is possible to do many many things with technology =
- once we figure out how.
>> Saying that there are approaches other than reorganizing the first =
nibble is fine.  Claiming that we'll
>> be anywhere near interoperability or standardization without it being =
clarified does not seem plausible.
>>=20
>> For instance, I will note that the description of 0 (Explicit NULL) =
is still defined in RFC3032 as implying
>> the packet underneath is IPv4.  I really did think that we'd talked =
in MPLS about fixing this - and maybe
>> Loa or others can give us the reference - but that's what the IANA =
pointer has right now.
>>=20
>> I understand the desire to get NSH done - deeply! =20
>>=20
>> I also hate late surprises and am trying to clear time to do a more =
thorough review of NSH as well as
>> requesting other focused reviews.
>>=20
>> This issue is not new - and the issues I saw in a quick look are =
those that are thoroughly documented
>> in draft-ietf-rtgwg-dt-encap-01 =
<https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-encap/> which =
considered NSH as one of the encapsulations.
>>=20
>> It seems clear that there are transport-specific issues and we need a =
place and a way to capture them.
>>=20
>> Regards,
>> Alia
>>=20
>> On Wed, Apr 13, 2016 at 8:53 AM, Carlos Pignataro (cpignata) =
<cpignata@cisco.com <mailto:cpignata@cisco.com>> wrote:
>> Alia,
>>=20
>> Thanks for looking into this.
>>=20
>> It is relevant. I believe ECMP-prevention (anti-aliasing with 0x4 and =
0x6) is necessary for traffic over MPLS expecting in-order delivery.=20
>>=20
>> Transporting NSH over MPLS, however, does not necessarily imply =
transporting NSH *directly* following the bottom LSE. There are other =
ways, as it was done with PWs.=20
>>=20
>> I think showing that it is possible to appropriately (i.e., =
respecting BCPs) transport NSH over MPLS is very important. This may or =
may not have implications on the NSH base header. I believe however that =
such actual formal specification (beyond showing its possible) should =
not gate NSH.
>>=20
>> Thanks!
>>=20
>> =E2=80=94 Carlos.
>>=20
>>=20
>>> On Apr 12, 2016, at 10:29 PM, Alia Atlas <akatlas@gmail.com =
<mailto:akatlas@gmail.com>> wrote:
>>>=20
>>> Xiaohu, Joel, and SFC WG group,
>>>=20
>>> The first nibble question is quite relevant if it is expected that =
the NSH header might be directly under
>>> an MPLS label stack.  This issue arose rather unpleasantly for =
pseudo-wires a long time ago and the
>>> reasoning for it is much better documented, as Carlos pointed out in =
a different thread, in RFC 4928 Section 3.
>>>=20
>>> At the time that PWE3 was working on the control word and whether it =
was to be mandatory (RFC 4385), it was clear that
>>> there were devices that looked at the first nibble of a packet under =
the MPLS header as a way to determine
>>> if the packet was IPv4 or IPv6 and obtain flow-diversity from it.  =
The cost of also verifying the associated checksum
>>> if available wasn't deemed acceptable for several implementations.  =
Given that determining as much entropy as
>>> possible is still really important and that it is non-trivial to =
negotiate/indicate the capability for including
>>> an Entropy Label in the MPLS stack, I have no reason to believe that =
this shortcut of looking at the first nibble
>>> is no longer used or deployed.   Feel free to contact me off-list if =
you believe this to be the case.
>>>=20
>>> It is clear from the NSH base header:
>>>   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>      =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>      |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol =
|
>>>      =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>> that this consideration has been completely ignored.  In fact, an =
NSH base header might have any value
>>> of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH were =
ever defined, suddenly the traffic might
>>> be subject to startling reordering if an MPLS transport were to be =
considered.
>>>=20
>>> Given a claim of NSH being transport-agnostic and repeated emphasis =
that MPLS, as well as UDP,
>>> is a valid transport for NSH, I do think this is a significant =
oversight and needs, at a minimum, discussion and
>>> explanation, and  - quite likely -  correction.
>>>=20
>>> While I am on the topic of details of the NSH encapsulation, I would =
request that Section 8 of draft-ietf-rtgwg-dt-encap-01
>>> be read and considered!   I am not excited by having many different =
and unique Next Protocol fields defined.
>>> For instance, I note the definition of a nearly identical Next =
Protocol field in =
https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe =
<https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe> .
>>>=20
>>> While I am, of course, willing to reason to detailed and =
well-thought out explanations for why each and every new
>>> encapsulation needs its very own IANA-defined Next Protocol field, =
this seems to me to be highly likely to require
>>> consolidation so that the same Next Protocol field can be used =
between the various encapsulations.
>>>=20
>>> I will work on giving a through review of NSH as soon as practical.  =
I do realize that there are multiple implementations
>>> and while details of how the "Next Protocol" field are documented =
shouldn't have a significant impact there, the
>>> discussion about the first nibble is likely to.
>>>=20
>>> Regards,
>>> Alia
>>>=20
>>>=20
>>> On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <xuxiaohu@huawei.com =
<mailto:xuxiaohu@huawei.com>> wrote:
>>> Joel,
>>>=20
>>> > -----Original Message-----
>>> > From: Joel M. Halpern [mailto:jmh@joelhalpern.com =
<mailto:jmh@joelhalpern.com>]
>>> > Sent: Wednesday, April 13, 2016 9:45 AM
>>> > To: Xuxiaohu; Thomas Narten; sfc@ietf.org <mailto:sfc@ietf.org>
>>> > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>> >
>>> > Xu,
>>> >       I do not believe that there is an MPLS specification that =
requires that all
>>> > content other than IP must have a first nibble of 0 or 1.
>>>=20
>>> When encapsulating NSH over MPLS directly, the first nibble of the =
NSH must not be 4 or 6.
>>>=20
>>> > There are specifications where it is discussed as desirable.
>>> >
>>> > It is in fact pretty trivial for us to change the format so that =
the first three bits are
>>> > 0, but it burns several valuable flag bits.  It is an SFC working =
group decision,
>>>=20
>>> That's the reason why I raised the first nibble question.
>>>=20
>>> Best regards,
>>> Xiaohu
>>>=20
>>> > not, as far as I can tell, a violation of the MPLS specification.
>>> >
>>> > Yours,
>>> > Joel
>>> >
>>> > On 4/12/16 9:41 PM, Xuxiaohu wrote:
>>> > > Hi Thomas,
>>> > >
>>> > > It said in the NSH draft:
>>> > >
>>> > >    "6.  Transport Agnostic: NSH is transport independent and is =
carried
>>> > >         in an overlay, over existing underlays.  If an existing =
overlay
>>> > >         topology provides the required service path =
connectivity, that
>>> > >         existing overlay may be used."
>>> > >
>>> > > That means the NSH should be able to be transported over MPLS. =
However,
>>> > according to the current NSH format definition, it's not safe to =
carry the NSH
>>> > over MPLS due to the first nibble issue. Therefore, I believe this =
issue needs to be
>>> > addressed before publication.
>>> > >
>>> > > Best regards,
>>> > > Xiaohu
>>> > >
>>> > >> -----Original Message-----
>>> > >> From: sfc [mailto:sfc-bounces@ietf.org =
<mailto:sfc-bounces@ietf.org>] On Behalf Of Thomas Narten
>>> > >> Sent: Thursday, March 31, 2016 10:48 AM
>>> > >> To: sfc@ietf.org <mailto:sfc@ietf.org>
>>> > >> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>> > >>
>>> > >> Dear WG:
>>> > >>
>>> > >> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>> > >> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/ =
<https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/>).
>>> > >>
>>> > >> The editors of the NSH document have indicated that they have
>>> > >> addressed all known comments and that there are no open issues =
with
>>> > >> the current version of the document.
>>> > >>
>>> > >> Substantive comments to the list please, editorial comments can =
go
>>> > >> directly to the document editors.
>>> > >>
>>> > >> We'll also get a brief update from the editors at next week's
>>> > >> meeting. If there are any remaining issues with the document, =
raising
>>> > >> them before the meeting would be especially helpful.
>>> > >>
>>> > >> For the chairs,
>>> > >> Thomas
>>> > >>
>>> > >> _______________________________________________
>>> > >> sfc mailing list
>>> > >> sfc@ietf.org <mailto:sfc@ietf.org>
>>> > >> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>>> > >
>>> > > _______________________________________________
>>> > > sfc mailing list
>>> > > sfc@ietf.org <mailto:sfc@ietf.org>
>>> > > https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>>> > >
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org <mailto:sfc@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org <mailto:sfc@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>>=20
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org <mailto:sfc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


--Apple-Mail=_A10A29B4-6816-47F7-8B80-EDA162029576
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D""><div class=3D"">Watching this discussion with =
amusement&nbsp;</div><div class=3D""><br class=3D""></div><div =
class=3D"">How many times have had to patch things later after documents =
were published and rev them..since some one has raised the issue of =
first nibble there are two ways of tackling this</div><div class=3D""><br =
class=3D""></div><div class=3D"">1. Address it in this document for most =
generic transport types - IPv4, IPv6, MPLS and Ethernet =
-&nbsp;</div><div class=3D"">2. Write a separate draft that addresses =
all transport types and how to make it happen for various use =
cases&nbsp;</div><div class=3D""><br class=3D""></div><div =
class=3D"">Because no document by itself completely guarantees =
interoperability - we can take any specification; For example MPLS -TE =
requires RSVP protocol specification to guarantee interoperability and =
on an on..There are always dependencies for a complete implementation =
and that minimal set is necessary for Interop</div><div class=3D""><br =
class=3D""></div><div class=3D"">Thanks</div><div =
class=3D"">Azhar</div><br class=3D""><div><blockquote type=3D"cite" =
class=3D""><div class=3D"">On Apr 13, 2016, at 9:59 AM, Carlos Pignataro =
(cpignata) &lt;<a href=3D"mailto:cpignata@cisco.com" =
class=3D"">cpignata@cisco.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><meta =
http-equiv=3D"Content-Type" content=3D"text/html charset=3Dutf-8" =
class=3D""><div style=3D"word-wrap: break-word; -webkit-nbsp-mode: =
space; -webkit-line-break: after-white-space;" class=3D"">Alia,<div =
class=3D""><br class=3D""></div><div class=3D"">It seems I was not =
totally clear before. Let me try again.</div><div class=3D""><br =
class=3D""></div><div class=3D"">My point is that if there are =
approaches to transport the SFC Encapsulation over MPLS, such as =
defining a CW-like thing starting with 0x0 (I=E2=80=99m not talking =
about Explicit Null) or defining an =E2=80=9CExplicit NSH=E2=80=9D Label =
value, or others, we do not need to wait for those specifications to =
become RFCs before advancing the SFC encapsulation. Further, that =
that=E2=80=99s probably work for MPLS and not for SFC (to find the best =
way to transport NSH over MPLS) =E2=80=94 although clearly we take your =
guidance there :-) Yes, clarifications are good. But to exemplify, we =
cannot say IPv6 does not interop because IPv6 over Bluetooth Low-Energy =
or IPv6 over 802.XYZ.alpha.pi is still being defined.</div><div =
class=3D""><br class=3D""></div><div class=3D"">Thorough deep reviews as =
well as focused reviews are good! Thanks. Not to go down a tangent, but =
I had mentioned also that perhaps there was not deep SFC representation =
in the Encap-DT.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Thanks,</div><div class=3D""><br class=3D""></div><div =
class=3D"">=E2=80=94 Carlos.</div><div class=3D""><br class=3D""><div =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D"">On Apr =
13, 2016, at 9:13 AM, Alia Atlas &lt;<a href=3D"mailto:akatlas@gmail.com" =
class=3D"">akatlas@gmail.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><meta =
http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dutf-8" =
class=3D""><div dir=3D"ltr" class=3D"">Carlos,<div class=3D""><br =
class=3D""></div><div class=3D"">As we all know, it is possible to do =
many many things with technology - once we figure out how.</div><div =
class=3D"">Saying that there are approaches other than reorganizing the =
first nibble is fine.&nbsp; Claiming that we'll</div><div class=3D"">be =
anywhere near interoperability or standardization without it being =
clarified does not seem plausible.</div><div class=3D""><br =
class=3D""></div><div class=3D"">For instance, I will note that the =
description of 0 (Explicit NULL) is still defined in RFC3032 as =
implying</div><div class=3D"">the packet underneath is IPv4.&nbsp; I =
really did think that we'd talked in MPLS about fixing this - and =
maybe</div><div class=3D"">Loa or others can give us the reference - but =
that's what the IANA pointer has right now.</div><div class=3D""><br =
class=3D""></div><div class=3D"">I understand the desire to get NSH done =
- deeply! &nbsp;</div><div class=3D""><br class=3D""></div><div =
class=3D"">I also hate late surprises and am trying to clear time to do =
a more thorough review of NSH as well as</div><div class=3D"">requesting =
other focused reviews.</div><div class=3D""><br class=3D""></div><div =
class=3D"">This issue is not new - and the issues I saw in a quick look =
are those that are thoroughly documented</div><div class=3D"">in&nbsp;<a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-encap/" =
style=3D"color:rgb(39,22,115);outline:0px;font-family:'PT =
Serif',Palatino,'Neue =
Swift',serif;font-size:15px;line-height:21.4286px;background-color:rgb(249=
,249,249)" class=3D"">draft-ietf-rtgwg-dt-encap-01</a><span =
style=3D"font-family:'PT Serif',Palatino,'Neue =
Swift',serif;font-size:15px;line-height:21.4286px;background-color:rgb(249=
,249,249)" class=3D"">&nbsp;</span>which considered NSH as one of the =
encapsulations.</div><div class=3D""><br class=3D""></div><div =
class=3D"">It seems clear that there <b =
class=3D"">are</b>&nbsp;transport-specific issues and we need a place =
and a way to capture them.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Regards,</div><div class=3D"">Alia</div></div><div =
class=3D"gmail_extra"><br class=3D""><div class=3D"gmail_quote">On Wed, =
Apr 13, 2016 at 8:53 AM, Carlos Pignataro (cpignata) <span dir=3D"ltr" =
class=3D"">&lt;<a href=3D"mailto:cpignata@cisco.com" target=3D"_blank" =
class=3D"">cpignata@cisco.com</a>&gt;</span> wrote:<br =
class=3D""><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex"><div =
style=3D"word-wrap:break-word" class=3D"">Alia,<div class=3D""><br =
class=3D""></div><div class=3D"">Thanks for looking into this.</div><div =
class=3D""><br class=3D""></div><div class=3D"">It is relevant. I =
believe ECMP-prevention (anti-aliasing with 0x4 and 0x6) is necessary =
for traffic over MPLS expecting in-order delivery.&nbsp;</div><div =
class=3D""><br class=3D""></div><div class=3D"">Transporting NSH over =
MPLS, however, does not necessarily imply transporting NSH *directly* =
following the bottom LSE. There are other ways, as it was done with =
PWs.&nbsp;</div><div class=3D""><br class=3D""></div><div class=3D"">I =
think showing that it is possible to appropriately (i.e., respecting =
BCPs) transport NSH over MPLS is very important. This may or may not =
have implications on the NSH base header. I believe however that such =
actual formal specification (beyond showing its possible) should not =
gate NSH.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Thanks!</div><span class=3D"HOEnZb"><font color=3D"#888888" =
class=3D""><div class=3D""><br class=3D""></div><div class=3D"">=E2=80=94 =
Carlos.</div></font></span><div class=3D""><div class=3D"h5"><div =
class=3D""><br class=3D""></div><div class=3D""><br class=3D""><div =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D"">On Apr =
12, 2016, at 10:29 PM, Alia Atlas &lt;<a href=3D"mailto:akatlas@gmail.com"=
 target=3D"_blank" class=3D"">akatlas@gmail.com</a>&gt; wrote:</div><br =
class=3D""><div class=3D""><div dir=3D"ltr" class=3D"">Xiaohu, Joel, and =
SFC WG group,<div class=3D""><br class=3D""></div><div class=3D"">The =
first nibble question is quite relevant if it is expected that the NSH =
header might be directly under</div><div class=3D"">an MPLS label =
stack.&nbsp; This issue arose rather unpleasantly for pseudo-wires a =
long time ago and the</div><div class=3D"">reasoning for it is much =
better documented, as Carlos pointed out in a different thread, in RFC =
4928 Section 3.</div><div class=3D""><br class=3D""></div><div =
class=3D"">At the time that PWE3 was working on the control word and =
whether it was to be mandatory (RFC 4385), it was clear that</div><div =
class=3D"">there were devices that looked at the first nibble of a =
packet under the MPLS header as a way to determine</div><div class=3D"">if=
 the packet was IPv4 or IPv6 and obtain flow-diversity from it.&nbsp; =
The cost of also verifying the associated checksum</div><div class=3D"">if=
 available wasn't deemed acceptable for several implementations.&nbsp; =
Given that determining as much entropy as</div><div class=3D"">possible =
is still really important and that it is non-trivial to =
negotiate/indicate the capability for including</div><div class=3D"">an =
Entropy Label in the MPLS stack, I have no reason to believe that this =
shortcut of looking at the first nibble</div><div class=3D"">is no =
longer used or deployed. &nbsp; Feel free to contact me off-list if you =
believe this to be the case.</div><div class=3D""><br =
class=3D""></div><div class=3D"">It is clear from the NSH base =
header:</div><div class=3D""><pre style=3D"overflow:auto;font-family:'PT =
Mono',Monaco,monospace;font-size:14px;padding:10px;margin-top:0px;margin-b=
ottom:10.5px;line-height:1.214;word-wrap:break-word;border:1px solid =
rgb(204,204,204);border-top-left-radius:4px;border-top-right-radius:4px;bo=
rder-bottom-right-radius:4px;border-bottom-left-radius:4px;background-colo=
r:rgb(255,253,245)" class=3D"">  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 =
0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol |
     =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</pre></d=
iv><div class=3D"">that this consideration has been completely =
ignored.&nbsp; In fact, an NSH base header might have any =
value</div><div class=3D"">of 0b0000, 0b0001, 0b0010, 0b0010 and if a =
version 01 for NSH were ever defined, suddenly the traffic =
might</div><div class=3D"">be subject to startling reordering if an MPLS =
transport were to be considered.</div><div class=3D""><br =
class=3D""></div><div class=3D"">Given a claim of NSH being =
transport-agnostic and repeated emphasis that MPLS, as well as =
UDP,</div><div class=3D"">is a valid transport for NSH, I do think this =
is a significant oversight and needs, at a minimum, discussion =
and</div><div class=3D"">explanation, and &nbsp;- quite likely - =
&nbsp;correction.</div><div class=3D""><br class=3D""></div><div =
class=3D"">While I am on the topic of details of the NSH encapsulation, =
I would request that Section 8 of draft-ietf-rtgwg-dt-encap-01</div><div =
class=3D"">be read and considered! &nbsp; I am not excited by having =
many different and unique Next Protocol fields defined.</div><div =
class=3D"">For instance, I note the definition of a nearly identical =
Next Protocol field in <a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe" =
target=3D"_blank" =
class=3D"">https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe</a> =
.</div><div class=3D""><br class=3D""></div><div class=3D"">While I am, =
of course, willing to reason to detailed and well-thought out =
explanations for why each and every new</div><div class=3D"">encapsulation=
 needs its very own IANA-defined Next Protocol field, this seems to me =
to be highly likely to require</div><div class=3D"">consolidation so =
that the same Next Protocol field can be used between the various =
encapsulations.</div><div class=3D""><br class=3D""></div><div =
class=3D"">I will work on giving a through review of NSH as soon as =
practical.&nbsp; I do realize that there are multiple =
implementations</div><div class=3D"">and while details of how the "Next =
Protocol" field are documented shouldn't have a significant impact =
there, the</div><div class=3D"">discussion about the first nibble is =
likely to.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Regards,</div><div class=3D"">Alia</div><div class=3D""><br =
class=3D""></div></div><div class=3D"gmail_extra"><br class=3D""><div =
class=3D"gmail_quote">On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <span =
dir=3D"ltr" class=3D"">&lt;<a href=3D"mailto:xuxiaohu@huawei.com" =
target=3D"_blank" class=3D"">xuxiaohu@huawei.com</a>&gt;</span> =
wrote:<br class=3D""><blockquote class=3D"gmail_quote" style=3D"margin:0 =
0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Joel,<br class=3D"">=

<span class=3D""><br class=3D"">
&gt; -----Original Message-----<br class=3D"">
&gt; From: Joel M. Halpern [mailto:<a href=3D"mailto:jmh@joelhalpern.com" =
target=3D"_blank" class=3D"">jmh@joelhalpern.com</a>]<br class=3D"">
&gt; Sent: Wednesday, April 13, 2016 9:45 AM<br class=3D"">
&gt; To: Xuxiaohu; Thomas Narten; <a href=3D"mailto:sfc@ietf.org" =
target=3D"_blank" class=3D"">sfc@ietf.org</a><br class=3D"">
&gt; Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br =
class=3D"">
&gt;<br class=3D"">
&gt; Xu,<br class=3D"">
&gt;&nbsp; &nbsp; &nbsp; &nbsp;I do not believe that there is an MPLS =
specification that requires that all<br class=3D"">
&gt; content other than IP must have a first nibble of 0 or 1.<br =
class=3D"">
<br class=3D"">
</span>When encapsulating NSH over MPLS directly, the first nibble of =
the NSH must not be 4 or 6.<br class=3D"">
<span class=3D""><br class=3D"">
&gt; There are specifications where it is discussed as desirable.<br =
class=3D"">
&gt;<br class=3D"">
&gt; It is in fact pretty trivial for us to change the format so that =
the first three bits are<br class=3D"">
&gt; 0, but it burns several valuable flag bits.&nbsp; It is an SFC =
working group decision,<br class=3D"">
<br class=3D"">
</span>That's the reason why I raised the first nibble question.<br =
class=3D"">
<br class=3D"">
Best regards,<br class=3D"">
Xiaohu<br class=3D"">
<div class=3D""><div class=3D""><br class=3D"">
&gt; not, as far as I can tell, a violation of the MPLS =
specification.<br class=3D"">
&gt;<br class=3D"">
&gt; Yours,<br class=3D"">
&gt; Joel<br class=3D"">
&gt;<br class=3D"">
&gt; On 4/12/16 9:41 PM, Xuxiaohu wrote:<br class=3D"">
&gt; &gt; Hi Thomas,<br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt; It said in the NSH draft:<br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt;&nbsp; &nbsp; "6.&nbsp; Transport Agnostic: NSH is transport =
independent and is carried<br class=3D"">
&gt; &gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;in an overlay, over existing =
underlays.&nbsp; If an existing overlay<br class=3D"">
&gt; &gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;topology provides the =
required service path connectivity, that<br class=3D"">
&gt; &gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;existing overlay may be =
used."<br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt; That means the NSH should be able to be transported over MPLS. =
However,<br class=3D"">
&gt; according to the current NSH format definition, it's not safe to =
carry the NSH<br class=3D"">
&gt; over MPLS due to the first nibble issue. Therefore, I believe this =
issue needs to be<br class=3D"">
&gt; addressed before publication.<br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt; Best regards,<br class=3D"">
&gt; &gt; Xiaohu<br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt;&gt; -----Original Message-----<br class=3D"">
&gt; &gt;&gt; From: sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" =
target=3D"_blank" class=3D"">sfc-bounces@ietf.org</a>] On Behalf Of =
Thomas Narten<br class=3D"">
&gt; &gt;&gt; Sent: Thursday, March 31, 2016 10:48 AM<br class=3D"">
&gt; &gt;&gt; To: <a href=3D"mailto:sfc@ietf.org" target=3D"_blank" =
class=3D"">sfc@ietf.org</a><br class=3D"">
&gt; &gt;&gt; Subject: [sfc] WG last call for =
draft-ietf-sfc-nsh-04.txt<br class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; Dear WG:<br class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; This note begins a WG last call on =
draft-ietf-sfc-nsh-04.txt<br class=3D"">
&gt; &gt;&gt; (<a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/" =
rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/</a>).<br =
class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; The editors of the NSH document have indicated that they =
have<br class=3D"">
&gt; &gt;&gt; addressed all known comments and that there are no open =
issues with<br class=3D"">
&gt; &gt;&gt; the current version of the document.<br class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; Substantive comments to the list please, editorial =
comments can go<br class=3D"">
&gt; &gt;&gt; directly to the document editors.<br class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; We'll also get a brief update from the editors at next =
week's<br class=3D"">
&gt; &gt;&gt; meeting. If there are any remaining issues with the =
document, raising<br class=3D"">
&gt; &gt;&gt; them before the meeting would be especially helpful.<br =
class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; For the chairs,<br class=3D"">
&gt; &gt;&gt; Thomas<br class=3D"">
&gt; &gt;&gt;<br class=3D"">
&gt; &gt;&gt; _______________________________________________<br =
class=3D"">
&gt; &gt;&gt; sfc mailing list<br class=3D"">
&gt; &gt;&gt; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank" =
class=3D"">sfc@ietf.org</a><br class=3D"">
&gt; &gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" =
rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br class=3D"">
&gt; &gt;<br class=3D"">
&gt; &gt; _______________________________________________<br class=3D"">
&gt; &gt; sfc mailing list<br class=3D"">
&gt; &gt; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank" =
class=3D"">sfc@ietf.org</a><br class=3D"">
&gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" =
rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br class=3D"">
&gt; &gt;<br class=3D"">
<br class=3D"">
_______________________________________________<br class=3D"">
sfc mailing list<br class=3D"">
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank" =
class=3D"">sfc@ietf.org</a><br class=3D"">
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" =
target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br class=3D"">
</div></div></blockquote></div><br class=3D""></div>
_______________________________________________<br class=3D"">sfc =
mailing list<br class=3D""><a href=3D"mailto:sfc@ietf.org" =
target=3D"_blank" class=3D"">sfc@ietf.org</a><br class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br =
class=3D""></div></blockquote></div><br =
class=3D""></div></div></div></div></blockquote></div><br =
class=3D""></div>
_______________________________________________<br class=3D"">sfc =
mailing list<br class=3D""><a href=3D"mailto:sfc@ietf.org" =
class=3D"">sfc@ietf.org</a><br class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/sfc" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br =
class=3D""></div></blockquote></div><br =
class=3D""></div></div>_______________________________________________<br =
class=3D"">sfc mailing list<br class=3D""><a href=3D"mailto:sfc@ietf.org" =
class=3D"">sfc@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc<br =
class=3D""></div></blockquote></div><br class=3D""></body></html>=

--Apple-Mail=_A10A29B4-6816-47F7-8B80-EDA162029576--


From nobody Wed Apr 13 07:30:44 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B03F12D618 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 07:30:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o4luxqVcp3Ix for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 07:30:36 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 192D012D666 for <sfc@ietf.org>; Wed, 13 Apr 2016 07:30:36 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 8F6201C0346; Wed, 13 Apr 2016 07:30:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1460557835; bh=NeWLZK0ieqzlQIIoG9EJMT5qH7AEsrGMNu67zGY10N8=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=q+K9CcnJhijDPwiMLJb5ueeZaXcmPkQ1cdVFxWUXte5tU4ljfTtT2+dJEjArRejxJ J3fSikDn/qMLncFhOMQ1kno9UwFqPuKfMtbLHmeYWS8XTf9omUuBp3FbpwEKAfZg+o 3clnfnbK4BFHzbojolYsVHFXh4c2Wbnmwfelx0VM=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id B80E51C0162; Wed, 13 Apr 2016 07:30:34 -0700 (PDT)
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, Med Boucadair <mohamed.boucadair@orange.com>
References: <067.78e3cad1267e838836b8aa31364bf52f@tools.ietf.org> <082.7faf2f0b4545924030d740d19fcb524f@tools.ietf.org> <787AE7BB302AE849A7480A190F8B933008D575AF@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <DF1F15A5-533C-4EA4-B520-9097D472969E@cisco.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <570E5805.6000200@joelhalpern.com>
Date: Wed, 13 Apr 2016 10:30:29 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <DF1F15A5-533C-4EA4-B520-9097D472969E@cisco.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/INMFLHoeyUenbure9P7B9iXfIvs>
Cc: "draft-ietf-sfc-nsh@tools.ietf.org" <draft-ietf-sfc-nsh@tools.ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #10 (nsh): O bit
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 14:30:42 -0000

That text works for me.
Yours,
Joel

On 4/13/16 8:18 AM, Carlos Pignataro (cpignata) wrote:
> WG,
>
>> On Apr 13, 2016, at 3:47 AM, mohamed.boucadair@orange.com wrote:
>>
>> Paul,
>>
>> I don't see how citing RFC 7498 (as suggested in your reply below) is related to this issue.
>>
>> Furthermore, I see this reply in the tracker:
>>
>> "Reserving a bit for OAM is acceptable, and done in other protocol specifications. OAM-specific drafts exist and will leverage the presence of the bit. Further, over time new OAM uses may arise, having the explicit ability to support them day-0 is key. The O bit was agreed upon by the WG during adoption, and there is no consensus to remove it. I propose that a reference be added to the OAM framework draft."
>>
>> * I see that you suggest to add a reference to the OAM framework draft, but still there is no such change in the text. I agree with adding draft-ietf-sfc-oam-framework as an informative reference. Thanks.
>> * The text does not say what an implementer needs to. The text "MUST examine the payload and take appropriate action" is vague and underspecified. I suggest to make this change:
>>
>> OLD:
>>
>>    O bit: when set to 0x1 indicates that this packet is an operations
>>    and management (OAM) packet.  The receiving SFF and SFs nodes MUST
>>    examine the payload and take appropriate action (e.g. return status
>>    information).
>>
>>    OAM message specifics and handling details are outside the scope of
>>    this document.
>>
>> NEW:
>>
>>    O bit: when set to 0x1 indicates that this packet is an operations
>>    and management (OAM) packet.  It is out of scope of this document
>>    to define the behaviors of SFFs and SF for processing this bit.
>>    OAM message specifics and handling details are outside the scope of
>>    this document. The reader may refer to [I-D.ietf-sfc-oam-framework]
>>    for an OAM SFC framework.
>>
>>    This bit is set by default to 0x0.
>>
>>    Intermediate SFFs and SFs MUST NOT change the value of this bit when
>>    forwarding the packet to the next hop.
>>
>
> I do not feel there’s a problem with OLD.
>
> However, I can propose a new NEW (since I’ve been looking at the OAM side):
>
> ~~~
>    O bit: Setting this bit indicates an Operations,
>    Administration, and Maintenance
>    (OAM) packet.  The actual format and processing of SFC OAM messages
>    is outside the scope of this specification (see [I-D.ietf-sfc-oam-framework]).
>
>    For data (i.e., not OAM) packets, the O bit MUST be cleared and MUST NOT
>    be modified along the SFP.
> ~~~
>
> This is still probably more restrictive than needed, but would accommodate all the concerns.
>
> What do you think?
>
> Thanks,
>
> — Carlos.
>
>> Thank you.
>>
>> Cheers,
>> Med
>>
>>> -----Message d'origine-----
>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de sfc issue tracker
>>> Envoyé : vendredi 26 février 2016 22:45
>>> À : draft-ietf-sfc-nsh@tools.ietf.org; paulq@cisco.com
>>> Cc : sfc@ietf.org
>>> Objet : Re: [sfc] #10 (nsh): O bit
>>>
>>> #10: O bit
>>>
>>> Changes (by paulq@cisco.com):
>>>
>>> * status:  new => closed
>>> * resolution:   => wontfix
>>>
>>>
>>> Comment:
>>>
>>> Reply: The current version of the draft states:  "A short reference is
>>> included below, RFC 7498 [RFC7498], provides a
>>> more comprehensive review of the SFC Problem Statement."  That seems like
>>> a reasonable approach, and propose marking this item as resolved.
>>>
>>> --
>>> -------------------------------------+------------------------------------
>>> -
>>> Reporter:                           |       Owner:  draft-ietf-sfc-
>>>   mohamed.boucadair@orange.com       |  nsh@tools.ietf.org
>>>      Type:  defect                   |      Status:  closed
>>> Priority:  major                    |   Milestone:
>>> Component:  nsh                      |     Version:
>>> Severity:  -                        |  Resolution:  wontfix
>>> Keywords:                           |
>>> -------------------------------------+------------------------------------
>>> -
>>>
>>> Ticket URL: <https://trac.tools.ietf.org/wg/sfc/trac/ticket/10#comment:1>
>>> sfc <https://tools.ietf.org/sfc/>
>>>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Wed Apr 13 07:49:33 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 77A5112D589 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 07:49:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 42jb0OuePtsn for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 07:49:30 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD4D112B049 for <sfc@ietf.org>; Wed, 13 Apr 2016 07:49:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=36939; q=dns/txt; s=iport; t=1460558969; x=1461768569; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=QT30Hjl2ayuga0q2WsERDgiBGvuQwvQbQd4xxB5Fa9c=; b=D97ah1kh7e0J5Wkzdxdtcqj9eQMfRDXFot4TzoeVjH7mZ1EGqV+JnBco 72nn0nAG3LSf6dOXMVyCe+VldKKZRmK3PL9zR5lRyi7EDvE13rLG4deyS Dm+E5GJDX6vQpmGQyz3lY7IcqMN/kbphMU/5FrH42nufHLJkDGkRnfKjV M=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DFAgBCWw5X/49dJa1egmtMU30GukYOg?= =?us-ascii?q?XAEFwEKhWwCgT84FAEBAQEBAQFlJ4RBAQEBAwEBAQELFUIHAgsFCwIBCA4KIAE?= =?us-ascii?q?GAwICJwsUEQIEDgUOiBIIDrBckkgBAQEBAQEBAQEBAQEBAQEBAQEBAQENBASGI?= =?us-ascii?q?YF1CIFMgQKEDxACAQs/CYJKK4IrBYdyiymEbQGDI4FmbYgWjxCPJgEeAUODZ2w?= =?us-ascii?q?BiDwHOH4BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,479,1454976000";  d="asc'?scan'208,217";a="259123861"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 Apr 2016 14:49:28 +0000
Received: from XCH-RTP-008.cisco.com (xch-rtp-008.cisco.com [64.101.220.148]) by rcdn-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id u3DEnRti032265 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 14:49:27 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-008.cisco.com (64.101.220.148) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 13 Apr 2016 10:49:26 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Wed, 13 Apr 2016 10:49:26 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Med Boucadair <mohamed.boucadair@orange.com>
Thread-Topic: [sfc] #19 (nsh): Mandatory context headers
Thread-Index: AQHRlOwrLWfyyxPo40ad4UCkzMlGz5+HrkyAgABoMID//8D3IIAAUyeA//++n5CAAFdUgA==
Date: Wed, 13 Apr 2016 14:49:26 +0000
Message-ID: <D5B78D05-8CFA-4199-9ACE-AC6F70203E7D@cisco.com>
References: <067.cab2ac7351c39145b242787570b38828@tools.ietf.org> <082.7d97c9f6976fc689f2b380a40263328d@tools.ietf.org> <787AE7BB302AE849A7480A190F8B933008D5747D@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <1C23AFBF-A060-4489-994B-044957A28278@cisco.com> <787AE7BB302AE849A7480A190F8B933008D57988@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <DDAE441E-5C7E-4699-BDCF-8060328FF352@cisco.com> <787AE7BB302AE849A7480A190F8B933008D57AE5@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D57AE5@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.117.115.56]
Content-Type: multipart/signed; boundary="Apple-Mail=_7FE35352-3FEB-403B-A5B9-D8C7DC686B43"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/B5KbdOowEP5WujRoevzYZ5sWZRc>
Cc: "draft-ietf-sfc-nsh@tools.ietf.org" <draft-ietf-sfc-nsh@tools.ietf.org>, "Paul Quinn \(paulq\)" <paulq@cisco.com>, sfc issue tracker <trac+sfc@tools.ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #19 (nsh): Mandatory context headers
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 14:49:32 -0000

--Apple-Mail=_7FE35352-3FEB-403B-A5B9-D8C7DC686B43
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_FE650671-3E1D-4CD5-8E1D-10C34BC6D859"


--Apple-Mail=_FE650671-3E1D-4CD5-8E1D-10C34BC6D859
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Dear Med,

The answer in that email thread seemed to me concrete, specific, and to =
the point =E2=80=94 not =E2=80=9Crhetoric". I will copy/paste it here:

> PQ>  That's a very valid question.  The starting premise was simple: a =
bounded set of fixed metadata.   Based on some experience in the service =
space and some initial use case discussion with operators, 4 provided =
some balance: reasonable in that it provided some meaningful space, yet =
not so large as to become unwieldy, all the while forcing some =
discipline.  Overall that has proven to be true as implementations have =
been tested and mapped to use cases.  Of course you can come up with =
cases where 4 is too many, or too few, in which case the draft provides =
a means to accommodate that.

What I interpret from that paragraph is: 2 32-bit words is too small for =
the use cases, 6 is too big such that it can result in overly-creative =
uses/abuses, 4 is as small as possible but not smaller than needed. =
Further, the use-case documents made good use of 4, without needing =
more. It is an operational as well as technical consideration.

I am not sure how that could be better clarified, but I=E2=80=99ll leave =
it to others. The above paragraph answers directly the question on the =
ticket: =E2=80=9CFor type 1, why are there four mandatory context =
headers, rather than 2, 3, 5, 10, etc.?=E2=80=9D

Best,

=E2=80=94 Carlos.


> On Apr 13, 2016, at 9:38 AM, mohamed.boucadair@orange.com wrote:
>=20
> Re-,
>=20
> No need to send me information that I already know.
>=20
> Still, I don=E2=80=99t see any technical justification to the initial =
concern. We all know that we don=E2=80=99t solve technical issues with =
rhetoric.
>=20
> Cheers,
> Med
>=20
> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com]
> Envoy=C3=A9 : mercredi 13 avril 2016 15:31
> =C3=80 : BOUCADAIR Mohamed IMT/OLN
> Cc : sfc issue tracker; draft-ietf-sfc-nsh@tools.ietf.org; Paul Quinn =
(paulq); sfc@ietf.org
> Objet : Re: [sfc] #19 (nsh): Mandatory context headers
>=20
>=20
> On Apr 13, 2016, at 8:38 AM, mohamed.boucadair@orange.com =
<mailto:mohamed.boucadair@orange.com> wrote:
>=20
> Carlos,
>=20
> I=E2=80=99m seeking to understand the rationale for fixing 4 mandatory =
context headers in the spec. Why not selecting 0, 1, 2, =E2=80=A610?
>=20
> I=E2=80=99m not asking for text, I=E2=80=99d like to understand.
>=20
>=20
> My recollection is that this was already discussed on the list.
>=20
> A quick search results in:
> https://www.ietf.org/mail-archive/web/sfc/current/msg04087.html =
<https://www.ietf.org/mail-archive/web/sfc/current/msg04087.html>
>=20
> Where it seems to me this was answered, and there was no follow-up =
requesting further clarification. Hence, seems like the answer clarified =
the query.
>=20
>=20
> Am I allowed to raise concerns I have with the draft or all is already =
frozen?
>=20
>=20
>=20
> Of course you (anyone) can (should!) raise concerns. It=E2=80=99s not =
a question of being =E2=80=9Callowed=E2=80=9D to.
>=20
> It is also appropriate to follow-up and follow-through with the =
responses to those concerns.
>=20
> Thanks,
>=20
> =E2=80=94 Carlos.
>=20
>=20
> I think the issue is clear enough.
>=20
> Cheers,
> Med
>=20
> De : Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com =
<mailto:cpignata@cisco.com>]
> Envoy=C3=A9 : mercredi 13 avril 2016 14:19
> =C3=80 : BOUCADAIR Mohamed IMT/OLN
> Cc : sfc issue tracker; draft-ietf-sfc-nsh@tools.ietf.org =
<mailto:draft-ietf-sfc-nsh@tools.ietf.org>; Paul Quinn (paulq); =
sfc@ietf.org <mailto:sfc@ietf.org>
> Objet : Re: [sfc] #19 (nsh): Mandatory context headers
>=20
> Med,
>=20
> The Ticket reads:
>  For type 1, why are there four mandatory context headers, rather than =
2, 3, 5, 10, etc.?
> The draft contains no particular justification for this choice.
> Do you find that 2 or 6 is better than 4?
>=20
> What exactly are you objecting to?
>=20
> I do not disagree that adding a sentence that reads =E2=80=9CIt was =
found that using 4 context headers was the best trade-off between foo =
and bar, satisfying baz=E2=80=9D would not hurt. But at the same time, =
it does not seem anything is gained either.
>=20
> Thanks,
>=20
> =E2=80=94 Carlos.
>=20
>=20
> On Apr 13, 2016, at 2:05 AM, mohamed.boucadair@orange.com =
<mailto:mohamed.boucadair@orange.com> wrote:
>=20
> Hi Paul,
>=20
> I object to close this issue.
>=20
> Unless I'm mistaken, the consensus should be declared by the chairs =
otherwise this is biased. I'm not the only one who raised this concern, =
BTW.
>=20
> Cheers,
> Med
>=20
>=20
>=20
> -----Message d'origine-----
> De : sfc [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>] =
De la part de sfc issue tracker
> Envoy=C3=A9 : mardi 12 avril 2016 20:50
> =C3=80 : draft-ietf-sfc-nsh@tools.ietf.org =
<mailto:draft-ietf-sfc-nsh@tools.ietf.org>; paulq@cisco.com =
<mailto:paulq@cisco.com>
> Cc : sfc@ietf.org <mailto:sfc@ietf.org>
> Objet : Re: [sfc] #19 (nsh): Mandatory context headers
>=20
> #19: Mandatory context headers
>=20
> Changes (by paulq@cisco.com <mailto:paulq@cisco.com>):
>=20
> * status:  new =3D> closed
> * resolution:   =3D> wontfix
>=20
>=20
> Comment:
>=20
> This was discussed on list, no consensus for change.  Will leave as =
is.
>=20
> --
> =
-------------------------------------+------------------------------------=

> -
> Reporter:                           |       Owner:  draft-ietf-sfc-
>  mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>    =
   |  nsh@tools.ietf.org <mailto:nsh@tools.ietf.org>
>     Type:  defect                   |      Status:  closed
> Priority:  major                    |   Milestone:
> Component:  nsh                      |     Version:
> Severity:  -                        |  Resolution:  wontfix
> Keywords:                           |
> =
-------------------------------------+------------------------------------=

> -
>=20
> Ticket URL: =
<https://trac.tools.ietf.org/wg/sfc/trac/ticket/19#comment:1 =
<https://trac.tools.ietf.org/wg/sfc/trac/ticket/19#comment:1>>
> sfc <https://tools.ietf.org/sfc/ <https://tools.ietf.org/sfc/>>
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org <mailto:sfc@ietf.org>
> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org <mailto:sfc@ietf.org>
> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>

--Apple-Mail=_FE650671-3E1D-4CD5-8E1D-10C34BC6D859
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">Dear Med,<div class=3D""><br class=3D""></div><div =
class=3D"">The answer in that email thread seemed to me concrete, =
specific, and to the point =E2=80=94 not =E2=80=9Crhetoric". I will =
copy/paste it here:</div><div class=3D""><br class=3D""></div><div =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D"">PQ&gt; =
&nbsp;That's a very valid question. &nbsp;The starting premise was=20
simple: a bounded set of fixed metadata. &nbsp; Based on some experience =
in=20
the service space and some initial use case discussion with operators, 4
 provided some balance: reasonable in that it provided
 some meaningful space, yet not so large as to become unwieldy, all the=20=

while forcing some discipline. &nbsp;Overall that has proven to be true =
as=20
implementations have been tested and mapped to use cases. &nbsp;Of =
course you
 can come up with cases where 4 is too many,
 or too few, in which case the draft provides a means to accommodate=20
that.</div></blockquote><br class=3D""></div><div class=3D"">What I =
interpret from that paragraph is: 2 32-bit words is too small for the =
use cases, 6 is too big such that it can result in overly-creative =
uses/abuses, 4 is as small as possible but not smaller than needed. =
Further, the use-case documents made good use of 4, without needing =
more. It is an operational as well as technical consideration.</div><div =
class=3D""><br class=3D""></div><div class=3D"">I am not sure how that =
could be better clarified, but I=E2=80=99ll leave it to others. The =
above paragraph answers directly the question on the ticket: =E2=80=9CFor =
type 1, why are there four mandatory context headers, rather than 2, 3, =
5, 10, etc.?=E2=80=9D</div><div class=3D""><br class=3D""></div><div =
class=3D"">Best,</div><div class=3D""><br class=3D""></div><div =
class=3D"">=E2=80=94 Carlos.</div><div class=3D""><br =
class=3D""></div><div class=3D""><br class=3D""><div><blockquote =
type=3D"cite" class=3D""><div class=3D"">On Apr 13, 2016, at 9:38 AM, <a =
href=3D"mailto:mohamed.boucadair@orange.com" =
class=3D"">mohamed.boucadair@orange.com</a> wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: =
0px;"><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D""><span =
style=3D"font-size: 10pt; font-family: 'Courier New';" class=3D"">Re-,<o:p=
 class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D""><span =
style=3D"font-size: 10pt; font-family: 'Courier New';" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; font-family: =
'Courier New';" class=3D"">No need to send me information that I already =
know.<o:p class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; font-family: =
'Courier New';" class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
10pt; font-family: 'Courier New';" class=3D"">Still, I don=E2=80=99t see =
any technical justification to the initial concern. We all know that we =
don=E2=80=99t solve technical issues with rhetoric.<o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 10pt; font-family: 'Courier New';" =
class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; =
font-family: 'Courier New';" class=3D"">Cheers,<o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 10pt; font-family: 'Courier New';" =
class=3D"">Med<o:p class=3D""></o:p></span></div><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; =
font-family: 'Courier New';" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"border-style: none =
none none solid; border-left-color: blue; border-left-width: 1.5pt; =
padding: 0cm 0cm 0cm 4pt;" class=3D""><div class=3D""><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0cm 0cm;" class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><b class=3D""><span style=3D"font-size: =
10pt; font-family: Tahoma, sans-serif;" =
class=3D"">De&nbsp;:</span></b><span style=3D"font-size: 10pt; =
font-family: Tahoma, sans-serif;" class=3D""><span =
class=3D"Apple-converted-space">&nbsp;</span>Carlos Pignataro (cpignata) =
[<a href=3D"mailto:cpignata@cisco.com" =
class=3D"">mailto:cpignata@cisco.com</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><br class=3D""><b =
class=3D"">Envoy=C3=A9&nbsp;:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>mercredi 13 avril 2016 =
15:31<br class=3D""><b class=3D"">=C3=80&nbsp;:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>BOUCADAIR Mohamed =
IMT/OLN<br class=3D""><b class=3D"">Cc&nbsp;:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>sfc issue tracker; <a =
href=3D"mailto:draft-ietf-sfc-nsh@tools.ietf.org" =
class=3D"">draft-ietf-sfc-nsh@tools.ietf.org</a>; Paul Quinn (paulq); <a =
href=3D"mailto:sfc@ietf.org" class=3D"">sfc@ietf.org</a><br class=3D""><b =
class=3D"">Objet&nbsp;:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [sfc] #19 (nsh): =
Mandatory context headers<o:p =
class=3D""></o:p></span></div></div></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div><div class=3D""><blockquote =
style=3D"margin-top: 5pt; margin-bottom: 5pt;" class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D"">On Apr 13, 2016, at =
8:38 AM,<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:mohamed.boucadair@orange.com" style=3D"color: purple; =
text-decoration: underline;" =
class=3D"">mohamed.boucadair@orange.com</a><span =
class=3D"Apple-converted-space">&nbsp;</span>wrote:<o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
10pt; font-family: 'Courier New';" class=3D"">Carlos,</span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; font-family: =
'Courier New';" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; font-family: =
'Courier New';" class=3D"">I=E2=80=99m seeking to understand the =
rationale for fixing 4 mandatory context headers in the spec. Why not =
selecting 0, 1, 2, =E2=80=A610?</span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; font-family: =
'Courier New';" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; font-family: =
'Courier New';" class=3D"">I=E2=80=99m not asking for text, I=E2=80=99d =
like to understand.</span><o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D""><span lang=3D"EN-US" =
style=3D"font-size: 10pt; font-family: 'Courier New';" =
class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div></div></blockquote><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D"">My recollection is that this was already discussed on =
the list.<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D"">A quick search results in:<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><a =
href=3D"https://www.ietf.org/mail-archive/web/sfc/current/msg04087.html" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://www.ietf.org/mail-archive/web/sfc/current/msg04087.html=
</a><o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D"">Where it seems to me this was answered, and there was =
no follow-up requesting further clarification. Hence, seems like the =
answer clarified the query.<o:p class=3D""></o:p></div></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><br class=3D""><br class=3D""><o:p =
class=3D""></o:p></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
10pt; font-family: 'Courier New';" class=3D"">Am I allowed to raise =
concerns I have with the draft or all is already frozen?</span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; font-family: =
'Courier New';" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D"">Of course you (anyone) can (should!) raise concerns. =
It=E2=80=99s not a question of being =E2=80=9Callowed=E2=80=9D =
to.&nbsp;<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D"">It is also appropriate to follow-up and =
follow-through with the responses to those concerns.<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">Thanks,<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">=E2=80=94 Carlos.<o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D""><br =
class=3D""><br class=3D""><o:p class=3D""></o:p></div><div class=3D""><div=
 class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D""><span lang=3D"EN-US" =
style=3D"font-size: 10pt; font-family: 'Courier New';" class=3D"">I =
think the issue is clear enough.</span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; font-family: =
'Courier New';" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; font-family: =
'Courier New';" class=3D"">Cheers,</span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; font-family: =
'Courier New';" class=3D"">Med</span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10pt; font-family: =
'Courier New';" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div><div style=3D"border-style: none none none =
solid; border-left-color: blue; border-left-width: 1.5pt; padding: 0cm =
0cm 0cm 4pt;" class=3D""><div class=3D""><div style=3D"border-style: =
solid none none; border-top-color: rgb(181, 196, 223); border-top-width: =
1pt; padding: 3pt 0cm 0cm;" class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><b class=3D""><span style=3D"font-size: =
10pt; font-family: Tahoma, sans-serif;" =
class=3D"">De&nbsp;:</span></b><span class=3D"apple-converted-space"><span=
 style=3D"font-size: 10pt; font-family: Tahoma, sans-serif;" =
class=3D"">&nbsp;</span></span><span style=3D"font-size: 10pt; =
font-family: Tahoma, sans-serif;" class=3D"">Carlos Pignataro (cpignata) =
[<a href=3D"mailto:cpignata@cisco.com" style=3D"color: purple; =
text-decoration: underline;" =
class=3D"">mailto:cpignata@cisco.com</a>]<span =
class=3D"apple-converted-space">&nbsp;</span><br class=3D""><b =
class=3D"">Envoy=C3=A9&nbsp;:</b><span =
class=3D"apple-converted-space">&nbsp;</span>mercredi 13 avril 2016 =
14:19<br class=3D""><b class=3D"">=C3=80&nbsp;:</b><span =
class=3D"apple-converted-space">&nbsp;</span>BOUCADAIR Mohamed =
IMT/OLN<br class=3D""><b class=3D"">Cc&nbsp;:</b><span =
class=3D"apple-converted-space">&nbsp;</span>sfc issue tracker;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:draft-ietf-sfc-nsh@tools.ietf.org" style=3D"color: =
purple; text-decoration: underline;" =
class=3D"">draft-ietf-sfc-nsh@tools.ietf.org</a>; Paul Quinn =
(paulq);<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:sfc@ietf.org" style=3D"color: purple; text-decoration: =
underline;" class=3D"">sfc@ietf.org</a><br class=3D""><b =
class=3D"">Objet&nbsp;:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Re: [sfc] #19 (nsh): =
Mandatory context headers</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D"">Med,<o:p class=3D""></o:p></div></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">The Ticket reads:<o:p =
class=3D""></o:p></div></div></div><div class=3D""><blockquote =
style=3D"margin-top: 5pt; margin-bottom: 5pt;" class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D"">&nbsp;For type 1, why =
are there four mandatory context headers, rather than 2, 3, 5, 10, =
etc.?<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">The draft contains no particular =
justification for this choice.<o:p =
class=3D""></o:p></div></div></blockquote></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D"">Do you find that 2 or =
6 is better than 4?<o:p class=3D""></o:p></div></div></div><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D"">&nbsp;<o:p class=3D""></o:p></div></div></div><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D"">What =
exactly are you objecting to?<o:p class=3D""></o:p></div></div></div><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D"">&nbsp;<o:p class=3D""></o:p></div></div></div><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D"">I do =
not disagree that adding a sentence that reads =E2=80=9CIt was found =
that using 4 context headers was the best trade-off between foo and bar, =
satisfying baz=E2=80=9D would not hurt. But at the same time, it does =
not seem anything is gained either.<o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">Thanks,<o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">=E2=80=94 Carlos.<o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div><div class=3D""><blockquote =
style=3D"margin-top: 5pt; margin-bottom: 5pt;" class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D"">On =
Apr 13, 2016, at 2:05 AM,<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:mohamed.boucadair@orange.com" style=3D"color: purple; =
text-decoration: underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">mohamed.boucadair@orange.com</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>wrote:<o:p =
class=3D""></o:p></div></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D"">&nbsp;<o:p class=3D""></o:p></div></div><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D"">Hi Paul,<br class=3D""><br class=3D"">I object to close this =
issue.<br class=3D""><br class=3D"">Unless I'm mistaken, the consensus =
should be declared by the chairs otherwise this is biased. I'm not the =
only one who raised this concern, BTW.<br class=3D""><br =
class=3D"">Cheers,<br class=3D"">Med<br class=3D""><br class=3D""><br =
class=3D""><br class=3D""><o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D"">-----Message =
d'origine-----<br class=3D"">De&nbsp;: sfc [<a =
href=3D"mailto:sfc-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">mailto:sfc-bounces@ietf.org</span></a>] De la part de sfc =
issue tracker<br class=3D"">Envoy=C3=A9&nbsp;: mardi 12 avril 2016 =
20:50<br class=3D"">=C3=80&nbsp;:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:draft-ietf-sfc-nsh@tools.ietf.org" style=3D"color: =
purple; text-decoration: underline;" class=3D""><span style=3D"color: =
purple;" class=3D"">draft-ietf-sfc-nsh@tools.ietf.org</span></a>;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:paulq@cisco.com" style=3D"color: purple; text-decoration: =
underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">paulq@cisco.com</span></a><br class=3D"">Cc&nbsp;:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:sfc@ietf.org" style=3D"color: purple; text-decoration: =
underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">sfc@ietf.org</span></a><br class=3D"">Objet&nbsp;: Re: [sfc] =
#19 (nsh): Mandatory context headers<br class=3D""><br class=3D"">#19: =
Mandatory context headers<br class=3D""><br class=3D"">Changes (by<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:paulq@cisco.com" style=3D"color: purple; text-decoration: =
underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">paulq@cisco.com</span></a>):<br class=3D""><br class=3D"">* =
status: &nbsp;new =3D&gt; closed<br class=3D"">* resolution: =
&nbsp;&nbsp;=3D&gt; wontfix<br class=3D""><br class=3D""><br =
class=3D"">Comment:<br class=3D""><br class=3D"">This was discussed on =
list, no consensus for change. &nbsp;Will leave as is.<br class=3D""><br =
class=3D"">--<br =
class=3D"">-------------------------------------+-------------------------=
-----------<br class=3D"">-<br class=3D"">Reporter: =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;| &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Owner: =
&nbsp;draft-ietf-sfc-<br class=3D"">&nbsp;<a =
href=3D"mailto:mohamed.boucadair@orange.com" style=3D"color: purple; =
text-decoration: underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">mohamed.boucadair@orange.com</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;| &nbsp;<a href=3D"mailto:nsh@tools.ietf.org" style=3D"color: =
purple; text-decoration: underline;" class=3D""><span style=3D"color: =
purple;" class=3D"">nsh@tools.ietf.org</span></a><br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;Type: &nbsp;defect =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;| =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Status: &nbsp;closed<br class=3D"">Priority:=
 &nbsp;major =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;| &nbsp;&nbsp;Milestone:<br =
class=3D"">Component: &nbsp;nsh =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;| =
&nbsp;&nbsp;&nbsp;&nbsp;Version:<br class=3D"">Severity: &nbsp;- =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;| =
&nbsp;Resolution: &nbsp;wontfix<br class=3D"">Keywords: =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;|<br =
class=3D"">-------------------------------------+-------------------------=
-----------<br class=3D"">-<br class=3D""><br class=3D"">Ticket URL: =
&lt;<a =
href=3D"https://trac.tools.ietf.org/wg/sfc/trac/ticket/19#comment:1" =
style=3D"color: purple; text-decoration: underline;" class=3D""><span =
style=3D"color: purple;" =
class=3D"">https://trac.tools.ietf.org/wg/sfc/trac/ticket/19#comment:1</sp=
an></a>&gt;<br class=3D"">sfc &lt;<a href=3D"https://tools.ietf.org/sfc/" =
style=3D"color: purple; text-decoration: underline;" class=3D""><span =
style=3D"color: purple;" =
class=3D"">https://tools.ietf.org/sfc/</span></a>&gt;<br class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">sfc mailing list<br class=3D""><a href=3D"mailto:sfc@ietf.org" =
style=3D"color: purple; text-decoration: underline;" class=3D""><span =
style=3D"color: purple;" class=3D"">sfc@ietf.org</span></a><br =
class=3D""><a href=3D"https://www.ietf.org/mailman/listinfo/sfc" =
style=3D"color: purple; text-decoration: underline;" class=3D""><span =
style=3D"color: purple;" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</span></a><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">sfc mailing list<br class=3D""><a href=3D"mailto:sfc@ietf.org" =
style=3D"color: purple; text-decoration: underline;" class=3D""><span =
style=3D"color: purple;" class=3D"">sfc@ietf.org</span></a><br =
class=3D""><a href=3D"https://www.ietf.org/mailman/listinfo/sfc" =
style=3D"color: purple; text-decoration: underline;" class=3D""><span =
style=3D"color: purple;" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</span></a></div></div=
></div></div></blockquote></div></div></div></div></div></div></div></div>=
</blockquote></div><br class=3D""></div></body></html>=

--Apple-Mail=_FE650671-3E1D-4CD5-8E1D-10C34BC6D859--

--Apple-Mail=_7FE35352-3FEB-403B-A5B9-D8C7DC686B43
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=fjN0
-----END PGP SIGNATURE-----

--Apple-Mail=_7FE35352-3FEB-403B-A5B9-D8C7DC686B43--


From nobody Wed Apr 13 10:34:14 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7030C12D164 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 10:34:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.895
X-Spam-Level: 
X-Spam-Status: No, score=-2.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k4gBk-BhUDQg for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 10:34:08 -0700 (PDT)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id 8ECF212D12E for <sfc@ietf.org>; Wed, 13 Apr 2016 10:34:06 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Wed, 13 Apr 2016 13:34:05 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: Alia Atlas <akatlas@gmail.com>, Loa Andersson <loa@pi.nu>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfOeSAX3MU5GUyUYGxYNRxnVJ+HeFQAgAAA4wCAAAKVgIAACdAAgACudwCAAAWNAIAACHGA///Ae+mAADtKgA==
Date: Wed, 13 Apr 2016 17:34:04 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F1E1EC@wtl-exchp-2.sandvine.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <570E4D07.2060405@pi.nu> <CAG4d1rcT1JmnGT-NWkYjd0uQm-kbm5-w7tfnJVs9W07L9Cir1A@mail.gmail.com> <CAG4d1rc=DpsXV3=p9dYX3tom0XLDb_uXJxHbVNennvXf8phoSQ@mail.gmail.com> <CAG4d1rf_KOjjRh9NV40j-SKbxe0Yw82LBPnpVuAoNThm9ZdOjQ@mail.gmail.com>
In-Reply-To: <CAG4d1rf_KOjjRh9NV40j-SKbxe0Yw82LBPnpVuAoNThm9ZdOjQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830F1E1ECwtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/K3aUUzv8-0ccv0Jv8JFp6H97xLA>
Cc: Thomas Narten <narten@us.ibm.com>, "Carlos Pignataro \(cpignata\)" <cpignata@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 17:34:12 -0000

--_000_E8355113905631478EFF04F5AA706E9830F1E1ECwtlexchp2sandvi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_E8355113905631478EFF04F5AA706E9830F1E1ECwtlexchp2sandvi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_E8355113905631478EFF04F5AA706E9830F1E1ECwtlexchp2sandvi_--


From nobody Wed Apr 13 11:12:21 2016
Return-Path: <akatlas@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 04ED612DF1A for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 11:12:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.699
X-Spam-Level: 
X-Spam-Status: No, score=-102.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IklBME1eDqDM for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 11:12:16 -0700 (PDT)
Received: from mail-ob0-x235.google.com (mail-ob0-x235.google.com [IPv6:2607:f8b0:4003:c01::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 52D9B12DE7A for <sfc@ietf.org>; Wed, 13 Apr 2016 11:12:16 -0700 (PDT)
Received: by mail-ob0-x235.google.com with SMTP id tz8so37994396obc.0 for <sfc@ietf.org>; Wed, 13 Apr 2016 11:12:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc; bh=hHnqea0efy972EWh+cIdiI2kLZ/TF8XpW49OiKpAlfA=; b=CJJl0PSRq6IA6iIiCXA8mX+lvNQdFV6XscW/iLg3d17r06eWA/ZeofXP5Is0EAupxY j2oELAMF/D6LetFTSW870kEPZtC5cqV8fxgpYFAzXPM9hz034Yxnr/qCH6bysrKk82yN cSR5LvV1ocCU+T6WTxx9Q2bEyFIidlaS0jCyluvN89zfKwiHHjQhnj6vBt42KnuSC3oI z4/dBX7YCM1xOOXjrbZPhGCwZsUJ7ryxn8isud9DqbBkr1bXyCx9Isd3K7UNfOAyfJTz by/a1wIY6k6uR6cAw8h0LUC46gV9DDr9YukWYlivo4uo7wT1f2c1z+vwMFbCUdUXf8t7 by5Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc; bh=hHnqea0efy972EWh+cIdiI2kLZ/TF8XpW49OiKpAlfA=; b=EqMDmHFshxGH6+BCg8zRBcgRdC2LJDHio6UIWpz2CodwjKFCkQjS/Kcjy2GoreGzf2 QVLz/++/JEd0ySq5cXVBNg/WbdSscXj09DBVgejV0ePw5Xf/WpB3/3NAHAIzmZi7qUqi jprCCkMbGvlLvGWOq4EdDlUjmLRfy8NaF4XVgux8bfFDTdtoRcE00srtC4zyNQg65RrD ggmfXBYM717CwuE09h0JJecngpTPlblXurec3i0k8dwPa7UQe6KDW2JphdMUjJD457oJ H144xjIr0md/IBb3EtcyAAixxo+KvHpjRO3gxeJVxhr3qq9uMu2ZcZ2wyJstMHZZHrb5 NBRQ==
X-Gm-Message-State: AOPr4FU3q2X6ZVYCx7+Bgqub7/YMobGByZPrp/LQ4T6hWhs7WrqWTRPADjHwdWtG5ytL+Od6co+BnFJVZpD3cw==
MIME-Version: 1.0
X-Received: by 10.182.38.233 with SMTP id j9mr5171657obk.57.1460571135668; Wed, 13 Apr 2016 11:12:15 -0700 (PDT)
Received: by 10.60.115.168 with HTTP; Wed, 13 Apr 2016 11:12:15 -0700 (PDT)
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F1E1EC@wtl-exchp-2.sandvine.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <570E4D07.2060405@pi.nu> <CAG4d1rcT1JmnGT-NWkYjd0uQm-kbm5-w7tfnJVs9W07L9Cir1A@mail.gmail.com> <CAG4d1rc=DpsXV3=p9dYX3tom0XLDb_uXJxHbVNennvXf8phoSQ@mail.gmail.com> <CAG4d1rf_KOjjRh9NV40j-SKbxe0Yw82LBPnpVuAoNThm9ZdOjQ@mail.gmail.com> <E8355113905631478EFF04F5AA706E9830F1E1EC@wtl-exchp-2.sandvine.com>
Date: Wed, 13 Apr 2016 14:12:15 -0400
Message-ID: <CAG4d1rdpRWqt7tnafTZMFKQ7TwtLg_p=7SzOX0V2YNidrdFwcA@mail.gmail.com>
From: Alia Atlas <akatlas@gmail.com>
To: Dave Dolson <ddolson@sandvine.com>
Content-Type: multipart/alternative; boundary=001a11c33936b5ffec053061b73f
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/dMdg2572jT56GMSfFenIizqaYPM>
Cc: Thomas Narten <narten@us.ibm.com>, "Carlos Pignataro \(cpignata\)" <cpignata@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 18:12:20 -0000

--001a11c33936b5ffec053061b73f
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Dave,

On Wed, Apr 13, 2016 at 1:34 PM, Dave Dolson <ddolson@sandvine.com> wrote:

> I=E2=80=99m going to show my ignorance and ask how Ethernet is carried ov=
er MPLS?
> The first nybble is part of the Destination MAC address.
>
> OUIs have been allocated beginning with 4 and also with 6.
>
>

Thanks for asking and don't be sorry for not having to live through the fun
and joy of standardizing pseudo-wires.   The very very short form is that
there is a 32-bit code-word defined that sits above the Ethernet frame and
right below the MPLS stack.  This is to deal with implementations that look
beneath the MPLS stack to hunt down more fields to hash to get good entropy
for ECMP or LAG.

As I recall, when I looked a long long (er, let's not get into how long)
time ago, the likeliness of actual collision with allocated OUIs was quite
small.

Alia


>
>
>
>
>
>
> *From:* sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of *Alia Atlas
> *Sent:* Wednesday, April 13, 2016 9:56 AM
> *To:* Loa Andersson
> *Cc:* Thomas Narten; Carlos Pignataro (cpignata); sfc@ietf.org; Jim
> Guichard (jguichar); Martin Stiemerling; Xuxiaohu; Joel M. Halpern
>
> *Subject:* Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
>
>
> Loa,
>
> Thanks!   I knew it was out there.
>
> Regardless,  the first nibble question can't be resolved by adding more
> labels to the stack!    The whole issue is looking at the S bit to guess
> what's under the MPLS label stack.  That's why PWE3 uses code-words.
>
> There needs to be an answer beyond handwaving that something can be
> invented.
>
> Of all the implementations, what transports is NSH carried over?  Do we
> have any diversity?
>
> Regards,
> Alia
>
> On Apr 13, 2016 9:43 AM, "Loa Andersson" <loa@pi.nu> wrote:
>
> Alia,
>
> I think you are referring to RFC 4182, it is more than a decade
> since it was published.
>
> /Loa
>
>
>
> On 2016-04-13 21:13, Alia Atlas wrote:
>
> Carlos,
>
> As we all know, it is possible to do many many things with technology -
> once we figure out how.
> Saying that there are approaches other than reorganizing the first
>
> nibble is fine.=C3=82  Claiming that we'll
>
>
> be anywhere near interoperability or standardization without it being
> clarified does not seem plausible.
>
> For instance, I will note that the description of 0 (Explicit NULL) is
> still defined in RFC3032 as implying
>
> the packet underneath is IPv4.=C3=82  I really did think that we'd talked=
 in
>
>
> MPLS about fixing this - and maybe
> Loa or others can give us the reference - but that's what the IANA
> pointer has right now.
>
> I understand the desire to get NSH done - deeply! =C3=82
>
>
>
> I also hate late surprises and am trying to clear time to do a more
> thorough review of NSH as well as
> requesting other focused reviews.
>
> This issue is not new - and the issues I saw in a quick look are those
> that are thoroughly documented
>
> in=C3=82 draft-ietf-rtgwg-dt-encap-01
> <https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-encap/>=C3=82 which
>
>
> considered NSH as one of the encapsulations.
>
> It seems clear that there *are*=C3=82 transport-specific issues and we ne=
ed a
>
>
> place and a way to capture them.
>
> Regards,
> Alia
>
> On Wed, Apr 13, 2016 at 8:53 AM, Carlos Pignataro (cpignata)
>
> <cpignata@cisco.com <mailto:cpignata@cisco.com>> wrote:
>
>     Alia,
>
>     Thanks for looking into this.
>
>     It is relevant. I believe ECMP-prevention (anti-aliasing with 0x4
>     and 0x6) is necessary for traffic over MPLS expecting in-order
>
>     delivery.=C3=82
>
>
>
>     Transporting NSH over MPLS, however, does not necessarily imply
>     transporting NSH *directly* following the bottom LSE. There are
>
>     other ways, as it was done with PWs.=C3=82
>
>
>
>     I think showing that it is possible to appropriately (i.e.,
>     respecting BCPs) transport NSH over MPLS is very important. This may
>     or may not have implications on the NSH base header. I believe
>     however that such actual formal specification (beyond showing its
>     possible) should not gate NSH.
>
>     Thanks!
>
>     =C3=A2=E2=82=AC=E2=80=9D Carlos.
>
>     On Apr 12, 2016, at 10:29 PM, Alia Atlas <akatlas@gmail.com
>
>     <mailto:akatlas@gmail.com>> wrote:
>
>     Xiaohu, Joel, and SFC WG group,
>
>     The first nibble question is quite relevant if it is expected that
>     the NSH header might be directly under
>
>     an MPLS label stack.=C3=82  This issue arose rather unpleasantly for
>
>
>     pseudo-wires a long time ago and the
>     reasoning for it is much better documented, as Carlos pointed out
>     in a different thread, in RFC 4928 Section 3.
>
>     At the time that PWE3 was working on the control word and whether
>     it was to be mandatory (RFC 4385), it was clear that
>     there were devices that looked at the first nibble of a packet
>     under the MPLS header as a way to determine
>     if the packet was IPv4 or IPv6 and obtain flow-diversity from
>
>     it.=C3=82  The cost of also verifying the associated checksum
>
>
>     if available wasn't deemed acceptable for several
>
>     implementations.=C3=82  Given that determining as much entropy as
>
>
>     possible is still really important and that it is non-trivial to
>     negotiate/indicate the capability for including
>     an Entropy Label in the MPLS stack, I have no reason to believe
>     that this shortcut of looking at the first nibble
>
>     is no longer used or deployed. =C3=82  Feel free to contact me off-li=
st
>
>
>     if you believe this to be the case.
>
>     It is clear from the NSH base header:
>        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-+
>           |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol=
 |
>           +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-+
>
>     that this consideration has been completely ignored.=C3=82  In fact, =
an
>
>
>     NSH base header might have any value
>     of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH were
>     ever defined, suddenly the traffic might
>     be subject to startling reordering if an MPLS transport were to be
>     considered.
>
>     Given a claim of NSH being transport-agnostic and repeated
>     emphasis that MPLS, as well as UDP,
>     is a valid transport for NSH, I do think this is a significant
>     oversight and needs, at a minimum, discussion and
>
>     explanation, and =C3=82 - quite likely - =C3=82 correction.
>
>
>
>     While I am on the topic of details of the NSH encapsulation, I
>     would request that Section 8 of draft-ietf-rtgwg-dt-encap-01
>
>     be read and considered! =C3=82  I am not excited by having many
>
>
>     different and unique Next Protocol fields defined.
>     For instance, I note the definition of a nearly identical Next
>     Protocol field in
>     https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe .
>
>     While I am, of course, willing to reason to detailed and
>     well-thought out explanations for why each and every new
>     encapsulation needs its very own IANA-defined Next Protocol field,
>     this seems to me to be highly likely to require
>     consolidation so that the same Next Protocol field can be used
>     between the various encapsulations.
>
>     I will work on giving a through review of NSH as soon as
>
>     practical.=C3=82  I do realize that there are multiple implementation=
s
>
>
>     and while details of how the "Next Protocol" field are documented
>     shouldn't have a significant impact there, the
>     discussion about the first nibble is likely to.
>
>     Regards,
>     Alia
>
>
>     On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <xuxiaohu@huawei.com
>
>     <mailto:xuxiaohu@huawei.com>> wrote:
>
>         Joel,
>
>         > -----Original Message-----
>
>         > From: Joel M. Halpern [mailto:jmh@joelhalpern.com <mailto:
> jmh@joelhalpern.com>]
>         > Sent: Wednesday, April 13, 2016 9:45 AM
>
>         > To: Xuxiaohu; Thomas Narten;sfc@ietf.org <mailto:sfc@ietf.org>
>         > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>         >
>         > Xu,
>
>         >=C3=82  =C3=82  =C3=82  =C3=82 I do not believe that there is an=
 MPLS specification
> that requires that all
>
>
>         > content other than IP must have a first nibble of 0 or 1.
>
>         When encapsulating NSH over MPLS directly, the first nibble of
>         the NSH must not be 4 or 6.
>
>         > There are specifications where it is discussed as desirable.
>         >
>         > It is in fact pretty trivial for us to change the format so tha=
t
> the first three bits are
>
>         > 0, but it burns several valuable flag bits.=C3=82  It is an SFC
> working group decision,
>
>
>
>         That's the reason why I raised the first nibble question.
>
>         Best regards,
>         Xiaohu
>
>         > not, as far as I can tell, a violation of the MPLS
>         specification.
>         >
>         > Yours,
>         > Joel
>         >
>         > On 4/12/16 9:41 PM, Xuxiaohu wrote:
>         > > Hi Thomas,
>         > >
>         > > It said in the NSH draft:
>         > >
>
>         > >=C3=82  =C3=82  "6.=C3=82  Transport Agnostic: NSH is transpor=
t
>         independent and is carried
>         > >=C3=82  =C3=82  =C3=82  =C3=82  =C3=82 in an overlay, over exi=
sting underlays.=C3=82  If
>         an existing overlay
>         > >=C3=82  =C3=82  =C3=82  =C3=82  =C3=82 topology provides the r=
equired service path
>         connectivity, that
>         > >=C3=82  =C3=82  =C3=82  =C3=82  =C3=82 existing overlay may be=
 used."
>
>
>         > >
>         > > That means the NSH should be able to be transported over
>         MPLS. However,
>         > according to the current NSH format definition, it's not
>         safe to carry the NSH
>         > over MPLS due to the first nibble issue. Therefore, I
>         believe this issue needs to be
>         > addressed before publication.
>         > >
>         > > Best regards,
>         > > Xiaohu
>         > >
>         > >> -----Original Message-----
>         > >> From: sfc [mailto:sfc-bounces@ietf.org
>         <mailto:sfc-bounces@ietf.org>] On Behalf Of Thomas Narten
>         > >> Sent: Thursday, March 31, 2016 10:48 AM
>
>         > >> To: sfc@ietf.org <mailto:sfc@ietf.org>
>         > >> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>         > >>
>         > >> Dear WG:
>         > >>
>         > >> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>         > >> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>         > >>
>         > >> The editors of the NSH document have indicated that they hav=
e
>         > >> addressed all known comments and that there are no open
>         issues with
>         > >> the current version of the document.
>         > >>
>         > >> Substantive comments to the list please, editorial
>         comments can go
>         > >> directly to the document editors.
>         > >>
>         > >> We'll also get a brief update from the editors at next week'=
s
>         > >> meeting. If there are any remaining issues with the
>         document, raising
>         > >> them before the meeting would be especially helpful.
>         > >>
>         > >> For the chairs,
>         > >> Thomas
>         > >>
>         > >> _______________________________________________
>         > >> sfc mailing list
>
>         > >> sfc@ietf.org <mailto:sfc@ietf.org>
>
>
>         > >> https://www.ietf.org/mailman/listinfo/sfc
>         > >
>         > > _______________________________________________
>         > > sfc mailing list
>
>         > > sfc@ietf.org <mailto:sfc@ietf.org>
>
>
>         > > https://www.ietf.org/mailman/listinfo/sfc
>         > >
>
>         _______________________________________________
>         sfc mailing list
>
>         sfc@ietf.org <mailto:sfc@ietf.org>
>
>
>         https://www.ietf.org/mailman/listinfo/sfc
>
>
>     _______________________________________________
>     sfc mailing list
>
>     sfc@ietf.org <mailto:sfc@ietf.org>
>     https://www.ietf.org/mailman/listinfo/sfc
>
>
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>
>

--001a11c33936b5ffec053061b73f
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Dave,<div><br></div><div class=3D"gmail_extra"><div cla=
ss=3D"gmail_quote">On Wed, Apr 13, 2016 at 1:34 PM, Dave Dolson <span dir=
=3D"ltr">&lt;<a href=3D"mailto:ddolson@sandvine.com" target=3D"_blank">ddol=
son@sandvine.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote"=
 style=3D"margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:=
rgb(204,204,204);border-left-style:solid;padding-left:1ex">





<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)">I=E2=80=99m going to show my ignorance and a=
sk how Ethernet is carried over MPLS? The first nybble is part of the Desti=
nation MAC address.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)">OUIs have been allocated beginning with 4 an=
d also with 6.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)"><u></u></span></p></div></div></blockquote><=
div><br></div><div><br></div><div><div>Thanks for asking and don&#39;t be s=
orry for not having to live through the fun and joy of standardizing pseudo=
-wires. =C2=A0 The very very short form is that there is a 32-bit code-word=
 defined that sits above the Ethernet frame and right below the MPLS stack.=
=C2=A0 This is to deal with implementations that look beneath the MPLS stac=
k to hunt down more fields to hash to get good entropy for ECMP or LAG.</di=
v></div><div><br></div><div>As I recall, when I looked a long long (er, let=
&#39;s not get into how long) time ago, the likeliness of actual collision =
with allocated OUIs was quite small.</div><div><br></div><div>Alia</div><di=
v>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px=
 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left=
-style:solid;padding-left:1ex"><div lang=3D"EN-US" link=3D"blue" vlink=3D"p=
urple"><div><p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-famil=
y:Calibri,sans-serif;color:rgb(31,73,125)">=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)"><u></u>=C2=A0<u></u></span></p>
<div style=3D"border-style:solid none none;border-top-color:rgb(181,196,223=
);border-top-width:1pt;padding:3pt 0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10pt;font-family:Tahoma,=
sans-serif">From:</span></b><span style=3D"font-size:10pt;font-family:Tahom=
a,sans-serif"> sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=
=3D"_blank">sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Alia Atlas<br>
<b>Sent:</b> Wednesday, April 13, 2016 9:56 AM<br>
<b>To:</b> Loa Andersson<br>
<b>Cc:</b> Thomas Narten; Carlos Pignataro (cpignata); <a href=3D"mailto:sf=
c@ietf.org" target=3D"_blank">sfc@ietf.org</a>; Jim Guichard (jguichar); Ma=
rtin Stiemerling; Xuxiaohu; Joel M. Halpern</span></p><div><div class=3D"h5=
"><br>
<b>Subject:</b> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<u></u>=
<u></u></div></div><p></p>
</div><div><div class=3D"h5">
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p>Loa, <u></u><u></u></p>
<p>Thanks!=C2=A0=C2=A0 I knew it was out there. <u></u><u></u></p>
<p>Regardless,=C2=A0 the first nibble question can&#39;t be resolved by add=
ing more labels to the stack!=C2=A0=C2=A0=C2=A0 The whole issue is looking =
at the S bit to guess what&#39;s under the MPLS label stack.=C2=A0 That&#39=
;s why PWE3 uses code-words.<u></u><u></u></p>
<p>There needs to be an answer beyond handwaving that something can be inve=
nted.<u></u><u></u></p>
<p>Of all the implementations, what transports is NSH carried over?=C2=A0 D=
o we have any diversity?
<u></u><u></u></p>
<p>Regards, <br>
Alia <u></u><u></u></p>
<div>
<p class=3D"MsoNormal">On Apr 13, 2016 9:43 AM, &quot;Loa Andersson&quot; &=
lt;<a href=3D"mailto:loa@pi.nu" target=3D"_blank">loa@pi.nu</a>&gt; wrote:<=
u></u><u></u></p>
<p class=3D"MsoNormal">Alia,<br>
<br>
I think you are referring to RFC 4182, it is more than a decade<br>
since it was published.<br>
<br>
/Loa<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
<br>
On 2016-04-13 21:13, Alia Atlas wrote:<u></u><u></u></p>
</div>
<blockquote style=3D"border-style:none none none solid;border-left-color:rg=
b(204,204,204);border-left-width:1pt;padding:0in 0in 0in 6pt;margin-left:4.=
8pt;margin-right:0in">
<div>
<p class=3D"MsoNormal">Carlos,<br>
<br>
As we all know, it is possible to do many many things with technology -<br>
once we figure out how.<br>
Saying that there are approaches other than reorganizing the first<u></u><u=
></u></p>
</div>
<p class=3D"MsoNormal">nibble is fine.=C3=82=C2=A0 Claiming that we&#39;ll<=
u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
be anywhere near interoperability or standardization without it being<br>
clarified does not seem plausible.<br>
<br>
For instance, I will note that the description of 0 (Explicit NULL) is<br>
still defined in RFC3032 as implying<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">the packet underneath is IPv4.=C3=82=C2=A0 I really =
did think that we&#39;d talked in<u></u><u></u></p>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12pt"><br>
MPLS about fixing this - and maybe<br>
Loa or others can give us the reference - but that&#39;s what the IANA<br>
pointer has right now.<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">I understand the desire to get NSH done - deeply! =
=C3=82<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
<br>
I also hate late surprises and am trying to clear time to do a more<br>
thorough review of NSH as well as<br>
requesting other focused reviews.<br>
<br>
This issue is not new - and the issues I saw in a quick look are those<br>
that are thoroughly documented<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">in=C3=82 draft-ietf-rtgwg-dt-encap-01<br>
&lt;<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-encap/"=
 target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-enc=
ap/</a>&gt;=C3=82 which<u></u><u></u></p>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12pt"><br>
considered NSH as one of the encapsulations.<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">It seems clear that there *are*=C3=82 transport-spec=
ific issues and we need a<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
place and a way to capture them.<br>
<br>
Regards,<br>
Alia<br>
<br>
On Wed, Apr 13, 2016 at 8:53 AM, Carlos Pignataro (cpignata)<u></u><u></u><=
/p>
</div>
<div>
<p class=3D"MsoNormal">&lt;<a href=3D"mailto:cpignata@cisco.com" target=3D"=
_blank">cpignata@cisco.com</a> &lt;mailto:<a href=3D"mailto:cpignata@cisco.=
com" target=3D"_blank">cpignata@cisco.com</a>&gt;&gt; wrote:<br>
<br>
=C2=A0 =C2=A0 Alia,<br>
<br>
=C2=A0 =C2=A0 Thanks for looking into this.<br>
<br>
=C2=A0 =C2=A0 It is relevant. I believe ECMP-prevention (anti-aliasing with=
 0x4<br>
=C2=A0 =C2=A0 and 0x6) is necessary for traffic over MPLS expecting in-orde=
r<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 delivery.=C3=82<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
<br>
=C2=A0 =C2=A0 Transporting NSH over MPLS, however, does not necessarily imp=
ly<br>
=C2=A0 =C2=A0 transporting NSH *directly* following the bottom LSE. There a=
re<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 other ways, as it was done with PWs.=
=C3=82<u></u><u></u></p>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12pt"><br>
<br>
=C2=A0 =C2=A0 I think showing that it is possible to appropriately (i.e.,<b=
r>
=C2=A0 =C2=A0 respecting BCPs) transport NSH over MPLS is very important. T=
his may<br>
=C2=A0 =C2=A0 or may not have implications on the NSH base header. I believ=
e<br>
=C2=A0 =C2=A0 however that such actual formal specification (beyond showing=
 its<br>
=C2=A0 =C2=A0 possible) should not gate NSH.<br>
<br>
=C2=A0 =C2=A0 Thanks!<u></u><u></u></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12pt">=C2=A0 =C2=A0 =C3=A2=E2=
=82=AC=E2=80=9D Carlos.<br>
<br>
<u></u><u></u></p>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 On Apr 12, 2016, at 10:29 PM, Alia Atl=
as &lt;<a href=3D"mailto:akatlas@gmail.com" target=3D"_blank">akatlas@gmail=
.com</a><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 &lt;mailto:<a href=3D"mailto:akatlas@g=
mail.com" target=3D"_blank">akatlas@gmail.com</a>&gt;&gt; wrote:<br>
<br>
=C2=A0 =C2=A0 Xiaohu, Joel, and SFC WG group,<br>
<br>
=C2=A0 =C2=A0 The first nibble question is quite relevant if it is expected=
 that<br>
=C2=A0 =C2=A0 the NSH header might be directly under<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 an MPLS label stack.=C3=82=C2=A0 This =
issue arose rather unpleasantly for<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
=C2=A0 =C2=A0 pseudo-wires a long time ago and the<br>
=C2=A0 =C2=A0 reasoning for it is much better documented, as Carlos pointed=
 out<br>
=C2=A0 =C2=A0 in a different thread, in RFC 4928 Section 3.<br>
<br>
=C2=A0 =C2=A0 At the time that PWE3 was working on the control word and whe=
ther<br>
=C2=A0 =C2=A0 it was to be mandatory (RFC 4385), it was clear that<br>
=C2=A0 =C2=A0 there were devices that looked at the first nibble of a packe=
t<br>
=C2=A0 =C2=A0 under the MPLS header as a way to determine<br>
=C2=A0 =C2=A0 if the packet was IPv4 or IPv6 and obtain flow-diversity from=
<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 it.=C3=82=C2=A0 The cost of also verif=
ying the associated checksum<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
=C2=A0 =C2=A0 if available wasn&#39;t deemed acceptable for several<u></u><=
u></u></p>
</div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 implementations.=C3=82=C2=A0 Given tha=
t determining as much entropy as<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
=C2=A0 =C2=A0 possible is still really important and that it is non-trivial=
 to<br>
=C2=A0 =C2=A0 negotiate/indicate the capability for including<br>
=C2=A0 =C2=A0 an Entropy Label in the MPLS stack, I have no reason to belie=
ve<br>
=C2=A0 =C2=A0 that this shortcut of looking at the first nibble<u></u><u></=
u></p>
</div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 is no longer used or deployed. =C3=82=
=C2=A0 Feel free to contact me off-list<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
=C2=A0 =C2=A0 if you believe this to be the case.<br>
<br>
=C2=A0 =C2=A0 It is clear from the NSH base header:<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A00 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 =
4 5 6 7 8 9 0 1<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-=
+-+-+-+-+-+-+-+-+-+-+-+-+<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 |Ver|O|C|R|R|R|R|R|R|=C2=A0 =C2=A0Length=
=C2=A0 |=C2=A0 =C2=A0 MD Type=C2=A0 =C2=A0 | Next Protocol |<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-=
+-+-+-+-+-+-+-+-+-+-+-+-+<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 that this consideration has been compl=
etely ignored.=C3=82=C2=A0 In fact, an<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
=C2=A0 =C2=A0 NSH base header might have any value<br>
=C2=A0 =C2=A0 of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH=
 were<br>
=C2=A0 =C2=A0 ever defined, suddenly the traffic might<br>
=C2=A0 =C2=A0 be subject to startling reordering if an MPLS transport were =
to be<br>
=C2=A0 =C2=A0 considered.<br>
<br>
=C2=A0 =C2=A0 Given a claim of NSH being transport-agnostic and repeated<br=
>
=C2=A0 =C2=A0 emphasis that MPLS, as well as UDP,<br>
=C2=A0 =C2=A0 is a valid transport for NSH, I do think this is a significan=
t<br>
=C2=A0 =C2=A0 oversight and needs, at a minimum, discussion and<u></u><u></=
u></p>
</div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 explanation, and =C3=82 - quite likely=
 - =C3=82 correction.<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
<br>
=C2=A0 =C2=A0 While I am on the topic of details of the NSH encapsulation, =
I<br>
=C2=A0 =C2=A0 would request that Section 8 of draft-ietf-rtgwg-dt-encap-01<=
u></u><u></u></p>
</div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 be read and considered! =C3=82=C2=A0 I=
 am not excited by having many<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
=C2=A0 =C2=A0 different and unique Next Protocol fields defined.<br>
=C2=A0 =C2=A0 For instance, I note the definition of a nearly identical Nex=
t<br>
=C2=A0 =C2=A0 Protocol field in<br>
=C2=A0 =C2=A0 <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-nvo3-v=
xlan-gpe" target=3D"_blank">
https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe</a> .<br>
<br>
=C2=A0 =C2=A0 While I am, of course, willing to reason to detailed and<br>
=C2=A0 =C2=A0 well-thought out explanations for why each and every new<br>
=C2=A0 =C2=A0 encapsulation needs its very own IANA-defined Next Protocol f=
ield,<br>
=C2=A0 =C2=A0 this seems to me to be highly likely to require<br>
=C2=A0 =C2=A0 consolidation so that the same Next Protocol field can be use=
d<br>
=C2=A0 =C2=A0 between the various encapsulations.<br>
<br>
=C2=A0 =C2=A0 I will work on giving a through review of NSH as soon as<u></=
u><u></u></p>
</div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 practical.=C3=82=C2=A0 I do realize th=
at there are multiple implementations<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
=C2=A0 =C2=A0 and while details of how the &quot;Next Protocol&quot; field =
are documented<br>
=C2=A0 =C2=A0 shouldn&#39;t have a significant impact there, the<br>
=C2=A0 =C2=A0 discussion about the first nibble is likely to.<br>
<br>
=C2=A0 =C2=A0 Regards,<br>
=C2=A0 =C2=A0 Alia<br>
<br>
<br>
=C2=A0 =C2=A0 On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu &lt;<a href=3D"mail=
to:xuxiaohu@huawei.com" target=3D"_blank">xuxiaohu@huawei.com</a><u></u><u>=
</u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 &lt;mailto:<a href=3D"mailto:xuxiaohu@=
huawei.com" target=3D"_blank">xuxiaohu@huawei.com</a>&gt;&gt; wrote:<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Joel,<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; -----Original Message-----<u></u><u></u></=
p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; From: Joel M. Halpe=
rn [mailto:<a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joe=
lhalpern.com</a> &lt;mailto:<a href=3D"mailto:jmh@joelhalpern.com" target=
=3D"_blank">jmh@joelhalpern.com</a>&gt;]<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; Sent: Wednesday, April 13, 2016 9:45 AM<u>=
</u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; To: Xuxiaohu; Thoma=
s <a href=3D"mailto:Narten%3Bsfc@ietf.org" target=3D"_blank">
Narten;sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=
=3D"_blank">sfc@ietf.org</a>&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; Subject: Re: [sfc] WG last call for draft-=
ietf-sfc-nsh-04.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; Xu,<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt;=C3=82=C2=A0 =C3=82=
=C2=A0 =C3=82=C2=A0 =C3=82 I do not believe that there is an MPLS specifica=
tion that requires that all<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; content other than IP must have a first ni=
bble of 0 or 1.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 When encapsulating NSH over MPLS directly, the =
first nibble of<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 the NSH must not be 4 or 6.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; There are specifications where it is discu=
ssed as desirable.<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; It is in fact pretty trivial for us to cha=
nge the format so that the first three bits are<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; 0, but it burns sev=
eral valuable flag bits.=C3=82=C2=A0 It is an SFC working group decision,<u=
></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 That&#39;s the reason why I raised the first ni=
bble question.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Best regards,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Xiaohu<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; not, as far as I can tell, a violation of =
the MPLS<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 specification.<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; Yours,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; Joel<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; On 4/12/16 9:41 PM, Xuxiaohu wrote:<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; Hi Thomas,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; It said in the NSH draft:<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;=C3=82=C2=A0 =
=C3=82=C2=A0 &quot;6.=C3=82=C2=A0 Transport Agnostic: NSH is transport<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 independent and is carried<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;=C3=82=C2=A0 =C3=82=C2=A0 =C3=82=C2=A0=
 =C3=82=C2=A0 =C3=82 in an overlay, over existing underlays.=C3=82=C2=A0 If=
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 an existing overlay<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;=C3=82=C2=A0 =C3=82=C2=A0 =C3=82=C2=A0=
 =C3=82=C2=A0 =C3=82 topology provides the required service path<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 connectivity, that<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;=C3=82=C2=A0 =C3=82=C2=A0 =C3=82=C2=A0=
 =C3=82=C2=A0 =C3=82 existing overlay may be used.&quot;<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; That means the NSH should be able to =
be transported over<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 MPLS. However,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; according to the current NSH format defini=
tion, it&#39;s not<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 safe to carry the NSH<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; over MPLS due to the first nibble issue. T=
herefore, I<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 believe this issue needs to be<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; addressed before publication.<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; Best regards,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; Xiaohu<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; -----Original Message-----<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; From: sfc [mailto:<a href=3D"mail=
to:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ietf.org</a><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &lt;mailto:<a href=3D"mailto:sfc-bounces@ietf.o=
rg" target=3D"_blank">sfc-bounces@ietf.org</a>&gt;] On Behalf Of Thomas Nar=
ten<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; Sent: Thursday, March 31, 2016 10=
:48 AM<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; To: <a hre=
f=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blan=
k">sfc@ietf.org</a>&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; Subject: [sfc] WG last call for d=
raft-ietf-sfc-nsh-04.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; Dear WG:<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; This note begins a WG last call o=
n draft-ietf-sfc-nsh-04.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; (<a href=3D"https://datatracker.i=
etf.org/doc/draft-ietf-sfc-nsh/" target=3D"_blank">https://datatracker.ietf=
.org/doc/draft-ietf-sfc-nsh/</a>).<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; The editors of the NSH document h=
ave indicated that they have<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; addressed all known comments and =
that there are no open<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 issues with<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; the current version of the docume=
nt.<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; Substantive comments to the list =
please, editorial<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 comments can go<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; directly to the document editors.=
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; We&#39;ll also get a brief update=
 from the editors at next week&#39;s<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; meeting. If there are any remaini=
ng issues with the<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 document, raising<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; them before the meeting would be =
especially helpful.<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; For the chairs,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; Thomas<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; _________________________________=
______________<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; sfc mailing list<u></u><u></u></p=
>
</div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; <a href=3D=
"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a href=
=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt;<u></u><u></=
u></p>
<div>
<p class=3D"MsoNormal"><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; <a href=3D"https://www.ietf.org/m=
ailman/listinfo/sfc" target=3D"_blank">
https://www.ietf.org/mailman/listinfo/sfc</a><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; _____________________________________=
__________<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; sfc mailing list<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; <a href=3D"mai=
lto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a href=3D"=
mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt;<u></u><u></u></=
p>
<div>
<p class=3D"MsoNormal"><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; <a href=3D"https://www.ietf.org/mailm=
an/listinfo/sfc" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sf=
c</a><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 _______________________________________________=
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 sfc mailing list<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 =C2=A0 =C2=A0 <a href=3D"mailto:sfc@ie=
tf.org" target=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc=
@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt;<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 <a href=3D"https://www.ietf.org/mailman/listinf=
o/sfc" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
<br>
=C2=A0 =C2=A0 _______________________________________________<br>
=C2=A0 =C2=A0 sfc mailing list<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0 <a href=3D"mailto:sfc@ietf.org" target=
=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" tar=
get=3D"_blank">sfc@ietf.org</a>&gt;<br>
=C2=A0 =C2=A0 <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=
=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><u></u><u></u></p>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12pt"><br>
<br>
<br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/sfc</a><u></u><u></u></p>
</div>
</blockquote>
</div>
</div></div></div>
</div>

</blockquote></div><br></div></div>

--001a11c33936b5ffec053061b73f--


From nobody Wed Apr 13 11:28:15 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24BEE12E2F8 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 11:28:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GjaSsl8eagzM for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 11:28:12 -0700 (PDT)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7322D12E2D6 for <sfc@ietf.org>; Wed, 13 Apr 2016 11:28:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=12582; q=dns/txt; s=iport; t=1460572092; x=1461781692; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=XMFNzNBtUYGgZyvBB0rDpkZUrnXoYaFNzx+qz3C+9lU=; b=Fbr+XSS9na//SxutspIMxCx+gcXsxYUAmgozCiMKoBFPfMpOfpmc6ds+ 5P54Lo4jte00lH/e5TvD704Kf4qe+bHsL/DM22UUbgkO8uxOSjstiH+8v +A4bJUWDs4uDuwpwMoGB+wjshmWQxW8ScOhSkqlasyFgkrWwyg08mi6Ez A=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DfAgBzjw5X/4YNJK1egmtMgVAGtVKEc?= =?us-ascii?q?w6BcYYOAoFDOBQBAQEBAQEBZSeEQQEBAQMBHQZEBA4FCwIBCBgqAgIyJQIEDgU?= =?us-ascii?q?OiBMIsGKSOAEBAQEBAQEBAQEBAQEBAQEBAQEBAQ0IhiGBdQiCToQOgzErgisFm?= =?us-ascii?q?AgBgyOBZokDjxCPJgEeAUOCBBmBSmyIfH4BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,480,1454976000";  d="asc'?scan'208,217";a="260351601"
Received: from alln-core-12.cisco.com ([173.36.13.134]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 13 Apr 2016 18:27:49 +0000
Received: from XCH-RTP-009.cisco.com (xch-rtp-009.cisco.com [64.101.220.149]) by alln-core-12.cisco.com (8.14.5/8.14.5) with ESMTP id u3DIRnf3031853 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 18:27:49 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-009.cisco.com (64.101.220.149) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 13 Apr 2016 14:27:48 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Wed, 13 Apr 2016 14:27:48 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfXjVJMNJL6xkKtVPhZYT1+65+HeFQAgAAA4wCAAAKVgIAACdAAgACudQCAAAWPAIAACHGA///AgQaAAEjVAIAARhKA
Date: Wed, 13 Apr 2016 18:27:48 +0000
Message-ID: <9630F426-DA80-4804-BEDB-5BF12EE11798@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <570E4D07.2060405@pi.nu> <CAG4d1rcT1JmnGT-NWkYjd0uQm-kbm5-w7tfnJVs9W07L9Cir1A@mail.gmail.com> <CAG4d1rc=DpsXV3=p9dYX3tom0XLDb_uXJxHbVNennvXf8phoSQ@mail.gmail.com> <CAG4d1rf_KOjjRh9NV40j-SKbxe0Yw82LBPnpVuAoNThm9ZdOjQ@mail.gmail.com> <570E54DC.5060408@joelhalpern.com>
In-Reply-To: <570E54DC.5060408@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.117.115.56]
Content-Type: multipart/signed; boundary="Apple-Mail=_F75E5338-2B33-41C2-B615-AF66F2E50880"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/PXLRGnhDHDO6E_B0nTdHHdKtqQk>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Alia Atlas <akatlas@gmail.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 18:28:14 -0000

--Apple-Mail=_F75E5338-2B33-41C2-B615-AF66F2E50880
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_7AED955F-BC93-4B9F-9BCF-01A62D8AEE5E"


--Apple-Mail=_7AED955F-BC93-4B9F-9BCF-01A62D8AEE5E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8


> On Apr 13, 2016, at 10:17 AM, Joel M. Halpern <jmh@joelhalpern.com> =
wrote:
>=20
> Yes, Alia, there are many transports out there being used for service =
chaining.  Most of the folks using these farious transports expect to =
support NSH.  Several of these have been brought forward  as =
Internet-Drafts.  Not all.  Which makes sense as standardizing transport =
behavior for NSH is out of scope for the working group.
>=20
> It does seem that the WG has to decide if they want to adjust the =
header format to slightly simplify carrying one transport. The =
difficulty is that the WG is not scoped to evaluate the various ways NSH =
might be carried on MPLS, much less to standardize and pick one.
>=20

I=E2=80=99ll add to this, without "taking sides", that it is a decision =
tradeoff between a detriment to all-but-one transports (an unused =
nibble) to cater to the specifics of one, with modulo to implementation =
implications, versus optimizing for one transport. But as Joel said, not =
SFCs scope, charter; perhaps expertise ought to be drawn from MPLS.

> Yours,
> Joel
>=20
> On 4/13/16 9:55 AM, Alia Atlas wrote:
>> There needs to be an answer beyond handwaving that something can be
>> invented.
>>=20

Alia,

If the requirement is to encapsulate NSH to transport it over MPLS =
networks, in a point-to-point fashion, in a way that prevents ECMP =
load-balancing, the IETF knows how to do that: It=E2=80=99s called a =
Pseudowire.

That=E2=80=99s not "handwaving that something can be invented=E2=80=9D. =
The current NSH can be transported over MPLS.

There are other alternatives such as specifying an =E2=80=9CNSH Explicit =
Label=E2=80=9D (or reusing GAL to indicate a header follows), followed =
by a CW/ACH with the first nibble as 0x0.

That one liner is clearly not a specification, but it=E2=80=99s also not =
handwaving.

These ought to be weighted against the alternative of modifying the NSH =
encap (plus, really, if we change NSH to start with 0x0, it would not be =
transport independent anymore :-)

BTW, as an aside, as you know not all Encapsulations defined in the IETF =
begin with a fixed 0x0.

>>=20
>> Regards,
>> Alia

Thanks,

=E2=80=94 Carlos.

--Apple-Mail=_7AED955F-BC93-4B9F-9BCF-01A62D8AEE5E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D""><br class=3D""><div><blockquote type=3D"cite" class=3D""><div =
class=3D"">On Apr 13, 2016, at 10:17 AM, Joel M. Halpern &lt;<a =
href=3D"mailto:jmh@joelhalpern.com" class=3D"">jmh@joelhalpern.com</a>&gt;=
 wrote:</div><br class=3D"Apple-interchange-newline"><div class=3D""><span=
 style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">Yes, Alia, there are many transports out there =
being used for service chaining. &nbsp;Most of the folks using these =
farious transports expect to support NSH. &nbsp;Several of these have =
been brought forward &nbsp;as Internet-Drafts. &nbsp;Not all. =
&nbsp;Which makes sense as standardizing transport behavior for NSH is =
out of scope for the working group.</span><br style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: =
0px;" class=3D""><br style=3D"font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">It does seem that the WG has to decide if they =
want to adjust the header format to slightly simplify carrying one =
transport. The difficulty is that the WG is not scoped to evaluate the =
various ways NSH might be carried on MPLS, much less to standardize and =
pick one.</span><br style=3D"font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><br =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""></div></blockquote><div><br =
class=3D""></div><div>I=E2=80=99ll add to this, without "taking sides", =
that it is a decision tradeoff between a detriment to all-but-one =
transports (an unused nibble) to cater to the specifics of one, with =
modulo to implementation implications, versus optimizing for one =
transport. But as Joel said, not SFCs scope, charter; perhaps expertise =
ought to be drawn from MPLS.</div><br class=3D""><blockquote type=3D"cite"=
 class=3D""><div class=3D""><span style=3D"font-family: Helvetica; =
font-size: 12px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; float: =
none; display: inline !important;" class=3D"">Yours,</span><br =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><span style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">Joel</span><br =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><br style=3D"font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: =
0px;" class=3D""><span style=3D"font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; float: none; display: =
inline !important;" class=3D"">On 4/13/16 9:55 AM, Alia Atlas =
wrote:</span><br style=3D"font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><blockquote=
 type=3D"cite" style=3D"font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D"">There =
needs to be an answer beyond handwaving that something can be<br =
class=3D"">invented.<br class=3D""><br =
class=3D""></blockquote></div></blockquote><div><br =
class=3D""></div><div>Alia,</div><div><br class=3D""></div><div>If the =
requirement is to encapsulate NSH to transport it over MPLS networks, in =
a point-to-point fashion, in a way that prevents ECMP load-balancing, =
the IETF knows how to do that: It=E2=80=99s called a =
Pseudowire.</div><div><br class=3D""></div><div>That=E2=80=99s not =
"handwaving that something can be invented=E2=80=9D. The current NSH can =
be transported over MPLS.</div><div><br class=3D""></div><div>There are =
other alternatives such as specifying an =E2=80=9CNSH Explicit Label=E2=80=
=9D (or reusing GAL to indicate a header follows), followed by a CW/ACH =
with the first nibble as 0x0.</div><div><br class=3D""></div><div>That =
one liner is clearly not a specification, but it=E2=80=99s also not =
handwaving.</div><div><br class=3D""></div><div>These ought to be =
weighted against the alternative of modifying the NSH encap (plus, =
really, if we change NSH to start with 0x0, it would not be transport =
independent anymore :-)</div><div><br class=3D""></div><div>BTW, as an =
aside, as you know not all Encapsulations defined in the IETF begin with =
a fixed 0x0.</div><div><br class=3D""></div><blockquote type=3D"cite" =
class=3D""><div class=3D""><blockquote type=3D"cite" style=3D"font-family:=
 Helvetica; font-size: 12px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: =
0px;" class=3D""><br class=3D"">Regards,<br class=3D"">Alia<br =
class=3D""></blockquote></div></blockquote></div><br class=3D""><div =
class=3D"">Thanks,</div><div class=3D""><br class=3D""></div><div =
class=3D"">=E2=80=94 Carlos.</div></body></html>=

--Apple-Mail=_7AED955F-BC93-4B9F-9BCF-01A62D8AEE5E--

--Apple-Mail=_F75E5338-2B33-41C2-B615-AF66F2E50880
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=YNEe
-----END PGP SIGNATURE-----

--Apple-Mail=_F75E5338-2B33-41C2-B615-AF66F2E50880--


From nobody Wed Apr 13 11:29:16 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 618EF12D1F0 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 11:29:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XH74l9Bxh5re for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 11:29:10 -0700 (PDT)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CB9D212D1B8 for <sfc@ietf.org>; Wed, 13 Apr 2016 11:29:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=54028; q=dns/txt; s=iport; t=1460572149; x=1461781749; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=uoEdEcxSBUWKVGzMknbPaTOn8yA6IwrqgZKxbR5DudU=; b=NPsTmxcWRLaFD6s2fpwJulewBXos+bVzEpIVdgEr2KA0fjMYQNU0pymh T/BlifZksacIazdhPXX3zJXO5ffQYrqrsWiA+5ugPKfuL1ixTRP7PwEqz f4Dez/5L+1Q9nJ/a2kZcN79aklRGDHIaDmV9Nf5NVbRtCiWiYjdKT1PWU 0=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DFAgCUjg5X/4sNJK1egmtMU30Grm2LW?= =?us-ascii?q?A6BbQQXAQqCGAGDUwKBQzgUAQEBAQEBAWUnhEEBAQEDAQEBARcDBkQHCwUHBAI?= =?us-ascii?q?BBgIOAwQBAQEgAQYDAgIhBgsUCQgCBA4FDogGAwoIDpNJnReNCA2FIwEBAQEBA?= =?us-ascii?q?QEBAQEBAQEBAQEBAQEBAQ0EBIYhgXUIgUyBAoJBgisJgkorgisFkxuEPDEBgyO?= =?us-ascii?q?BZm2Cc4MugXWBZ4ROgyiFM4YggSuHWwEeAUOCBBmBSmwBiHt+AQEB?=
X-IronPort-AV: E=Sophos;i="5.24,480,1454976000";  d="asc'?scan'208,217";a="96963984"
Received: from alln-core-6.cisco.com ([173.36.13.139]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 13 Apr 2016 18:29:06 +0000
Received: from XCH-RTP-006.cisco.com (xch-rtp-006.cisco.com [64.101.220.146]) by alln-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id u3DIT69x023149 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 18:29:06 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-006.cisco.com (64.101.220.146) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 13 Apr 2016 14:29:05 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Wed, 13 Apr 2016 14:29:05 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Dave Dolson <ddolson@sandvine.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfXjVJMNJL6xkKtVPhZYT1+65+HeFQAgAAA4wCAAAKVgIAACdAAgACudQCAAAWPAIAACHGA///AgQaAAH/lAIAAD1qA
Date: Wed, 13 Apr 2016 18:29:05 +0000
Message-ID: <9FEAA096-2685-457B-AD85-20EFABDB9E5A@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <570E4D07.2060405@pi.nu> <CAG4d1rcT1JmnGT-NWkYjd0uQm-kbm5-w7tfnJVs9W07L9Cir1A@mail.gmail.com> <CAG4d1rc=DpsXV3=p9dYX3tom0XLDb_uXJxHbVNennvXf8phoSQ@mail.gmail.com> <CAG4d1rf_KOjjRh9NV40j-SKbxe0Yw82LBPnpVuAoNThm9ZdOjQ@mail.gmail.com> <E8355113905631478EFF04F5AA706E9830F1E1EC@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F1E1EC@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.117.115.56]
Content-Type: multipart/signed; boundary="Apple-Mail=_00587756-C951-4287-A4DC-FD145EA0FA33"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/StccjAkD7sQxTaTSvqVnKdCDHTA>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Alia Atlas <akatlas@gmail.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 18:29:13 -0000

--Apple-Mail=_00587756-C951-4287-A4DC-FD145EA0FA33
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_239E7B18-4B7B-411D-B381-DEDBD0961885"


--Apple-Mail=_239E7B18-4B7B-411D-B381-DEDBD0961885
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi, Dave,

> On Apr 13, 2016, at 1:34 PM, Dave Dolson <ddolson@sandvine.com> wrote:
>=20
> I=E2=80=99m going to show my ignorance and ask how Ethernet is carried =
over MPLS?

https://tools.ietf.org/html/rfc4448

> The first nybble is part of the Destination MAC address.
> OUIs have been allocated beginning with 4 and also with 6.
>=20

https://tools.ietf.org/html/rfc4448#section-4.6

Thanks!

=E2=80=94 Carlos.

>=20
>=20
> From: sfc [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>] =
On Behalf Of Alia Atlas
> Sent: Wednesday, April 13, 2016 9:56 AM
> To: Loa Andersson
> Cc: Thomas Narten; Carlos Pignataro (cpignata); sfc@ietf.org =
<mailto:sfc@ietf.org>; Jim Guichard (jguichar); Martin Stiemerling; =
Xuxiaohu; Joel M. Halpern
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Loa,
>=20
> Thanks!   I knew it was out there.
>=20
> Regardless,  the first nibble question can't be resolved by adding =
more labels to the stack!    The whole issue is looking at the S bit to =
guess what's under the MPLS label stack.  That's why PWE3 uses =
code-words.
>=20
> There needs to be an answer beyond handwaving that something can be =
invented.
>=20
> Of all the implementations, what transports is NSH carried over?  Do =
we have any diversity?
>=20
> Regards,
> Alia
>=20
> On Apr 13, 2016 9:43 AM, "Loa Andersson" <loa@pi.nu =
<mailto:loa@pi.nu>> wrote:
> Alia,
>=20
> I think you are referring to RFC 4182, it is more than a decade
> since it was published.
>=20
> /Loa
>=20
>=20
> On 2016-04-13 21:13, Alia Atlas wrote:
> Carlos,
>=20
> As we all know, it is possible to do many many things with technology =
-
> once we figure out how.
> Saying that there are approaches other than reorganizing the first
> nibble is fine.=C3=82  Claiming that we'll
>=20
> be anywhere near interoperability or standardization without it being
> clarified does not seem plausible.
>=20
> For instance, I will note that the description of 0 (Explicit NULL) is
> still defined in RFC3032 as implying
> the packet underneath is IPv4.=C3=82  I really did think that we'd =
talked in
>=20
> MPLS about fixing this - and maybe
> Loa or others can give us the reference - but that's what the IANA
> pointer has right now.
>=20
> I understand the desire to get NSH done - deeply! =C3=82
>=20
>=20
> I also hate late surprises and am trying to clear time to do a more
> thorough review of NSH as well as
> requesting other focused reviews.
>=20
> This issue is not new - and the issues I saw in a quick look are those
> that are thoroughly documented
> in=C3=82 draft-ietf-rtgwg-dt-encap-01
> <https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-encap/ =
<https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-encap/>>=C3=82 =
which
>=20
> considered NSH as one of the encapsulations.
>=20
> It seems clear that there *are*=C3=82 transport-specific issues and we =
need a
>=20
> place and a way to capture them.
>=20
> Regards,
> Alia
>=20
> On Wed, Apr 13, 2016 at 8:53 AM, Carlos Pignataro (cpignata)
> <cpignata@cisco.com <mailto:cpignata@cisco.com> =
<mailto:cpignata@cisco.com <mailto:cpignata@cisco.com>>> wrote:
>=20
>     Alia,
>=20
>     Thanks for looking into this.
>=20
>     It is relevant. I believe ECMP-prevention (anti-aliasing with 0x4
>     and 0x6) is necessary for traffic over MPLS expecting in-order
>     delivery.=C3=82
>=20
>=20
>     Transporting NSH over MPLS, however, does not necessarily imply
>     transporting NSH *directly* following the bottom LSE. There are
>     other ways, as it was done with PWs.=C3=82
>=20
>=20
>     I think showing that it is possible to appropriately (i.e.,
>     respecting BCPs) transport NSH over MPLS is very important. This =
may
>     or may not have implications on the NSH base header. I believe
>     however that such actual formal specification (beyond showing its
>     possible) should not gate NSH.
>=20
>     Thanks!
>=20
>     =C3=A2=E2=82=AC=E2=80=9D Carlos.
>=20
>=20
>     On Apr 12, 2016, at 10:29 PM, Alia Atlas <akatlas@gmail.com =
<mailto:akatlas@gmail.com>
>     <mailto:akatlas@gmail.com <mailto:akatlas@gmail.com>>> wrote:
>=20
>     Xiaohu, Joel, and SFC WG group,
>=20
>     The first nibble question is quite relevant if it is expected that
>     the NSH header might be directly under
>     an MPLS label stack.=C3=82  This issue arose rather unpleasantly =
for
>=20
>     pseudo-wires a long time ago and the
>     reasoning for it is much better documented, as Carlos pointed out
>     in a different thread, in RFC 4928 Section 3.
>=20
>     At the time that PWE3 was working on the control word and whether
>     it was to be mandatory (RFC 4385), it was clear that
>     there were devices that looked at the first nibble of a packet
>     under the MPLS header as a way to determine
>     if the packet was IPv4 or IPv6 and obtain flow-diversity from
>     it.=C3=82  The cost of also verifying the associated checksum
>=20
>     if available wasn't deemed acceptable for several
>     implementations.=C3=82  Given that determining as much entropy as
>=20
>     possible is still really important and that it is non-trivial to
>     negotiate/indicate the capability for including
>     an Entropy Label in the MPLS stack, I have no reason to believe
>     that this shortcut of looking at the first nibble
>     is no longer used or deployed. =C3=82  Feel free to contact me =
off-list
>=20
>     if you believe this to be the case.
>=20
>     It is clear from the NSH base header:
>        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>           =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>           |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next =
Protocol |
>           =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>     that this consideration has been completely ignored.=C3=82  In =
fact, an
>=20
>     NSH base header might have any value
>     of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH were
>     ever defined, suddenly the traffic might
>     be subject to startling reordering if an MPLS transport were to be
>     considered.
>=20
>     Given a claim of NSH being transport-agnostic and repeated
>     emphasis that MPLS, as well as UDP,
>     is a valid transport for NSH, I do think this is a significant
>     oversight and needs, at a minimum, discussion and
>     explanation, and =C3=82 - quite likely - =C3=82 correction.
>=20
>=20
>     While I am on the topic of details of the NSH encapsulation, I
>     would request that Section 8 of draft-ietf-rtgwg-dt-encap-01
>     be read and considered! =C3=82  I am not excited by having many
>=20
>     different and unique Next Protocol fields defined.
>     For instance, I note the definition of a nearly identical Next
>     Protocol field in
>     https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe =
<https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe> .
>=20
>     While I am, of course, willing to reason to detailed and
>     well-thought out explanations for why each and every new
>     encapsulation needs its very own IANA-defined Next Protocol field,
>     this seems to me to be highly likely to require
>     consolidation so that the same Next Protocol field can be used
>     between the various encapsulations.
>=20
>     I will work on giving a through review of NSH as soon as
>     practical.=C3=82  I do realize that there are multiple =
implementations
>=20
>     and while details of how the "Next Protocol" field are documented
>     shouldn't have a significant impact there, the
>     discussion about the first nibble is likely to.
>=20
>     Regards,
>     Alia
>=20
>=20
>     On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <xuxiaohu@huawei.com =
<mailto:xuxiaohu@huawei.com>
>     <mailto:xuxiaohu@huawei.com <mailto:xuxiaohu@huawei.com>>> wrote:
>=20
>         Joel,
>=20
>         > -----Original Message-----
>         > From: Joel M. Halpern [mailto:jmh@joelhalpern.com =
<mailto:jmh@joelhalpern.com> <mailto:jmh@joelhalpern.com =
<mailto:jmh@joelhalpern.com>>]
>         > Sent: Wednesday, April 13, 2016 9:45 AM
>         > To: Xuxiaohu; Thomas Narten;sfc@ietf.org =
<mailto:Narten%3Bsfc@ietf.org> <mailto:sfc@ietf.org =
<mailto:sfc@ietf.org>>
>         > Subject: Re: [sfc] WG last call for =
draft-ietf-sfc-nsh-04.txt
>         >
>         > Xu,
>         >=C3=82  =C3=82  =C3=82  =C3=82 I do not believe that there is =
an MPLS specification that requires that all
>=20
>         > content other than IP must have a first nibble of 0 or 1.
>=20
>         When encapsulating NSH over MPLS directly, the first nibble of
>         the NSH must not be 4 or 6.
>=20
>         > There are specifications where it is discussed as desirable.
>         >
>         > It is in fact pretty trivial for us to change the format so =
that the first three bits are
>         > 0, but it burns several valuable flag bits.=C3=82  It is an =
SFC working group decision,
>=20
>=20
>         That's the reason why I raised the first nibble question.
>=20
>         Best regards,
>         Xiaohu
>=20
>         > not, as far as I can tell, a violation of the MPLS
>         specification.
>         >
>         > Yours,
>         > Joel
>         >
>         > On 4/12/16 9:41 PM, Xuxiaohu wrote:
>         > > Hi Thomas,
>         > >
>         > > It said in the NSH draft:
>         > >
>         > >=C3=82  =C3=82  "6.=C3=82  Transport Agnostic: NSH is =
transport
>         independent and is carried
>         > >=C3=82  =C3=82  =C3=82  =C3=82  =C3=82 in an overlay, over =
existing underlays.=C3=82  If
>         an existing overlay
>         > >=C3=82  =C3=82  =C3=82  =C3=82  =C3=82 topology provides =
the required service path
>         connectivity, that
>         > >=C3=82  =C3=82  =C3=82  =C3=82  =C3=82 existing overlay may =
be used."
>=20
>         > >
>         > > That means the NSH should be able to be transported over
>         MPLS. However,
>         > according to the current NSH format definition, it's not
>         safe to carry the NSH
>         > over MPLS due to the first nibble issue. Therefore, I
>         believe this issue needs to be
>         > addressed before publication.
>         > >
>         > > Best regards,
>         > > Xiaohu
>         > >
>         > >> -----Original Message-----
>         > >> From: sfc [mailto:sfc-bounces@ietf.org =
<mailto:sfc-bounces@ietf.org>
>         <mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>>] =
On Behalf Of Thomas Narten
>         > >> Sent: Thursday, March 31, 2016 10:48 AM
>         > >> To: sfc@ietf.org <mailto:sfc@ietf.org> =
<mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>         > >> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>         > >>
>         > >> Dear WG:
>         > >>
>         > >> This note begins a WG last call on =
draft-ietf-sfc-nsh-04.txt
>         > >> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/ =
<https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/>).
>         > >>
>         > >> The editors of the NSH document have indicated that they =
have
>         > >> addressed all known comments and that there are no open
>         issues with
>         > >> the current version of the document.
>         > >>
>         > >> Substantive comments to the list please, editorial
>         comments can go
>         > >> directly to the document editors.
>         > >>
>         > >> We'll also get a brief update from the editors at next =
week's
>         > >> meeting. If there are any remaining issues with the
>         document, raising
>         > >> them before the meeting would be especially helpful.
>         > >>
>         > >> For the chairs,
>         > >> Thomas
>         > >>
>         > >> _______________________________________________
>         > >> sfc mailing list
>         > >> sfc@ietf.org <mailto:sfc@ietf.org> <mailto:sfc@ietf.org =
<mailto:sfc@ietf.org>>
>=20
>         > >> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>         > >
>         > > _______________________________________________
>         > > sfc mailing list
>         > > sfc@ietf.org <mailto:sfc@ietf.org> <mailto:sfc@ietf.org =
<mailto:sfc@ietf.org>>
>=20
>         > > https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>         > >
>=20
>         _______________________________________________
>         sfc mailing list
>         sfc@ietf.org <mailto:sfc@ietf.org> <mailto:sfc@ietf.org =
<mailto:sfc@ietf.org>>
>=20
>         https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>=20
>=20
>     _______________________________________________
>     sfc mailing list
>     sfc@ietf.org <mailto:sfc@ietf.org> <mailto:sfc@ietf.org =
<mailto:sfc@ietf.org>>
>     https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>=20
>=20
>=20
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org <mailto:sfc@ietf.org>
> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>

--Apple-Mail=_239E7B18-4B7B-411D-B381-DEDBD0961885
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">Hi, Dave,<div class=3D""><br class=3D""><div><blockquote =
type=3D"cite" class=3D""><div class=3D"">On Apr 13, 2016, at 1:34 PM, =
Dave Dolson &lt;<a href=3D"mailto:ddolson@sandvine.com" =
class=3D"">ddolson@sandvine.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: =
0px;"><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D""><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);" class=3D"">I=E2=80=99m going to show my ignorance and =
ask how Ethernet is carried over =
MPLS?</span></div></div></div></blockquote><div><br =
class=3D""></div><div><a href=3D"https://tools.ietf.org/html/rfc4448" =
class=3D"">https://tools.ietf.org/html/rfc4448</a></div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: =
0px;"><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D""><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);" class=3D""> The first nybble is part of the =
Destination MAC address.<o:p class=3D""></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif; color: rgb(31, 73, 125);" =
class=3D"">OUIs have been allocated beginning with 4 and also with =
6.<o:p class=3D""></o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div></div></div></blockquote><div><br =
class=3D""></div><a =
href=3D"https://tools.ietf.org/html/rfc4448#section-4.6" =
class=3D"">https://tools.ietf.org/html/rfc4448#section-4.6</a></div><div><=
br class=3D""></div><div>Thanks!</div><div><br class=3D""></div><div>=E2=80=
=94 Carlos.</div><div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D""><div class=3D"WordSection1" style=3D"page: =
WordSection1; font-family: Helvetica; font-size: 12px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; orphans: auto; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; widows: auto; word-spacing: =
0px; -webkit-text-stroke-width: 0px;"><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"border-style: solid =
none none; border-top-color: rgb(181, 196, 223); border-top-width: 1pt; =
padding: 3pt 0in 0in;" class=3D""><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><b class=3D""><span style=3D"font-size: 10pt; font-family: =
Tahoma, sans-serif;" class=3D"">From:</span></b><span style=3D"font-size: =
10pt; font-family: Tahoma, sans-serif;" class=3D""><span =
class=3D"Apple-converted-space">&nbsp;</span>sfc [<a =
href=3D"mailto:sfc-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;" =
class=3D"">mailto:sfc-bounces@ietf.org</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><b class=3D"">On Behalf =
Of<span class=3D"Apple-converted-space">&nbsp;</span></b>Alia Atlas<br =
class=3D""><b class=3D"">Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Wednesday, April 13, 2016 =
9:56 AM<br class=3D""><b class=3D"">To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Loa Andersson<br =
class=3D""><b class=3D"">Cc:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Thomas Narten; Carlos =
Pignataro (cpignata);<span class=3D"Apple-converted-space">&nbsp;</span><a=
 href=3D"mailto:sfc@ietf.org" style=3D"color: purple; text-decoration: =
underline;" class=3D"">sfc@ietf.org</a>; Jim Guichard (jguichar); Martin =
Stiemerling; Xuxiaohu; Joel M. Halpern<br class=3D""><b =
class=3D"">Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [sfc] WG last call for =
draft-ietf-sfc-nsh-04.txt<o:p class=3D""></o:p></span></div></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><o:p class=3D"">&nbsp;</o:p></div><p =
style=3D"margin-right: 0in; margin-left: 0in; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D"">Loa,<span =
class=3D"Apple-converted-space">&nbsp;</span><o:p class=3D""></o:p></p><p =
style=3D"margin-right: 0in; margin-left: 0in; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D"">Thanks!&nbsp;&nbsp; I =
knew it was out there.<span =
class=3D"Apple-converted-space">&nbsp;</span><o:p class=3D""></o:p></p><p =
style=3D"margin-right: 0in; margin-left: 0in; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D"">Regardless,&nbsp; the =
first nibble question can't be resolved by adding more labels to the =
stack!&nbsp;&nbsp;&nbsp; The whole issue is looking at the S bit to =
guess what's under the MPLS label stack.&nbsp; That's why PWE3 uses =
code-words.<o:p class=3D""></o:p></p><p style=3D"margin-right: 0in; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D"">There needs to be an answer beyond handwaving that =
something can be invented.<o:p class=3D""></o:p></p><p =
style=3D"margin-right: 0in; margin-left: 0in; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D"">Of all the =
implementations, what transports is NSH carried over?&nbsp; Do we have =
any diversity?<o:p class=3D""></o:p></p><p style=3D"margin-right: 0in; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D"">Regards,<span =
class=3D"Apple-converted-space">&nbsp;</span><br class=3D"">Alia<span =
class=3D"Apple-converted-space">&nbsp;</span><o:p =
class=3D""></o:p></p><div class=3D""><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D"">On Apr 13, 2016 9:43 AM, "Loa Andersson" &lt;<a =
href=3D"mailto:loa@pi.nu" style=3D"color: purple; text-decoration: =
underline;" class=3D"">loa@pi.nu</a>&gt; wrote:<o:p =
class=3D""></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D"">Alia,<br class=3D""><br class=3D"">I think you are referring =
to RFC 4182, it is more than a decade<br class=3D"">since it was =
published.<br class=3D""><br class=3D"">/Loa<o:p =
class=3D""></o:p></div><div class=3D""><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><br class=3D""><br class=3D"">On 2016-04-13 21:13, Alia Atlas =
wrote:<o:p class=3D""></o:p></div></div><blockquote style=3D"border-style:=
 none none none solid; border-left-color: rgb(204, 204, 204); =
border-left-width: 1pt; padding: 0in 0in 0in 6pt; margin-left: 4.8pt; =
margin-right: 0in;" class=3D""><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D"">Carlos,<br class=3D""><br class=3D"">As we all know, it is =
possible to do many many things with technology -<br class=3D"">once we =
figure out how.<br class=3D"">Saying that there are approaches other =
than reorganizing the first<o:p class=3D""></o:p></div></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">nibble is fine.=C3=82&nbsp; Claiming that =
we'll<o:p class=3D""></o:p></div><div class=3D""><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D""><br class=3D"">be anywhere near interoperability or =
standardization without it being<br class=3D"">clarified does not seem =
plausible.<br class=3D""><br class=3D"">For instance, I will note that =
the description of 0 (Explicit NULL) is<br class=3D"">still defined in =
RFC3032 as implying<o:p class=3D""></o:p></div></div><div style=3D"margin:=
 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D"">the packet underneath is IPv4.=C3=82&nbsp; I really =
did think that we'd talked in<o:p class=3D""></o:p></div><div =
class=3D""><p class=3D"MsoNormal" style=3D"margin: 0in 0in 12pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><br =
class=3D"">MPLS about fixing this - and maybe<br class=3D"">Loa or =
others can give us the reference - but that's what the IANA<br =
class=3D"">pointer has right now.<o:p class=3D""></o:p></p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">I understand the desire to get NSH done - =
deeply! =C3=82<o:p class=3D""></o:p></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><br class=3D""><br class=3D"">I also hate =
late surprises and am trying to clear time to do a more<br =
class=3D"">thorough review of NSH as well as<br class=3D"">requesting =
other focused reviews.<br class=3D""><br class=3D"">This issue is not =
new - and the issues I saw in a quick look are those<br class=3D"">that =
are thoroughly documented<o:p class=3D""></o:p></div></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">in=C3=82 draft-ietf-rtgwg-dt-encap-01<br =
class=3D"">&lt;<a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-encap/" =
target=3D"_blank" style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-encap/</a>=
&gt;=C3=82 which<o:p class=3D""></o:p></div><div class=3D""><p =
class=3D"MsoNormal" style=3D"margin: 0in 0in 12pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><br class=3D"">considered NSH as =
one of the encapsulations.<o:p class=3D""></o:p></p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">It seems clear that there *are*=C3=82 =
transport-specific issues and we need a<o:p class=3D""></o:p></div><div =
class=3D""><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D""><br class=3D"">place =
and a way to capture them.<br class=3D""><br class=3D"">Regards,<br =
class=3D"">Alia<br class=3D""><br class=3D"">On Wed, Apr 13, 2016 at =
8:53 AM, Carlos Pignataro (cpignata)<o:p class=3D""></o:p></div></div><div=
 class=3D""><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D"">&lt;<a =
href=3D"mailto:cpignata@cisco.com" target=3D"_blank" style=3D"color: =
purple; text-decoration: underline;" =
class=3D"">cpignata@cisco.com</a><span =
class=3D"Apple-converted-space">&nbsp;</span>&lt;mailto:<a =
href=3D"mailto:cpignata@cisco.com" target=3D"_blank" style=3D"color: =
purple; text-decoration: underline;" =
class=3D"">cpignata@cisco.com</a>&gt;&gt; wrote:<br class=3D""><br =
class=3D"">&nbsp; &nbsp; Alia,<br class=3D""><br class=3D"">&nbsp; =
&nbsp; Thanks for looking into this.<br class=3D""><br class=3D"">&nbsp; =
&nbsp; It is relevant. I believe ECMP-prevention (anti-aliasing with =
0x4<br class=3D"">&nbsp; &nbsp; and 0x6) is necessary for traffic over =
MPLS expecting in-order<o:p class=3D""></o:p></div></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">&nbsp; &nbsp; delivery.=C3=82<o:p =
class=3D""></o:p></div><div class=3D""><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><br class=3D""><br class=3D"">&nbsp; &nbsp; Transporting NSH =
over MPLS, however, does not necessarily imply<br class=3D"">&nbsp; =
&nbsp; transporting NSH *directly* following the bottom LSE. There =
are<o:p class=3D""></o:p></div></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D"">&nbsp; &nbsp; other ways, as it was done with PWs.=C3=82<o:p =
class=3D""></o:p></div><div class=3D""><p class=3D"MsoNormal" =
style=3D"margin: 0in 0in 12pt; font-size: 12pt; font-family: 'Times New =
Roman', serif;"><br class=3D""><br class=3D"">&nbsp; &nbsp; I think =
showing that it is possible to appropriately (i.e.,<br class=3D"">&nbsp; =
&nbsp; respecting BCPs) transport NSH over MPLS is very important. This =
may<br class=3D"">&nbsp; &nbsp; or may not have implications on the NSH =
base header. I believe<br class=3D"">&nbsp; &nbsp; however that such =
actual formal specification (beyond showing its<br class=3D"">&nbsp; =
&nbsp; possible) should not gate NSH.<br class=3D""><br class=3D"">&nbsp; =
&nbsp; Thanks!<o:p class=3D""></o:p></p></div><p class=3D"MsoNormal" =
style=3D"margin: 0in 0in 12pt; font-size: 12pt; font-family: 'Times New =
Roman', serif;">&nbsp; &nbsp; =C3=A2=E2=82=AC=E2=80=9D Carlos.<br =
class=3D""><br class=3D""><o:p class=3D""></o:p></p><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">&nbsp; &nbsp; On Apr 12, 2016, at 10:29 =
PM, Alia Atlas &lt;<a href=3D"mailto:akatlas@gmail.com" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">akatlas@gmail.com</a><o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D"">&nbsp; &nbsp; =
&lt;mailto:<a href=3D"mailto:akatlas@gmail.com" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">akatlas@gmail.com</a>&gt;&gt; wrote:<br class=3D""><br =
class=3D"">&nbsp; &nbsp; Xiaohu, Joel, and SFC WG group,<br class=3D""><br=
 class=3D"">&nbsp; &nbsp; The first nibble question is quite relevant if =
it is expected that<br class=3D"">&nbsp; &nbsp; the NSH header might be =
directly under<o:p class=3D""></o:p></div></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D"">&nbsp; &nbsp; an MPLS label stack.=C3=82&nbsp; This =
issue arose rather unpleasantly for<o:p class=3D""></o:p></div><div =
class=3D""><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D""><br class=3D"">&nbsp; =
&nbsp; pseudo-wires a long time ago and the<br class=3D"">&nbsp; &nbsp; =
reasoning for it is much better documented, as Carlos pointed out<br =
class=3D"">&nbsp; &nbsp; in a different thread, in RFC 4928 Section =
3.<br class=3D""><br class=3D"">&nbsp; &nbsp; At the time that PWE3 was =
working on the control word and whether<br class=3D"">&nbsp; &nbsp; it =
was to be mandatory (RFC 4385), it was clear that<br class=3D"">&nbsp; =
&nbsp; there were devices that looked at the first nibble of a packet<br =
class=3D"">&nbsp; &nbsp; under the MPLS header as a way to determine<br =
class=3D"">&nbsp; &nbsp; if the packet was IPv4 or IPv6 and obtain =
flow-diversity from<o:p class=3D""></o:p></div></div><div style=3D"margin:=
 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D"">&nbsp; &nbsp; it.=C3=82&nbsp; The cost of also =
verifying the associated checksum<o:p class=3D""></o:p></div><div =
class=3D""><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D""><br class=3D"">&nbsp; =
&nbsp; if available wasn't deemed acceptable for several<o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D"">&nbsp;=
 &nbsp; implementations.=C3=82&nbsp; Given that determining as much =
entropy as<o:p class=3D""></o:p></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><br class=3D"">&nbsp; &nbsp; possible is =
still really important and that it is non-trivial to<br class=3D"">&nbsp; =
&nbsp; negotiate/indicate the capability for including<br =
class=3D"">&nbsp; &nbsp; an Entropy Label in the MPLS stack, I have no =
reason to believe<br class=3D"">&nbsp; &nbsp; that this shortcut of =
looking at the first nibble<o:p class=3D""></o:p></div></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">&nbsp; &nbsp; is no longer used or =
deployed. =C3=82&nbsp; Feel free to contact me off-list<o:p =
class=3D""></o:p></div><div class=3D""><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><br class=3D"">&nbsp; &nbsp; if you believe this to be the =
case.<br class=3D""><br class=3D"">&nbsp; &nbsp; It is clear from the =
NSH base header:<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp;0 1 2 3 4 5 6 =
7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1<br class=3D"">&nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
|Ver|O|C|R|R|R|R|R|R|&nbsp; &nbsp;Length&nbsp; |&nbsp; &nbsp; MD =
Type&nbsp; &nbsp; | Next Protocol |<br class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+<o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D"">&nbsp;=
 &nbsp; that this consideration has been completely ignored.=C3=82&nbsp; =
In fact, an<o:p class=3D""></o:p></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><br class=3D"">&nbsp; &nbsp; NSH base =
header might have any value<br class=3D"">&nbsp; &nbsp; of 0b0000, =
0b0001, 0b0010, 0b0010 and if a version 01 for NSH were<br =
class=3D"">&nbsp; &nbsp; ever defined, suddenly the traffic might<br =
class=3D"">&nbsp; &nbsp; be subject to startling reordering if an MPLS =
transport were to be<br class=3D"">&nbsp; &nbsp; considered.<br =
class=3D""><br class=3D"">&nbsp; &nbsp; Given a claim of NSH being =
transport-agnostic and repeated<br class=3D"">&nbsp; &nbsp; emphasis =
that MPLS, as well as UDP,<br class=3D"">&nbsp; &nbsp; is a valid =
transport for NSH, I do think this is a significant<br class=3D"">&nbsp; =
&nbsp; oversight and needs, at a minimum, discussion and<o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D"">&nbsp;=
 &nbsp; explanation, and =C3=82 - quite likely - =C3=82 correction.<o:p =
class=3D""></o:p></div><div class=3D""><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><br class=3D""><br class=3D"">&nbsp; &nbsp; While I am on the =
topic of details of the NSH encapsulation, I<br class=3D"">&nbsp; &nbsp; =
would request that Section 8 of draft-ietf-rtgwg-dt-encap-01<o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D"">&nbsp;=
 &nbsp; be read and considered! =C3=82&nbsp; I am not excited by having =
many<o:p class=3D""></o:p></div><div class=3D""><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;" class=3D""><br class=3D"">&nbsp; &nbsp; different and unique =
Next Protocol fields defined.<br class=3D"">&nbsp; &nbsp; For instance, =
I note the definition of a nearly identical Next<br class=3D"">&nbsp; =
&nbsp; Protocol field in<br class=3D"">&nbsp; &nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe" =
target=3D"_blank" style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe</a><=
span class=3D"Apple-converted-space">&nbsp;</span>.<br class=3D""><br =
class=3D"">&nbsp; &nbsp; While I am, of course, willing to reason to =
detailed and<br class=3D"">&nbsp; &nbsp; well-thought out explanations =
for why each and every new<br class=3D"">&nbsp; &nbsp; encapsulation =
needs its very own IANA-defined Next Protocol field,<br class=3D"">&nbsp; =
&nbsp; this seems to me to be highly likely to require<br =
class=3D"">&nbsp; &nbsp; consolidation so that the same Next Protocol =
field can be used<br class=3D"">&nbsp; &nbsp; between the various =
encapsulations.<br class=3D""><br class=3D"">&nbsp; &nbsp; I will work =
on giving a through review of NSH as soon as<o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D"">&nbsp;=
 &nbsp; practical.=C3=82&nbsp; I do realize that there are multiple =
implementations<o:p class=3D""></o:p></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D""><br class=3D"">&nbsp; &nbsp; and while =
details of how the "Next Protocol" field are documented<br =
class=3D"">&nbsp; &nbsp; shouldn't have a significant impact there, =
the<br class=3D"">&nbsp; &nbsp; discussion about the first nibble is =
likely to.<br class=3D""><br class=3D"">&nbsp; &nbsp; Regards,<br =
class=3D"">&nbsp; &nbsp; Alia<br class=3D""><br class=3D""><br =
class=3D"">&nbsp; &nbsp; On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu =
&lt;<a href=3D"mailto:xuxiaohu@huawei.com" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">xuxiaohu@huawei.com</a><o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D"">&nbsp; &nbsp; =
&lt;mailto:<a href=3D"mailto:xuxiaohu@huawei.com" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">xuxiaohu@huawei.com</a>&gt;&gt; wrote:<br class=3D""><br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; Joel,<br class=3D""><br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; -----Original =
Message-----<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; From: =
Joel M. Halpern [mailto:<a href=3D"mailto:jmh@joelhalpern.com" =
target=3D"_blank" style=3D"color: purple; text-decoration: underline;" =
class=3D"">jmh@joelhalpern.com</a><span =
class=3D"Apple-converted-space">&nbsp;</span>&lt;mailto:<a =
href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank" style=3D"color: =
purple; text-decoration: underline;" =
class=3D"">jmh@joelhalpern.com</a>&gt;]<br class=3D"">&nbsp; &nbsp; =
&nbsp; &nbsp; &gt; Sent: Wednesday, April 13, 2016 9:45 AM<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; To: Xuxiaohu; Thomas<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:Narten%3Bsfc@ietf.org" target=3D"_blank" style=3D"color: =
purple; text-decoration: underline;" =
class=3D"">Narten;sfc@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>&lt;mailto:<a =
href=3D"mailto:sfc@ietf.org" target=3D"_blank" style=3D"color: purple; =
text-decoration: underline;" class=3D"">sfc@ietf.org</a>&gt;<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; Subject: Re: [sfc] WG last =
call for draft-ietf-sfc-nsh-04.txt<br class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp; &gt;<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; Xu,<o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D"">&nbsp;=
 &nbsp; &nbsp; &nbsp; &gt;=C3=82&nbsp; =C3=82&nbsp; =C3=82&nbsp; =C3=82 =
I do not believe that there is an MPLS specification that requires that =
all<o:p class=3D""></o:p></div><div class=3D""><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; content other =
than IP must have a first nibble of 0 or 1.<br class=3D""><br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; When encapsulating NSH over MPLS =
directly, the first nibble of<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; =
the NSH must not be 4 or 6.<br class=3D""><br class=3D"">&nbsp; &nbsp; =
&nbsp; &nbsp; &gt; There are specifications where it is discussed as =
desirable.<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt;<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; It is in fact pretty trivial =
for us to change the format so that the first three bits are<o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D"">&nbsp;=
 &nbsp; &nbsp; &nbsp; &gt; 0, but it burns several valuable flag =
bits.=C3=82&nbsp; It is an SFC working group decision,<o:p =
class=3D""></o:p></div><div class=3D""><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><br class=3D""><br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; =
That's the reason why I raised the first nibble question.<br =
class=3D""><br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; Best regards,<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; Xiaohu<br class=3D""><br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; not, as far as I can tell, a =
violation of the MPLS<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; =
specification.<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt;<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; Yours,<br class=3D"">&nbsp; =
&nbsp; &nbsp; &nbsp; &gt; Joel<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; =
&gt;<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; On 4/12/16 9:41 PM, =
Xuxiaohu wrote:<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt; Hi =
Thomas,<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt; It said in the NSH =
draft:<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;<o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D"">&nbsp;=
 &nbsp; &nbsp; &nbsp; &gt; &gt;=C3=82&nbsp; =C3=82&nbsp; "6.=C3=82&nbsp; =
Transport Agnostic: NSH is transport<br class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp; independent and is carried<br class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp; &gt; &gt;=C3=82&nbsp; =C3=82&nbsp; =C3=82&nbsp; =C3=82&nbsp; =C3=82=
 in an overlay, over existing underlays.=C3=82&nbsp; If<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; an existing overlay<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;=C3=82&nbsp; =C3=82&nbsp; =
=C3=82&nbsp; =C3=82&nbsp; =C3=82 topology provides the required service =
path<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; connectivity, that<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;=C3=82&nbsp; =C3=82&nbsp; =
=C3=82&nbsp; =C3=82&nbsp; =C3=82 existing overlay may be used."<o:p =
class=3D""></o:p></div><div class=3D""><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt; That means the NSH =
should be able to be transported over<br class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp; MPLS. However,<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; =
according to the current NSH format definition, it's not<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; safe to carry the NSH<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; over MPLS due to the first =
nibble issue. Therefore, I<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; =
believe this issue needs to be<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; =
&gt; addressed before publication.<br class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp; &gt; &gt;<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt; =
Best regards,<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt; =
Xiaohu<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;&gt; -----Original =
Message-----<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;&gt; =
From: sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" =
target=3D"_blank" style=3D"color: purple; text-decoration: underline;" =
class=3D"">sfc-bounces@ietf.org</a><br class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp; &lt;mailto:<a href=3D"mailto:sfc-bounces@ietf.org" =
target=3D"_blank" style=3D"color: purple; text-decoration: underline;" =
class=3D"">sfc-bounces@ietf.org</a>&gt;] On Behalf Of Thomas Narten<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;&gt; Sent: Thursday, =
March 31, 2016 10:48 AM<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;" class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp; &gt; &gt;&gt; To:<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:sfc@ietf.org" target=3D"_blank" style=3D"color: purple; =
text-decoration: underline;" class=3D"">sfc@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>&lt;mailto:<a =
href=3D"mailto:sfc@ietf.org" target=3D"_blank" style=3D"color: purple; =
text-decoration: underline;" class=3D"">sfc@ietf.org</a>&gt;<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;&gt; Subject: [sfc] WG =
last call for draft-ietf-sfc-nsh-04.txt<br class=3D"">&nbsp; &nbsp; =
&nbsp; &nbsp; &gt; &gt;&gt;<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; =
&gt; &gt;&gt; Dear WG:<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; =
&gt;&gt;<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;&gt; This =
note begins a WG last call on draft-ietf-sfc-nsh-04.txt<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;&gt; (<a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/" =
target=3D"_blank" style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/</a>).<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;&gt;<br class=3D"">&nbsp; =
&nbsp; &nbsp; &nbsp; &gt; &gt;&gt; The editors of the NSH document have =
indicated that they have<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; =
&gt;&gt; addressed all known comments and that there are no open<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; issues with<br class=3D"">&nbsp; =
&nbsp; &nbsp; &nbsp; &gt; &gt;&gt; the current version of the =
document.<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;&gt;<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;&gt; Substantive =
comments to the list please, editorial<br class=3D"">&nbsp; &nbsp; =
&nbsp; &nbsp; comments can go<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; =
&gt; &gt;&gt; directly to the document editors.<br class=3D"">&nbsp; =
&nbsp; &nbsp; &nbsp; &gt; &gt;&gt;<br class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp; &gt; &gt;&gt; We'll also get a brief update from the editors at =
next week's<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;&gt; =
meeting. If there are any remaining issues with the<br class=3D"">&nbsp; =
&nbsp; &nbsp; &nbsp; document, raising<br class=3D"">&nbsp; &nbsp; =
&nbsp; &nbsp; &gt; &gt;&gt; them before the meeting would be especially =
helpful.<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;&gt;<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;&gt; For the chairs,<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;&gt; Thomas<br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;&gt;<br class=3D"">&nbsp; =
&nbsp; &nbsp; &nbsp; &gt; &gt;&gt; =
_______________________________________________<br class=3D"">&nbsp; =
&nbsp; &nbsp; &nbsp; &gt; &gt;&gt; sfc mailing list<o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D"">&nbsp;=
 &nbsp; &nbsp; &nbsp; &gt; &gt;&gt;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:sfc@ietf.org" target=3D"_blank" style=3D"color: purple; =
text-decoration: underline;" class=3D"">sfc@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>&lt;mailto:<a =
href=3D"mailto:sfc@ietf.org" target=3D"_blank" style=3D"color: purple; =
text-decoration: underline;" class=3D"">sfc@ietf.org</a>&gt;<o:p =
class=3D""></o:p></div><div class=3D""><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;&gt;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;<br class=3D"">&nbsp; =
&nbsp; &nbsp; &nbsp; &gt; &gt; =
_______________________________________________<br class=3D"">&nbsp; =
&nbsp; &nbsp; &nbsp; &gt; &gt; sfc mailing list<o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D"">&nbsp;=
 &nbsp; &nbsp; &nbsp; &gt; &gt;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:sfc@ietf.org" target=3D"_blank" style=3D"color: purple; =
text-decoration: underline;" class=3D"">sfc@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>&lt;mailto:<a =
href=3D"mailto:sfc@ietf.org" target=3D"_blank" style=3D"color: purple; =
text-decoration: underline;" class=3D"">sfc@ietf.org</a>&gt;<o:p =
class=3D""></o:p></div><div class=3D""><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &gt; &gt;<br class=3D""><br =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; =
_______________________________________________<br class=3D"">&nbsp; =
&nbsp; &nbsp; &nbsp; sfc mailing list<o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;" class=3D"">&nbsp;=
 &nbsp; &nbsp; &nbsp;<span class=3D"Apple-converted-space">&nbsp;</span><a=
 href=3D"mailto:sfc@ietf.org" target=3D"_blank" style=3D"color: purple; =
text-decoration: underline;" class=3D"">sfc@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>&lt;mailto:<a =
href=3D"mailto:sfc@ietf.org" target=3D"_blank" style=3D"color: purple; =
text-decoration: underline;" class=3D"">sfc@ietf.org</a>&gt;<o:p =
class=3D""></o:p></div><div class=3D""><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" =
class=3D""><br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br class=3D""><br=
 class=3D""><br class=3D"">&nbsp; &nbsp; =
_______________________________________________<br class=3D"">&nbsp; =
&nbsp; sfc mailing list<o:p class=3D""></o:p></div></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;" class=3D"">&nbsp; &nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:sfc@ietf.org" target=3D"_blank" style=3D"color: purple; =
text-decoration: underline;" class=3D"">sfc@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>&lt;mailto:<a =
href=3D"mailto:sfc@ietf.org" target=3D"_blank" style=3D"color: purple; =
text-decoration: underline;" class=3D"">sfc@ietf.org</a>&gt;<br =
class=3D"">&nbsp; &nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><o:p =
class=3D""></o:p></div><div class=3D""><p class=3D"MsoNormal" =
style=3D"margin: 0in 0in 12pt; font-size: 12pt; font-family: 'Times New =
Roman', serif;"><br class=3D""><br class=3D""><br class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">sfc mailing list<br class=3D""><a href=3D"mailto:sfc@ietf.org" =
target=3D"_blank" style=3D"color: purple; text-decoration: underline;" =
class=3D"">sfc@ietf.org</a><br class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a></p></div></blockq=
uote></div></div></div></blockquote></div><br =
class=3D""></div></body></html>=

--Apple-Mail=_239E7B18-4B7B-411D-B381-DEDBD0961885--

--Apple-Mail=_00587756-C951-4287-A4DC-FD145EA0FA33
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org

iQIcBAEBCAAGBQJXDo/tAAoJEIXgpQGOZny9StAP/jGlTKfL/I6kHdWOgl2OSFCz
dqvdenJ2CR3lVGQ20x890ojMlCmZcoYqpMJ6dnTRA/F43SMlf+ib+b0FAZoU6az6
4VKYtyNUPo2rA67w2J5IFQCWaUjtEZcuegvBCvxAsHRvsacySzj4Km/04O/MgAtX
Oi1nMuEheic18oiKcrQq+ywEbn2CLg/jDAuQ7ni2HlzDfJiArg710ufKHWHvOmm2
kiEiFlRg3Nh1klgcpnqu0LDBDIOqddB+7imQfqZCwJ0C6kMFd/9PuNl7xNj2yJqH
ZThLcujEUffGCxr/sp0oGvp+QRxgrXlY7IJeho7Nboqv32tT4E9izymnbsSCbIXS
cfcvpQRC8pWhcsnRd5lusLDUHTuHLiNiaGM5YzbUXqI0S32bSbKZuD5k7KgsvDU2
/ll6eYYM5ZegKiEl89pfboWHByJzClx23dQDPNXh06qoNEU4tHMSfFvwj49D8fE9
dq8pVv/E4bgVHPrMVKpdydFkGUl34cnP0A0umk9j5zClVmrpGA9DbOFszZHmSHR6
iGSQEkAyU0v7y/EW74qAmr7tSLaBTAxiKLOfdnnahdCFd7042oxCJaPeHGvKZ07o
Xs2uLIoUUZl/kIeJYcHQ8dFm0J2RFJnPqY7mnM1vWRwFsAia3+86k5phXVcGbXuX
H7OwhEB3D2hn/LOqaxeW
=DuTu
-----END PGP SIGNATURE-----

--Apple-Mail=_00587756-C951-4287-A4DC-FD145EA0FA33--


From nobody Wed Apr 13 11:58:52 2016
Return-Path: <akatlas@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2C3E12DC3E for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 11:58:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.699
X-Spam-Level: 
X-Spam-Status: No, score=-102.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oMQQX7buZlVm for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 11:58:48 -0700 (PDT)
Received: from mail-ob0-x22b.google.com (mail-ob0-x22b.google.com [IPv6:2607:f8b0:4003:c01::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D379D12DE05 for <sfc@ietf.org>; Wed, 13 Apr 2016 11:58:47 -0700 (PDT)
Received: by mail-ob0-x22b.google.com with SMTP id k9so38638479obk.2 for <sfc@ietf.org>; Wed, 13 Apr 2016 11:58:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc; bh=q5WlInGBPcUHS5vMSFmBhC/vzFVwY7xS6U+IyduX0jM=; b=bTgljsoKEqHJuHJ8J3665/1BtmOKnhht/qtXpB3YtJhpBKLl53eKw+IJ6qLINxggOZ 5ataTb+Vh0Gaayf5m/A53w447iF28A3Mi3mox0UYQi/XEh3E9zW4yVGEoIlDRNkgME8q 0Ff+C5txmQWz69Y3lNR4SDihK24ePx+5vonRCPVwBs3S9OZ5rOJHcRljknq4QiXVd6a9 IpE19t1gXcVobQhruQVhqRE0MKX5ShmwPa9eBAEFCZZinwGyub0TJM+y6vzV0AjWT9uP MlYYAyujZWiMpp9w8CWaV1CDAD3avpUiq9IFVKpTVopWTpWWR6tah+PC/T+YWJBzgF+Y SI4A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc; bh=q5WlInGBPcUHS5vMSFmBhC/vzFVwY7xS6U+IyduX0jM=; b=YFga4zWhIr5CCjwccDGFxMY21SD6z37jTPLxqsDprMydNUuizbcIXOuHc4NIyHPJTv 5RUYgOM2ipBoMsobQVlau7potptXaSZO89GQPp7J3V/XNqm/WnkbYhXBCi4aI8FrhfhU b+JefHRsMxkpPh7PqyNSkJhr+YWy79460wadF/q7UvWq0fc6i2mykx6Djvl7BaxNs1lb Vjk7xH4o1osomKqLl6SD2S3GBc1Kjhg1sx7O0pKlOy9ZT3mT9if8c/rLd41SMvHfdfuZ /1W7I4TpsAiqLIXejlnkc8hFTPG6SmPyLObikc5eSDAzO5pm293vKKcWNg595Yl9+SEB 55JA==
X-Gm-Message-State: AOPr4FUuA7jo3ytC9CKdjiCeqiotBunY99miR7o4kGPZ9PZvuLPa/BT+NWxfazreAv00Vv0jBuAk2accsVskVQ==
MIME-Version: 1.0
X-Received: by 10.182.165.99 with SMTP id yx3mr5717565obb.20.1460573927173; Wed, 13 Apr 2016 11:58:47 -0700 (PDT)
Received: by 10.60.115.168 with HTTP; Wed, 13 Apr 2016 11:58:46 -0700 (PDT)
In-Reply-To: <1CC1CA8E-30CD-4DF1-8247-5B962B0125AA@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <1CC1CA8E-30CD-4DF1-8247-5B962B0125AA@cisco.com>
Date: Wed, 13 Apr 2016 14:58:46 -0400
Message-ID: <CAG4d1rdbN1a_ULMFXhQCMvwP9Qy2+o0-cpqyizmxCpc76cbArg@mail.gmail.com>
From: Alia Atlas <akatlas@gmail.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Content-Type: multipart/alternative; boundary=001a11c2ea6a18f46c0530625e59
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/aNsttmFwfMPZgriGUYNgXq7zUX8>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 18:58:50 -0000

--001a11c2ea6a18f46c0530625e59
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Carlos,

On Wed, Apr 13, 2016 at 9:59 AM, Carlos Pignataro (cpignata) <
cpignata@cisco.com> wrote:

> Alia,
>
> It seems I was not totally clear before. Let me try again.
>
> My point is that if there are approaches to transport the SFC
> Encapsulation over MPLS, such as defining a CW-like thing starting with 0=
x0
> (I=E2=80=99m not talking about Explicit Null) or defining an =E2=80=9CExp=
licit NSH=E2=80=9D Label
> value, or others, we do not need to wait for those specifications to beco=
me
> RFCs before advancing the SFC encapsulation. Further, that that=E2=80=99s=
 probably
> work for MPLS and not for SFC (to find the best way to transport NSH over
> MPLS) =E2=80=94 although clearly we take your guidance there :-) Yes,
> clarifications are good. But to exemplify, we cannot say IPv6 does not
> interop because IPv6 over Bluetooth Low-Energy or IPv6 over
> 802.XYZ.alpha.pi is still being defined.
>

Sure - but there are link layers that IPv6 does work over already ;-)
I do feel that there is a need for at least a WG-agreed  approach to the
issue.
I am thinking in general about how to handle the transport-specific aspects
when SFC is the WG with full context.  I'm fairly certain that explaining
issues around congestion control for UDP, for instance, are quite
interesting.


> Thorough deep reviews as well as focused reviews are good! Thanks. Not to
> go down a tangent, but I had mentioned also that perhaps there was not de=
ep
> SFC representation in the Encap-DT.
>

Yes and I had hoped it would facilitate even better coordination on this
aspect of things.  Lessons learned.

Regards,
alia



> Thanks,
>
> =E2=80=94 Carlos.
>
> On Apr 13, 2016, at 9:13 AM, Alia Atlas <akatlas@gmail.com> wrote:
>
> Carlos,
>
> As we all know, it is possible to do many many things with technology -
> once we figure out how.
> Saying that there are approaches other than reorganizing the first nibble
> is fine.  Claiming that we'll
> be anywhere near interoperability or standardization without it being
> clarified does not seem plausible.
>
> For instance, I will note that the description of 0 (Explicit NULL) is
> still defined in RFC3032 as implying
> the packet underneath is IPv4.  I really did think that we'd talked in
> MPLS about fixing this - and maybe
> Loa or others can give us the reference - but that's what the IANA pointe=
r
> has right now.
>
> I understand the desire to get NSH done - deeply!
>
> I also hate late surprises and am trying to clear time to do a more
> thorough review of NSH as well as
> requesting other focused reviews.
>
> This issue is not new - and the issues I saw in a quick look are those
> that are thoroughly documented
> in draft-ietf-rtgwg-dt-encap-01
> <https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-encap/> which
> considered NSH as one of the encapsulations.
>
> It seems clear that there *are* transport-specific issues and we need a
> place and a way to capture them.
>
> Regards,
> Alia
>
> On Wed, Apr 13, 2016 at 8:53 AM, Carlos Pignataro (cpignata) <
> cpignata@cisco.com> wrote:
>
>> Alia,
>>
>> Thanks for looking into this.
>>
>> It is relevant. I believe ECMP-prevention (anti-aliasing with 0x4 and
>> 0x6) is necessary for traffic over MPLS expecting in-order delivery.
>>
>> Transporting NSH over MPLS, however, does not necessarily imply
>> transporting NSH *directly* following the bottom LSE. There are other wa=
ys,
>> as it was done with PWs.
>>
>> I think showing that it is possible to appropriately (i.e., respecting
>> BCPs) transport NSH over MPLS is very important. This may or may not hav=
e
>> implications on the NSH base header. I believe however that such actual
>> formal specification (beyond showing its possible) should not gate NSH.
>>
>> Thanks!
>>
>> =E2=80=94 Carlos.
>>
>>
>> On Apr 12, 2016, at 10:29 PM, Alia Atlas <akatlas@gmail.com> wrote:
>>
>> Xiaohu, Joel, and SFC WG group,
>>
>> The first nibble question is quite relevant if it is expected that the
>> NSH header might be directly under
>> an MPLS label stack.  This issue arose rather unpleasantly for
>> pseudo-wires a long time ago and the
>> reasoning for it is much better documented, as Carlos pointed out in a
>> different thread, in RFC 4928 Section 3.
>>
>> At the time that PWE3 was working on the control word and whether it was
>> to be mandatory (RFC 4385), it was clear that
>> there were devices that looked at the first nibble of a packet under the
>> MPLS header as a way to determine
>> if the packet was IPv4 or IPv6 and obtain flow-diversity from it.  The
>> cost of also verifying the associated checksum
>> if available wasn't deemed acceptable for several implementations.  Give=
n
>> that determining as much entropy as
>> possible is still really important and that it is non-trivial to
>> negotiate/indicate the capability for including
>> an Entropy Label in the MPLS stack, I have no reason to believe that thi=
s
>> shortcut of looking at the first nibble
>> is no longer used or deployed.   Feel free to contact me off-list if you
>> believe this to be the case.
>>
>> It is clear from the NSH base header:
>>
>>   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>      |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol |
>>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>
>> that this consideration has been completely ignored.  In fact, an NSH
>> base header might have any value
>> of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH were ever
>> defined, suddenly the traffic might
>> be subject to startling reordering if an MPLS transport were to be
>> considered.
>>
>> Given a claim of NSH being transport-agnostic and repeated emphasis that
>> MPLS, as well as UDP,
>> is a valid transport for NSH, I do think this is a significant oversight
>> and needs, at a minimum, discussion and
>> explanation, and  - quite likely -  correction.
>>
>> While I am on the topic of details of the NSH encapsulation, I would
>> request that Section 8 of draft-ietf-rtgwg-dt-encap-01
>> be read and considered!   I am not excited by having many different and
>> unique Next Protocol fields defined.
>> For instance, I note the definition of a nearly identical Next Protocol
>> field in https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe .
>>
>> While I am, of course, willing to reason to detailed and well-thought ou=
t
>> explanations for why each and every new
>> encapsulation needs its very own IANA-defined Next Protocol field, this
>> seems to me to be highly likely to require
>> consolidation so that the same Next Protocol field can be used between
>> the various encapsulations.
>>
>> I will work on giving a through review of NSH as soon as practical.  I d=
o
>> realize that there are multiple implementations
>> and while details of how the "Next Protocol" field are documented
>> shouldn't have a significant impact there, the
>> discussion about the first nibble is likely to.
>>
>> Regards,
>> Alia
>>
>>
>> On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <xuxiaohu@huawei.com> wrote:
>>
>>> Joel,
>>>
>>> > -----Original Message-----
>>> > From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
>>> > Sent: Wednesday, April 13, 2016 9:45 AM
>>> > To: Xuxiaohu; Thomas Narten; sfc@ietf.org
>>> > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>> >
>>> > Xu,
>>> >       I do not believe that there is an MPLS specification that
>>> requires that all
>>> > content other than IP must have a first nibble of 0 or 1.
>>>
>>> When encapsulating NSH over MPLS directly, the first nibble of the NSH
>>> must not be 4 or 6.
>>>
>>> > There are specifications where it is discussed as desirable.
>>> >
>>> > It is in fact pretty trivial for us to change the format so that the
>>> first three bits are
>>> > 0, but it burns several valuable flag bits.  It is an SFC working
>>> group decision,
>>>
>>> That's the reason why I raised the first nibble question.
>>>
>>> Best regards,
>>> Xiaohu
>>>
>>> > not, as far as I can tell, a violation of the MPLS specification.
>>> >
>>> > Yours,
>>> > Joel
>>> >
>>> > On 4/12/16 9:41 PM, Xuxiaohu wrote:
>>> > > Hi Thomas,
>>> > >
>>> > > It said in the NSH draft:
>>> > >
>>> > >    "6.  Transport Agnostic: NSH is transport independent and is
>>> carried
>>> > >         in an overlay, over existing underlays.  If an existing
>>> overlay
>>> > >         topology provides the required service path connectivity,
>>> that
>>> > >         existing overlay may be used."
>>> > >
>>> > > That means the NSH should be able to be transported over MPLS.
>>> However,
>>> > according to the current NSH format definition, it's not safe to carr=
y
>>> the NSH
>>> > over MPLS due to the first nibble issue. Therefore, I believe this
>>> issue needs to be
>>> > addressed before publication.
>>> > >
>>> > > Best regards,
>>> > > Xiaohu
>>> > >
>>> > >> -----Original Message-----
>>> > >> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
>>> > >> Sent: Thursday, March 31, 2016 10:48 AM
>>> > >> To: sfc@ietf.org
>>> > >> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>> > >>
>>> > >> Dear WG:
>>> > >>
>>> > >> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>> > >> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>> > >>
>>> > >> The editors of the NSH document have indicated that they have
>>> > >> addressed all known comments and that there are no open issues wit=
h
>>> > >> the current version of the document.
>>> > >>
>>> > >> Substantive comments to the list please, editorial comments can go
>>> > >> directly to the document editors.
>>> > >>
>>> > >> We'll also get a brief update from the editors at next week's
>>> > >> meeting. If there are any remaining issues with the document,
>>> raising
>>> > >> them before the meeting would be especially helpful.
>>> > >>
>>> > >> For the chairs,
>>> > >> Thomas
>>> > >>
>>> > >> _______________________________________________
>>> > >> sfc mailing list
>>> > >> sfc@ietf.org
>>> > >> https://www.ietf.org/mailman/listinfo/sfc
>>> > >
>>> > > _______________________________________________
>>> > > sfc mailing list
>>> > > sfc@ietf.org
>>> > > https://www.ietf.org/mailman/listinfo/sfc
>>> > >
>>>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>>
>>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>
>
>

--001a11c2ea6a18f46c0530625e59
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Carlos,<div class=3D"gmail_extra"><br><div class=3D"gmail_=
quote">On Wed, Apr 13, 2016 at 9:59 AM, Carlos Pignataro (cpignata) <span d=
ir=3D"ltr">&lt;<a href=3D"mailto:cpignata@cisco.com" target=3D"_blank">cpig=
nata@cisco.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" s=
tyle=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div=
 style=3D"word-wrap:break-word">Alia,<div><br></div><div>It seems I was not=
 totally clear before. Let me try again.</div><div><br></div><div>My point =
is that if there are approaches to transport the SFC Encapsulation over MPL=
S, such as defining a CW-like thing starting with 0x0 (I=E2=80=99m not talk=
ing about Explicit Null) or defining an =E2=80=9CExplicit NSH=E2=80=9D Labe=
l value, or others, we do not need to wait for those specifications to beco=
me RFCs before advancing the SFC encapsulation. Further, that that=E2=80=99=
s probably work for MPLS and not for SFC (to find the best way to transport=
 NSH over MPLS) =E2=80=94 although clearly we take your guidance there :-) =
Yes, clarifications are good. But to exemplify, we cannot say IPv6 does not=
 interop because IPv6 over Bluetooth Low-Energy or IPv6 over 802.XYZ.alpha.=
pi is still being defined.</div></div></blockquote><div><br></div><div>Sure=
 - but there are link layers that IPv6 does work over already ;-)</div><div=
>I do feel that there is a need for at least a WG-agreed =C2=A0approach to =
the issue.</div><div>I am thinking in general about how to handle the trans=
port-specific aspects when SFC is the WG with full context.=C2=A0 I&#39;m f=
airly certain that explaining issues around congestion control for UDP, for=
 instance, are quite interesting.</div><div>=C2=A0</div><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex"><div style=3D"word-wrap:break-word"><div></div><div>Thorough =
deep reviews as well as focused reviews are good! Thanks. Not to go down a =
tangent, but I had mentioned also that perhaps there was not deep SFC repre=
sentation in the Encap-DT.</div></div></blockquote><div><br></div><div>Yes =
and I had hoped it would facilitate even better coordination on this aspect=
 of things.=C2=A0 Lessons learned.=C2=A0</div><div><br></div><div>Regards,<=
/div><div>alia</div><div><br></div><div>=C2=A0</div><blockquote class=3D"gm=
ail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-le=
ft:1ex"><div style=3D"word-wrap:break-word"><div></div><div>Thanks,</div><d=
iv><br></div><div>=E2=80=94 Carlos.</div><div><div class=3D"h5"><div><br><d=
iv><blockquote type=3D"cite"><div>On Apr 13, 2016, at 9:13 AM, Alia Atlas &=
lt;<a href=3D"mailto:akatlas@gmail.com" target=3D"_blank">akatlas@gmail.com=
</a>&gt; wrote:</div><br><div><div dir=3D"ltr">Carlos,<div><br></div><div>A=
s we all know, it is possible to do many many things with technology - once=
 we figure out how.</div><div>Saying that there are approaches other than r=
eorganizing the first nibble is fine.=C2=A0 Claiming that we&#39;ll</div><d=
iv>be anywhere near interoperability or standardization without it being cl=
arified does not seem plausible.</div><div><br></div><div>For instance, I w=
ill note that the description of 0 (Explicit NULL) is still defined in RFC3=
032 as implying</div><div>the packet underneath is IPv4.=C2=A0 I really did=
 think that we&#39;d talked in MPLS about fixing this - and maybe</div><div=
>Loa or others can give us the reference - but that&#39;s what the IANA poi=
nter has right now.</div><div><br></div><div>I understand the desire to get=
 NSH done - deeply! =C2=A0</div><div><br></div><div>I also hate late surpri=
ses and am trying to clear time to do a more thorough review of NSH as well=
 as</div><div>requesting other focused reviews.</div><div><br></div><div>Th=
is issue is not new - and the issues I saw in a quick look are those that a=
re thoroughly documented</div><div>in=C2=A0<a href=3D"https://datatracker.i=
etf.org/doc/draft-ietf-rtgwg-dt-encap/" style=3D"color:rgb(39,22,115);outli=
ne:0px;font-family:&#39;PT Serif&#39;,Palatino,&#39;Neue Swift&#39;,serif;f=
ont-size:15px;line-height:21.4286px;background-color:rgb(249,249,249)" targ=
et=3D"_blank">draft-ietf-rtgwg-dt-encap-01</a><span style=3D"font-family:&#=
39;PT Serif&#39;,Palatino,&#39;Neue Swift&#39;,serif;font-size:15px;line-he=
ight:21.4286px;background-color:rgb(249,249,249)">=C2=A0</span>which consid=
ered NSH as one of the encapsulations.</div><div><br></div><div>It seems cl=
ear that there <b>are</b>=C2=A0transport-specific issues and we need a plac=
e and a way to capture them.</div><div><br></div><div>Regards,</div><div>Al=
ia</div></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On =
Wed, Apr 13, 2016 at 8:53 AM, Carlos Pignataro (cpignata) <span dir=3D"ltr"=
>&lt;<a href=3D"mailto:cpignata@cisco.com" target=3D"_blank">cpignata@cisco=
.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"ma=
rgin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style=3D"=
word-wrap:break-word">Alia,<div><br></div><div>Thanks for looking into this=
.</div><div><br></div><div>It is relevant. I believe ECMP-prevention (anti-=
aliasing with 0x4 and 0x6) is necessary for traffic over MPLS expecting in-=
order delivery.=C2=A0</div><div><br></div><div>Transporting NSH over MPLS, =
however, does not necessarily imply transporting NSH *directly* following t=
he bottom LSE. There are other ways, as it was done with PWs.=C2=A0</div><d=
iv><br></div><div>I think showing that it is possible to appropriately (i.e=
., respecting BCPs) transport NSH over MPLS is very important. This may or =
may not have implications on the NSH base header. I believe however that su=
ch actual formal specification (beyond showing its possible) should not gat=
e NSH.</div><div><br></div><div>Thanks!</div><span><font color=3D"#888888">=
<div><br></div><div>=E2=80=94 Carlos.</div></font></span><div><div><div><br=
></div><div><br><div><blockquote type=3D"cite"><div>On Apr 12, 2016, at 10:=
29 PM, Alia Atlas &lt;<a href=3D"mailto:akatlas@gmail.com" target=3D"_blank=
">akatlas@gmail.com</a>&gt; wrote:</div><br><div><div dir=3D"ltr">Xiaohu, J=
oel, and SFC WG group,<div><br></div><div>The first nibble question is quit=
e relevant if it is expected that the NSH header might be directly under</d=
iv><div>an MPLS label stack.=C2=A0 This issue arose rather unpleasantly for=
 pseudo-wires a long time ago and the</div><div>reasoning for it is much be=
tter documented, as Carlos pointed out in a different thread, in RFC 4928 S=
ection 3.</div><div><br></div><div>At the time that PWE3 was working on the=
 control word and whether it was to be mandatory (RFC 4385), it was clear t=
hat</div><div>there were devices that looked at the first nibble of a packe=
t under the MPLS header as a way to determine</div><div>if the packet was I=
Pv4 or IPv6 and obtain flow-diversity from it.=C2=A0 The cost of also verif=
ying the associated checksum</div><div>if available wasn&#39;t deemed accep=
table for several implementations.=C2=A0 Given that determining as much ent=
ropy as</div><div>possible is still really important and that it is non-tri=
vial to negotiate/indicate the capability for including</div><div>an Entrop=
y Label in the MPLS stack, I have no reason to believe that this shortcut o=
f looking at the first nibble</div><div>is no longer used or deployed. =C2=
=A0 Feel free to contact me off-list if you believe this to be the case.</d=
iv><div><br></div><div>It is clear from the NSH base header:</div><div><pre=
 style=3D"overflow:auto;font-family:&#39;PT Mono&#39;,Monaco,monospace;font=
-size:14px;padding:10px;margin-top:0px;margin-bottom:10.5px;line-height:1.2=
14;word-wrap:break-word;border:1px solid rgb(204,204,204);border-top-left-r=
adius:4px;border-top-right-radius:4px;border-bottom-right-radius:4px;border=
-bottom-left-radius:4px;background-color:rgb(255,253,245)">  0 1 2 3 4 5 6 =
7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</pre=
></div><div>that this consideration has been completely ignored.=C2=A0 In f=
act, an NSH base header might have any value</div><div>of 0b0000, 0b0001, 0=
b0010, 0b0010 and if a version 01 for NSH were ever defined, suddenly the t=
raffic might</div><div>be subject to startling reordering if an MPLS transp=
ort were to be considered.</div><div><br></div><div>Given a claim of NSH be=
ing transport-agnostic and repeated emphasis that MPLS, as well as UDP,</di=
v><div>is a valid transport for NSH, I do think this is a significant overs=
ight and needs, at a minimum, discussion and</div><div>explanation, and =C2=
=A0- quite likely - =C2=A0correction.</div><div><br></div><div>While I am o=
n the topic of details of the NSH encapsulation, I would request that Secti=
on 8 of draft-ietf-rtgwg-dt-encap-01</div><div>be read and considered! =C2=
=A0 I am not excited by having many different and unique Next Protocol fiel=
ds defined.</div><div>For instance, I note the definition of a nearly ident=
ical Next Protocol field in <a href=3D"https://datatracker.ietf.org/doc/dra=
ft-ietf-nvo3-vxlan-gpe" target=3D"_blank">https://datatracker.ietf.org/doc/=
draft-ietf-nvo3-vxlan-gpe</a> .</div><div><br></div><div>While I am, of cou=
rse, willing to reason to detailed and well-thought out explanations for wh=
y each and every new</div><div>encapsulation needs its very own IANA-define=
d Next Protocol field, this seems to me to be highly likely to require</div=
><div>consolidation so that the same Next Protocol field can be used betwee=
n the various encapsulations.</div><div><br></div><div>I will work on givin=
g a through review of NSH as soon as practical.=C2=A0 I do realize that the=
re are multiple implementations</div><div>and while details of how the &quo=
t;Next Protocol&quot; field are documented shouldn&#39;t have a significant=
 impact there, the</div><div>discussion about the first nibble is likely to=
.</div><div><br></div><div>Regards,</div><div>Alia</div><div><br></div></di=
v><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Tue, Apr 12,=
 2016 at 9:53 PM, Xuxiaohu <span dir=3D"ltr">&lt;<a href=3D"mailto:xuxiaohu=
@huawei.com" target=3D"_blank">xuxiaohu@huawei.com</a>&gt;</span> wrote:<br=
><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1=
px #ccc solid;padding-left:1ex">Joel,<br>
<span><br>
&gt; -----Original Message-----<br>
&gt; From: Joel M. Halpern [mailto:<a href=3D"mailto:jmh@joelhalpern.com" t=
arget=3D"_blank">jmh@joelhalpern.com</a>]<br>
&gt; Sent: Wednesday, April 13, 2016 9:45 AM<br>
&gt; To: Xuxiaohu; Thomas Narten; <a href=3D"mailto:sfc@ietf.org" target=3D=
"_blank">sfc@ietf.org</a><br>
&gt; Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
&gt;<br>
&gt; Xu,<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0I do not believe that there is an MPLS speci=
fication that requires that all<br>
&gt; content other than IP must have a first nibble of 0 or 1.<br>
<br>
</span>When encapsulating NSH over MPLS directly, the first nibble of the N=
SH must not be 4 or 6.<br>
<span><br>
&gt; There are specifications where it is discussed as desirable.<br>
&gt;<br>
&gt; It is in fact pretty trivial for us to change the format so that the f=
irst three bits are<br>
&gt; 0, but it burns several valuable flag bits.=C2=A0 It is an SFC working=
 group decision,<br>
<br>
</span>That&#39;s the reason why I raised the first nibble question.<br>
<br>
Best regards,<br>
Xiaohu<br>
<div><div><br>
&gt; not, as far as I can tell, a violation of the MPLS specification.<br>
&gt;<br>
&gt; Yours,<br>
&gt; Joel<br>
&gt;<br>
&gt; On 4/12/16 9:41 PM, Xuxiaohu wrote:<br>
&gt; &gt; Hi Thomas,<br>
&gt; &gt;<br>
&gt; &gt; It said in the NSH draft:<br>
&gt; &gt;<br>
&gt; &gt;=C2=A0 =C2=A0 &quot;6.=C2=A0 Transport Agnostic: NSH is transport =
independent and is carried<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0in an overlay, over existing und=
erlays.=C2=A0 If an existing overlay<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0topology provides the required s=
ervice path connectivity, that<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0existing overlay may be used.&qu=
ot;<br>
&gt; &gt;<br>
&gt; &gt; That means the NSH should be able to be transported over MPLS. Ho=
wever,<br>
&gt; according to the current NSH format definition, it&#39;s not safe to c=
arry the NSH<br>
&gt; over MPLS due to the first nibble issue. Therefore, I believe this iss=
ue needs to be<br>
&gt; addressed before publication.<br>
&gt; &gt;<br>
&gt; &gt; Best regards,<br>
&gt; &gt; Xiaohu<br>
&gt; &gt;<br>
&gt; &gt;&gt; -----Original Message-----<br>
&gt; &gt;&gt; From: sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" tar=
get=3D"_blank">sfc-bounces@ietf.org</a>] On Behalf Of Thomas Narten<br>
&gt; &gt;&gt; Sent: Thursday, March 31, 2016 10:48 AM<br>
&gt; &gt;&gt; To: <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@iet=
f.org</a><br>
&gt; &gt;&gt; Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; Dear WG:<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; This note begins a WG last call on draft-ietf-sfc-nsh-04.txt<=
br>
&gt; &gt;&gt; (<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sfc-n=
sh/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc/=
draft-ietf-sfc-nsh/</a>).<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; The editors of the NSH document have indicated that they have=
<br>
&gt; &gt;&gt; addressed all known comments and that there are no open issue=
s with<br>
&gt; &gt;&gt; the current version of the document.<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; Substantive comments to the list please, editorial comments c=
an go<br>
&gt; &gt;&gt; directly to the document editors.<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; We&#39;ll also get a brief update from the editors at next we=
ek&#39;s<br>
&gt; &gt;&gt; meeting. If there are any remaining issues with the document,=
 raising<br>
&gt; &gt;&gt; them before the meeting would be especially helpful.<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; For the chairs,<br>
&gt; &gt;&gt; Thomas<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; _______________________________________________<br>
&gt; &gt;&gt; sfc mailing list<br>
&gt; &gt;&gt; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.or=
g</a><br>
&gt; &gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"=
noreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a>=
<br>
&gt; &gt;<br>
&gt; &gt; _______________________________________________<br>
&gt; &gt; sfc mailing list<br>
&gt; &gt; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a=
><br>
&gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"nore=
ferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt; &gt;<br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
</div></div></blockquote></div><br></div>
_______________________________________________<br>sfc mailing list<br><a h=
ref=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br><a href=
=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">https://ww=
w.ietf.org/mailman/listinfo/sfc</a><br></div></blockquote></div><br></div><=
/div></div></div></blockquote></div><br></div>
_______________________________________________<br>sfc mailing list<br><a h=
ref=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br><a href=
=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">https://ww=
w.ietf.org/mailman/listinfo/sfc</a><br></div></blockquote></div><br></div><=
/div></div></div></blockquote></div><br></div></div>

--001a11c2ea6a18f46c0530625e59--


From nobody Wed Apr 13 12:05:23 2016
Return-Path: <don.fedyk@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AAC6712DB83 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 12:05:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SXOSne9EZG6p for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 12:05:20 -0700 (PDT)
Received: from g9t5008.houston.hp.com (g9t5008.houston.hp.com [15.240.92.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ECEB412D968 for <sfc@ietf.org>; Wed, 13 Apr 2016 12:05:19 -0700 (PDT)
Received: from G9W8455.americas.hpqcorp.net (g9w8455.houston.hp.com [16.216.161.94]) (using TLSv1.2 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by g9t5008.houston.hp.com (Postfix) with ESMTPS id 296635E; Wed, 13 Apr 2016 19:05:18 +0000 (UTC)
Received: from G9W8455.americas.hpqcorp.net (2002:10d8:a15e::10d8:a15e) by G9W8455.americas.hpqcorp.net (2002:10d8:a15e::10d8:a15e) with Microsoft SMTP Server (TLS) id 15.0.1076.9; Wed, 13 Apr 2016 19:05:18 +0000
Received: from G9W3617.americas.hpqcorp.net (16.216.186.52) by G9W8455.americas.hpqcorp.net (16.216.161.94) with Microsoft SMTP Server (TLS) id 15.0.1076.9 via Frontend Transport; Wed, 13 Apr 2016 19:05:18 +0000
Received: from G4W3293.americas.hpqcorp.net ([169.254.2.173]) by G9W3617.americas.hpqcorp.net ([16.216.186.52]) with mapi id 14.03.0169.001; Wed, 13 Apr 2016 19:05:18 +0000
From: "Fedyk, Don" <don.fedyk@hpe.com>
To: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfQ9ZjlrPWHUEW4Ok49bydgVZ+IUfhw
Date: Wed, 13 Apr 2016 19:05:17 +0000
Message-ID: <A46D9C092EA46F489F135060986AD9FF225C4091@G4W3293.americas.hpqcorp.net>
References: <m3egarz7kh.wl-narten@us.ibm.com>
In-Reply-To: <m3egarz7kh.wl-narten@us.ibm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [16.210.48.21]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/uHdHba59c84gTaMUF7pmPeRYsBU>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 19:05:21 -0000

Hi Thomas=20

At this point I do not support a last call on the NSH header. There is a lo=
t of comments and I don't think it is at a point where it is last call read=
y.

I have be banging my head against the wall on this one because I would like=
 more concrete around the forwarding aspects.  I do accept that there is a =
draft (draft-kumar-sfc-nsh-forwarding-00 ) now that addresses some the conf=
usion in NSH on forwarding and it helps.  Although it seems odd to let a NS=
H draft progress as confusing and to clarify it later in another draft.=20

My main objection is related to the fact that for a draft that claims it is=
 independent of forwarding it simply has not been proven.  That does not me=
an we need to specify forwarding but I'd still like to see the data formats=
 of what are being "prototyped" today so I can compare with the other data =
formats that I know today.  For example the MAC chaining draft we authored =
would like to use NSH for metadata but the MAC chaining local MACs bear a r=
elationship with the NSH SDI & SI.  In fact without these fields as mandato=
ry it would be more independent in my case.  I'm sure there are similar asp=
ects with other transports types but until I see them and the operations I =
can't assess transport independence claims.

There are other inconsistencies that I could live with in the draft relatin=
g to the logic of the MD types etc. (A length field seems to be the only th=
ing that is really needed and local context will determine the contents).  =
But we have made these comments more than once and I've seen little acknowl=
edgment that if the NSH data is basically context driven fixed fields and T=
LVs could be mixed.=20

So in short I support of the drafts goals as a way to carry metadata but it=
 is not ready for last call yet in my opinion.=20

Thanks
Don  =20

> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
> Sent: Wednesday, March 30, 2016 10:48 PM
> To: sfc@ietf.org
> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Dear WG:
>=20
> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>=20
> The editors of the NSH document have indicated that they have addressed
> all known comments and that there are no open issues with the current
> version of the document.
>=20
> Substantive comments to the list please, editorial comments can go direct=
ly
> to the document editors.
>=20
> We'll also get a brief update from the editors at next week's meeting. If
> there are any remaining issues with the document, raising them before the
> meeting would be especially helpful.
>=20
> For the chairs,
> Thomas
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Apr 13 12:11:24 2016
Return-Path: <smkumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E68A712DDFF for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 12:11:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JzEI2hVhjHZK for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 12:11:15 -0700 (PDT)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7526A12DD8B for <sfc@ietf.org>; Wed, 13 Apr 2016 12:11:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=49524; q=dns/txt; s=iport; t=1460574674; x=1461784274; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=CU0piiYRTk4N7hrbd4KRwwpDtsCr2eM4HfRRUibfd2Y=; b=KQMAInqxchCQmiZRlggcs9WMIaDBU+5IN2Pg+R+R6rzBVcCM0ophsIfe VPs3KZTWDN/ZwT7FYssoWUJkyu9x73Vhh9iXHy0en9/2WH9aZdtk0YUoA PjeRxcewfwhamlHKXf8aFFEObSYzXB1qs3TmCOUCSsAOVD+K5E4S4FjfG E=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AFAgBxmA5X/5hdJa1egmtMU30Grm2LW?= =?us-ascii?q?AENgW0EFwEKghgBg1MCHIEnOBQBAQEBAQEBZSeEQQEBAQMBAQEBFwMGCjoHCwU?= =?us-ascii?q?HBAIBCA4DBAEBASABBgMCAgIfBgsUCQgCBAENBQiIDAMKCA6wV40EDYUjAQEBA?= =?us-ascii?q?QEBAQEBAQEBAQEBAQEBAQEBEQSJaoECgkGCFBcJgkqCVgWTG4Q8MQGFdoJzgy6?= =?us-ascii?q?BboFuhE6DKIUzhiCBK4dbAR4BAUKCBBmBSmyIfH4BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,480,1454976000";  d="scan'208,217";a="259562193"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 Apr 2016 19:11:13 +0000
Received: from XCH-ALN-010.cisco.com (xch-aln-010.cisco.com [173.36.7.20]) by rcdn-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id u3DJBCD0018051 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 19:11:12 GMT
Received: from xch-rcd-020.cisco.com (173.37.102.30) by XCH-ALN-010.cisco.com (173.36.7.20) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 13 Apr 2016 14:11:12 -0500
Received: from xch-rcd-020.cisco.com ([173.37.102.30]) by XCH-RCD-020.cisco.com ([173.37.102.30]) with mapi id 15.00.1104.009; Wed, 13 Apr 2016 14:11:11 -0500
From: "Surendra Kumar (smkumar)" <smkumar@cisco.com>
To: Alia Atlas <akatlas@gmail.com>, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfRQZdXrBmlr06CGQN/c/WsFJ+HiRgAgAAA4gCAAAKWgIAACdAAgACudwCAAAWNAIAADNaAgABTqwD//63NkA==
Date: Wed, 13 Apr 2016 19:11:11 +0000
Message-ID: <4bacfb9979b44988b438338e4a777c5a@XCH-RCD-020.cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <1CC1CA8E-30CD-4DF1-8247-5B962B0125AA@cisco.com> <CAG4d1rdbN1a_ULMFXhQCMvwP9Qy2+o0-cpqyizmxCpc76cbArg@mail.gmail.com>
In-Reply-To: <CAG4d1rdbN1a_ULMFXhQCMvwP9Qy2+o0-cpqyizmxCpc76cbArg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.157.10.155]
Content-Type: multipart/alternative; boundary="_000_4bacfb9979b44988b438338e4a777c5aXCHRCD020ciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/iynQBhq7-apNO8EaruG9ciR5wtA>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 19:11:23 -0000

--_000_4bacfb9979b44988b438338e4a777c5aXCHRCD020ciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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=

--_000_4bacfb9979b44988b438338e4a777c5aXCHRCD020ciscocom_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_4bacfb9979b44988b438338e4a777c5aXCHRCD020ciscocom_--


From nobody Wed Apr 13 12:11:42 2016
Return-Path: <prvs=904b2bfe1=S.Majee@f5.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F7A612DDE8 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 12:11:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.017
X-Spam-Level: 
X-Spam-Status: No, score=-8.017 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=f5.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7Li-w5DjuVCd for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 12:11:30 -0700 (PDT)
Received: from mail.f5.com (mail.f5.com [208.85.209.139]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9390112DD8B for <sfc@ietf.org>; Wed, 13 Apr 2016 12:11:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=f5.com; i=@f5.com; q=dns/txt; s=seattle; t=1460574691; x=1492110691; h=from:to:subject:date:message-id:references:in-reply-to: content-id:content-transfer-encoding:mime-version; bh=OQmdnOEP5CUwfYtkeoPrRNE2KheKnGejuxJ8jxLcELk=; b=n0s/SYG81bRAdNqwolZBMavpXd1z6YWp2H9RCizWDDzQf9xZRzmeMoBr mmTKJUGgmpfoFzCemCtvemxJwMj+tGpnz/ydj4UqV1YJ4jUhEqAQg1WzO 13/e7XqzWzQrgPhvEbhaVZSEo6/3y4e054izePftP1wwiVR+XtRNoMO3a k=;
X-IronPort-AV: E=Sophos;i="5.24,480,1454976000"; d="scan'208";a="212807488"
Received: from oracle-apps.f5net.com (HELO exchmail.f5net.com) ([192.168.10.235]) by mail.f5.com with ESMTP; 13 Apr 2016 19:11:18 +0000
Received: from SEAEXCHMBX02.olympus.F5Net.com (192.168.15.224) by SEAEXCHMBX08.olympus.F5Net.com (192.168.15.227) with Microsoft SMTP Server (TLS) id 15.0.1156.6; Wed, 13 Apr 2016 12:11:16 -0700
Received: from SEAEXCHMBX02.olympus.F5Net.com ([fe80::dd5e:c398:17d9:927f]) by seaexchmbx02.olympus.F5Net.com ([fe80::dd5e:c398:17d9:927f%13]) with mapi id 15.00.1156.000; Wed, 13 Apr 2016 12:11:16 -0700
From: Sumandra Majee <S.Majee@F5.com>
To: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfiB6+8DFWMK0eTkw1/L1AdMJ+IWo4A
Date: Wed, 13 Apr 2016 19:11:16 +0000
Message-ID: <D333E2BE.4FEC1%s.majee@f5.com>
References: <m3egarz7kh.wl-narten@us.ibm.com>
In-Reply-To: <m3egarz7kh.wl-narten@us.ibm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.4.150722
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.168.15.239]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <E634EE0F043FF949A4A4A75E492AC756@F5.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/7rV5nuPpxev5yC-T2Wz6gHB2yFQ>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 19:11:42 -0000

Thomas,

I do support the adoption of this draft.

The overriding concern seems to be that for MD type 1 the semantics of
context header is not standardized, and my view is that it is GOOD that
this draft considers context info area to be a scratchpad.

A) I don=B9t think neither DC allocation and mobility allocation of context
headers will satisfy all cases. Our implementation uses context header
scratchpad to put some different information.

B) Standardizing context header too early also has a higher chance of not
meeting the actual implementation need. This is a new technology that
doesn=B9t have much milage.

C) YES interoperability is an issue. And I would like to see the
allocation draft(s) reserve 3/4 bits to specify the allocation type/schema
itself. I would like to see a context header registry for MD type 1
allocation itself. However that can be addressed separately in the
allocation draft(s).

Sumandra


On 3/30/16, 7:48 PM, "sfc on behalf of Thomas Narten"
<sfc-bounces@ietf.org on behalf of narten@us.ibm.com> wrote:

>Dear WG:
>
>This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>(https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>
>The editors of the NSH document have indicated that they have
>addressed all known comments and that there are no open issues with
>the current version of the document.
>
>Substantive comments to the list please, editorial comments can go
>directly to the document editors.
>
>We'll also get a brief update from the editors at next week's
>meeting. If there are any remaining issues with the document, raising
>them before the meeting would be especially helpful.
>
>For the chairs,
>Thomas
>
>_______________________________________________
>sfc mailing list
>sfc@ietf.org
>https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Apr 13 12:44:00 2016
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65E0312D6BF for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 12:43:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jhXtEsChtK8N for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 12:43:57 -0700 (PDT)
Received: from hub021-ca-4.exch021.serverdata.net (hub021-ca-4.exch021.serverdata.net [64.78.22.171]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BEDDA12D4FF for <sfc@ietf.org>; Wed, 13 Apr 2016 12:43:57 -0700 (PDT)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-4.exch021.domain.local ([10.254.4.39]) with mapi id 14.03.0266.001;  Wed, 13 Apr 2016 12:43:57 -0700
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: Sumandra Majee <S.Majee@F5.com>, Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfijVJMNJL6xkKtVPhZYT1+65+IWo4AgAAH/QA=
Date: Wed, 13 Apr 2016 19:43:56 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B6D77FCF8@MBX021-W3-CA-2.exch021.domain.local>
References: <m3egarz7kh.wl-narten@us.ibm.com> <D333E2BE.4FEC1%s.majee@f5.com>
In-Reply-To: <D333E2BE.4FEC1%s.majee@f5.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/j-Ug8-M--jISuVL3YVXRw1wqivo>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 19:43:59 -0000

Sumandra,

I don't object to the scratchpad nature of the MD-type-1 metadata.   But I =
have a small reservation and a large reservation around other aspects of it=
:

* small reservation -- why call this 4 context headers of 4 bytes each?   I=
t would be much more intuitive to call it a 16 byte scratch pad.   The form=
er implies structure that is present, at best, in an implementation-specifi=
c manner.

* large reservation -- since this is a scratch pad, it does not seem justif=
iable to make it mandatory.

My objections would be removed if it were a 16-byte scratchpad that was opt=
ional.=20

Thanks.

   Ron


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Sumandra Majee
Sent: Wednesday, April 13, 2016 3:11 PM
To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Thomas,

I do support the adoption of this draft.

The overriding concern seems to be that for MD type 1 the semantics of cont=
ext header is not standardized, and my view is that it is GOOD that this dr=
aft considers context info area to be a scratchpad.

A) I don=B9t think neither DC allocation and mobility allocation of context=
 headers will satisfy all cases. Our implementation uses context header scr=
atchpad to put some different information.

B) Standardizing context header too early also has a higher chance of not m=
eeting the actual implementation need. This is a new technology that doesn=
=B9t have much milage.

C) YES interoperability is an issue. And I would like to see the allocation=
 draft(s) reserve 3/4 bits to specify the allocation type/schema itself. I =
would like to see a context header registry for MD type 1 allocation itself=
. However that can be addressed separately in the allocation draft(s).

Sumandra


On 3/30/16, 7:48 PM, "sfc on behalf of Thomas Narten"
<sfc-bounces@ietf.org on behalf of narten@us.ibm.com> wrote:

>Dear WG:
>
>This note begins a WG last call on draft-ietf-sfc-nsh-04.txt=20
>(https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>
>The editors of the NSH document have indicated that they have addressed=20
>all known comments and that there are no open issues with the current=20
>version of the document.
>
>Substantive comments to the list please, editorial comments can go=20
>directly to the document editors.
>
>We'll also get a brief update from the editors at next week's meeting.=20
>If there are any remaining issues with the document, raising them=20
>before the meeting would be especially helpful.
>
>For the chairs,
>Thomas
>
>_______________________________________________
>sfc mailing list
>sfc@ietf.org
>https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Apr 13 12:58:56 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA08512D67F for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 12:58:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2VZv3aAyOJkr for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 12:58:53 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E39E12D88A for <sfc@ietf.org>; Wed, 13 Apr 2016 12:58:53 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id D61FA2E8E00; Wed, 13 Apr 2016 12:58:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1460577532; bh=eHNnW0LoQsdl3ldehQ8zHOE9wTpdX8p0AXStgWBrAts=; h=Subject:To:References:From:Date:In-Reply-To:From; b=aajk4AZm88efhc7ynl6cN/5vfMdT55WKyoNmrDyNbx5dYfCOpfrGozkSNcs0xzqp+ /ddxmPdDeDixbZY9ld3rMq15R2GIetQGV92c01+zIt5iTyI0J2pK2+ov6u9YczCVnO FDCZB385Bw3X2sORm811FctCnJsv9kYqyVMgwbsk=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id B7E712E8E27; Wed, 13 Apr 2016 12:58:49 -0700 (PDT)
To: "Fedyk, Don" <don.fedyk@hpe.com>, Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <m3egarz7kh.wl-narten@us.ibm.com> <A46D9C092EA46F489F135060986AD9FF225C4091@G4W3293.americas.hpqcorp.net>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <570EA4EE.8040203@joelhalpern.com>
Date: Wed, 13 Apr 2016 15:58:38 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <A46D9C092EA46F489F135060986AD9FF225C4091@G4W3293.americas.hpqcorp.net>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/CyscyZQdVtOvjJwr-P10Lg-a0Ks>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 19:58:55 -0000

I am having trouble following your argument about forwarding in this email.

Yes, transports can carry forwarding information.  The SFC archtiecture 
allows it.  that does not make including service paht identification in 
ht NSH header either redundant or incorrect.

I do not know what you mean by needing more examples of the forwarding. 
  The draft itself describes how the NSH header SFP ID and index can be 
used for the SFF forwarding decision.  That description seems quite 
clear to me.  If there is ambiguity or unclarity, please let the WG 
know, so we can improve it.

Yours,
Joel

On 4/13/16 3:05 PM, Fedyk, Don wrote:
> Hi Thomas
>
> At this point I do not support a last call on the NSH header. There is a lot of comments and I don't think it is at a point where it is last call ready.
>
> I have be banging my head against the wall on this one because I would like more concrete around the forwarding aspects.  I do accept that there is a draft (draft-kumar-sfc-nsh-forwarding-00 ) now that addresses some the confusion in NSH on forwarding and it helps.  Although it seems odd to let a NSH draft progress as confusing and to clarify it later in another draft.
>
> My main objection is related to the fact that for a draft that claims it is independent of forwarding it simply has not been proven.  That does not mean we need to specify forwarding but I'd still like to see the data formats of what are being "prototyped" today so I can compare with the other data formats that I know today.  For example the MAC chaining draft we authored would like to use NSH for metadata but the MAC chaining local MACs bear a relationship with the NSH SDI & SI.  In fact without these fields as mandatory it would be more independent in my case.  I'm sure there are similar aspects with other transports types but until I see them and the operations I can't assess transport independence claims.
>
> There are other inconsistencies that I could live with in the draft relating to the logic of the MD types etc. (A length field seems to be the only thing that is really needed and local context will determine the contents).  But we have made these comments more than once and I've seen little acknowledgment that if the NSH data is basically context driven fixed fields and TLVs could be mixed.
>
> So in short I support of the drafts goals as a way to carry metadata but it is not ready for last call yet in my opinion.
>
> Thanks
> Don
>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
>> Sent: Wednesday, March 30, 2016 10:48 PM
>> To: sfc@ietf.org
>> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Dear WG:
>>
>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>
>> The editors of the NSH document have indicated that they have addressed
>> all known comments and that there are no open issues with the current
>> version of the document.
>>
>> Substantive comments to the list please, editorial comments can go directly
>> to the document editors.
>>
>> We'll also get a brief update from the editors at next week's meeting. If
>> there are any remaining issues with the document, raising them before the
>> meeting would be especially helpful.
>>
>> For the chairs,
>> Thomas
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Wed Apr 13 13:03:03 2016
Return-Path: <agmalis@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C02F12E2AE for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 13:03:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XOG7nl9IF5Qj for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 13:03:00 -0700 (PDT)
Received: from mail-oi0-x235.google.com (mail-oi0-x235.google.com [IPv6:2607:f8b0:4003:c06::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3E84E12E24C for <sfc@ietf.org>; Wed, 13 Apr 2016 13:03:00 -0700 (PDT)
Received: by mail-oi0-x235.google.com with SMTP id y204so75307355oie.3 for <sfc@ietf.org>; Wed, 13 Apr 2016 13:03:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=Y7TQ89SfRj7ok5mMQxiDAAo6X4Kj33VC9sCEQAAyBaM=; b=JB97Tj0zDB9S45Y81Ot6UeL2OkrNbjx+hH/bwVBrtgqssi8mI/5Qy6VBQJhEx3s6gR bzaham7aiwZZmbMDeV6gil1FKyGqWc7olbB+VfEVzTSEB3alc0dRz7TAyNNyNLEcUtR3 KiP3sw3bJpcI7q+Ms5shi2zQxqYX7RqaWFGbMCzb8ingrEJ3nw7oGt4gR12JHtiwD7nc I1dKW4ZDkab+LDzIGjE90Zldw+rG4T6kizvbItYJp68ytS9GSgprowilAAtZxXsaOgDS pIXD2fipj16mVIcvR8PoMijMJMoPfkhKIGRuMAdenKwlNoafA4UBqfpazxQYK6z+GEW1 37gg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=Y7TQ89SfRj7ok5mMQxiDAAo6X4Kj33VC9sCEQAAyBaM=; b=PJ/3w1UEmbKlaQsRus3J8wkySQO5W5E55wfNqAQvf1o11iYYg98fClOX2rV+VKOyPU 8RfsSusjmkOcl+10r3NiUVRWBWuESQBjyrMosRLVxcPjZHJxu2Cfcs6/vlC465tiE/NQ cteT0BBLQkJH8/bH9pD57QKW1PEBKfpQbN1zc80M+abUzmPrQU1s94fxoPwn5i85OjgA bkuiJ8Jw2F4i7fbGWfqwUramRWDm/xJ/iBjEvXG5YjabG2EdoxwKF+80Prb8qzelUkg8 i53HC6JUzDXY+w2sCEIIg9qZvc4NPdl1wSZzmIM8Xf3Dl2pyXQNP3BPC0L/DxAG3EISz ukwA==
X-Gm-Message-State: AOPr4FXZnqj2o9JUPDYLqoTaI0oTvZPg5Lnsttj0JyiDXAAYQVPwlbiEUY/ZB10Cf0lsLxId9nOdCtY/iWqf9A==
X-Received: by 10.202.90.3 with SMTP id o3mr5415799oib.96.1460577779635; Wed, 13 Apr 2016 13:02:59 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.182.242.35 with HTTP; Wed, 13 Apr 2016 13:02:39 -0700 (PDT)
In-Reply-To: <9630F426-DA80-4804-BEDB-5BF12EE11798@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <570E4D07.2060405@pi.nu> <CAG4d1rcT1JmnGT-NWkYjd0uQm-kbm5-w7tfnJVs9W07L9Cir1A@mail.gmail.com> <CAG4d1rc=DpsXV3=p9dYX3tom0XLDb_uXJxHbVNennvXf8phoSQ@mail.gmail.com> <CAG4d1rf_KOjjRh9NV40j-SKbxe0Yw82LBPnpVuAoNThm9ZdOjQ@mail.gmail.com> <570E54DC.5060408@joelhalpern.com> <9630F426-DA80-4804-BEDB-5BF12EE11798@cisco.com>
From: "Andrew G. Malis" <agmalis@gmail.com>
Date: Wed, 13 Apr 2016 16:02:39 -0400
Message-ID: <CAA=duU1BtFrO9FGTTBADQry=DCdzVPDHmbE3tWNPEyWrMMYgvQ@mail.gmail.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Content-Type: multipart/alternative; boundary=001a113d5edcb8ddde053063432f
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Ff_-Y0d7fuxlybrL6XLPwAvr6x8>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Alia Atlas <akatlas@gmail.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 20:03:02 -0000

--001a113d5edcb8ddde053063432f
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Carlos,

We certainly could define a new NSH PW type, and require that when NSH is
transported over MPLS, then it=E2=80=99s in a PW. That would just require t=
he
consensus of the SFC WG on that approach, a draft for the PALS WG to define
the PW, and consensus there, of course. Of course, this approach would
require the use of LDP-based signaling, as always, to dynamically establish
the PW, or static provisioning of the PW label.

However, the SFC group is also free to rearrange the bits in the header
such that the first niblble is always 0x0 or 0x1, to prevent current HW
from incorrectly reordering SFC packets when carried over MPLS. I disagree
with you and Joel that the WG isn=E2=80=99t chartered to discuss how to car=
ry NSH
over various encapsulations, otherwise we wouldn=E2=80=99t have drafts (alr=
eady
existing) for how to carry the NSH header over Ethernet and UDP. Also,
optimizing the header to work well over a particular transport to account
for current implementations in the field doesn=E2=80=99t make the header
non-transport-dependent, since it wouldn=E2=80=99t prevent the header from =
being
carried over any other transport as well.

Cheers,
Andy

On Wed, Apr 13, 2016 at 2:27 PM, Carlos Pignataro (cpignata) <
cpignata@cisco.com> wrote:

>
> On Apr 13, 2016, at 10:17 AM, Joel M. Halpern <jmh@joelhalpern.com> wrote=
:
>
> Yes, Alia, there are many transports out there being used for service
> chaining.  Most of the folks using these farious transports expect to
> support NSH.  Several of these have been brought forward  as
> Internet-Drafts.  Not all.  Which makes sense as standardizing transport
> behavior for NSH is out of scope for the working group.
>
> It does seem that the WG has to decide if they want to adjust the header
> format to slightly simplify carrying one transport. The difficulty is tha=
t
> the WG is not scoped to evaluate the various ways NSH might be carried on
> MPLS, much less to standardize and pick one.
>
>
> I=E2=80=99ll add to this, without "taking sides", that it is a decision t=
radeoff
> between a detriment to all-but-one transports (an unused nibble) to cater
> to the specifics of one, with modulo to implementation implications, vers=
us
> optimizing for one transport. But as Joel said, not SFCs scope, charter;
> perhaps expertise ought to be drawn from MPLS.
>
> Yours,
> Joel
>
> On 4/13/16 9:55 AM, Alia Atlas wrote:
>
> There needs to be an answer beyond handwaving that something can be
> invented.
>
>
> Alia,
>
> If the requirement is to encapsulate NSH to transport it over MPLS
> networks, in a point-to-point fashion, in a way that prevents ECMP
> load-balancing, the IETF knows how to do that: It=E2=80=99s called a Pseu=
dowire.
>
> That=E2=80=99s not "handwaving that something can be invented=E2=80=9D. T=
he current NSH
> can be transported over MPLS.
>
> There are other alternatives such as specifying an =E2=80=9CNSH Explicit =
Label=E2=80=9D
> (or reusing GAL to indicate a header follows), followed by a CW/ACH with
> the first nibble as 0x0.
>
> That one liner is clearly not a specification, but it=E2=80=99s also not
> handwaving.
>
> These ought to be weighted against the alternative of modifying the NSH
> encap (plus, really, if we change NSH to start with 0x0, it would not be
> transport independent anymore :-)
>
> BTW, as an aside, as you know not all Encapsulations defined in the IETF
> begin with a fixed 0x0.
>
>
> Regards,
> Alia
>
>
> Thanks,
>
> =E2=80=94 Carlos.
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>
>

--001a113d5edcb8ddde053063432f
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Carlos,<div><br></div><div>We certainly could define a new=
 NSH PW type, and require that when NSH is transported over MPLS, then it=
=E2=80=99s in a PW. That would just require the consensus of the SFC WG on =
that approach, a draft for the PALS WG to define the PW, and consensus ther=
e, of course. Of course, this approach would require the use of LDP-based s=
ignaling, as always, to dynamically establish the PW, or static provisionin=
g of the PW label.</div><div><br></div><div>However, the SFC group is also =
free to rearrange the bits in the header such that the first niblble is alw=
ays 0x0 or 0x1, to prevent current HW from incorrectly reordering SFC packe=
ts when carried over MPLS. I disagree with you and Joel that the WG isn=E2=
=80=99t chartered to discuss how to carry NSH over various encapsulations, =
otherwise we wouldn=E2=80=99t have drafts (already existing) for how to car=
ry the NSH header over Ethernet and UDP. Also, optimizing the header to wor=
k well over a particular transport to account for current implementations i=
n the field doesn=E2=80=99t make the header non-transport-dependent, since =
it wouldn=E2=80=99t prevent the header from being carried over any other tr=
ansport as well.</div><div><br></div><div>Cheers,</div><div>Andy</div></div=
><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Wed, Apr 13, =
2016 at 2:27 PM, Carlos Pignataro (cpignata) <span dir=3D"ltr">&lt;<a href=
=3D"mailto:cpignata@cisco.com" target=3D"_blank">cpignata@cisco.com</a>&gt;=
</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex"><div style=3D"word-wrap:br=
eak-word"><br><div><span class=3D""><blockquote type=3D"cite"><div>On Apr 1=
3, 2016, at 10:17 AM, Joel M. Halpern &lt;<a href=3D"mailto:jmh@joelhalpern=
.com" target=3D"_blank">jmh@joelhalpern.com</a>&gt; wrote:</div><br><div><s=
pan style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-we=
ight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-tra=
nsform:none;white-space:normal;word-spacing:0px;float:none;display:inline!i=
mportant">Yes, Alia, there are many transports out there being used for ser=
vice chaining.=C2=A0 Most of the folks using these farious transports expec=
t to support NSH.=C2=A0 Several of these have been brought forward =C2=A0as=
 Internet-Drafts.=C2=A0 Not all.=C2=A0 Which makes sense as standardizing t=
ransport behavior for NSH is out of scope for the working group.</span><br =
style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weight=
:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-transfo=
rm:none;white-space:normal;word-spacing:0px"><br style=3D"font-family:Helve=
tica;font-size:12px;font-style:normal;font-weight:normal;letter-spacing:nor=
mal;text-align:start;text-indent:0px;text-transform:none;white-space:normal=
;word-spacing:0px"><span style=3D"font-family:Helvetica;font-size:12px;font=
-style:normal;font-weight:normal;letter-spacing:normal;text-align:start;tex=
t-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;float:=
none;display:inline!important">It does seem that the WG has to decide if th=
ey want to adjust the header format to slightly simplify carrying one trans=
port. The difficulty is that the WG is not scoped to evaluate the various w=
ays NSH might be carried on MPLS, much less to standardize and pick one.</s=
pan><br style=3D"font-family:Helvetica;font-size:12px;font-style:normal;fon=
t-weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text=
-transform:none;white-space:normal;word-spacing:0px"><br style=3D"font-fami=
ly:Helvetica;font-size:12px;font-style:normal;font-weight:normal;letter-spa=
cing:normal;text-align:start;text-indent:0px;text-transform:none;white-spac=
e:normal;word-spacing:0px"></div></blockquote><div><br></div></span><div>I=
=E2=80=99ll add to this, without &quot;taking sides&quot;, that it is a dec=
ision tradeoff between a detriment to all-but-one transports (an unused nib=
ble) to cater to the specifics of one, with modulo to implementation implic=
ations, versus optimizing for one transport. But as Joel said, not SFCs sco=
pe, charter; perhaps expertise ought to be drawn from MPLS.</div><br><block=
quote type=3D"cite"><div><span class=3D""><span style=3D"font-family:Helvet=
ica;font-size:12px;font-style:normal;font-weight:normal;letter-spacing:norm=
al;text-align:start;text-indent:0px;text-transform:none;white-space:normal;=
word-spacing:0px;float:none;display:inline!important">Yours,</span><br styl=
e=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weight:nor=
mal;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:n=
one;white-space:normal;word-spacing:0px"><span style=3D"font-family:Helveti=
ca;font-size:12px;font-style:normal;font-weight:normal;letter-spacing:norma=
l;text-align:start;text-indent:0px;text-transform:none;white-space:normal;w=
ord-spacing:0px;float:none;display:inline!important">Joel</span><br style=
=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weight:norm=
al;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:no=
ne;white-space:normal;word-spacing:0px"><br style=3D"font-family:Helvetica;=
font-size:12px;font-style:normal;font-weight:normal;letter-spacing:normal;t=
ext-align:start;text-indent:0px;text-transform:none;white-space:normal;word=
-spacing:0px"><span style=3D"font-family:Helvetica;font-size:12px;font-styl=
e:normal;font-weight:normal;letter-spacing:normal;text-align:start;text-ind=
ent:0px;text-transform:none;white-space:normal;word-spacing:0px;float:none;=
display:inline!important">On 4/13/16 9:55 AM, Alia Atlas wrote:</span><br s=
tyle=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weight:=
normal;letter-spacing:normal;text-align:start;text-indent:0px;text-transfor=
m:none;white-space:normal;word-spacing:0px"></span><span class=3D""><blockq=
uote type=3D"cite" style=3D"font-family:Helvetica;font-size:12px;font-style=
:normal;font-weight:normal;letter-spacing:normal;text-align:start;text-inde=
nt:0px;text-transform:none;white-space:normal;word-spacing:0px">There needs=
 to be an answer beyond handwaving that something can be<br>invented.<br><b=
r></blockquote></span></div></blockquote><div><br></div><div>Alia,</div><di=
v><br></div><div>If the requirement is to encapsulate NSH to transport it o=
ver MPLS networks, in a point-to-point fashion, in a way that prevents ECMP=
 load-balancing, the IETF knows how to do that: It=E2=80=99s called a Pseud=
owire.</div><div><br></div><div>That=E2=80=99s not &quot;handwaving that so=
mething can be invented=E2=80=9D. The current NSH can be transported over M=
PLS.</div><div><br></div><div>There are other alternatives such as specifyi=
ng an =E2=80=9CNSH Explicit Label=E2=80=9D (or reusing GAL to indicate a he=
ader follows), followed by a CW/ACH with the first nibble as 0x0.</div><div=
><br></div><div>That one liner is clearly not a specification, but it=E2=80=
=99s also not handwaving.</div><div><br></div><div>These ought to be weight=
ed against the alternative of modifying the NSH encap (plus, really, if we =
change NSH to start with 0x0, it would not be transport independent anymore=
 :-)</div><div><br></div><div>BTW, as an aside, as you know not all Encapsu=
lations defined in the IETF begin with a fixed 0x0.</div><div><br></div><bl=
ockquote type=3D"cite"><div><blockquote type=3D"cite" style=3D"font-family:=
Helvetica;font-size:12px;font-style:normal;font-weight:normal;letter-spacin=
g:normal;text-align:start;text-indent:0px;text-transform:none;white-space:n=
ormal;word-spacing:0px"><br>Regards,<br>Alia<br></blockquote></div></blockq=
uote></div><br><div>Thanks,</div><div><br></div><div>=E2=80=94 Carlos.</div=
></div><br>_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br></blockquote></div><br></div>

--001a113d5edcb8ddde053063432f--


From nobody Wed Apr 13 13:05:31 2016
Return-Path: <don.fedyk@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 131AB12D971 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 13:05:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id McpJHyxaKdVm for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 13:05:29 -0700 (PDT)
Received: from g9t5008.houston.hp.com (g9t5008.houston.hp.com [15.240.92.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E0DD112D734 for <sfc@ietf.org>; Wed, 13 Apr 2016 13:05:28 -0700 (PDT)
Received: from G9W8454.americas.hpqcorp.net (g9w8454.houston.hp.com [16.216.161.4]) (using TLSv1.2 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by g9t5008.houston.hp.com (Postfix) with ESMTPS id E35544C; Wed, 13 Apr 2016 20:05:27 +0000 (UTC)
Received: from G9W8454.americas.hpqcorp.net (16.216.161.4) by G9W8454.americas.hpqcorp.net (16.216.161.4) with Microsoft SMTP Server (TLS) id 15.0.1076.9; Wed, 13 Apr 2016 20:05:27 +0000
Received: from G9W3617.americas.hpqcorp.net (16.216.186.52) by G9W8454.americas.hpqcorp.net (16.216.161.4) with Microsoft SMTP Server (TLS) id 15.0.1076.9 via Frontend Transport; Wed, 13 Apr 2016 20:05:27 +0000
Received: from G4W3293.americas.hpqcorp.net ([169.254.2.173]) by G9W3617.americas.hpqcorp.net ([16.216.186.52]) with mapi id 14.03.0169.001; Wed, 13 Apr 2016 20:05:27 +0000
From: "Fedyk, Don" <don.fedyk@hpe.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfQ9ZjlrPWHUEW4Ok49bydgVZ+IUfhwgAAV1QCAAAB/UA==
Date: Wed, 13 Apr 2016 20:05:26 +0000
Message-ID: <A46D9C092EA46F489F135060986AD9FF225C412E@G4W3293.americas.hpqcorp.net>
References: <m3egarz7kh.wl-narten@us.ibm.com> <A46D9C092EA46F489F135060986AD9FF225C4091@G4W3293.americas.hpqcorp.net> <570EA4EE.8040203@joelhalpern.com>
In-Reply-To: <570EA4EE.8040203@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [16.210.48.21]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/TjE_WTXIXTWRVzDz7FyglXANUIw>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 20:05:31 -0000

Hi Joel

The argument has been put forward that NSH is only carrying identifiers.  W=
hen I look at NSH service forwarding that I know I disagree with that state=
ment.  I think that NSH SID + SI is an address space and hence is not compl=
etely independent of forwarding.  The only way I can reason it out is to se=
e other examples of complete packet headers and operations per hop.   There=
 has been a lot of hand waving.

Cheers
Don=20

> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Wednesday, April 13, 2016 3:59 PM
> To: Fedyk, Don <don.fedyk@hpe.com>; Thomas Narten
> <narten@us.ibm.com>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> I am having trouble following your argument about forwarding in this emai=
l.
>=20
> Yes, transports can carry forwarding information.  The SFC archtiecture a=
llows
> it.  that does not make including service paht identification in ht NSH h=
eader
> either redundant or incorrect.
>=20
> I do not know what you mean by needing more examples of the forwarding.
>   The draft itself describes how the NSH header SFP ID and index can be u=
sed
> for the SFF forwarding decision.  That description seems quite clear to m=
e.  If
> there is ambiguity or unclarity, please let the WG know, so we can improv=
e it.
>=20
> Yours,
> Joel
>=20
> On 4/13/16 3:05 PM, Fedyk, Don wrote:
> > Hi Thomas
> >
> > At this point I do not support a last call on the NSH header. There is =
a lot of
> comments and I don't think it is at a point where it is last call ready.
> >
> > I have be banging my head against the wall on this one because I would =
like
> more concrete around the forwarding aspects.  I do accept that there is a
> draft (draft-kumar-sfc-nsh-forwarding-00 ) now that addresses some the
> confusion in NSH on forwarding and it helps.  Although it seems odd to le=
t a
> NSH draft progress as confusing and to clarify it later in another draft.
> >
> > My main objection is related to the fact that for a draft that claims i=
t is
> independent of forwarding it simply has not been proven.  That does not
> mean we need to specify forwarding but I'd still like to see the data for=
mats
> of what are being "prototyped" today so I can compare with the other data
> formats that I know today.  For example the MAC chaining draft we authore=
d
> would like to use NSH for metadata but the MAC chaining local MACs bear a
> relationship with the NSH SDI & SI.  In fact without these fields as mand=
atory
> it would be more independent in my case.  I'm sure there are similar aspe=
cts
> with other transports types but until I see them and the operations I can=
't
> assess transport independence claims.
> >
> > There are other inconsistencies that I could live with in the draft rel=
ating to
> the logic of the MD types etc. (A length field seems to be the only thing=
 that
> is really needed and local context will determine the contents).  But we =
have
> made these comments more than once and I've seen little acknowledgment
> that if the NSH data is basically context driven fixed fields and TLVs co=
uld be
> mixed.
> >
> > So in short I support of the drafts goals as a way to carry metadata bu=
t it is
> not ready for last call yet in my opinion.
> >
> > Thanks
> > Don
> >
> >> -----Original Message-----
> >> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
> >> Sent: Wednesday, March 30, 2016 10:48 PM
> >> To: sfc@ietf.org
> >> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>
> >> Dear WG:
> >>
> >> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> >> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> >>
> >> The editors of the NSH document have indicated that they have
> >> addressed all known comments and that there are no open issues with
> >> the current version of the document.
> >>
> >> Substantive comments to the list please, editorial comments can go
> >> directly to the document editors.
> >>
> >> We'll also get a brief update from the editors at next week's
> >> meeting. If there are any remaining issues with the document, raising
> >> them before the meeting would be especially helpful.
> >>
> >> For the chairs,
> >> Thomas
> >>
> >> _______________________________________________
> >> sfc mailing list
> >> sfc@ietf.org
> >> https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
> >


From nobody Wed Apr 13 13:09:31 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 81FEC12B077 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 13:09:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b8Mh5FMAK21m for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 13:09:28 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B7B612D5A3 for <sfc@ietf.org>; Wed, 13 Apr 2016 13:09:24 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 244925201F3; Wed, 13 Apr 2016 13:09:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1460578164; bh=Q8Is6xmDxVHLgmrYez7o1uYEABaBRy3YpvR2JbV4Nig=; h=Subject:To:References:From:Date:In-Reply-To:From; b=ppQ3ri+TB2RfIOTS3toL91YZHmhGZCq+3IeL7sQn4f3AcCn63U+ZBc0so7i++oarr C+JjeccAdH2jR1uVowFYJWyhBCzg6sAttbFwCGyZMAvAMtfCCvA+44HKJuPa2Gkvpq nQ77AMiyiahgUc9JhFqb1I3ly09ZCMQD1Lzu2LLE=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 7EAE11C0346; Wed, 13 Apr 2016 13:09:23 -0700 (PDT)
To: "Fedyk, Don" <don.fedyk@hpe.com>, Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <m3egarz7kh.wl-narten@us.ibm.com> <A46D9C092EA46F489F135060986AD9FF225C4091@G4W3293.americas.hpqcorp.net> <570EA4EE.8040203@joelhalpern.com> <A46D9C092EA46F489F135060986AD9FF225C412E@G4W3293.americas.hpqcorp.net>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <570EA76D.8080000@joelhalpern.com>
Date: Wed, 13 Apr 2016 16:09:17 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <A46D9C092EA46F489F135060986AD9FF225C412E@G4W3293.americas.hpqcorp.net>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/g_2fSD6ub0eVa16ckQhsF_nrCQs>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 20:09:29 -0000

Given that the draft describes how to use the SFP ID and Index for
forwarding, it would seem very strange to argue that it does not
describe a forwarding behavior, or that those fields are not for use by
forwarding.  It is not REQUIRED that they be used for forwarding at an
SFF, but it is certainly permitted.

Is there wording in the draft that says that these are non-forwarding 
identifiers?  If so, we really should fix that.

Yours,
Joel

On 4/13/16 4:05 PM, Fedyk, Don wrote:
> Hi Joel
>
> The argument has been put forward that NSH is only carrying
> identifiers.  When I look at NSH service forwarding that I know I
> disagree with that statement.  I think that NSH SID + SI is an
> address space and hence is not completely independent of forwarding.
> The only way I can reason it out is to see other examples of complete
> packet headers and operations per hop.   There has been a lot of hand
> waving.
>
> Cheers Don
>
>> -----Original Message----- From: Joel M. Halpern
>> [mailto:jmh@joelhalpern.com] Sent: Wednesday, April 13, 2016 3:59
>> PM To: Fedyk, Don <don.fedyk@hpe.com>; Thomas Narten
>> <narten@us.ibm.com>; sfc@ietf.org Subject: Re: [sfc] WG last call
>> for draft-ietf-sfc-nsh-04.txt
>>
>> I am having trouble following your argument about forwarding in
>> this email.
>>
>> Yes, transports can carry forwarding information.  The SFC
>> archtiecture allows it.  that does not make including service paht
>> identification in ht NSH header either redundant or incorrect.
>>
>> I do not know what you mean by needing more examples of the
>> forwarding. The draft itself describes how the NSH header SFP ID
>> and index can be used for the SFF forwarding decision.  That
>> description seems quite clear to me.  If there is ambiguity or
>> unclarity, please let the WG know, so we can improve it.
>>
>> Yours, Joel
>>
>> On 4/13/16 3:05 PM, Fedyk, Don wrote:
>>> Hi Thomas
>>>
>>> At this point I do not support a last call on the NSH header.
>>> There is a lot of
>> comments and I don't think it is at a point where it is last call
>> ready.
>>>
>>> I have be banging my head against the wall on this one because I
>>> would like
>> more concrete around the forwarding aspects.  I do accept that
>> there is a draft (draft-kumar-sfc-nsh-forwarding-00 ) now that
>> addresses some the confusion in NSH on forwarding and it helps.
>> Although it seems odd to let a NSH draft progress as confusing and
>> to clarify it later in another draft.
>>>
>>> My main objection is related to the fact that for a draft that
>>> claims it is
>> independent of forwarding it simply has not been proven.  That does
>> not mean we need to specify forwarding but I'd still like to see
>> the data formats of what are being "prototyped" today so I can
>> compare with the other data formats that I know today.  For example
>> the MAC chaining draft we authored would like to use NSH for
>> metadata but the MAC chaining local MACs bear a relationship with
>> the NSH SDI & SI.  In fact without these fields as mandatory it
>> would be more independent in my case.  I'm sure there are similar
>> aspects with other transports types but until I see them and the
>> operations I can't assess transport independence claims.
>>>
>>> There are other inconsistencies that I could live with in the
>>> draft relating to
>> the logic of the MD types etc. (A length field seems to be the only
>> thing that is really needed and local context will determine the
>> contents).  But we have made these comments more than once and I've
>> seen little acknowledgment that if the NSH data is basically
>> context driven fixed fields and TLVs could be mixed.
>>>
>>> So in short I support of the drafts goals as a way to carry
>>> metadata but it is
>> not ready for last call yet in my opinion.
>>>
>>> Thanks Don
>>>
>>>> -----Original Message----- From: sfc
>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten Sent:
>>>> Wednesday, March 30, 2016 10:48 PM To: sfc@ietf.org Subject:
>>>> [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Dear WG:
>>>>
>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>
>>>> The editors of the NSH document have indicated that they have
>>>> addressed all known comments and that there are no open issues
>>>> with the current version of the document.
>>>>
>>>> Substantive comments to the list please, editorial comments can
>>>> go directly to the document editors.
>>>>
>>>> We'll also get a brief update from the editors at next week's
>>>> meeting. If there are any remaining issues with the document,
>>>> raising them before the meeting would be especially helpful.
>>>>
>>>> For the chairs, Thomas
>>>>
>>>> _______________________________________________ sfc mailing
>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>
>>> _______________________________________________ sfc mailing list
>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>


From nobody Wed Apr 13 13:10:55 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B536012DB1F for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 13:10:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KpSBwUzxD1qo for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 13:10:51 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E8E2612DAC9 for <sfc@ietf.org>; Wed, 13 Apr 2016 13:10:51 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id AEFD95202A3; Wed, 13 Apr 2016 13:10:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1460578251; bh=4+mtePvGblW+TJ1SCJHjN2Z3fTMjFEHqC3u0gl+VQ1s=; h=From:Subject:To:References:Cc:Date:In-Reply-To:From; b=mSVXsS6Ij5RxRrEr7Oc4EWb2Ut3y5RgEH3y9giMM56DnJPL5J/WZnaAV7SS1uJvMj RXNDcQ8AahyZ3Z19B9IbNjGNBoHtW2NTp0jmTSNNTCrKTYSaemCOOOugB056dHZP67 lpxejQJVDovt1GSGbkpwMwXDiNG2ITuGvozRNY00=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 27E005202A1; Wed, 13 Apr 2016 13:10:51 -0700 (PDT)
From: Joel Halpern <jmh@joelhalpern.com>
To: "Andrew G. Malis" <agmalis@gmail.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <570E4D07.2060405@pi.nu> <CAG4d1rcT1JmnGT-NWkYjd0uQm-kbm5-w7tfnJVs9W07L9Cir1A@mail.gmail.com> <CAG4d1rc=DpsXV3=p9dYX3tom0XLDb_uXJxHbVNennvXf8phoSQ@mail.gmail.com> <CAG4d1rf_KOjjRh9NV40j-SKbxe0Yw82LBPnpVuAoNThm9ZdOjQ@mail.gmail.com> <570E54DC.5060408@joelhalpern.com> <9630F426-DA80-4804-BEDB-5BF12EE11798@cisco.com> <CAA=duU1BtFrO9FGTTBADQry=DCdzVPDHmbE3tWNPEyWrMMYgvQ@mail.gmail.com>
Message-ID: <570EA7C4.1000006@joelhalpern.com>
Date: Wed, 13 Apr 2016 16:10:44 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <CAA=duU1BtFrO9FGTTBADQry=DCdzVPDHmbE3tWNPEyWrMMYgvQ@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/p2yBUoAEMCfbS6qUPdW2_kgCACw>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 20:10:54 -0000

[Resend, reducing CCs]

Andy, I have never seen a working group charter prevent the submission 
of individual drafts on a topic.  So the presence of drafts on UDP, 
Ethernet MAC Chaining, or any other transports says nothing about what 
is in our out of scope for the WG.

I have also seen WGs adopt drafts that are out of scope, but that is a 
more complicated situation, and usually indicates an expectation to 
expand the scope.

I have actually expressed concerns on the list about both the UDP draft 
and the Ethernet draft because I can not see a goo dpath forward for 
handling the material.

Changing the NSH layout is clearly within scope for the working group.

Yours,
Joel

On 4/13/16 4:02 PM, Andrew G. Malis wrote:
> Carlos,
>
> We certainly could define a new NSH PW type, and require that when NSH
> is transported over MPLS, then itâ€™s in a PW. That would just require the
> consensus of the SFC WG on that approach, a draft for the PALS WG to
> define the PW, and consensus there, of course. Of course, this approach
> would require the use of LDP-based signaling, as always, to dynamically
> establish the PW, or static provisioning of the PW label.
>
> However, the SFC group is also free to rearrange the bits in the header
> such that the first niblble is always 0x0 or 0x1, to prevent current HW
> from incorrectly reordering SFC packets when carried over MPLS. I
> disagree with you and Joel that the WG isnâ€™t chartered to discuss how to
> carry NSH over various encapsulations, otherwise we wouldnâ€™t have drafts
> (already existing) for how to carry the NSH header over Ethernet and
> UDP. Also, optimizing the header to work well over a particular
> transport to account for current implementations in the field doesnâ€™t
> make the header non-transport-dependent, since it wouldnâ€™t prevent the
> header from being carried over any other transport as well.
>
> Cheers,
> Andy
>
> On Wed, Apr 13, 2016 at 2:27 PM, Carlos Pignataro (cpignata)
> <cpignata@cisco.com <mailto:cpignata@cisco.com>> wrote:
>
>
>>     On Apr 13, 2016, at 10:17 AM, Joel M. Halpern <jmh@joelhalpern.com
>>     <mailto:jmh@joelhalpern.com>> wrote:
>>
>>     Yes, Alia, there are many transports out there being used for
>>     service chaining.  Most of the folks using these farious
>>     transports expect to support NSH.  Several of these have been
>>     brought forward  as Internet-Drafts.  Not all.  Which makes sense
>>     as standardizing transport behavior for NSH is out of scope for
>>     the working group.
>>
>>     It does seem that the WG has to decide if they want to adjust the
>>     header format to slightly simplify carrying one transport. The
>>     difficulty is that the WG is not scoped to evaluate the various
>>     ways NSH might be carried on MPLS, much less to standardize and
>>     pick one.
>>
>
>     Iâ€™ll add to this, without "taking sides", that it is a decision
>     tradeoff between a detriment to all-but-one transports (an unused
>     nibble) to cater to the specifics of one, with modulo to
>     implementation implications, versus optimizing for one transport.
>     But as Joel said, not SFCs scope, charter; perhaps expertise ought
>     to be drawn from MPLS.
>
>>     Yours,
>>     Joel
>>
>>     On 4/13/16 9:55 AM, Alia Atlas wrote:
>>>     There needs to be an answer beyond handwaving that something can be
>>>     invented.
>>>
>
>     Alia,
>
>     If the requirement is to encapsulate NSH to transport it over MPLS
>     networks, in a point-to-point fashion, in a way that prevents ECMP
>     load-balancing, the IETF knows how to do that: Itâ€™s called a Pseudowire.
>
>     Thatâ€™s not "handwaving that something can be inventedâ€. The current
>     NSH can be transported over MPLS.
>
>     There are other alternatives such as specifying an â€œNSH Explicit
>     Labelâ€ (or reusing GAL to indicate a header follows), followed by a
>     CW/ACH with the first nibble as 0x0.
>
>     That one liner is clearly not a specification, but itâ€™s also not
>     handwaving.
>
>     These ought to be weighted against the alternative of modifying the
>     NSH encap (plus, really, if we change NSH to start with 0x0, it
>     would not be transport independent anymore :-)
>
>     BTW, as an aside, as you know not all Encapsulations defined in the
>     IETF begin with a fixed 0x0.
>
>>>
>>>     Regards,
>>>     Alia
>
>     Thanks,
>
>     â€” Carlos.
>
>     _______________________________________________
>     sfc mailing list
>     sfc@ietf.org <mailto:sfc@ietf.org>
>     https://www.ietf.org/mailman/listinfo/sfc
>
>


From nobody Wed Apr 13 13:35:55 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D97F12E4D5 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 13:35:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Nw3K8kQkVkoA for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 13:35:48 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 465E312E4D8 for <sfc@ietf.org>; Wed, 13 Apr 2016 13:35:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=19325; q=dns/txt; s=iport; t=1460579746; x=1461789346; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=m6+5QtN4oFnvk9mUJEEK1vP0Puec17Ib18Oh9oOqp6Y=; b=KIzkcgDOYYmwc6yPt3ee1ucg3cVDnQWx9SxIdNFRPFCcikp/BNa6YfXc NlvQb4diyHgzT0chHKjz081p6NWp9RCTI5qzCyQ1uHEPXcdBJieYYWCSC sHLPVFr3a9lU9SYk8RzWl0AQH8UudBvzj6lHG6kitjxZSAl4hdVc74JUt A=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DvAgDTrA5X/5NdJa1egmtMU30Grm+GZ?= =?us-ascii?q?YRzDoFxFwEKhWwCgUE4FAEBAQEBAQFlJ4RBAQEBAwEBAQEaBkQEAwsFCwIBCBg?= =?us-ascii?q?VEgMCAiEGCxQRAgQOBQ6IBgMKCA6wVI0PDYUjAQEBAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBDQQEhiGBdYJWgkGBTV4SgkErgisFl1cxAYMjgWaHDoF1jxCHS4dbAR4BQ4I?= =?us-ascii?q?EGYFKbIh8fgEBAQ?=
X-IronPort-AV: E=Sophos;i="5.24,481,1454976000";  d="asc'?scan'208,217";a="91155594"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 Apr 2016 20:35:44 +0000
Received: from XCH-RTP-007.cisco.com (xch-rtp-007.cisco.com [64.101.220.147]) by rcdn-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id u3DKZiOT021675 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 20:35:44 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-007.cisco.com (64.101.220.147) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 13 Apr 2016 16:35:43 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Wed, 13 Apr 2016 16:35:43 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: "Andrew G. Malis" <agmalis@gmail.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfXjVJMNJL6xkKtVPhZYT1+65+HeFQAgAAA4wCAAAKVgIAACdAAgACudQCAAAWPAIAACHGA///AgQaAAEjVAIAARhKAgAAagYCAAAk8AA==
Date: Wed, 13 Apr 2016 20:35:43 +0000
Message-ID: <F596A889-CDE0-49F3-860F-7D3E50D7A121@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <570E4D07.2060405@pi.nu> <CAG4d1rcT1JmnGT-NWkYjd0uQm-kbm5-w7tfnJVs9W07L9Cir1A@mail.gmail.com> <CAG4d1rc=DpsXV3=p9dYX3tom0XLDb_uXJxHbVNennvXf8phoSQ@mail.gmail.com> <CAG4d1rf_KOjjRh9NV40j-SKbxe0Yw82LBPnpVuAoNThm9ZdOjQ@mail.gmail.com> <570E54DC.5060408@joelhalpern.com> <9630F426-DA80-4804-BEDB-5BF12EE11798@cisco.com> <CAA=duU1BtFrO9FGTTBADQry=DCdzVPDHmbE3tWNPEyWrMMYgvQ@mail.gmail.com>
In-Reply-To: <CAA=duU1BtFrO9FGTTBADQry=DCdzVPDHmbE3tWNPEyWrMMYgvQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.180.131]
Content-Type: multipart/signed; boundary="Apple-Mail=_DC36D7EB-D166-42A2-86BE-9B1E5DA17BB8"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/JqUkRnlODarCdAZRqUe4TupUAlw>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Alia Atlas <akatlas@gmail.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 20:35:51 -0000

--Apple-Mail=_DC36D7EB-D166-42A2-86BE-9B1E5DA17BB8
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_BAB5FAE0-9682-4E8A-B257-FE30FE792FE5"


--Apple-Mail=_BAB5FAE0-9682-4E8A-B257-FE30FE792FE5
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi, Andy,

Clearly, rearranging the bits of the NSH, such that the first nibble is =
always 0x0 (not 0x1, remember that=E2=80=99s PW-ACH) does not define an =
MPLS encapsulation for NSH.

The whole set of things you describe that we could do for an NSH PW, =
including encapsulation definition, signaling (LDP, static, or =
controller-based config, BGP, other), Internet-Drafts, consensus =
seeking, and others that you did not include like TTL settings, =
congestion considerations, security considerations, etc, would need to =
be specified in either case, of course. It=E2=80=99s not like SFC can =
say =E2=80=9Cfirst nibble is 0x0=E2=80=9D and the MPLS encap is done =E2=80=
=94 the ToDo list is even on either side.

But all this discussion seems tangential and a red herring. Since NSH =
can run over MPLS, but that=E2=80=99s not to be defined by SFC.

To clarify one additional point, the WG does not have drafts on various =
encapsulations, contrary to what you state or imply below. There are =
individual submissions.

Sorry I was not clear when I wrote that "setting the first nibble to 0x0 =
would make it transport-dependent". I did not intend to imply that the =
header would not run over various lower layers. That=E2=80=99s of course =
still possible. What I meant is that the header would have 4 bits =
dictated specifically in a dependent way based on one encapsulation, and =
all other encapsulations (that do not care about the first nibble) would =
inherit that dependency, dependent from an MPLS transport.

Thank you,

=E2=80=94 Carlos.

> On Apr 13, 2016, at 4:02 PM, Andrew G. Malis <agmalis@gmail.com> =
wrote:
>=20
> Carlos,
>=20
> We certainly could define a new NSH PW type, and require that when NSH =
is transported over MPLS, then it=E2=80=99s in a PW. That would just =
require the consensus of the SFC WG on that approach, a draft for the =
PALS WG to define the PW, and consensus there, of course. Of course, =
this approach would require the use of LDP-based signaling, as always, =
to dynamically establish the PW, or static provisioning of the PW label.
>=20
> However, the SFC group is also free to rearrange the bits in the =
header such that the first niblble is always 0x0 or 0x1, to prevent =
current HW from incorrectly reordering SFC packets when carried over =
MPLS. I disagree with you and Joel that the WG isn=E2=80=99t chartered =
to discuss how to carry NSH over various encapsulations, otherwise we =
wouldn=E2=80=99t have drafts (already existing) for how to carry the NSH =
header over Ethernet and UDP. Also, optimizing the header to work well =
over a particular transport to account for current implementations in =
the field doesn=E2=80=99t make the header non-transport-dependent, since =
it wouldn=E2=80=99t prevent the header from being carried over any other =
transport as well.
>=20
> Cheers,
> Andy
>=20
> On Wed, Apr 13, 2016 at 2:27 PM, Carlos Pignataro (cpignata) =
<cpignata@cisco.com <mailto:cpignata@cisco.com>> wrote:
>=20
>> On Apr 13, 2016, at 10:17 AM, Joel M. Halpern <jmh@joelhalpern.com =
<mailto:jmh@joelhalpern.com>> wrote:
>>=20
>> Yes, Alia, there are many transports out there being used for service =
chaining.  Most of the folks using these farious transports expect to =
support NSH.  Several of these have been brought forward  as =
Internet-Drafts.  Not all.  Which makes sense as standardizing transport =
behavior for NSH is out of scope for the working group.
>>=20
>> It does seem that the WG has to decide if they want to adjust the =
header format to slightly simplify carrying one transport. The =
difficulty is that the WG is not scoped to evaluate the various ways NSH =
might be carried on MPLS, much less to standardize and pick one.
>>=20
>=20
> I=E2=80=99ll add to this, without "taking sides", that it is a =
decision tradeoff between a detriment to all-but-one transports (an =
unused nibble) to cater to the specifics of one, with modulo to =
implementation implications, versus optimizing for one transport. But as =
Joel said, not SFCs scope, charter; perhaps expertise ought to be drawn =
from MPLS.
>=20
>> Yours,
>> Joel
>>=20
>> On 4/13/16 9:55 AM, Alia Atlas wrote:
>>> There needs to be an answer beyond handwaving that something can be
>>> invented.
>>>=20
>=20
> Alia,
>=20
> If the requirement is to encapsulate NSH to transport it over MPLS =
networks, in a point-to-point fashion, in a way that prevents ECMP =
load-balancing, the IETF knows how to do that: It=E2=80=99s called a =
Pseudowire.
>=20
> That=E2=80=99s not "handwaving that something can be invented=E2=80=9D. =
The current NSH can be transported over MPLS.
>=20
> There are other alternatives such as specifying an =E2=80=9CNSH =
Explicit Label=E2=80=9D (or reusing GAL to indicate a header follows), =
followed by a CW/ACH with the first nibble as 0x0.
>=20
> That one liner is clearly not a specification, but it=E2=80=99s also =
not handwaving.
>=20
> These ought to be weighted against the alternative of modifying the =
NSH encap (plus, really, if we change NSH to start with 0x0, it would =
not be transport independent anymore :-)
>=20
> BTW, as an aside, as you know not all Encapsulations defined in the =
IETF begin with a fixed 0x0.
>=20
>>>=20
>>> Regards,
>>> Alia
>=20
> Thanks,
>=20
> =E2=80=94 Carlos.
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org <mailto:sfc@ietf.org>
> https://www.ietf.org/mailman/listinfo/sfc =
<https://www.ietf.org/mailman/listinfo/sfc>
>=20
>=20


--Apple-Mail=_BAB5FAE0-9682-4E8A-B257-FE30FE792FE5
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">Hi, Andy,<div class=3D""><br class=3D""></div><div =
class=3D"">Clearly, rearranging the bits of the NSH, such that the first =
nibble is always 0x0 (not 0x1, remember that=E2=80=99s PW-ACH) does not =
define an MPLS encapsulation for NSH.&nbsp;</div><div class=3D""><br =
class=3D""></div><div class=3D"">The whole set of things you describe =
that we could do for an NSH PW, including encapsulation definition, =
signaling (LDP, static, or controller-based config, BGP, other), =
Internet-Drafts, consensus seeking, and others that you did not include =
like TTL settings, congestion considerations, security considerations, =
etc, would need to be specified in either case, of course. It=E2=80=99s =
not like SFC can say =E2=80=9Cfirst nibble is 0x0=E2=80=9D and the MPLS =
encap is done =E2=80=94 the ToDo list is even on either side.</div><div =
class=3D""><br class=3D""></div><div class=3D"">But all this discussion =
seems tangential and a red herring. Since NSH can run over MPLS, but =
that=E2=80=99s not to be defined by SFC.</div><div class=3D""><br =
class=3D""></div><div class=3D"">To clarify one additional point, the WG =
does not have drafts on various encapsulations, contrary to what you =
state or imply below. There are individual submissions.</div><div =
class=3D""><br class=3D""></div><div class=3D"">Sorry I was not clear =
when I wrote that "setting the first nibble to 0x0 would make it =
transport-dependent". I did not intend to imply that the header would =
not run over various lower layers. That=E2=80=99s of course still =
possible. What I meant is that the header would have 4 bits dictated =
specifically in a dependent way based on one encapsulation, and all =
other encapsulations (that do not care about the first nibble) would =
inherit that dependency, dependent from an MPLS transport.</div><div =
class=3D""><br class=3D""></div><div class=3D"">Thank you,</div><div =
class=3D""><br class=3D""></div><div class=3D"">=E2=80=94 =
Carlos.</div><div class=3D""><br class=3D""><div><blockquote type=3D"cite"=
 class=3D""><div class=3D"">On Apr 13, 2016, at 4:02 PM, Andrew G. Malis =
&lt;<a href=3D"mailto:agmalis@gmail.com" =
class=3D"">agmalis@gmail.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><meta =
http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dutf-8" =
class=3D""><div dir=3D"ltr" class=3D"">Carlos,<div class=3D""><br =
class=3D""></div><div class=3D"">We certainly could define a new NSH PW =
type, and require that when NSH is transported over MPLS, then it=E2=80=99=
s in a PW. That would just require the consensus of the SFC WG on that =
approach, a draft for the PALS WG to define the PW, and consensus there, =
of course. Of course, this approach would require the use of LDP-based =
signaling, as always, to dynamically establish the PW, or static =
provisioning of the PW label.</div><div class=3D""><br =
class=3D""></div><div class=3D"">However, the SFC group is also free to =
rearrange the bits in the header such that the first niblble is always =
0x0 or 0x1, to prevent current HW from incorrectly reordering SFC =
packets when carried over MPLS. I disagree with you and Joel that the WG =
isn=E2=80=99t chartered to discuss how to carry NSH over various =
encapsulations, otherwise we wouldn=E2=80=99t have drafts (already =
existing) for how to carry the NSH header over Ethernet and UDP. Also, =
optimizing the header to work well over a particular transport to =
account for current implementations in the field doesn=E2=80=99t make =
the header non-transport-dependent, since it wouldn=E2=80=99t prevent =
the header from being carried over any other transport as =
well.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Cheers,</div><div class=3D"">Andy</div></div><div =
class=3D"gmail_extra"><br class=3D""><div class=3D"gmail_quote">On Wed, =
Apr 13, 2016 at 2:27 PM, Carlos Pignataro (cpignata) <span dir=3D"ltr" =
class=3D"">&lt;<a href=3D"mailto:cpignata@cisco.com" target=3D"_blank" =
class=3D"">cpignata@cisco.com</a>&gt;</span> wrote:<br =
class=3D""><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex"><div =
style=3D"word-wrap:break-word" class=3D""><br class=3D""><div =
class=3D""><span class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D"">On Apr 13, 2016, at 10:17 AM, Joel M. Halpern &lt;<a =
href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank" =
class=3D"">jmh@joelhalpern.com</a>&gt; wrote:</div><br class=3D""><div =
class=3D""><span =
style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weigh=
t:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-trans=
form:none;white-space:normal;word-spacing:0px;float:none;display:inline!im=
portant" class=3D"">Yes, Alia, there are many transports out there being =
used for service chaining.&nbsp; Most of the folks using these farious =
transports expect to support NSH.&nbsp; Several of these have been =
brought forward &nbsp;as Internet-Drafts.&nbsp; Not all.&nbsp; Which =
makes sense as standardizing transport behavior for NSH is out of scope =
for the working group.</span><br =
style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weigh=
t:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-trans=
form:none;white-space:normal;word-spacing:0px" class=3D""><br =
style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weigh=
t:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-trans=
form:none;white-space:normal;word-spacing:0px" class=3D""><span =
style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weigh=
t:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-trans=
form:none;white-space:normal;word-spacing:0px;float:none;display:inline!im=
portant" class=3D"">It does seem that the WG has to decide if they want =
to adjust the header format to slightly simplify carrying one transport. =
The difficulty is that the WG is not scoped to evaluate the various ways =
NSH might be carried on MPLS, much less to standardize and pick =
one.</span><br =
style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weigh=
t:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-trans=
form:none;white-space:normal;word-spacing:0px" class=3D""><br =
style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weigh=
t:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-trans=
form:none;white-space:normal;word-spacing:0px" =
class=3D""></div></blockquote><div class=3D""><br =
class=3D""></div></span><div class=3D"">I=E2=80=99ll add to this, =
without "taking sides", that it is a decision tradeoff between a =
detriment to all-but-one transports (an unused nibble) to cater to the =
specifics of one, with modulo to implementation implications, versus =
optimizing for one transport. But as Joel said, not SFCs scope, charter; =
perhaps expertise ought to be drawn from MPLS.</div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><span =
class=3D""><span =
style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weigh=
t:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-trans=
form:none;white-space:normal;word-spacing:0px;float:none;display:inline!im=
portant" class=3D"">Yours,</span><br =
style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weigh=
t:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-trans=
form:none;white-space:normal;word-spacing:0px" class=3D""><span =
style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weigh=
t:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-trans=
form:none;white-space:normal;word-spacing:0px;float:none;display:inline!im=
portant" class=3D"">Joel</span><br =
style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weigh=
t:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-trans=
form:none;white-space:normal;word-spacing:0px" class=3D""><br =
style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weigh=
t:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-trans=
form:none;white-space:normal;word-spacing:0px" class=3D""><span =
style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weigh=
t:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-trans=
form:none;white-space:normal;word-spacing:0px;float:none;display:inline!im=
portant" class=3D"">On 4/13/16 9:55 AM, Alia Atlas wrote:</span><br =
style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weigh=
t:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-trans=
form:none;white-space:normal;word-spacing:0px" class=3D""></span><span =
class=3D""><blockquote type=3D"cite" =
style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weigh=
t:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-trans=
form:none;white-space:normal;word-spacing:0px" class=3D"">There needs to =
be an answer beyond handwaving that something can be<br =
class=3D"">invented.<br class=3D""><br =
class=3D""></blockquote></span></div></blockquote><div class=3D""><br =
class=3D""></div><div class=3D"">Alia,</div><div class=3D""><br =
class=3D""></div><div class=3D"">If the requirement is to encapsulate =
NSH to transport it over MPLS networks, in a point-to-point fashion, in =
a way that prevents ECMP load-balancing, the IETF knows how to do that: =
It=E2=80=99s called a Pseudowire.</div><div class=3D""><br =
class=3D""></div><div class=3D"">That=E2=80=99s not "handwaving that =
something can be invented=E2=80=9D. The current NSH can be transported =
over MPLS.</div><div class=3D""><br class=3D""></div><div class=3D"">There=
 are other alternatives such as specifying an =E2=80=9CNSH Explicit =
Label=E2=80=9D (or reusing GAL to indicate a header follows), followed =
by a CW/ACH with the first nibble as 0x0.</div><div class=3D""><br =
class=3D""></div><div class=3D"">That one liner is clearly not a =
specification, but it=E2=80=99s also not handwaving.</div><div =
class=3D""><br class=3D""></div><div class=3D"">These ought to be =
weighted against the alternative of modifying the NSH encap (plus, =
really, if we change NSH to start with 0x0, it would not be transport =
independent anymore :-)</div><div class=3D""><br class=3D""></div><div =
class=3D"">BTW, as an aside, as you know not all Encapsulations defined =
in the IETF begin with a fixed 0x0.</div><div class=3D""><br =
class=3D""></div><blockquote type=3D"cite" class=3D""><div =
class=3D""><blockquote type=3D"cite" =
style=3D"font-family:Helvetica;font-size:12px;font-style:normal;font-weigh=
t:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-trans=
form:none;white-space:normal;word-spacing:0px" class=3D""><br =
class=3D"">Regards,<br class=3D"">Alia<br =
class=3D""></blockquote></div></blockquote></div><br class=3D""><div =
class=3D"">Thanks,</div><div class=3D""><br class=3D""></div><div =
class=3D"">=E2=80=94 Carlos.</div></div><br =
class=3D"">_______________________________________________<br class=3D"">
sfc mailing list<br class=3D"">
<a href=3D"mailto:sfc@ietf.org" class=3D"">sfc@ietf.org</a><br class=3D"">=

<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" =
target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sfc</a><br class=3D"">
<br class=3D""></blockquote></div><br class=3D""></div>
</div></blockquote></div><br class=3D""></div></body></html>=

--Apple-Mail=_BAB5FAE0-9682-4E8A-B257-FE30FE792FE5--

--Apple-Mail=_DC36D7EB-D166-42A2-86BE-9B1E5DA17BB8
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=aX8B
-----END PGP SIGNATURE-----

--Apple-Mail=_DC36D7EB-D166-42A2-86BE-9B1E5DA17BB8--


From nobody Wed Apr 13 13:39:54 2016
Return-Path: <don.fedyk@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E5B9A12DB7E for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 13:39:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iRO-KtRowdFf for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 13:39:50 -0700 (PDT)
Received: from g9t5008.houston.hp.com (g9t5008.houston.hp.com [15.240.92.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0810E12E21B for <sfc@ietf.org>; Wed, 13 Apr 2016 13:39:48 -0700 (PDT)
Received: from G4W9121.americas.hpqcorp.net (g4w9121.houston.hp.com [16.210.21.16]) (using TLSv1.2 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by g9t5008.houston.hp.com (Postfix) with ESMTPS id 344AF51; Wed, 13 Apr 2016 20:39:48 +0000 (UTC)
Received: from G4W9121.americas.hpqcorp.net (16.210.21.16) by G4W9121.americas.hpqcorp.net (16.210.21.16) with Microsoft SMTP Server (TLS) id 15.0.1076.9; Wed, 13 Apr 2016 20:39:47 +0000
Received: from G4W6302.americas.hpqcorp.net (16.210.26.227) by G4W9121.americas.hpqcorp.net (16.210.21.16) with Microsoft SMTP Server (TLS) id 15.0.1076.9 via Frontend Transport; Wed, 13 Apr 2016 20:39:47 +0000
Received: from G4W3293.americas.hpqcorp.net ([169.254.2.173]) by G4W6302.americas.hpqcorp.net ([16.210.26.227]) with mapi id 14.03.0169.001; Wed, 13 Apr 2016 20:39:47 +0000
From: "Fedyk, Don" <don.fedyk@hpe.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfQ9ZjlrPWHUEW4Ok49bydgVZ+IUfhwgAAV1QCAAAB/UIAAAnuAgAACFbA=
Date: Wed, 13 Apr 2016 20:39:45 +0000
Message-ID: <A46D9C092EA46F489F135060986AD9FF225C41A6@G4W3293.americas.hpqcorp.net>
References: <m3egarz7kh.wl-narten@us.ibm.com> <A46D9C092EA46F489F135060986AD9FF225C4091@G4W3293.americas.hpqcorp.net> <570EA4EE.8040203@joelhalpern.com> <A46D9C092EA46F489F135060986AD9FF225C412E@G4W3293.americas.hpqcorp.net> <570EA76D.8080000@joelhalpern.com>
In-Reply-To: <570EA76D.8080000@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [16.210.48.21]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/hGmD9joPQ6mDvrf5QA4RwUCyQTc>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 20:39:53 -0000

Joel=20

I think that https://tools.ietf.org/html/draft-kumar-sfc-nsh-forwarding-00 =
clarifies Service Forwarding (along the chain) versus Packet forwarding (el=
sewhere).    But this draft points out that the NSH draft is "confusing" wi=
th respect to some parts of service forwarding.   And when I and others hav=
e asked on the list about subtleties of Service forwarding  behaviors and t=
he relationship of chain ID with various packet formats;  the answers were =
NSH SID and SI were just identifiers.  So while there is not a statement th=
ey are non-forwarding identifiers the confusion still exists because the be=
havior is not clear. =20
I still think NSH SID and SI  behave as an address space - receive a packet=
; lookup the address; if recognized process; then place the next hop addres=
s (includes not modifying the address in some cases) on the packet and forw=
ard on.  If the fields don't match expected values;  drop or exception proc=
ess.=20

Cheers
Don=20


> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Wednesday, April 13, 2016 4:09 PM
> To: Fedyk, Don <don.fedyk@hpe.com>; Thomas Narten
> <narten@us.ibm.com>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Given that the draft describes how to use the SFP ID and Index for
> forwarding, it would seem very strange to argue that it does not describe=
 a
> forwarding behavior, or that those fields are not for use by forwarding. =
 It is
> not REQUIRED that they be used for forwarding at an SFF, but it is certai=
nly
> permitted.
>=20
> Is there wording in the draft that says that these are non-forwarding
> identifiers?  If so, we really should fix that.
>=20
> Yours,
> Joel
>=20
> On 4/13/16 4:05 PM, Fedyk, Don wrote:
> > Hi Joel
> >
> > The argument has been put forward that NSH is only carrying
> > identifiers.  When I look at NSH service forwarding that I know I
> > disagree with that statement.  I think that NSH SID + SI is an address
> > space and hence is not completely independent of forwarding.
> > The only way I can reason it out is to see other examples of complete
> > packet headers and operations per hop.   There has been a lot of hand
> > waving.
> >
> > Cheers Don
> >
> >> -----Original Message----- From: Joel M. Halpern
> >> [mailto:jmh@joelhalpern.com] Sent: Wednesday, April 13, 2016 3:59 PM
> >> To: Fedyk, Don <don.fedyk@hpe.com>; Thomas Narten
> >> <narten@us.ibm.com>; sfc@ietf.org Subject: Re: [sfc] WG last call for
> >> draft-ietf-sfc-nsh-04.txt
> >>
> >> I am having trouble following your argument about forwarding in this
> >> email.
> >>
> >> Yes, transports can carry forwarding information.  The SFC
> >> archtiecture allows it.  that does not make including service paht
> >> identification in ht NSH header either redundant or incorrect.
> >>
> >> I do not know what you mean by needing more examples of the
> >> forwarding. The draft itself describes how the NSH header SFP ID and
> >> index can be used for the SFF forwarding decision.  That description
> >> seems quite clear to me.  If there is ambiguity or unclarity, please
> >> let the WG know, so we can improve it.
> >>
> >> Yours, Joel
> >>
> >> On 4/13/16 3:05 PM, Fedyk, Don wrote:
> >>> Hi Thomas
> >>>
> >>> At this point I do not support a last call on the NSH header.
> >>> There is a lot of
> >> comments and I don't think it is at a point where it is last call
> >> ready.
> >>>
> >>> I have be banging my head against the wall on this one because I
> >>> would like
> >> more concrete around the forwarding aspects.  I do accept that there
> >> is a draft (draft-kumar-sfc-nsh-forwarding-00 ) now that addresses
> >> some the confusion in NSH on forwarding and it helps.
> >> Although it seems odd to let a NSH draft progress as confusing and to
> >> clarify it later in another draft.
> >>>
> >>> My main objection is related to the fact that for a draft that
> >>> claims it is
> >> independent of forwarding it simply has not been proven.  That does
> >> not mean we need to specify forwarding but I'd still like to see the
> >> data formats of what are being "prototyped" today so I can compare
> >> with the other data formats that I know today.  For example the MAC
> >> chaining draft we authored would like to use NSH for metadata but the
> >> MAC chaining local MACs bear a relationship with the NSH SDI & SI.
> >> In fact without these fields as mandatory it would be more
> >> independent in my case.  I'm sure there are similar aspects with
> >> other transports types but until I see them and the operations I
> >> can't assess transport independence claims.
> >>>
> >>> There are other inconsistencies that I could live with in the draft
> >>> relating to
> >> the logic of the MD types etc. (A length field seems to be the only
> >> thing that is really needed and local context will determine the
> >> contents).  But we have made these comments more than once and I've
> >> seen little acknowledgment that if the NSH data is basically context
> >> driven fixed fields and TLVs could be mixed.
> >>>
> >>> So in short I support of the drafts goals as a way to carry metadata
> >>> but it is
> >> not ready for last call yet in my opinion.
> >>>
> >>> Thanks Don
> >>>
> >>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]
> >>>> On Behalf Of Thomas Narten Sent:
> >>>> Wednesday, March 30, 2016 10:48 PM To: sfc@ietf.org Subject:
> >>>> [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>
> >>>> Dear WG:
> >>>>
> >>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> >>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> >>>>
> >>>> The editors of the NSH document have indicated that they have
> >>>> addressed all known comments and that there are no open issues with
> >>>> the current version of the document.
> >>>>
> >>>> Substantive comments to the list please, editorial comments can go
> >>>> directly to the document editors.
> >>>>
> >>>> We'll also get a brief update from the editors at next week's
> >>>> meeting. If there are any remaining issues with the document,
> >>>> raising them before the meeting would be especially helpful.
> >>>>
> >>>> For the chairs, Thomas
> >>>>
> >>>> _______________________________________________ sfc
> mailing list
> >>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >>>
> >>> _______________________________________________ sfc mailing
> list
> >>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >>>


From nobody Wed Apr 13 13:41:14 2016
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8BCC012E4F5 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 13:41:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id suDcjNFfxYp1 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 13:41:11 -0700 (PDT)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE84212E4F4 for <sfc@ietf.org>; Wed, 13 Apr 2016 13:41:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5609; q=dns/txt; s=iport; t=1460580070; x=1461789670; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=fyvFmyVs4LpvVlq5Xh0OVaDrckUitUDBpPMUNCVXy+o=; b=OjIs3riHsvlAXDieu9LI+fxI9/oaZrwBeP2ilwoih8Ep3ZUpshVgq0fp W6yERde/cTiEdlEA7yQzvGEwsXAtZ16Vs3dzpHHM0t5zOpl+kHsv1CMP8 41OWke7pJliayyJUYoIgClQIZlBzYMBrYOhgu3sj7laf9IyvJA4fEwsK/ 8=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AOAgA8rg5X/4sNJK1egzdTfQa6RwENg?= =?us-ascii?q?XEXC4VsAoFBOBQBAQEBAQEBZSeEQQEBAQMBAQEBGh00BAcFBwQCAQgRBAEBAR4?= =?us-ascii?q?JBycLFAkIAgQOBYghCA7DGAEBAQEBAQEBAQEBAQEBAQEBAQEBAREEhiGBdYJWh?= =?us-ascii?q?A8RARyDLYIrBZgIAYV2iBaBZ4ROiFuGIIkGAR4BAUKCBBmBSmyIRjZ+AQEB?=
X-IronPort-AV: E=Sophos;i="5.24,481,1454976000"; d="scan'208";a="97009476"
Received: from alln-core-6.cisco.com ([173.36.13.139]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 13 Apr 2016 20:41:09 +0000
Received: from XCH-ALN-007.cisco.com (xch-aln-007.cisco.com [173.36.7.17]) by alln-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id u3DKf9Fa007873 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 20:41:09 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-007.cisco.com (173.36.7.17) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 13 Apr 2016 15:41:09 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Wed, 13 Apr 2016 15:41:09 -0500
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: "Fedyk, Don" <don.fedyk@hpe.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfXi0m0zbDrFUiQMfrqrpCL9J+IrLeAgAAO6ACAAAHmAIAACfiA
Date: Wed, 13 Apr 2016 20:41:09 +0000
Message-ID: <76E12D76-815F-47F9-B7B6-D5BCE5E5A60B@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <A46D9C092EA46F489F135060986AD9FF225C4091@G4W3293.americas.hpqcorp.net> <570EA4EE.8040203@joelhalpern.com> <A46D9C092EA46F489F135060986AD9FF225C412E@G4W3293.americas.hpqcorp.net>
In-Reply-To: <A46D9C092EA46F489F135060986AD9FF225C412E@G4W3293.americas.hpqcorp.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.178.207]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <4A1A2B26A905504ABA5DB9EB8C24AB17@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/x_PIU5LDJR8HPDmOKUlW2aNQHJE>
Cc: Thomas Narten <narten@us.ibm.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 20:41:12 -0000

Don,

Considered through the lens of a mac forwarding person I can see the discon=
nect.  NSH forwarding occurs at the service plane, not the network plane an=
d as such the SPI/SI acts an identifier for transport selection.  This de-c=
ouples NSH service path from the network.

So, in the service plane NSH SPI/SI indicate information about the path and=
 location within that path, but no actual movement (i.e. forwarding) can oc=
cur without the actual transport imposition.  This transport provides all t=
he normal transport characteristics you seek (dependent on the transport se=
lected).

Paul

> On Apr 13, 2016, at 4:05 PM, Fedyk, Don <don.fedyk@hpe.com> wrote:
>=20
> Hi Joel
>=20
> The argument has been put forward that NSH is only carrying identifiers. =
 When I look at NSH service forwarding that I know I disagree with that sta=
tement.  I think that NSH SID + SI is an address space and hence is not com=
pletely independent of forwarding.  The only way I can reason it out is to =
see other examples of complete packet headers and operations per hop.   The=
re has been a lot of hand waving.
>=20
> Cheers
> Don=20
>=20
>> -----Original Message-----
>> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
>> Sent: Wednesday, April 13, 2016 3:59 PM
>> To: Fedyk, Don <don.fedyk@hpe.com>; Thomas Narten
>> <narten@us.ibm.com>; sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>=20
>> I am having trouble following your argument about forwarding in this ema=
il.
>>=20
>> Yes, transports can carry forwarding information.  The SFC archtiecture =
allows
>> it.  that does not make including service paht identification in ht NSH =
header
>> either redundant or incorrect.
>>=20
>> I do not know what you mean by needing more examples of the forwarding.
>>  The draft itself describes how the NSH header SFP ID and index can be u=
sed
>> for the SFF forwarding decision.  That description seems quite clear to =
me.  If
>> there is ambiguity or unclarity, please let the WG know, so we can impro=
ve it.
>>=20
>> Yours,
>> Joel
>>=20
>> On 4/13/16 3:05 PM, Fedyk, Don wrote:
>>> Hi Thomas
>>>=20
>>> At this point I do not support a last call on the NSH header. There is =
a lot of
>> comments and I don't think it is at a point where it is last call ready.
>>>=20
>>> I have be banging my head against the wall on this one because I would =
like
>> more concrete around the forwarding aspects.  I do accept that there is =
a
>> draft (draft-kumar-sfc-nsh-forwarding-00 ) now that addresses some the
>> confusion in NSH on forwarding and it helps.  Although it seems odd to l=
et a
>> NSH draft progress as confusing and to clarify it later in another draft=
.
>>>=20
>>> My main objection is related to the fact that for a draft that claims i=
t is
>> independent of forwarding it simply has not been proven.  That does not
>> mean we need to specify forwarding but I'd still like to see the data fo=
rmats
>> of what are being "prototyped" today so I can compare with the other dat=
a
>> formats that I know today.  For example the MAC chaining draft we author=
ed
>> would like to use NSH for metadata but the MAC chaining local MACs bear =
a
>> relationship with the NSH SDI & SI.  In fact without these fields as man=
datory
>> it would be more independent in my case.  I'm sure there are similar asp=
ects
>> with other transports types but until I see them and the operations I ca=
n't
>> assess transport independence claims.
>>>=20
>>> There are other inconsistencies that I could live with in the draft rel=
ating to
>> the logic of the MD types etc. (A length field seems to be the only thin=
g that
>> is really needed and local context will determine the contents).  But we=
 have
>> made these comments more than once and I've seen little acknowledgment
>> that if the NSH data is basically context driven fixed fields and TLVs c=
ould be
>> mixed.
>>>=20
>>> So in short I support of the drafts goals as a way to carry metadata bu=
t it is
>> not ready for last call yet in my opinion.
>>>=20
>>> Thanks
>>> Don
>>>=20
>>>> -----Original Message-----
>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
>>>> Sent: Wednesday, March 30, 2016 10:48 PM
>>>> To: sfc@ietf.org
>>>> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>=20
>>>> Dear WG:
>>>>=20
>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>=20
>>>> The editors of the NSH document have indicated that they have
>>>> addressed all known comments and that there are no open issues with
>>>> the current version of the document.
>>>>=20
>>>> Substantive comments to the list please, editorial comments can go
>>>> directly to the document editors.
>>>>=20
>>>> We'll also get a brief update from the editors at next week's
>>>> meeting. If there are any remaining issues with the document, raising
>>>> them before the meeting would be especially helpful.
>>>>=20
>>>> For the chairs,
>>>> Thomas
>>>>=20
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>=20
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Apr 13 14:01:11 2016
Return-Path: <don.fedyk@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2924B12D914 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 14:01:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WDSEM5pJGCFo for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 14:01:08 -0700 (PDT)
Received: from g1t5424.austin.hp.com (g1t5424.austin.hp.com [15.216.225.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 066E112D90F for <sfc@ietf.org>; Wed, 13 Apr 2016 14:01:07 -0700 (PDT)
Received: from G1W8108.americas.hpqcorp.net (g1w8108.austin.hp.com [16.193.72.60]) (using TLSv1.2 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by g1t5424.austin.hp.com (Postfix) with ESMTPS id A32CA70; Wed, 13 Apr 2016 21:01:06 +0000 (UTC)
Received: from G1W8108.americas.hpqcorp.net (2002:10c3:2114::10c3:2114) by G1W8108.americas.hpqcorp.net (2002:10c3:2114::10c3:2114) with Microsoft SMTP Server (TLS) id 15.0.1076.9; Wed, 13 Apr 2016 21:00:36 +0000
Received: from G9W3613.americas.hpqcorp.net (16.216.186.48) by G1W8108.americas.hpqcorp.net (16.193.72.60) with Microsoft SMTP Server (TLS) id 15.0.1076.9 via Frontend Transport; Wed, 13 Apr 2016 21:00:36 +0000
Received: from G4W3293.americas.hpqcorp.net ([169.254.2.173]) by G9W3613.americas.hpqcorp.net ([16.216.186.48]) with mapi id 14.03.0169.001; Wed, 13 Apr 2016 21:00:36 +0000
From: "Fedyk, Don" <don.fedyk@hpe.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfQ9ZjlrPWHUEW4Ok49bydgVZ+IUfhwgAAV1QCAAAB/UIAAC2KAgAABpgA=
Date: Wed, 13 Apr 2016 21:00:35 +0000
Message-ID: <A46D9C092EA46F489F135060986AD9FF225C41D3@G4W3293.americas.hpqcorp.net>
References: <m3egarz7kh.wl-narten@us.ibm.com> <A46D9C092EA46F489F135060986AD9FF225C4091@G4W3293.americas.hpqcorp.net> <570EA4EE.8040203@joelhalpern.com> <A46D9C092EA46F489F135060986AD9FF225C412E@G4W3293.americas.hpqcorp.net> <76E12D76-815F-47F9-B7B6-D5BCE5E5A60B@cisco.com>
In-Reply-To: <76E12D76-815F-47F9-B7B6-D5BCE5E5A60B@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [16.210.48.21]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/0uAqWzbtNVShvxSIEJnI1-O-U6w>
Cc: Thomas Narten <narten@us.ibm.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 21:01:10 -0000

Hi Paul

The same statements are true when you put the ChainID in local MACs and use=
 them in the Service Plane.  No actual forwarding has to happen you can jus=
t change the IDs and message pass within a compute element. I'd say that is=
 an API call to me.  Packet formats are what is on the wire or the virtual =
wire. It so happens the MAC format can work for both.  But I believe that M=
PLS is similar in this regard.=20

Cheers
Don =20

> -----Original Message-----
> From: Paul Quinn (paulq) [mailto:paulq@cisco.com]
> Sent: Wednesday, April 13, 2016 4:41 PM
> To: Fedyk, Don <don.fedyk@hpe.com>
> Cc: Joel M. Halpern <jmh@joelhalpern.com>; Thomas Narten
> <narten@us.ibm.com>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Don,
>=20
> Considered through the lens of a mac forwarding person I can see the
> disconnect.  NSH forwarding occurs at the service plane, not the network
> plane and as such the SPI/SI acts an identifier for transport selection. =
 This
> de-couples NSH service path from the network.
>=20
> So, in the service plane NSH SPI/SI indicate information about the path a=
nd
> location within that path, but no actual movement (i.e. forwarding) can o=
ccur
> without the actual transport imposition.  This transport provides all the
> normal transport characteristics you seek (dependent on the transport
> selected).
>=20
> Paul
>=20
> > On Apr 13, 2016, at 4:05 PM, Fedyk, Don <don.fedyk@hpe.com> wrote:
> >
> > Hi Joel
> >
> > The argument has been put forward that NSH is only carrying identifiers=
.
> When I look at NSH service forwarding that I know I disagree with that
> statement.  I think that NSH SID + SI is an address space and hence is no=
t
> completely independent of forwarding.  The only way I can reason it out i=
s to
> see other examples of complete packet headers and operations per hop.
> There has been a lot of hand waving.
> >
> > Cheers
> > Don
> >
> >> -----Original Message-----
> >> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> >> Sent: Wednesday, April 13, 2016 3:59 PM
> >> To: Fedyk, Don <don.fedyk@hpe.com>; Thomas Narten
> >> <narten@us.ibm.com>; sfc@ietf.org
> >> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>
> >> I am having trouble following your argument about forwarding in this
> email.
> >>
> >> Yes, transports can carry forwarding information.  The SFC
> >> archtiecture allows it.  that does not make including service paht
> >> identification in ht NSH header either redundant or incorrect.
> >>
> >> I do not know what you mean by needing more examples of the
> forwarding.
> >>  The draft itself describes how the NSH header SFP ID and index can
> >> be used for the SFF forwarding decision.  That description seems
> >> quite clear to me.  If there is ambiguity or unclarity, please let the=
 WG
> know, so we can improve it.
> >>
> >> Yours,
> >> Joel
> >>
> >> On 4/13/16 3:05 PM, Fedyk, Don wrote:
> >>> Hi Thomas
> >>>
> >>> At this point I do not support a last call on the NSH header. There
> >>> is a lot of
> >> comments and I don't think it is at a point where it is last call read=
y.
> >>>
> >>> I have be banging my head against the wall on this one because I
> >>> would like
> >> more concrete around the forwarding aspects.  I do accept that there
> >> is a draft (draft-kumar-sfc-nsh-forwarding-00 ) now that addresses
> >> some the confusion in NSH on forwarding and it helps.  Although it
> >> seems odd to let a NSH draft progress as confusing and to clarify it l=
ater in
> another draft.
> >>>
> >>> My main objection is related to the fact that for a draft that
> >>> claims it is
> >> independent of forwarding it simply has not been proven.  That does
> >> not mean we need to specify forwarding but I'd still like to see the
> >> data formats of what are being "prototyped" today so I can compare
> >> with the other data formats that I know today.  For example the MAC
> >> chaining draft we authored would like to use NSH for metadata but the
> >> MAC chaining local MACs bear a relationship with the NSH SDI & SI.
> >> In fact without these fields as mandatory it would be more
> >> independent in my case.  I'm sure there are similar aspects with
> >> other transports types but until I see them and the operations I can't
> assess transport independence claims.
> >>>
> >>> There are other inconsistencies that I could live with in the draft
> >>> relating to
> >> the logic of the MD types etc. (A length field seems to be the only
> >> thing that is really needed and local context will determine the
> >> contents).  But we have made these comments more than once and I've
> >> seen little acknowledgment that if the NSH data is basically context
> >> driven fixed fields and TLVs could be mixed.
> >>>
> >>> So in short I support of the drafts goals as a way to carry metadata
> >>> but it is
> >> not ready for last call yet in my opinion.
> >>>
> >>> Thanks
> >>> Don
> >>>
> >>>> -----Original Message-----
> >>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
> >>>> Sent: Wednesday, March 30, 2016 10:48 PM
> >>>> To: sfc@ietf.org
> >>>> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>
> >>>> Dear WG:
> >>>>
> >>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> >>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> >>>>
> >>>> The editors of the NSH document have indicated that they have
> >>>> addressed all known comments and that there are no open issues with
> >>>> the current version of the document.
> >>>>
> >>>> Substantive comments to the list please, editorial comments can go
> >>>> directly to the document editors.
> >>>>
> >>>> We'll also get a brief update from the editors at next week's
> >>>> meeting. If there are any remaining issues with the document,
> >>>> raising them before the meeting would be especially helpful.
> >>>>
> >>>> For the chairs,
> >>>> Thomas
> >>>>
> >>>> _______________________________________________
> >>>> sfc mailing list
> >>>> sfc@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>
> >>> _______________________________________________
> >>> sfc mailing list
> >>> sfc@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/sfc
> >>>
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Apr 13 15:05:39 2016
Return-Path: <paul.bottorff@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 886B412E4CE for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 15:05:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z3TR_jMAonCE for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 15:05:35 -0700 (PDT)
Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2on0115.outbound.protection.outlook.com [207.46.100.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 62E5212E4CB for <sfc@ietf.org>; Wed, 13 Apr 2016 15:05:35 -0700 (PDT)
Received: from TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM (10.162.187.152) by TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM (10.162.187.152) with Microsoft SMTP Server (TLS) id 15.1.453.26; Wed, 13 Apr 2016 22:05:33 +0000
Received: from TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM ([10.162.187.152]) by TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM ([10.162.187.152]) with mapi id 15.01.0453.029; Wed, 13 Apr 2016 22:05:33 +0000
From: "Bottorff, Paul" <paul.bottorff@hpe.com>
To: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivflTl8PyB805kuSkB1naNwin5+IdPDQ
Date: Wed, 13 Apr 2016 22:05:33 +0000
Message-ID: <TU4PR84MB015931A06895E5B3094D1668FE960@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM>
References: <m3egarz7kh.wl-narten@us.ibm.com>
In-Reply-To: <m3egarz7kh.wl-narten@us.ibm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: us.ibm.com; dkim=none (message not signed) header.d=none;us.ibm.com; dmarc=none action=none header.from=hpe.com;
x-originating-ip: [15.211.195.7]
x-ms-office365-filtering-correlation-id: 75643347-ff7d-4ef4-3746-08d363e7bc49
x-microsoft-exchange-diagnostics: 1; TU4PR84MB0159; 5:eApIlxfy0MbwOMTaF07+TuZESOKHZmHBcIOU8tHgzl+urM4/EnGY+sjst0ru3LWRDhMGf5w5UqwnXiOZcAUIw1QgnySMCQPm7UUEMRAoGWoPzZANNqkf6rFKJaQZqnIxukLx9zePgUwJPErWCkFi9Q==; 24:64d61Z0ls/7AdFddhBF4Jvtj5mf/kSIttEijOeDQggw6UdDH6wj0e+48MkqNewjWG+xG1FKlxZwTKt85n3b00GoDtEPMZfDAnc4Rm0GwmmE=
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:TU4PR84MB0159;
x-microsoft-antispam-prvs: <TU4PR84MB0159CFBB588861271FF157EBFE960@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(5005006)(8121501046)(3002001)(10201501046); SRVR:TU4PR84MB0159; BCL:0; PCL:0; RULEID:; SRVR:TU4PR84MB0159; 
x-forefront-prvs: 0911D5CE78
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(13464003)(377454003)(5002640100001)(92566002)(9686002)(122556002)(2906002)(107886002)(2900100001)(189998001)(10400500002)(33656002)(5003600100002)(76176999)(5001770100001)(87936001)(54356999)(2950100001)(11100500001)(106116001)(50986999)(81166005)(230783001)(5004730100002)(102836003)(6116002)(19580405001)(3846002)(99286002)(5008740100001)(15975445007)(66066001)(19580395003)(1096002)(586003)(1220700001)(2501003)(86362001)(77096005)(7059030); DIR:OUT; SFP:1102; SCL:1; SRVR:TU4PR84MB0159; H:TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM; FPR:; SPF:None; MLV:sfv; LANG:en; 
spamdiagnosticoutput: 1:23
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: hpe.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Apr 2016 22:05:33.5631 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc
X-MS-Exchange-Transport-CrossTenantHeadersStamped: TU4PR84MB0159
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ifsuxuB3MQXY_VtzjiJO6ASnNMg>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 22:05:37 -0000

Hi Thomas:

I do not support last call on draft-eitf-sfc-nsh-04. The risk of rushing to=
 close a format before we have clear agreement on the forwarding principles=
 and features is just too high.

The major problems with the current draft are:=20
1)the service address formed by the combined SPI+SI appears to have a numbe=
r of deficiencies which lead to transport dependencies and to layer violati=
ons,
2)there is no resolution to forward/reverse addressing necessary for suppor=
t of many L4-high service functions,
3)there is no resolution to encoding hierarchies which are of importance to=
 SFC applications in NFV environments,
4)the draft needs a transport service interface and a description of the ma=
ppings used for the service layer onto the transport layer,
5)the draft specifies two independent formats for encoding the NSH header w=
hich is likely to divide the market slowing the deployment of NSH.

>From my point of view the SFC formed service plane layer network with a pee=
r dialog between the SCF, SFF and SF.  The Service Path Header (SPI+SI) for=
ms the address for this service plane. As it stands there is an attempt to =
overload the function of the SI as both the SF identifier with the Service =
Path and as a form of loop detection, however the coupling has resulted in =
two problems:=20
1)Since every SF in a path must have a sequential SI, in the event we need =
to insert or delete a SF it is necessary to update the SFF forwarding entri=
es for the entire chain. To fix this either the SI should be allowed to tak=
e non-sequential values along the chain or should not be used for SF addres=
sing.
2)Since the SI is only decremented on SF hops it can't guard against a loop=
 between SFFs or SCFs, hence SI is not a reliable method for loop squelchin=
g. If a TTL is needed it needs to be separated from SI. Given that there is=
 no clear alternative to TTL for loop squelching at the service layer I bel=
ieve we do need to include an effective TTL to go forward.
3)Every other successful address space has needed to add a few bits to supp=
ort QoS options. I would suggest taking 3-4 bits from the MD-type and to re=
serve for QoS handling.
4)In may data centers we have multi-vendor deployments. In these environmen=
ts we may have different managers assigning chains. There should to be some=
 convention for splitting the address space between these vendors. The most=
 desirable solution to this is to add an assigned organization ID to the ad=
dress space. An alternative would be to separate the SPI into a 4 and 20 bi=
t field designating the high 4 bits as a local manager ID.
 =20
There has been periodic questions about the use of a bit to designate the f=
orward/reverse direction. This is an important issue for support of L4-high=
er SF which typically generate frames in addition to forwarding frames. I h=
ave proposed using the transport source address as part of the forwarding t=
o eliminate the need for a bit, however if the committee wants to designate=
 a specific indication for forward/reverse then it should be fully document=
ed in the draft.

The discussion on hierarchies has proposed stacking NSH headers. Since a hi=
erarchy probably will require some type of indication in the NSH header we =
should have settled a solution before closing on the NSH header.

The way to make the draft transport independent is to specify an abstract s=
ervice interface between the service layer and the transport layer. The cur=
rent example transport mappings do not make clear what service the transpor=
t must provide to support the service plane. Looking at the current example=
s I think a transport service interface should include: the transport type,=
 the source transport address, the destination transport address, the trans=
port QoS.

Having two formats which accomplish essentially the same thing will divide =
the market. It also will slow implementations since vendors will either hav=
e to take a chance and pick one or implement both. Though all the technical=
 problems of two formats can be solved failing to choose a format is not a =
service to the industry.

Sincerely,

Paul


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
Sent: Wednesday, March 30, 2016 7:48 PM
To: sfc@ietf.org
Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Dear WG:

This note begins a WG last call on draft-ietf-sfc-nsh-04.txt (https://datat=
racker.ietf.org/doc/draft-ietf-sfc-nsh/).

The editors of the NSH document have indicated that they have addressed all=
 known comments and that there are no open issues with the current version =
of the document.

Substantive comments to the list please, editorial comments can go directly=
 to the document editors.

We'll also get a brief update from the editors at next week's meeting. If t=
here are any remaining issues with the document, raising them before the me=
eting would be especially helpful.

For the chairs,
Thomas

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Apr 13 15:09:45 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E189E12D8D5 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 15:09:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KTDkWC89WmbF for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 15:09:42 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3140C12D681 for <sfc@ietf.org>; Wed, 13 Apr 2016 15:09:42 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id C6C4D5C072D; Wed, 13 Apr 2016 15:09:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1460585381; bh=QWbv7lVaLi5ZFaAWQBmRXRVVly9/59n4J011iqlMo/w=; h=Subject:To:References:From:Date:In-Reply-To:From; b=Py+mQey3EXGaMm/oZq7KGIO2TKVE36AjdQMPPUqMchfVIU8PoR8q62nPchMG0NYzA N1cBNAxvcu0YifTahTbFyL/FoWzH4LpU3IV7Y+gf1c7o8Okq0kG/6LLsqBINkoaHVL EWdlqjgb8xfd4hzJAmb4OOijphXnbe0+YyAWqFuc=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 3545A5C0728; Wed, 13 Apr 2016 15:09:41 -0700 (PDT)
To: "Fedyk, Don" <don.fedyk@hpe.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <m3egarz7kh.wl-narten@us.ibm.com> <A46D9C092EA46F489F135060986AD9FF225C4091@G4W3293.americas.hpqcorp.net> <570EA4EE.8040203@joelhalpern.com> <A46D9C092EA46F489F135060986AD9FF225C412E@G4W3293.americas.hpqcorp.net> <570EA76D.8080000@joelhalpern.com> <A46D9C092EA46F489F135060986AD9FF225C41A6@G4W3293.americas.hpqcorp.net>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <570EC39E.6050201@joelhalpern.com>
Date: Wed, 13 Apr 2016 18:09:34 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <A46D9C092EA46F489F135060986AD9FF225C41A6@G4W3293.americas.hpqcorp.net>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/aW5ep70arMNIeBmJR9tTMkGMUsw>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 22:09:44 -0000

I am having trouble following you.  Sorry.  the kumar forwarding draft 
describes some ways one can implement things.  It is not define 
anything.  When I last looked, they appeared to be reasonable ways to 
implement things, but not the only ones.

So the question I have is what wording in the NSH draft causes you 
concern.  Is there wording in the NSH draft that gives the impression 
that the SPI / SI is only an "identifier"?  Is there wording that we 
could add that would help?

Thanks,
Joel

On 4/13/16 4:39 PM, Fedyk, Don wrote:
> Joel
>
> I think that
> https://tools.ietf.org/html/draft-kumar-sfc-nsh-forwarding-00
> clarifies Service Forwarding (along the chain) versus Packet
> forwarding (elsewhere).    But this draft points out that the NSH
> draft is "confusing" with respect to some parts of service
> forwarding.   And when I and others have asked on the list about
> subtleties of Service forwarding  behaviors and the relationship of
> chain ID with various packet formats;  the answers were NSH SID and
> SI were just identifiers.  So while there is not a statement they are
> non-forwarding identifiers the confusion still exists because the
> behavior is not clear. I still think NSH SID and SI  behave as an
> address space - receive a packet; lookup the address; if recognized
> process; then place the next hop address (includes not modifying the
> address in some cases) on the packet and forward on.  If the fields
> don't match expected values;  drop or exception process.
>
> Cheers Don
>
>
>> -----Original Message----- From: Joel M. Halpern
>> [mailto:jmh@joelhalpern.com] Sent: Wednesday, April 13, 2016 4:09
>> PM To: Fedyk, Don <don.fedyk@hpe.com>; Thomas Narten
>> <narten@us.ibm.com>; sfc@ietf.org Subject: Re: [sfc] WG last call
>> for draft-ietf-sfc-nsh-04.txt
>>
>> Given that the draft describes how to use the SFP ID and Index for
>> forwarding, it would seem very strange to argue that it does not
>> describe a forwarding behavior, or that those fields are not for
>> use by forwarding.  It is not REQUIRED that they be used for
>> forwarding at an SFF, but it is certainly permitted.
>>
>> Is there wording in the draft that says that these are
>> non-forwarding identifiers?  If so, we really should fix that.
>>
>> Yours, Joel
>>
>> On 4/13/16 4:05 PM, Fedyk, Don wrote:
>>> Hi Joel
>>>
>>> The argument has been put forward that NSH is only carrying
>>> identifiers.  When I look at NSH service forwarding that I know
>>> I disagree with that statement.  I think that NSH SID + SI is an
>>> address space and hence is not completely independent of
>>> forwarding. The only way I can reason it out is to see other
>>> examples of complete packet headers and operations per hop.
>>> There has been a lot of hand waving.
>>>
>>> Cheers Don
>>>
>>>> -----Original Message----- From: Joel M. Halpern
>>>> [mailto:jmh@joelhalpern.com] Sent: Wednesday, April 13, 2016
>>>> 3:59 PM To: Fedyk, Don <don.fedyk@hpe.com>; Thomas Narten
>>>> <narten@us.ibm.com>; sfc@ietf.org Subject: Re: [sfc] WG last
>>>> call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> I am having trouble following your argument about forwarding in
>>>> this email.
>>>>
>>>> Yes, transports can carry forwarding information.  The SFC
>>>> archtiecture allows it.  that does not make including service
>>>> paht identification in ht NSH header either redundant or
>>>> incorrect.
>>>>
>>>> I do not know what you mean by needing more examples of the
>>>> forwarding. The draft itself describes how the NSH header SFP
>>>> ID and index can be used for the SFF forwarding decision.  That
>>>> description seems quite clear to me.  If there is ambiguity or
>>>> unclarity, please let the WG know, so we can improve it.
>>>>
>>>> Yours, Joel
>>>>
>>>> On 4/13/16 3:05 PM, Fedyk, Don wrote:
>>>>> Hi Thomas
>>>>>
>>>>> At this point I do not support a last call on the NSH
>>>>> header. There is a lot of
>>>> comments and I don't think it is at a point where it is last
>>>> call ready.
>>>>>
>>>>> I have be banging my head against the wall on this one
>>>>> because I would like
>>>> more concrete around the forwarding aspects.  I do accept that
>>>> there is a draft (draft-kumar-sfc-nsh-forwarding-00 ) now that
>>>> addresses some the confusion in NSH on forwarding and it
>>>> helps. Although it seems odd to let a NSH draft progress as
>>>> confusing and to clarify it later in another draft.
>>>>>
>>>>> My main objection is related to the fact that for a draft
>>>>> that claims it is
>>>> independent of forwarding it simply has not been proven.  That
>>>> does not mean we need to specify forwarding but I'd still like
>>>> to see the data formats of what are being "prototyped" today so
>>>> I can compare with the other data formats that I know today.
>>>> For example the MAC chaining draft we authored would like to
>>>> use NSH for metadata but the MAC chaining local MACs bear a
>>>> relationship with the NSH SDI & SI. In fact without these
>>>> fields as mandatory it would be more independent in my case.
>>>> I'm sure there are similar aspects with other transports types
>>>> but until I see them and the operations I can't assess
>>>> transport independence claims.
>>>>>
>>>>> There are other inconsistencies that I could live with in the
>>>>> draft relating to
>>>> the logic of the MD types etc. (A length field seems to be the
>>>> only thing that is really needed and local context will
>>>> determine the contents).  But we have made these comments more
>>>> than once and I've seen little acknowledgment that if the NSH
>>>> data is basically context driven fixed fields and TLVs could be
>>>> mixed.
>>>>>
>>>>> So in short I support of the drafts goals as a way to carry
>>>>> metadata but it is
>>>> not ready for last call yet in my opinion.
>>>>>
>>>>> Thanks Don
>>>>>
>>>>>> -----Original Message----- From: sfc
>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
>>>>>> Sent: Wednesday, March 30, 2016 10:48 PM To: sfc@ietf.org
>>>>>> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Dear WG:
>>>>>>
>>>>>> This note begins a WG last call on
>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>
>>>>>> The editors of the NSH document have indicated that they
>>>>>> have addressed all known comments and that there are no
>>>>>> open issues with the current version of the document.
>>>>>>
>>>>>> Substantive comments to the list please, editorial comments
>>>>>> can go directly to the document editors.
>>>>>>
>>>>>> We'll also get a brief update from the editors at next
>>>>>> week's meeting. If there are any remaining issues with the
>>>>>> document, raising them before the meeting would be
>>>>>> especially helpful.
>>>>>>
>>>>>> For the chairs, Thomas
>>>>>>
>>>>>> _______________________________________________ sfc
>> mailing list
>>>>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>>> _______________________________________________ sfc mailing
>> list
>>>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>


From nobody Wed Apr 13 15:53:00 2016
Return-Path: <prvs=904b2bfe1=S.Majee@f5.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7824612E1F3 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 15:52:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.017
X-Spam-Level: 
X-Spam-Status: No, score=-8.017 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=f5.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bvPo2BA_BLfy for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 15:52:57 -0700 (PDT)
Received: from mail.f5.com (mail.f5.com [208.85.209.139]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4990812E1F0 for <sfc@ietf.org>; Wed, 13 Apr 2016 15:52:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=f5.com; i=@f5.com; q=dns/txt; s=seattle; t=1460587978; x=1492123978; h=from:to:subject:date:message-id:references:in-reply-to: content-id:content-transfer-encoding:mime-version; bh=OQSje9reGrQOY6FtyVpYDdlGrpWVl4TwppIPhJ04Y5w=; b=ezRVVkxUyeI9z5OGFGfcARgnz/J0ENHABXr+VevXJMurSJXjz3zfEFJC OuMPePmmkzKP6Qrh5sr+JhZQgd/Qw57X9ZUTA5qm1IFWEmKILQ8wfb5Av aGfgO5IevbuvA8jDlodiXc+2dMUSnaQT/H+1Jpy/bKTKFC+DF5o87IblT k=;
X-IronPort-AV: E=Sophos;i="5.24,481,1454976000"; d="scan'208";a="212841750"
Received: from oracle-apps.f5net.com (HELO exchmail.f5net.com) ([192.168.10.235]) by mail.f5.com with ESMTP; 13 Apr 2016 22:52:57 +0000
Received: from SEAEXCHMBX02.olympus.F5Net.com (192.168.15.224) by SEAEXCHMBX07.olympus.F5Net.com (192.168.15.50) with Microsoft SMTP Server (TLS) id 15.0.1156.6; Wed, 13 Apr 2016 15:52:56 -0700
Received: from SEAEXCHMBX02.olympus.F5Net.com ([fe80::dd5e:c398:17d9:927f]) by seaexchmbx02.olympus.F5Net.com ([fe80::dd5e:c398:17d9:927f%13]) with mapi id 15.00.1156.000; Wed, 13 Apr 2016 15:52:56 -0700
From: Sumandra Majee <S.Majee@F5.com>
To: Ron Parker <Ron_Parker@affirmednetworks.com>, Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfiB6+8DFWMK0eTkw1/L1AdMJ+IWo4AgAB+fAD//79zAA==
Date: Wed, 13 Apr 2016 22:52:56 +0000
Message-ID: <D33418AB.4FF2A%s.majee@f5.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <D333E2BE.4FEC1%s.majee@f5.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D77FCF8@MBX021-W3-CA-2.exch021.domain.local>
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B6D77FCF8@MBX021-W3-CA-2.exch021.domain.local>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.4.150722
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.168.15.239]
Content-Type: text/plain; charset="euc-kr"
Content-ID: <9199FE1188351E4AA18F113E1EEF8898@F5.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/5thE4HgmHrMbOoU2tjPAmfuCzOE>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 22:52:59 -0000
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From nobody Wed Apr 13 16:34:26 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A4FE12E2F0 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 13:07:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ib1fRnC64BDM for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 13:07:17 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A5DF412E326 for <sfc@ietf.org>; Wed, 13 Apr 2016 13:07:17 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 6BEA6520106; Wed, 13 Apr 2016 13:07:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1460578037; bh=TNXt4QGFOJl6YdNSRsU4i1zAKGhvfVMoYAhAxo86yn8=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=HQzAa5uiAFF82ceEPjcNpGv4bz1/RDLXH+usAY533F222K7AvkUxG/fyY0mrFKF5T 1PjDtgCKKF0YEkyPb9sKsXkiZknaCvhXFPz/RuMe1x2uKcIjLh6B9RKoHdVTtz2I31 76+zz6N/GhM1RBBlEBHnR/gg6hUuSrjOiW7KC8+E=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 457F9520105; Wed, 13 Apr 2016 13:07:16 -0700 (PDT)
To: "Andrew G. Malis" <agmalis@gmail.com>, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <570E4D07.2060405@pi.nu> <CAG4d1rcT1JmnGT-NWkYjd0uQm-kbm5-w7tfnJVs9W07L9Cir1A@mail.gmail.com> <CAG4d1rc=DpsXV3=p9dYX3tom0XLDb_uXJxHbVNennvXf8phoSQ@mail.gmail.com> <CAG4d1rf_KOjjRh9NV40j-SKbxe0Yw82LBPnpVuAoNThm9ZdOjQ@mail.gmail.com> <570E54DC.5060408@joelhalpern.com> <9630F426-DA80-4804-BEDB-5BF12EE11798@cisco.com> <CAA=duU1BtFrO9FGTTBADQry=DCdzVPDHmbE3tWNPEyWrMMYgvQ@mail.gmail.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <570EA6EE.2000503@joelhalpern.com>
Date: Wed, 13 Apr 2016 16:07:10 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <CAA=duU1BtFrO9FGTTBADQry=DCdzVPDHmbE3tWNPEyWrMMYgvQ@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/A7_xSQOTSDf4R_xdcNnMvdeAP7w>
X-Mailman-Approved-At: Wed, 13 Apr 2016 16:34:25 -0700
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Alia Atlas <akatlas@gmail.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 20:07:19 -0000

Andy, I have never seen a working group charter prevent the submission 
of individual drafts on a topic.  So the presence of drafts on UDP, 
Ethernet MAC Chaining, or any other transports says nothing about what 
is in our out of scope for the WG.

I have also seen WGs adopt drafts that are out of scope, but that is a 
more complicated situation, and usually indicates an expectation to 
expand the scope.

I have actually expressed concerns on the list about both the UDP draft 
and the Ethernet draft because I can not see a goo dpath forward for 
handling the material.

Changing the NSH layout is clearly within scope for the working group.

Yours,
Joel

On 4/13/16 4:02 PM, Andrew G. Malis wrote:
> Carlos,
>
> We certainly could define a new NSH PW type, and require that when NSH
> is transported over MPLS, then itâ€™s in a PW. That would just require the
> consensus of the SFC WG on that approach, a draft for the PALS WG to
> define the PW, and consensus there, of course. Of course, this approach
> would require the use of LDP-based signaling, as always, to dynamically
> establish the PW, or static provisioning of the PW label.
>
> However, the SFC group is also free to rearrange the bits in the header
> such that the first niblble is always 0x0 or 0x1, to prevent current HW
> from incorrectly reordering SFC packets when carried over MPLS. I
> disagree with you and Joel that the WG isnâ€™t chartered to discuss how to
> carry NSH over various encapsulations, otherwise we wouldnâ€™t have drafts
> (already existing) for how to carry the NSH header over Ethernet and
> UDP. Also, optimizing the header to work well over a particular
> transport to account for current implementations in the field doesnâ€™t
> make the header non-transport-dependent, since it wouldnâ€™t prevent the
> header from being carried over any other transport as well.
>
> Cheers,
> Andy
>
> On Wed, Apr 13, 2016 at 2:27 PM, Carlos Pignataro (cpignata)
> <cpignata@cisco.com <mailto:cpignata@cisco.com>> wrote:
>
>
>>     On Apr 13, 2016, at 10:17 AM, Joel M. Halpern <jmh@joelhalpern.com
>>     <mailto:jmh@joelhalpern.com>> wrote:
>>
>>     Yes, Alia, there are many transports out there being used for
>>     service chaining.  Most of the folks using these farious
>>     transports expect to support NSH.  Several of these have been
>>     brought forward  as Internet-Drafts.  Not all.  Which makes sense
>>     as standardizing transport behavior for NSH is out of scope for
>>     the working group.
>>
>>     It does seem that the WG has to decide if they want to adjust the
>>     header format to slightly simplify carrying one transport. The
>>     difficulty is that the WG is not scoped to evaluate the various
>>     ways NSH might be carried on MPLS, much less to standardize and
>>     pick one.
>>
>
>     Iâ€™ll add to this, without "taking sides", that it is a decision
>     tradeoff between a detriment to all-but-one transports (an unused
>     nibble) to cater to the specifics of one, with modulo to
>     implementation implications, versus optimizing for one transport.
>     But as Joel said, not SFCs scope, charter; perhaps expertise ought
>     to be drawn from MPLS.
>
>>     Yours,
>>     Joel
>>
>>     On 4/13/16 9:55 AM, Alia Atlas wrote:
>>>     There needs to be an answer beyond handwaving that something can be
>>>     invented.
>>>
>
>     Alia,
>
>     If the requirement is to encapsulate NSH to transport it over MPLS
>     networks, in a point-to-point fashion, in a way that prevents ECMP
>     load-balancing, the IETF knows how to do that: Itâ€™s called a Pseudowire.
>
>     Thatâ€™s not "handwaving that something can be inventedâ€. The current
>     NSH can be transported over MPLS.
>
>     There are other alternatives such as specifying an â€œNSH Explicit
>     Labelâ€ (or reusing GAL to indicate a header follows), followed by a
>     CW/ACH with the first nibble as 0x0.
>
>     That one liner is clearly not a specification, but itâ€™s also not
>     handwaving.
>
>     These ought to be weighted against the alternative of modifying the
>     NSH encap (plus, really, if we change NSH to start with 0x0, it
>     would not be transport independent anymore :-)
>
>     BTW, as an aside, as you know not all Encapsulations defined in the
>     IETF begin with a fixed 0x0.
>
>>>
>>>     Regards,
>>>     Alia
>
>     Thanks,
>
>     â€” Carlos.
>
>     _______________________________________________
>     sfc mailing list
>     sfc@ietf.org <mailto:sfc@ietf.org>
>     https://www.ietf.org/mailman/listinfo/sfc
>
>


From nobody Wed Apr 13 16:34:29 2016
Return-Path: <kegray@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD2C912E3FC for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 16:22:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IHe8UDY5bPYf for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 16:22:19 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1759512E160 for <sfc@ietf.org>; Wed, 13 Apr 2016 16:22:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=17880; q=dns/txt; s=iport; t=1460589739; x=1461799339; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=MJRBuS1s0791O85e449ecqd47XS/G2+j5kAjfSJrKkI=; b=gntWfLTBi6F4yMa9xpxxAqOiiAjIZsOs/0smMVDItcWRDyff/+pDfYUt F0HfK2nEtf1WPpKiz3vIb3t/Z/5UMNhkFZHcfTiJ2PCGt1yEsG8yBYhL1 aAHIUNZKScmvRzQKwaeyzDhKjySohDl/oUNL39TXoEHC6G/zn9H5SxOps M=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AjAgDe0w5X/4sNJK1egzdTfQaudYtYA?= =?us-ascii?q?Q2BcRcLghgBg1MCHIElOBQBAQEBAQEBZSeEQQEBAQMBAQEBGgYRMwcLDAQCAQY?= =?us-ascii?q?CDgMEAQEBAgIjAwICAh8GCxQBCAgCBAENBYgUAwoIDpM1nReNEQ2FIwEBAQEBA?= =?us-ascii?q?QEBAQEBAQEBAQEBAQEBAREEfIUlg0mBAoJBgXwYgmqCVgEEl1cxAYV2gnODLoF?= =?us-ascii?q?1gWeEToMohTOGIIErh1sBHgEBQoIDARmBSmyIfH4BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,481,1454976000"; d="scan'208";a="261020157"
Received: from alln-core-6.cisco.com ([173.36.13.139]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 13 Apr 2016 23:22:17 +0000
Received: from XCH-RCD-018.cisco.com (xch-rcd-018.cisco.com [173.37.102.28]) by alln-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id u3DNMHZ3028048 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 23:22:17 GMT
Received: from xch-aln-001.cisco.com (173.36.7.11) by XCH-RCD-018.cisco.com (173.37.102.28) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 13 Apr 2016 18:22:16 -0500
Received: from xch-aln-001.cisco.com ([173.36.7.11]) by XCH-ALN-001.cisco.com ([173.36.7.11]) with mapi id 15.00.1104.009; Wed, 13 Apr 2016 18:22:16 -0500
From: "Ken Gray (kegray)" <kegray@cisco.com>
To: Alia Atlas <akatlas@gmail.com>, Dave Dolson <ddolson@sandvine.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfXOrxwRb0D2Uqc0wibcP0Crp+HiRgAgAAA4gCAAAKWgIAACdAAgACudwCAAAWNAIAACHGA//+vvP+AAJCpAIAACquAgAATjgA=
Date: Wed, 13 Apr 2016 23:22:16 +0000
Message-ID: <D33424D2.1219BC%kegray@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <570E4D07.2060405@pi.nu> <CAG4d1rcT1JmnGT-NWkYjd0uQm-kbm5-w7tfnJVs9W07L9Cir1A@mail.gmail.com> <CAG4d1rc=DpsXV3=p9dYX3tom0XLDb_uXJxHbVNennvXf8phoSQ@mail.gmail.com> <CAG4d1rf_KOjjRh9NV40j-SKbxe0Yw82LBPnpVuAoNThm9ZdOjQ@mail.gmail.com> <E8355113905631478EFF04F5AA706E9830F1E1EC@wtl-exchp-2.sandvine.com> <CAG4d1rdpRWqt7tnafTZMFKQ7TwtLg_p=7SzOX0V2YNidrdFwcA@mail.gmail.com>
In-Reply-To: <CAG4d1rdpRWqt7tnafTZMFKQ7TwtLg_p=7SzOX0V2YNidrdFwcA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.214.28]
Content-Type: text/plain; charset="utf-8"
Content-ID: <D58D5E4972156E47A187AF79E74462EA@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/BLRTkRmehDljfCMCEDnUZdwZAlY>
X-Mailman-Approved-At: Wed, 13 Apr 2016 16:34:25 -0700
Cc: Thomas Narten <narten@us.ibm.com>, "Carlos Pignataro \(cpignata\)" <cpignata@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 23:22:22 -0000
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From nobody Wed Apr 13 16:34:56 2016
Return-Path: <naikumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7953312DDCC for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 11:25:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TsP0LlyE5mdW for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 11:25:35 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7D89E12DE9D for <sfc@ietf.org>; Wed, 13 Apr 2016 11:25:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=54560; q=dns/txt; s=iport; t=1460571935; x=1461781535; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=qPLBVJ0w59SWtgfInLZLZKzn6TblLzRIrZsEiyzqSMI=; b=IQ7rOKuG31OgYmFda8BKgodV58Amwlb57E68KD5ySRfHzLgCkXGBmth+ cbmR0MIkSM3WLGRCrzmzy5CheWFiWm9M2zyJvtKbXbKynO1Q/jn5U1Ckx KouaJMgsVY4NIsHtVphSt5CFmhKjHnn8bc1F+b2l+lagdztT51rqoBLDI U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AFAgCUjg5X/5NdJa1egmtMU30Grm2LW?= =?us-ascii?q?AENgW0EFwEKghgBg1MCHIEnOBQBAQEBAQEBZSeEQQEBAQMBAQEBFwMGRAcLBQc?= =?us-ascii?q?EAgEGAg4DAwEBAQEgAQYDAgICHwYLFAkIAgQBDQWIFAMKCA6TSZ0XjQgNhSMBA?= =?us-ascii?q?QEBAQEBAQEBAQEBAQEBAQEBAQERBIlqgQKCQYIUCg0JgkqCVgWTG4Q8MQGFdoJ?= =?us-ascii?q?zgy6BdYFnhE6DKIUzhiCBK4dbAR4BAUKCAwEZgUpsiHx+AQEB?=
X-IronPort-AV: E=Sophos; i="5.24,480,1454976000"; d="scan'208,217"; a="96094621"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 Apr 2016 18:25:34 +0000
Received: from XCH-RCD-019.cisco.com (xch-rcd-019.cisco.com [173.37.102.29]) by rcdn-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id u3DIPXgQ015084 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 Apr 2016 18:25:33 GMT
Received: from xch-rcd-015.cisco.com (173.37.102.25) by XCH-RCD-019.cisco.com (173.37.102.29) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 13 Apr 2016 13:25:32 -0500
Received: from xch-rcd-015.cisco.com ([173.37.102.25]) by XCH-RCD-015.cisco.com ([173.37.102.25]) with mapi id 15.00.1104.009; Wed, 13 Apr 2016 13:25:32 -0500
From: "Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com>
To: Alia Atlas <akatlas@gmail.com>, Dave Dolson <ddolson@sandvine.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfXyqCcD6VppkGV0uk4NIZKpp+HiRgAgAAA4gCAAAKWgIAACdAAgACudwCAAAWNAIAACHGA//+vvUCAAJCoAIAACquA///ApYA=
Date: Wed, 13 Apr 2016 18:25:32 +0000
Message-ID: <D33406CD.13BD96%naikumar@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <570E4D07.2060405@pi.nu> <CAG4d1rcT1JmnGT-NWkYjd0uQm-kbm5-w7tfnJVs9W07L9Cir1A@mail.gmail.com> <CAG4d1rc=DpsXV3=p9dYX3tom0XLDb_uXJxHbVNennvXf8phoSQ@mail.gmail.com> <CAG4d1rf_KOjjRh9NV40j-SKbxe0Yw82LBPnpVuAoNThm9ZdOjQ@mail.gmail.com> <E8355113905631478EFF04F5AA706E9830F1E1EC@wtl-exchp-2.sandvine.com> <CAG4d1rdpRWqt7tnafTZMFKQ7TwtLg_p=7SzOX0V2YNidrdFwcA@mail.gmail.com>
In-Reply-To: <CAG4d1rdpRWqt7tnafTZMFKQ7TwtLg_p=7SzOX0V2YNidrdFwcA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.150.52.207]
Content-Type: multipart/alternative; boundary="_000_D33406CD13BD96naikumarciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/bvJe41bpqKm3LunCoRuGzfHSiw8>
X-Mailman-Approved-At: Wed, 13 Apr 2016 16:34:31 -0700
Cc: Thomas Narten <narten@us.ibm.com>, "Carlos Pignataro \(cpignata\)" <cpignata@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Martin Stiemerling <mls.ietf@gmail.com>, Xuxiaohu <xuxiaohu@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 18:25:39 -0000
X-List-Received-Date: Wed, 13 Apr 2016 18:25:39 -0000

--_000_D33406CD13BD96naikumarciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_D33406CD13BD96naikumarciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <F29E7AFE425F8D44BF1D491BB5F5B354@emea.cisco.com>
Content-Transfer-Encoding: base64

PGh0bWw+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIgY29udGVudD0i
dGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjwvaGVhZD4NCjxib2R5IHN0eWxlPSJ3b3JkLXdy
YXA6IGJyZWFrLXdvcmQ7IC13ZWJraXQtbmJzcC1tb2RlOiBzcGFjZTsgLXdlYmtpdC1saW5lLWJy
ZWFrOiBhZnRlci13aGl0ZS1zcGFjZTsgY29sb3I6IHJnYigwLCAwLCAwKTsgZm9udC1zaXplOiAx
NHB4OyBmb250LWZhbWlseTogQ2FsaWJyaSwgc2Fucy1zZXJpZjsiPg0KPGRpdj5KdXN0IHRvIGFk
ZCB0byB3aGF0IEFsaWEgbWVudGlvbmVkLjwvZGl2Pg0KPGRpdj48YnI+DQo8L2Rpdj4NCjxkaXY+
TXkgdW5kZXJzdGFuZGluZyBpcyAmbmJzcDstIHRoZSBjb250cm9sIHdvcmQgc3RhcnRzIHdpdGgg
MDAwMGIuIFNvIGV2ZW4gaWYgaXQgY29sbGlkZXMgd2l0aCBleGlzdGluZyBPVUksIGl0IGRvZXMg
bm90IGNyZWF0ZSBhbnkgaXNzdWUsIGFzIHRoZSBpbnRlbnRpb24gaXMgdG8gYXZvaWQgdHJlYXRp
bmcgTUFDIGFkZHJlc3Mgc3RhcnRpbmcgd2l0aCA0IG9yIDYgYXMgZmlyc3QgbmliYmxlIGFzIElQ
djQgb3IgSVB2NiBwYWNrZXQuPC9kaXY+DQo8ZGl2Pjxicj4NCjwvZGl2Pg0KPGRpdj5UaGFua3Ms
PC9kaXY+DQo8ZGl2Pk5hZ2VuZHJhPC9kaXY+DQo8ZGl2Pjxicj4NCjwvZGl2Pg0KPHNwYW4gaWQ9
Ik9MS19TUkNfQk9EWV9TRUNUSU9OIj4NCjxkaXYgc3R5bGU9ImZvbnQtZmFtaWx5OkNhbGlicmk7
IGZvbnQtc2l6ZToxMXB0OyB0ZXh0LWFsaWduOmxlZnQ7IGNvbG9yOmJsYWNrOyBCT1JERVItQk9U
VE9NOiBtZWRpdW0gbm9uZTsgQk9SREVSLUxFRlQ6IG1lZGl1bSBub25lOyBQQURESU5HLUJPVFRP
TTogMGluOyBQQURESU5HLUxFRlQ6IDBpbjsgUEFERElORy1SSUdIVDogMGluOyBCT1JERVItVE9Q
OiAjYjVjNGRmIDFwdCBzb2xpZDsgQk9SREVSLVJJR0hUOiBtZWRpdW0gbm9uZTsgUEFERElORy1U
T1A6IDNwdCI+DQo8c3BhbiBzdHlsZT0iZm9udC13ZWlnaHQ6Ym9sZCI+RnJvbTogPC9zcGFuPnNm
YyAmbHQ7PGEgaHJlZj0ibWFpbHRvOnNmYy1ib3VuY2VzQGlldGYub3JnIj5zZmMtYm91bmNlc0Bp
ZXRmLm9yZzwvYT4mZ3Q7IG9uIGJlaGFsZiBvZiBBbGlhIEF0bGFzICZsdDs8YSBocmVmPSJtYWls
dG86YWthdGxhc0BnbWFpbC5jb20iPmFrYXRsYXNAZ21haWwuY29tPC9hPiZndDs8YnI+DQo8c3Bh
biBzdHlsZT0iZm9udC13ZWlnaHQ6Ym9sZCI+RGF0ZTogPC9zcGFuPldlZG5lc2RheSwgQXByaWwg
MTMsIDIwMTYgYXQgMjoxMiBQTTxicj4NCjxzcGFuIHN0eWxlPSJmb250LXdlaWdodDpib2xkIj5U
bzogPC9zcGFuPkRhdmUgRG9sc29uICZsdDs8YSBocmVmPSJtYWlsdG86ZGRvbHNvbkBzYW5kdmlu
ZS5jb20iPmRkb2xzb25Ac2FuZHZpbmUuY29tPC9hPiZndDs8YnI+DQo8c3BhbiBzdHlsZT0iZm9u
dC13ZWlnaHQ6Ym9sZCI+Q2M6IDwvc3Bhbj5UaG9tYXMgTmFydGVuICZsdDs8YSBocmVmPSJtYWls
dG86bmFydGVuQHVzLmlibS5jb20iPm5hcnRlbkB1cy5pYm0uY29tPC9hPiZndDssICZxdW90O0Nh
cmxvcyBQaWduYXRhcm8gKGNwaWduYXRhKSZxdW90OyAmbHQ7PGEgaHJlZj0ibWFpbHRvOmNwaWdu
YXRhQGNpc2NvLmNvbSI+Y3BpZ25hdGFAY2lzY28uY29tPC9hPiZndDssICZxdW90OzxhIGhyZWY9
Im1haWx0bzpzZmNAaWV0Zi5vcmciPnNmY0BpZXRmLm9yZzwvYT4mcXVvdDsNCiAmbHQ7PGEgaHJl
Zj0ibWFpbHRvOnNmY0BpZXRmLm9yZyI+c2ZjQGlldGYub3JnPC9hPiZndDssICZxdW90O0ppbSBH
dWljaGFyZCAoamd1aWNoYXIpJnF1b3Q7ICZsdDs8YSBocmVmPSJtYWlsdG86amd1aWNoYXJAY2lz
Y28uY29tIj5qZ3VpY2hhckBjaXNjby5jb208L2E+Jmd0OywgTWFydGluIFN0aWVtZXJsaW5nICZs
dDs8YSBocmVmPSJtYWlsdG86bWxzLmlldGZAZ21haWwuY29tIj5tbHMuaWV0ZkBnbWFpbC5jb208
L2E+Jmd0OywgWHV4aWFvaHUgJmx0OzxhIGhyZWY9Im1haWx0bzp4dXhpYW9odUBodWF3ZWkuY29t
Ij54dXhpYW9odUBodWF3ZWkuY29tPC9hPiZndDssDQogJnF1b3Q7Sm9lbCBNLiBIYWxwZXJuJnF1
b3Q7ICZsdDs8YSBocmVmPSJtYWlsdG86am1oQGpvZWxoYWxwZXJuLmNvbSI+am1oQGpvZWxoYWxw
ZXJuLmNvbTwvYT4mZ3Q7LCBMb2EgQW5kZXJzc29uICZsdDs8YSBocmVmPSJtYWlsdG86bG9hQHBp
Lm51Ij5sb2FAcGkubnU8L2E+Jmd0Ozxicj4NCjxzcGFuIHN0eWxlPSJmb250LXdlaWdodDpib2xk
Ij5TdWJqZWN0OiA8L3NwYW4+UmU6IFtzZmNdIFdHIGxhc3QgY2FsbCBmb3IgZHJhZnQtaWV0Zi1z
ZmMtbnNoLTA0LnR4dDxicj4NCjwvZGl2Pg0KPGRpdj48YnI+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2
Pg0KPGRpdiBkaXI9Imx0ciI+SGkgRGF2ZSwNCjxkaXY+PGJyPg0KPC9kaXY+DQo8ZGl2IGNsYXNz
PSJnbWFpbF9leHRyYSI+DQo8ZGl2IGNsYXNzPSJnbWFpbF9xdW90ZSI+T24gV2VkLCBBcHIgMTMs
IDIwMTYgYXQgMTozNCBQTSwgRGF2ZSBEb2xzb24gPHNwYW4gZGlyPSJsdHIiPg0KJmx0OzxhIGhy
ZWY9Im1haWx0bzpkZG9sc29uQHNhbmR2aW5lLmNvbSIgdGFyZ2V0PSJfYmxhbmsiPmRkb2xzb25A
c2FuZHZpbmUuY29tPC9hPiZndDs8L3NwYW4+IHdyb3RlOjxicj4NCjxibG9ja3F1b3RlIGNsYXNz
PSJnbWFpbF9xdW90ZSIgc3R5bGU9Im1hcmdpbjowcHggMHB4IDBweCAwLjhleDtib3JkZXItbGVm
dC13aWR0aDoxcHg7Ym9yZGVyLWxlZnQtY29sb3I6cmdiKDIwNCwyMDQsMjA0KTtib3JkZXItbGVm
dC1zdHlsZTpzb2xpZDtwYWRkaW5nLWxlZnQ6MWV4Ij4NCjxkaXYgbGFuZz0iRU4tVVMiIGxpbms9
ImJsdWUiIHZsaW5rPSJwdXJwbGUiPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu
IHN0eWxlPSJmb250LXNpemU6MTFwdDtmb250LWZhbWlseTpDYWxpYnJpLHNhbnMtc2VyaWY7Y29s
b3I6cmdiKDMxLDczLDEyNSkiPknigJltIGdvaW5nIHRvIHNob3cgbXkgaWdub3JhbmNlIGFuZCBh
c2sgaG93IEV0aGVybmV0IGlzIGNhcnJpZWQgb3ZlciBNUExTPyBUaGUgZmlyc3QgbnliYmxlIGlz
IHBhcnQgb2YgdGhlIERlc3RpbmF0aW9uIE1BQyBhZGRyZXNzLjx1PjwvdT48dT48L3U+PC9zcGFu
PjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTFwdDtm
b250LWZhbWlseTpDYWxpYnJpLHNhbnMtc2VyaWY7Y29sb3I6cmdiKDMxLDczLDEyNSkiPk9VSXMg
aGF2ZSBiZWVuIGFsbG9jYXRlZCBiZWdpbm5pbmcgd2l0aCA0IGFuZCBhbHNvIHdpdGggNi48dT48
L3U+PHU+PC91Pjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0i
Zm9udC1zaXplOjExcHQ7Zm9udC1mYW1pbHk6Q2FsaWJyaSxzYW5zLXNlcmlmO2NvbG9yOnJnYigz
MSw3MywxMjUpIj48dT48L3U+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Jsb2NrcXVv
dGU+DQo8ZGl2Pjxicj4NCjwvZGl2Pg0KPGRpdj48YnI+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2PlRo
YW5rcyBmb3IgYXNraW5nIGFuZCBkb24ndCBiZSBzb3JyeSBmb3Igbm90IGhhdmluZyB0byBsaXZl
IHRocm91Z2ggdGhlIGZ1biBhbmQgam95IG9mIHN0YW5kYXJkaXppbmcgcHNldWRvLXdpcmVzLiAm
bmJzcDsgVGhlIHZlcnkgdmVyeSBzaG9ydCBmb3JtIGlzIHRoYXQgdGhlcmUgaXMgYSAzMi1iaXQg
Y29kZS13b3JkIGRlZmluZWQgdGhhdCBzaXRzIGFib3ZlIHRoZSBFdGhlcm5ldCBmcmFtZSBhbmQg
cmlnaHQgYmVsb3cgdGhlIE1QTFMgc3RhY2suJm5ic3A7DQogVGhpcyBpcyB0byBkZWFsIHdpdGgg
aW1wbGVtZW50YXRpb25zIHRoYXQgbG9vayBiZW5lYXRoIHRoZSBNUExTIHN0YWNrIHRvIGh1bnQg
ZG93biBtb3JlIGZpZWxkcyB0byBoYXNoIHRvIGdldCBnb29kIGVudHJvcHkgZm9yIEVDTVAgb3Ig
TEFHLjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pjxicj4NCjwvZGl2Pg0KPGRpdj5BcyBJIHJlY2FsbCwg
d2hlbiBJIGxvb2tlZCBhIGxvbmcgbG9uZyAoZXIsIGxldCdzIG5vdCBnZXQgaW50byBob3cgbG9u
ZykgdGltZSBhZ28sIHRoZSBsaWtlbGluZXNzIG9mIGFjdHVhbCBjb2xsaXNpb24gd2l0aCBhbGxv
Y2F0ZWQgT1VJcyB3YXMgcXVpdGUgc21hbGwuPC9kaXY+DQo8ZGl2Pjxicj4NCjwvZGl2Pg0KPGRp
dj5BbGlhPC9kaXY+DQo8ZGl2PiZuYnNwOzwvZGl2Pg0KPGJsb2NrcXVvdGUgY2xhc3M9ImdtYWls
X3F1b3RlIiBzdHlsZT0ibWFyZ2luOjBweCAwcHggMHB4IDAuOGV4O2JvcmRlci1sZWZ0LXdpZHRo
OjFweDtib3JkZXItbGVmdC1jb2xvcjpyZ2IoMjA0LDIwNCwyMDQpO2JvcmRlci1sZWZ0LXN0eWxl
OnNvbGlkO3BhZGRpbmctbGVmdDoxZXgiPg0KPGRpdiBsYW5nPSJFTi1VUyIgbGluaz0iYmx1ZSIg
dmxpbms9InB1cnBsZSI+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9
ImZvbnQtc2l6ZToxMXB0O2ZvbnQtZmFtaWx5OkNhbGlicmksc2Fucy1zZXJpZjtjb2xvcjpyZ2Io
MzEsNzMsMTI1KSI+Jm5ic3A7PHU+PC91Pjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExcHQ7Zm9udC1mYW1pbHk6Q2FsaWJyaSxzYW5zLXNl
cmlmO2NvbG9yOnJnYigzMSw3MywxMjUpIj48dT48L3U+Jm5ic3A7PHU+PC91Pjwvc3Bhbj48L3A+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExcHQ7Zm9udC1m
YW1pbHk6Q2FsaWJyaSxzYW5zLXNlcmlmO2NvbG9yOnJnYigzMSw3MywxMjUpIj48dT48L3U+Jm5i
c3A7PHU+PC91Pjwvc3Bhbj48L3A+DQo8ZGl2IHN0eWxlPSJib3JkZXItc3R5bGU6c29saWQgbm9u
ZSBub25lO2JvcmRlci10b3AtY29sb3I6cmdiKDE4MSwxOTYsMjIzKTtib3JkZXItdG9wLXdpZHRo
OjFwdDtwYWRkaW5nOjNwdCAwaW4gMGluIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxiPjxzcGFu
IHN0eWxlPSJmb250LXNpemU6MTBwdDtmb250LWZhbWlseTpUYWhvbWEsc2Fucy1zZXJpZiI+RnJv
bTo8L3NwYW4+PC9iPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTBwdDtmb250LWZhbWlseTpUYWhv
bWEsc2Fucy1zZXJpZiI+IHNmYyBbbWFpbHRvOjxhIGhyZWY9Im1haWx0bzpzZmMtYm91bmNlc0Bp
ZXRmLm9yZyIgdGFyZ2V0PSJfYmxhbmsiPnNmYy1ib3VuY2VzQGlldGYub3JnPC9hPl0NCjxiPk9u
IEJlaGFsZiBPZiA8L2I+QWxpYSBBdGxhczxicj4NCjxiPlNlbnQ6PC9iPiBXZWRuZXNkYXksIEFw
cmlsIDEzLCAyMDE2IDk6NTYgQU08YnI+DQo8Yj5Ubzo8L2I+IExvYSBBbmRlcnNzb248YnI+DQo8
Yj5DYzo8L2I+IFRob21hcyBOYXJ0ZW47IENhcmxvcyBQaWduYXRhcm8gKGNwaWduYXRhKTsgPGEg
aHJlZj0ibWFpbHRvOnNmY0BpZXRmLm9yZyIgdGFyZ2V0PSJfYmxhbmsiPg0Kc2ZjQGlldGYub3Jn
PC9hPjsgSmltIEd1aWNoYXJkIChqZ3VpY2hhcik7IE1hcnRpbiBTdGllbWVybGluZzsgWHV4aWFv
aHU7IEpvZWwgTS4gSGFscGVybjwvc3Bhbj48L3A+DQo8ZGl2Pg0KPGRpdiBjbGFzcz0iaDUiPjxi
cj4NCjxiPlN1YmplY3Q6PC9iPiBSZTogW3NmY10gV0cgbGFzdCBjYWxsIGZvciBkcmFmdC1pZXRm
LXNmYy1uc2gtMDQudHh0PHU+PC91Pjx1PjwvdT48L2Rpdj4NCjwvZGl2Pg0KPHA+PC9wPg0KPC9k
aXY+DQo8ZGl2Pg0KPGRpdiBjbGFzcz0iaDUiPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHU+PC91
PiZuYnNwOzx1PjwvdT48L3A+DQo8cD5Mb2EsIDx1PjwvdT48dT48L3U+PC9wPg0KPHA+VGhhbmtz
ISZuYnNwOyZuYnNwOyBJIGtuZXcgaXQgd2FzIG91dCB0aGVyZS4gPHU+PC91Pjx1PjwvdT48L3A+
DQo8cD5SZWdhcmRsZXNzLCZuYnNwOyB0aGUgZmlyc3QgbmliYmxlIHF1ZXN0aW9uIGNhbid0IGJl
IHJlc29sdmVkIGJ5IGFkZGluZyBtb3JlIGxhYmVscyB0byB0aGUgc3RhY2shJm5ic3A7Jm5ic3A7
Jm5ic3A7IFRoZSB3aG9sZSBpc3N1ZSBpcyBsb29raW5nIGF0IHRoZSBTIGJpdCB0byBndWVzcyB3
aGF0J3MgdW5kZXIgdGhlIE1QTFMgbGFiZWwgc3RhY2suJm5ic3A7IFRoYXQncyB3aHkgUFdFMyB1
c2VzIGNvZGUtd29yZHMuPHU+PC91Pjx1PjwvdT48L3A+DQo8cD5UaGVyZSBuZWVkcyB0byBiZSBh
biBhbnN3ZXIgYmV5b25kIGhhbmR3YXZpbmcgdGhhdCBzb21ldGhpbmcgY2FuIGJlIGludmVudGVk
Ljx1PjwvdT48dT48L3U+PC9wPg0KPHA+T2YgYWxsIHRoZSBpbXBsZW1lbnRhdGlvbnMsIHdoYXQg
dHJhbnNwb3J0cyBpcyBOU0ggY2FycmllZCBvdmVyPyZuYnNwOyBEbyB3ZSBoYXZlIGFueSBkaXZl
cnNpdHk/DQo8dT48L3U+PHU+PC91PjwvcD4NCjxwPlJlZ2FyZHMsIDxicj4NCkFsaWEgPHU+PC91
Pjx1PjwvdT48L3A+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+T24gQXByIDEzLCAyMDE2
IDk6NDMgQU0sICZxdW90O0xvYSBBbmRlcnNzb24mcXVvdDsgJmx0OzxhIGhyZWY9Im1haWx0bzps
b2FAcGkubnUiIHRhcmdldD0iX2JsYW5rIj5sb2FAcGkubnU8L2E+Jmd0OyB3cm90ZTo8dT48L3U+
PHU+PC91PjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPkFsaWEsPGJyPg0KPGJyPg0KSSB0aGlu
ayB5b3UgYXJlIHJlZmVycmluZyB0byBSRkMgNDE4MiwgaXQgaXMgbW9yZSB0aGFuIGEgZGVjYWRl
PGJyPg0Kc2luY2UgaXQgd2FzIHB1Ymxpc2hlZC48YnI+DQo8YnI+DQovTG9hPHU+PC91Pjx1Pjwv
dT48L3A+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGJyPg0KPGJyPg0KT24gMjAxNi0w
NC0xMyAyMToxMywgQWxpYSBBdGxhcyB3cm90ZTo8dT48L3U+PHU+PC91PjwvcD4NCjwvZGl2Pg0K
PGJsb2NrcXVvdGUgc3R5bGU9ImJvcmRlci1zdHlsZTpub25lIG5vbmUgbm9uZSBzb2xpZDtib3Jk
ZXItbGVmdC1jb2xvcjpyZ2IoMjA0LDIwNCwyMDQpO2JvcmRlci1sZWZ0LXdpZHRoOjFwdDtwYWRk
aW5nOjBpbiAwaW4gMGluIDZwdDttYXJnaW4tbGVmdDo0LjhwdDttYXJnaW4tcmlnaHQ6MGluIj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5DYXJsb3MsPGJyPg0KPGJyPg0KQXMgd2UgYWxs
IGtub3csIGl0IGlzIHBvc3NpYmxlIHRvIGRvIG1hbnkgbWFueSB0aGluZ3Mgd2l0aCB0ZWNobm9s
b2d5IC08YnI+DQpvbmNlIHdlIGZpZ3VyZSBvdXQgaG93Ljxicj4NClNheWluZyB0aGF0IHRoZXJl
IGFyZSBhcHByb2FjaGVzIG90aGVyIHRoYW4gcmVvcmdhbml6aW5nIHRoZSBmaXJzdDx1PjwvdT48
dT48L3U+PC9wPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5uaWJibGUgaXMgZmluZS7D
giZuYnNwOyBDbGFpbWluZyB0aGF0IHdlJ2xsPHU+PC91Pjx1PjwvdT48L3A+DQo8ZGl2Pg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCI+PGJyPg0KYmUgYW55d2hlcmUgbmVhciBpbnRlcm9wZXJhYmlsaXR5
IG9yIHN0YW5kYXJkaXphdGlvbiB3aXRob3V0IGl0IGJlaW5nPGJyPg0KY2xhcmlmaWVkIGRvZXMg
bm90IHNlZW0gcGxhdXNpYmxlLjxicj4NCjxicj4NCkZvciBpbnN0YW5jZSwgSSB3aWxsIG5vdGUg
dGhhdCB0aGUgZGVzY3JpcHRpb24gb2YgMCAoRXhwbGljaXQgTlVMTCkgaXM8YnI+DQpzdGlsbCBk
ZWZpbmVkIGluIFJGQzMwMzIgYXMgaW1wbHlpbmc8dT48L3U+PHU+PC91PjwvcD4NCjwvZGl2Pg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCI+dGhlIHBhY2tldCB1bmRlcm5lYXRoIGlzIElQdjQuw4ImbmJz
cDsgSSByZWFsbHkgZGlkIHRoaW5rIHRoYXQgd2UnZCB0YWxrZWQgaW48dT48L3U+PHU+PC91Pjwv
cD4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWJvdHRvbToxMnB0
Ij48YnI+DQpNUExTIGFib3V0IGZpeGluZyB0aGlzIC0gYW5kIG1heWJlPGJyPg0KTG9hIG9yIG90
aGVycyBjYW4gZ2l2ZSB1cyB0aGUgcmVmZXJlbmNlIC0gYnV0IHRoYXQncyB3aGF0IHRoZSBJQU5B
PGJyPg0KcG9pbnRlciBoYXMgcmlnaHQgbm93Ljx1PjwvdT48dT48L3U+PC9wPg0KPC9kaXY+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIj5JIHVuZGVyc3RhbmQgdGhlIGRlc2lyZSB0byBnZXQgTlNIIGRv
bmUgLSBkZWVwbHkhIMOCPHU+PC91Pjx1PjwvdT48L3A+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCI+PGJyPg0KPGJyPg0KSSBhbHNvIGhhdGUgbGF0ZSBzdXJwcmlzZXMgYW5kIGFtIHRyeWlu
ZyB0byBjbGVhciB0aW1lIHRvIGRvIGEgbW9yZTxicj4NCnRob3JvdWdoIHJldmlldyBvZiBOU0gg
YXMgd2VsbCBhczxicj4NCnJlcXVlc3Rpbmcgb3RoZXIgZm9jdXNlZCByZXZpZXdzLjxicj4NCjxi
cj4NClRoaXMgaXNzdWUgaXMgbm90IG5ldyAtIGFuZCB0aGUgaXNzdWVzIEkgc2F3IGluIGEgcXVp
Y2sgbG9vayBhcmUgdGhvc2U8YnI+DQp0aGF0IGFyZSB0aG9yb3VnaGx5IGRvY3VtZW50ZWQ8dT48
L3U+PHU+PC91PjwvcD4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+aW7DgiBkcmFmdC1p
ZXRmLXJ0Z3dnLWR0LWVuY2FwLTAxPGJyPg0KJmx0OzxhIGhyZWY9Imh0dHBzOi8vZGF0YXRyYWNr
ZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWlldGYtcnRnd2ctZHQtZW5jYXAvIiB0YXJnZXQ9Il9ibGFu
ayI+aHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvZHJhZnQtaWV0Zi1ydGd3Zy1kdC1l
bmNhcC88L2E+Jmd0O8OCIHdoaWNoPHU+PC91Pjx1PjwvdT48L3A+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1ib3R0b206MTJwdCI+PGJyPg0KY29uc2lkZXJlZCBO
U0ggYXMgb25lIG9mIHRoZSBlbmNhcHN1bGF0aW9ucy48dT48L3U+PHU+PC91PjwvcD4NCjwvZGl2
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+SXQgc2VlbXMgY2xlYXIgdGhhdCB0aGVyZSAqYXJlKsOC
IHRyYW5zcG9ydC1zcGVjaWZpYyBpc3N1ZXMgYW5kIHdlIG5lZWQgYTx1PjwvdT48dT48L3U+PC9w
Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxicj4NCnBsYWNlIGFuZCBhIHdheSB0byBj
YXB0dXJlIHRoZW0uPGJyPg0KPGJyPg0KUmVnYXJkcyw8YnI+DQpBbGlhPGJyPg0KPGJyPg0KT24g
V2VkLCBBcHIgMTMsIDIwMTYgYXQgODo1MyBBTSwgQ2FybG9zIFBpZ25hdGFybyAoY3BpZ25hdGEp
PHU+PC91Pjx1PjwvdT48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4m
bHQ7PGEgaHJlZj0ibWFpbHRvOmNwaWduYXRhQGNpc2NvLmNvbSIgdGFyZ2V0PSJfYmxhbmsiPmNw
aWduYXRhQGNpc2NvLmNvbTwvYT4gJmx0O21haWx0bzo8YSBocmVmPSJtYWlsdG86Y3BpZ25hdGFA
Y2lzY28uY29tIiB0YXJnZXQ9Il9ibGFuayI+Y3BpZ25hdGFAY2lzY28uY29tPC9hPiZndDsmZ3Q7
IHdyb3RlOjxicj4NCjxicj4NCiZuYnNwOyAmbmJzcDsgQWxpYSw8YnI+DQo8YnI+DQombmJzcDsg
Jm5ic3A7IFRoYW5rcyBmb3IgbG9va2luZyBpbnRvIHRoaXMuPGJyPg0KPGJyPg0KJm5ic3A7ICZu
YnNwOyBJdCBpcyByZWxldmFudC4gSSBiZWxpZXZlIEVDTVAtcHJldmVudGlvbiAoYW50aS1hbGlh
c2luZyB3aXRoIDB4NDxicj4NCiZuYnNwOyAmbmJzcDsgYW5kIDB4NikgaXMgbmVjZXNzYXJ5IGZv
ciB0cmFmZmljIG92ZXIgTVBMUyBleHBlY3RpbmcgaW4tb3JkZXI8dT48L3U+PHU+PC91PjwvcD4N
CjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7ICZuYnNwOyBkZWxpdmVyeS7Dgjx1
PjwvdT48dT48L3U+PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxicj4NCjxicj4N
CiZuYnNwOyAmbmJzcDsgVHJhbnNwb3J0aW5nIE5TSCBvdmVyIE1QTFMsIGhvd2V2ZXIsIGRvZXMg
bm90IG5lY2Vzc2FyaWx5IGltcGx5PGJyPg0KJm5ic3A7ICZuYnNwOyB0cmFuc3BvcnRpbmcgTlNI
ICpkaXJlY3RseSogZm9sbG93aW5nIHRoZSBib3R0b20gTFNFLiBUaGVyZSBhcmU8dT48L3U+PHU+
PC91PjwvcD4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7ICZuYnNwOyBvdGhl
ciB3YXlzLCBhcyBpdCB3YXMgZG9uZSB3aXRoIFBXcy7Dgjx1PjwvdT48dT48L3U+PC9wPg0KPGRp
dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tYm90dG9tOjEycHQiPjxicj4N
Cjxicj4NCiZuYnNwOyAmbmJzcDsgSSB0aGluayBzaG93aW5nIHRoYXQgaXQgaXMgcG9zc2libGUg
dG8gYXBwcm9wcmlhdGVseSAoaS5lLiw8YnI+DQombmJzcDsgJm5ic3A7IHJlc3BlY3RpbmcgQkNQ
cykgdHJhbnNwb3J0IE5TSCBvdmVyIE1QTFMgaXMgdmVyeSBpbXBvcnRhbnQuIFRoaXMgbWF5PGJy
Pg0KJm5ic3A7ICZuYnNwOyBvciBtYXkgbm90IGhhdmUgaW1wbGljYXRpb25zIG9uIHRoZSBOU0gg
YmFzZSBoZWFkZXIuIEkgYmVsaWV2ZTxicj4NCiZuYnNwOyAmbmJzcDsgaG93ZXZlciB0aGF0IHN1
Y2ggYWN0dWFsIGZvcm1hbCBzcGVjaWZpY2F0aW9uIChiZXlvbmQgc2hvd2luZyBpdHM8YnI+DQom
bmJzcDsgJm5ic3A7IHBvc3NpYmxlKSBzaG91bGQgbm90IGdhdGUgTlNILjxicj4NCjxicj4NCiZu
YnNwOyAmbmJzcDsgVGhhbmtzITx1PjwvdT48dT48L3U+PC9wPg0KPC9kaXY+DQo8cCBjbGFzcz0i
TXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWJvdHRvbToxMnB0Ij4mbmJzcDsgJm5ic3A7IMOi4oKs
4oCdIENhcmxvcy48YnI+DQo8YnI+DQo8dT48L3U+PHU+PC91PjwvcD4NCjxkaXY+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj4mbmJzcDsgJm5ic3A7IE9uIEFwciAxMiwgMjAxNiwgYXQgMTA6MjkgUE0s
IEFsaWEgQXRsYXMgJmx0OzxhIGhyZWY9Im1haWx0bzpha2F0bGFzQGdtYWlsLmNvbSIgdGFyZ2V0
PSJfYmxhbmsiPmFrYXRsYXNAZ21haWwuY29tPC9hPjx1PjwvdT48dT48L3U+PC9wPg0KPC9kaXY+
DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7ICZuYnNwOyAmbHQ7bWFpbHRvOjxh
IGhyZWY9Im1haWx0bzpha2F0bGFzQGdtYWlsLmNvbSIgdGFyZ2V0PSJfYmxhbmsiPmFrYXRsYXNA
Z21haWwuY29tPC9hPiZndDsmZ3Q7IHdyb3RlOjxicj4NCjxicj4NCiZuYnNwOyAmbmJzcDsgWGlh
b2h1LCBKb2VsLCBhbmQgU0ZDIFdHIGdyb3VwLDxicj4NCjxicj4NCiZuYnNwOyAmbmJzcDsgVGhl
IGZpcnN0IG5pYmJsZSBxdWVzdGlvbiBpcyBxdWl0ZSByZWxldmFudCBpZiBpdCBpcyBleHBlY3Rl
ZCB0aGF0PGJyPg0KJm5ic3A7ICZuYnNwOyB0aGUgTlNIIGhlYWRlciBtaWdodCBiZSBkaXJlY3Rs
eSB1bmRlcjx1PjwvdT48dT48L3U+PC9wPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4m
bmJzcDsgJm5ic3A7IGFuIE1QTFMgbGFiZWwgc3RhY2suw4ImbmJzcDsgVGhpcyBpc3N1ZSBhcm9z
ZSByYXRoZXIgdW5wbGVhc2FudGx5IGZvcjx1PjwvdT48dT48L3U+PC9wPg0KPGRpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPjxicj4NCiZuYnNwOyAmbmJzcDsgcHNldWRvLXdpcmVzIGEgbG9uZyB0
aW1lIGFnbyBhbmQgdGhlPGJyPg0KJm5ic3A7ICZuYnNwOyByZWFzb25pbmcgZm9yIGl0IGlzIG11
Y2ggYmV0dGVyIGRvY3VtZW50ZWQsIGFzIENhcmxvcyBwb2ludGVkIG91dDxicj4NCiZuYnNwOyAm
bmJzcDsgaW4gYSBkaWZmZXJlbnQgdGhyZWFkLCBpbiBSRkMgNDkyOCBTZWN0aW9uIDMuPGJyPg0K
PGJyPg0KJm5ic3A7ICZuYnNwOyBBdCB0aGUgdGltZSB0aGF0IFBXRTMgd2FzIHdvcmtpbmcgb24g
dGhlIGNvbnRyb2wgd29yZCBhbmQgd2hldGhlcjxicj4NCiZuYnNwOyAmbmJzcDsgaXQgd2FzIHRv
IGJlIG1hbmRhdG9yeSAoUkZDIDQzODUpLCBpdCB3YXMgY2xlYXIgdGhhdDxicj4NCiZuYnNwOyAm
bmJzcDsgdGhlcmUgd2VyZSBkZXZpY2VzIHRoYXQgbG9va2VkIGF0IHRoZSBmaXJzdCBuaWJibGUg
b2YgYSBwYWNrZXQ8YnI+DQombmJzcDsgJm5ic3A7IHVuZGVyIHRoZSBNUExTIGhlYWRlciBhcyBh
IHdheSB0byBkZXRlcm1pbmU8YnI+DQombmJzcDsgJm5ic3A7IGlmIHRoZSBwYWNrZXQgd2FzIElQ
djQgb3IgSVB2NiBhbmQgb2J0YWluIGZsb3ctZGl2ZXJzaXR5IGZyb208dT48L3U+PHU+PC91Pjwv
cD4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7ICZuYnNwOyBpdC7DgiZuYnNw
OyBUaGUgY29zdCBvZiBhbHNvIHZlcmlmeWluZyB0aGUgYXNzb2NpYXRlZCBjaGVja3N1bTx1Pjwv
dT48dT48L3U+PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxicj4NCiZuYnNwOyAm
bmJzcDsgaWYgYXZhaWxhYmxlIHdhc24ndCBkZWVtZWQgYWNjZXB0YWJsZSBmb3Igc2V2ZXJhbDx1
PjwvdT48dT48L3U+PC9wPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4mbmJzcDsgJm5i
c3A7IGltcGxlbWVudGF0aW9ucy7DgiZuYnNwOyBHaXZlbiB0aGF0IGRldGVybWluaW5nIGFzIG11
Y2ggZW50cm9weSBhczx1PjwvdT48dT48L3U+PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiPjxicj4NCiZuYnNwOyAmbmJzcDsgcG9zc2libGUgaXMgc3RpbGwgcmVhbGx5IGltcG9ydGFu
dCBhbmQgdGhhdCBpdCBpcyBub24tdHJpdmlhbCB0bzxicj4NCiZuYnNwOyAmbmJzcDsgbmVnb3Rp
YXRlL2luZGljYXRlIHRoZSBjYXBhYmlsaXR5IGZvciBpbmNsdWRpbmc8YnI+DQombmJzcDsgJm5i
c3A7IGFuIEVudHJvcHkgTGFiZWwgaW4gdGhlIE1QTFMgc3RhY2ssIEkgaGF2ZSBubyByZWFzb24g
dG8gYmVsaWV2ZTxicj4NCiZuYnNwOyAmbmJzcDsgdGhhdCB0aGlzIHNob3J0Y3V0IG9mIGxvb2tp
bmcgYXQgdGhlIGZpcnN0IG5pYmJsZTx1PjwvdT48dT48L3U+PC9wPg0KPC9kaXY+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj4mbmJzcDsgJm5ic3A7IGlzIG5vIGxvbmdlciB1c2VkIG9yIGRlcGxveWVk
LiDDgiZuYnNwOyBGZWVsIGZyZWUgdG8gY29udGFjdCBtZSBvZmYtbGlzdDx1PjwvdT48dT48L3U+
PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxicj4NCiZuYnNwOyAmbmJzcDsgaWYg
eW91IGJlbGlldmUgdGhpcyB0byBiZSB0aGUgY2FzZS48YnI+DQo8YnI+DQombmJzcDsgJm5ic3A7
IEl0IGlzIGNsZWFyIGZyb20gdGhlIE5TSCBiYXNlIGhlYWRlcjo8YnI+DQombmJzcDsgJm5ic3A7
ICZuYnNwOyAmbmJzcDswIDEgMiAzIDQgNSA2IDcgOCA5IDAgMSAyIDMgNCA1IDYgNyA4IDkgMCAx
IDIgMyA0IDUgNiA3IDggOSAwIDE8YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5i
c3A7ICYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7
LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYj
NDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7
LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7LSYjNDM7PGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsg
Jm5ic3A7ICZuYnNwOyB8VmVyfE98Q3xSfFJ8UnxSfFJ8UnwmbmJzcDsgJm5ic3A7TGVuZ3RoJm5i
c3A7IHwmbmJzcDsgJm5ic3A7IE1EIFR5cGUmbmJzcDsgJm5ic3A7IHwgTmV4dCBQcm90b2NvbCB8
PGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmIzQzOy0mIzQzOy0mIzQz
Oy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0m
IzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQz
Oy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0mIzQzOy0m
IzQzOy0mIzQzOzx1PjwvdT48dT48L3U+PC9wPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij4mbmJzcDsgJm5ic3A7IHRoYXQgdGhpcyBjb25zaWRlcmF0aW9uIGhhcyBiZWVuIGNvbXBsZXRl
bHkgaWdub3JlZC7DgiZuYnNwOyBJbiBmYWN0LCBhbjx1PjwvdT48dT48L3U+PC9wPg0KPGRpdj4N
CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxicj4NCiZuYnNwOyAmbmJzcDsgTlNIIGJhc2UgaGVhZGVy
IG1pZ2h0IGhhdmUgYW55IHZhbHVlPGJyPg0KJm5ic3A7ICZuYnNwOyBvZiAwYjAwMDAsIDBiMDAw
MSwgMGIwMDEwLCAwYjAwMTAgYW5kIGlmIGEgdmVyc2lvbiAwMSBmb3IgTlNIIHdlcmU8YnI+DQom
bmJzcDsgJm5ic3A7IGV2ZXIgZGVmaW5lZCwgc3VkZGVubHkgdGhlIHRyYWZmaWMgbWlnaHQ8YnI+
DQombmJzcDsgJm5ic3A7IGJlIHN1YmplY3QgdG8gc3RhcnRsaW5nIHJlb3JkZXJpbmcgaWYgYW4g
TVBMUyB0cmFuc3BvcnQgd2VyZSB0byBiZTxicj4NCiZuYnNwOyAmbmJzcDsgY29uc2lkZXJlZC48
YnI+DQo8YnI+DQombmJzcDsgJm5ic3A7IEdpdmVuIGEgY2xhaW0gb2YgTlNIIGJlaW5nIHRyYW5z
cG9ydC1hZ25vc3RpYyBhbmQgcmVwZWF0ZWQ8YnI+DQombmJzcDsgJm5ic3A7IGVtcGhhc2lzIHRo
YXQgTVBMUywgYXMgd2VsbCBhcyBVRFAsPGJyPg0KJm5ic3A7ICZuYnNwOyBpcyBhIHZhbGlkIHRy
YW5zcG9ydCBmb3IgTlNILCBJIGRvIHRoaW5rIHRoaXMgaXMgYSBzaWduaWZpY2FudDxicj4NCiZu
YnNwOyAmbmJzcDsgb3ZlcnNpZ2h0IGFuZCBuZWVkcywgYXQgYSBtaW5pbXVtLCBkaXNjdXNzaW9u
IGFuZDx1PjwvdT48dT48L3U+PC9wPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4mbmJz
cDsgJm5ic3A7IGV4cGxhbmF0aW9uLCBhbmQgw4IgLSBxdWl0ZSBsaWtlbHkgLSDDgiBjb3JyZWN0
aW9uLjx1PjwvdT48dT48L3U+PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxicj4N
Cjxicj4NCiZuYnNwOyAmbmJzcDsgV2hpbGUgSSBhbSBvbiB0aGUgdG9waWMgb2YgZGV0YWlscyBv
ZiB0aGUgTlNIIGVuY2Fwc3VsYXRpb24sIEk8YnI+DQombmJzcDsgJm5ic3A7IHdvdWxkIHJlcXVl
c3QgdGhhdCBTZWN0aW9uIDggb2YgZHJhZnQtaWV0Zi1ydGd3Zy1kdC1lbmNhcC0wMTx1PjwvdT48
dT48L3U+PC9wPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4mbmJzcDsgJm5ic3A7IGJl
IHJlYWQgYW5kIGNvbnNpZGVyZWQhIMOCJm5ic3A7IEkgYW0gbm90IGV4Y2l0ZWQgYnkgaGF2aW5n
IG1hbnk8dT48L3U+PHU+PC91PjwvcD4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48YnI+
DQombmJzcDsgJm5ic3A7IGRpZmZlcmVudCBhbmQgdW5pcXVlIE5leHQgUHJvdG9jb2wgZmllbGRz
IGRlZmluZWQuPGJyPg0KJm5ic3A7ICZuYnNwOyBGb3IgaW5zdGFuY2UsIEkgbm90ZSB0aGUgZGVm
aW5pdGlvbiBvZiBhIG5lYXJseSBpZGVudGljYWwgTmV4dDxicj4NCiZuYnNwOyAmbmJzcDsgUHJv
dG9jb2wgZmllbGQgaW48YnI+DQombmJzcDsgJm5ic3A7IDxhIGhyZWY9Imh0dHBzOi8vZGF0YXRy
YWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWlldGYtbnZvMy12eGxhbi1ncGUiIHRhcmdldD0iX2Js
YW5rIj4NCmh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWlldGYtbnZvMy12
eGxhbi1ncGU8L2E+IC48YnI+DQo8YnI+DQombmJzcDsgJm5ic3A7IFdoaWxlIEkgYW0sIG9mIGNv
dXJzZSwgd2lsbGluZyB0byByZWFzb24gdG8gZGV0YWlsZWQgYW5kPGJyPg0KJm5ic3A7ICZuYnNw
OyB3ZWxsLXRob3VnaHQgb3V0IGV4cGxhbmF0aW9ucyBmb3Igd2h5IGVhY2ggYW5kIGV2ZXJ5IG5l
dzxicj4NCiZuYnNwOyAmbmJzcDsgZW5jYXBzdWxhdGlvbiBuZWVkcyBpdHMgdmVyeSBvd24gSUFO
QS1kZWZpbmVkIE5leHQgUHJvdG9jb2wgZmllbGQsPGJyPg0KJm5ic3A7ICZuYnNwOyB0aGlzIHNl
ZW1zIHRvIG1lIHRvIGJlIGhpZ2hseSBsaWtlbHkgdG8gcmVxdWlyZTxicj4NCiZuYnNwOyAmbmJz
cDsgY29uc29saWRhdGlvbiBzbyB0aGF0IHRoZSBzYW1lIE5leHQgUHJvdG9jb2wgZmllbGQgY2Fu
IGJlIHVzZWQ8YnI+DQombmJzcDsgJm5ic3A7IGJldHdlZW4gdGhlIHZhcmlvdXMgZW5jYXBzdWxh
dGlvbnMuPGJyPg0KPGJyPg0KJm5ic3A7ICZuYnNwOyBJIHdpbGwgd29yayBvbiBnaXZpbmcgYSB0
aHJvdWdoIHJldmlldyBvZiBOU0ggYXMgc29vbiBhczx1PjwvdT48dT48L3U+PC9wPg0KPC9kaXY+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4mbmJzcDsgJm5ic3A7IHByYWN0aWNhbC7DgiZuYnNwOyBJ
IGRvIHJlYWxpemUgdGhhdCB0aGVyZSBhcmUgbXVsdGlwbGUgaW1wbGVtZW50YXRpb25zPHU+PC91
Pjx1PjwvdT48L3A+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGJyPg0KJm5ic3A7ICZu
YnNwOyBhbmQgd2hpbGUgZGV0YWlscyBvZiBob3cgdGhlICZxdW90O05leHQgUHJvdG9jb2wmcXVv
dDsgZmllbGQgYXJlIGRvY3VtZW50ZWQ8YnI+DQombmJzcDsgJm5ic3A7IHNob3VsZG4ndCBoYXZl
IGEgc2lnbmlmaWNhbnQgaW1wYWN0IHRoZXJlLCB0aGU8YnI+DQombmJzcDsgJm5ic3A7IGRpc2N1
c3Npb24gYWJvdXQgdGhlIGZpcnN0IG5pYmJsZSBpcyBsaWtlbHkgdG8uPGJyPg0KPGJyPg0KJm5i
c3A7ICZuYnNwOyBSZWdhcmRzLDxicj4NCiZuYnNwOyAmbmJzcDsgQWxpYTxicj4NCjxicj4NCjxi
cj4NCiZuYnNwOyAmbmJzcDsgT24gVHVlLCBBcHIgMTIsIDIwMTYgYXQgOTo1MyBQTSwgWHV4aWFv
aHUgJmx0OzxhIGhyZWY9Im1haWx0bzp4dXhpYW9odUBodWF3ZWkuY29tIiB0YXJnZXQ9Il9ibGFu
ayI+eHV4aWFvaHVAaHVhd2VpLmNvbTwvYT48dT48L3U+PHU+PC91PjwvcD4NCjwvZGl2Pg0KPGRp
dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNwOyAmbmJzcDsgJmx0O21haWx0bzo8YSBocmVm
PSJtYWlsdG86eHV4aWFvaHVAaHVhd2VpLmNvbSIgdGFyZ2V0PSJfYmxhbmsiPnh1eGlhb2h1QGh1
YXdlaS5jb208L2E+Jmd0OyZndDsgd3JvdGU6PGJyPg0KPGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJz
cDsgJm5ic3A7IEpvZWwsPGJyPg0KPGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZn
dDsgLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS08dT48L3U+PHU+PC91PjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAm
Z3Q7IEZyb206IEpvZWwgTS4gSGFscGVybiBbbWFpbHRvOjxhIGhyZWY9Im1haWx0bzpqbWhAam9l
bGhhbHBlcm4uY29tIiB0YXJnZXQ9Il9ibGFuayI+am1oQGpvZWxoYWxwZXJuLmNvbTwvYT4gJmx0
O21haWx0bzo8YSBocmVmPSJtYWlsdG86am1oQGpvZWxoYWxwZXJuLmNvbSIgdGFyZ2V0PSJfYmxh
bmsiPmptaEBqb2VsaGFscGVybi5jb208L2E+Jmd0O108YnI+DQombmJzcDsgJm5ic3A7ICZuYnNw
OyAmbmJzcDsgJmd0OyBTZW50OiBXZWRuZXNkYXksIEFwcmlsIDEzLCAyMDE2IDk6NDUgQU08dT48
L3U+PHU+PC91PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNw
OyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmZ3Q7IFRvOiBYdXhpYW9odTsgVGhvbWFzIDxhIGhyZWY9
Im1haWx0bzpOYXJ0ZW4lM0JzZmNAaWV0Zi5vcmciIHRhcmdldD0iX2JsYW5rIj4NCk5hcnRlbjtz
ZmNAaWV0Zi5vcmc8L2E+ICZsdDttYWlsdG86PGEgaHJlZj0ibWFpbHRvOnNmY0BpZXRmLm9yZyIg
dGFyZ2V0PSJfYmxhbmsiPnNmY0BpZXRmLm9yZzwvYT4mZ3Q7PGJyPg0KJm5ic3A7ICZuYnNwOyAm
bmJzcDsgJm5ic3A7ICZndDsgU3ViamVjdDogUmU6IFtzZmNdIFdHIGxhc3QgY2FsbCBmb3IgZHJh
ZnQtaWV0Zi1zZmMtbnNoLTA0LnR4dDxicj4NCiZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAm
Z3Q7PGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgWHUsPHU+PC91Pjx1Pjwv
dT48L3A+DQo8L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNwOyAmbmJzcDsgJm5ic3A7
ICZuYnNwOyAmZ3Q7w4ImbmJzcDsgw4ImbmJzcDsgw4ImbmJzcDsgw4IgSSBkbyBub3QgYmVsaWV2
ZSB0aGF0IHRoZXJlIGlzIGFuIE1QTFMgc3BlY2lmaWNhdGlvbiB0aGF0IHJlcXVpcmVzIHRoYXQg
YWxsPHU+PC91Pjx1PjwvdT48L3A+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGJyPg0K
Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgY29udGVudCBvdGhlciB0aGFuIElQIG11
c3QgaGF2ZSBhIGZpcnN0IG5pYmJsZSBvZiAwIG9yIDEuPGJyPg0KPGJyPg0KJm5ic3A7ICZuYnNw
OyAmbmJzcDsgJm5ic3A7IFdoZW4gZW5jYXBzdWxhdGluZyBOU0ggb3ZlciBNUExTIGRpcmVjdGx5
LCB0aGUgZmlyc3QgbmliYmxlIG9mPGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7IHRo
ZSBOU0ggbXVzdCBub3QgYmUgNCBvciA2Ljxicj4NCjxicj4NCiZuYnNwOyAmbmJzcDsgJm5ic3A7
ICZuYnNwOyAmZ3Q7IFRoZXJlIGFyZSBzcGVjaWZpY2F0aW9ucyB3aGVyZSBpdCBpcyBkaXNjdXNz
ZWQgYXMgZGVzaXJhYmxlLjxicj4NCiZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmZ3Q7PGJy
Pg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgSXQgaXMgaW4gZmFjdCBwcmV0dHkg
dHJpdmlhbCBmb3IgdXMgdG8gY2hhbmdlIHRoZSBmb3JtYXQgc28gdGhhdCB0aGUgZmlyc3QgdGhy
ZWUgYml0cyBhcmU8dT48L3U+PHU+PC91PjwvcD4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCI+Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgMCwgYnV0IGl0IGJ1cm5zIHNldmVy
YWwgdmFsdWFibGUgZmxhZyBiaXRzLsOCJm5ic3A7IEl0IGlzIGFuIFNGQyB3b3JraW5nIGdyb3Vw
IGRlY2lzaW9uLDx1PjwvdT48dT48L3U+PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
Pjxicj4NCjxicj4NCiZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyBUaGF0J3MgdGhlIHJlYXNv
biB3aHkgSSByYWlzZWQgdGhlIGZpcnN0IG5pYmJsZSBxdWVzdGlvbi48YnI+DQo8YnI+DQombmJz
cDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgQmVzdCByZWdhcmRzLDxicj4NCiZuYnNwOyAmbmJzcDsg
Jm5ic3A7ICZuYnNwOyBYaWFvaHU8YnI+DQo8YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJz
cDsgJmd0OyBub3QsIGFzIGZhciBhcyBJIGNhbiB0ZWxsLCBhIHZpb2xhdGlvbiBvZiB0aGUgTVBM
Uzxicj4NCiZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyBzcGVjaWZpY2F0aW9uLjxicj4NCiZu
YnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmZ3Q7PGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsg
Jm5ic3A7ICZndDsgWW91cnMsPGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsg
Sm9lbDxicj4NCiZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmZ3Q7PGJyPg0KJm5ic3A7ICZu
YnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgT24gNC8xMi8xNiA5OjQxIFBNLCBYdXhpYW9odSB3cm90
ZTo8YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJmd0OyAmZ3Q7IEhpIFRob21hcyw8
YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJmd0OyAmZ3Q7PGJyPg0KJm5ic3A7ICZu
YnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgJmd0OyBJdCBzYWlkIGluIHRoZSBOU0ggZHJhZnQ6PGJy
Pg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgJmd0Ozx1PjwvdT48dT48L3U+PC9w
Pg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4mbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJz
cDsgJmd0OyAmZ3Q7w4ImbmJzcDsgw4ImbmJzcDsgJnF1b3Q7Ni7DgiZuYnNwOyBUcmFuc3BvcnQg
QWdub3N0aWM6IE5TSCBpcyB0cmFuc3BvcnQ8YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJz
cDsgaW5kZXBlbmRlbnQgYW5kIGlzIGNhcnJpZWQ8YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAm
bmJzcDsgJmd0OyAmZ3Q7w4ImbmJzcDsgw4ImbmJzcDsgw4ImbmJzcDsgw4ImbmJzcDsgw4IgaW4g
YW4gb3ZlcmxheSwgb3ZlciBleGlzdGluZyB1bmRlcmxheXMuw4ImbmJzcDsgSWY8YnI+DQombmJz
cDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgYW4gZXhpc3Rpbmcgb3ZlcmxheTxicj4NCiZuYnNwOyAm
bmJzcDsgJm5ic3A7ICZuYnNwOyAmZ3Q7ICZndDvDgiZuYnNwOyDDgiZuYnNwOyDDgiZuYnNwOyDD
giZuYnNwOyDDgiB0b3BvbG9neSBwcm92aWRlcyB0aGUgcmVxdWlyZWQgc2VydmljZSBwYXRoPGJy
Pg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7IGNvbm5lY3Rpdml0eSwgdGhhdDxicj4NCiZu
YnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmZ3Q7ICZndDvDgiZuYnNwOyDDgiZuYnNwOyDDgiZu
YnNwOyDDgiZuYnNwOyDDgiBleGlzdGluZyBvdmVybGF5IG1heSBiZSB1c2VkLiZxdW90Ozx1Pjwv
dT48dT48L3U+PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxicj4NCiZuYnNwOyAm
bmJzcDsgJm5ic3A7ICZuYnNwOyAmZ3Q7ICZndDs8YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAm
bmJzcDsgJmd0OyAmZ3Q7IFRoYXQgbWVhbnMgdGhlIE5TSCBzaG91bGQgYmUgYWJsZSB0byBiZSB0
cmFuc3BvcnRlZCBvdmVyPGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7IE1QTFMuIEhv
d2V2ZXIsPGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgYWNjb3JkaW5nIHRv
IHRoZSBjdXJyZW50IE5TSCBmb3JtYXQgZGVmaW5pdGlvbiwgaXQncyBub3Q8YnI+DQombmJzcDsg
Jm5ic3A7ICZuYnNwOyAmbmJzcDsgc2FmZSB0byBjYXJyeSB0aGUgTlNIPGJyPg0KJm5ic3A7ICZu
YnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgb3ZlciBNUExTIGR1ZSB0byB0aGUgZmlyc3QgbmliYmxl
IGlzc3VlLiBUaGVyZWZvcmUsIEk8YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgYmVs
aWV2ZSB0aGlzIGlzc3VlIG5lZWRzIHRvIGJlPGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5i
c3A7ICZndDsgYWRkcmVzc2VkIGJlZm9yZSBwdWJsaWNhdGlvbi48YnI+DQombmJzcDsgJm5ic3A7
ICZuYnNwOyAmbmJzcDsgJmd0OyAmZ3Q7PGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7
ICZndDsgJmd0OyBCZXN0IHJlZ2FyZHMsPGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7
ICZndDsgJmd0OyBYaWFvaHU8YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJmd0OyAm
Z3Q7PGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgJmd0OyZndDsgLS0tLS1P
cmlnaW5hbCBNZXNzYWdlLS0tLS08YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJmd0
OyAmZ3Q7Jmd0OyBGcm9tOiBzZmMgW21haWx0bzo8YSBocmVmPSJtYWlsdG86c2ZjLWJvdW5jZXNA
aWV0Zi5vcmciIHRhcmdldD0iX2JsYW5rIj5zZmMtYm91bmNlc0BpZXRmLm9yZzwvYT48YnI+DQom
bmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJmx0O21haWx0bzo8YSBocmVmPSJtYWlsdG86c2Zj
LWJvdW5jZXNAaWV0Zi5vcmciIHRhcmdldD0iX2JsYW5rIj5zZmMtYm91bmNlc0BpZXRmLm9yZzwv
YT4mZ3Q7XSBPbiBCZWhhbGYgT2YgVGhvbWFzIE5hcnRlbjxicj4NCiZuYnNwOyAmbmJzcDsgJm5i
c3A7ICZuYnNwOyAmZ3Q7ICZndDsmZ3Q7IFNlbnQ6IFRodXJzZGF5LCBNYXJjaCAzMSwgMjAxNiAx
MDo0OCBBTTx1PjwvdT48dT48L3U+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCI+Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgJmd0OyZndDsgVG86IDxhIGhy
ZWY9Im1haWx0bzpzZmNAaWV0Zi5vcmciIHRhcmdldD0iX2JsYW5rIj4NCnNmY0BpZXRmLm9yZzwv
YT4gJmx0O21haWx0bzo8YSBocmVmPSJtYWlsdG86c2ZjQGlldGYub3JnIiB0YXJnZXQ9Il9ibGFu
ayI+c2ZjQGlldGYub3JnPC9hPiZndDs8YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsg
Jmd0OyAmZ3Q7Jmd0OyBTdWJqZWN0OiBbc2ZjXSBXRyBsYXN0IGNhbGwgZm9yIGRyYWZ0LWlldGYt
c2ZjLW5zaC0wNC50eHQ8YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJmd0OyAmZ3Q7
Jmd0Ozxicj4NCiZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmZ3Q7ICZndDsmZ3Q7IERlYXIg
V0c6PGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgJmd0OyZndDs8YnI+DQom
bmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJmd0OyAmZ3Q7Jmd0OyBUaGlzIG5vdGUgYmVnaW5z
IGEgV0cgbGFzdCBjYWxsIG9uIGRyYWZ0LWlldGYtc2ZjLW5zaC0wNC50eHQ8YnI+DQombmJzcDsg
Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJmd0OyAmZ3Q7Jmd0OyAoPGEgaHJlZj0iaHR0cHM6Ly9kYXRh
dHJhY2tlci5pZXRmLm9yZy9kb2MvZHJhZnQtaWV0Zi1zZmMtbnNoLyIgdGFyZ2V0PSJfYmxhbmsi
Pmh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWlldGYtc2ZjLW5zaC88L2E+
KS48YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJmd0OyAmZ3Q7Jmd0Ozxicj4NCiZu
YnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmZ3Q7ICZndDsmZ3Q7IFRoZSBlZGl0b3JzIG9mIHRo
ZSBOU0ggZG9jdW1lbnQgaGF2ZSBpbmRpY2F0ZWQgdGhhdCB0aGV5IGhhdmU8YnI+DQombmJzcDsg
Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJmd0OyAmZ3Q7Jmd0OyBhZGRyZXNzZWQgYWxsIGtub3duIGNv
bW1lbnRzIGFuZCB0aGF0IHRoZXJlIGFyZSBubyBvcGVuPGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJz
cDsgJm5ic3A7IGlzc3VlcyB3aXRoPGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZn
dDsgJmd0OyZndDsgdGhlIGN1cnJlbnQgdmVyc2lvbiBvZiB0aGUgZG9jdW1lbnQuPGJyPg0KJm5i
c3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgJmd0OyZndDs8YnI+DQombmJzcDsgJm5ic3A7
ICZuYnNwOyAmbmJzcDsgJmd0OyAmZ3Q7Jmd0OyBTdWJzdGFudGl2ZSBjb21tZW50cyB0byB0aGUg
bGlzdCBwbGVhc2UsIGVkaXRvcmlhbDxicj4NCiZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyBj
b21tZW50cyBjYW4gZ288YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJmd0OyAmZ3Q7
Jmd0OyBkaXJlY3RseSB0byB0aGUgZG9jdW1lbnQgZWRpdG9ycy48YnI+DQombmJzcDsgJm5ic3A7
ICZuYnNwOyAmbmJzcDsgJmd0OyAmZ3Q7Jmd0Ozxicj4NCiZuYnNwOyAmbmJzcDsgJm5ic3A7ICZu
YnNwOyAmZ3Q7ICZndDsmZ3Q7IFdlJ2xsIGFsc28gZ2V0IGEgYnJpZWYgdXBkYXRlIGZyb20gdGhl
IGVkaXRvcnMgYXQgbmV4dCB3ZWVrJ3M8YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsg
Jmd0OyAmZ3Q7Jmd0OyBtZWV0aW5nLiBJZiB0aGVyZSBhcmUgYW55IHJlbWFpbmluZyBpc3N1ZXMg
d2l0aCB0aGU8YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgZG9jdW1lbnQsIHJhaXNp
bmc8YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJmd0OyAmZ3Q7Jmd0OyB0aGVtIGJl
Zm9yZSB0aGUgbWVldGluZyB3b3VsZCBiZSBlc3BlY2lhbGx5IGhlbHBmdWwuPGJyPg0KJm5ic3A7
ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgJmd0OyZndDs8YnI+DQombmJzcDsgJm5ic3A7ICZu
YnNwOyAmbmJzcDsgJmd0OyAmZ3Q7Jmd0OyBGb3IgdGhlIGNoYWlycyw8YnI+DQombmJzcDsgJm5i
c3A7ICZuYnNwOyAmbmJzcDsgJmd0OyAmZ3Q7Jmd0OyBUaG9tYXM8YnI+DQombmJzcDsgJm5ic3A7
ICZuYnNwOyAmbmJzcDsgJmd0OyAmZ3Q7Jmd0Ozxicj4NCiZuYnNwOyAmbmJzcDsgJm5ic3A7ICZu
YnNwOyAmZ3Q7ICZndDsmZ3Q7IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fPGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgJmd0OyZndDsg
c2ZjIG1haWxpbmcgbGlzdDx1PjwvdT48dT48L3U+PC9wPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNv
Tm9ybWFsIj4mbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJmd0OyAmZ3Q7Jmd0OyA8YSBocmVm
PSJtYWlsdG86c2ZjQGlldGYub3JnIiB0YXJnZXQ9Il9ibGFuayI+c2ZjQGlldGYub3JnPC9hPiAm
bHQ7bWFpbHRvOjxhIGhyZWY9Im1haWx0bzpzZmNAaWV0Zi5vcmciIHRhcmdldD0iX2JsYW5rIj5z
ZmNAaWV0Zi5vcmc8L2E+Jmd0Ozx1PjwvdT48dT48L3U+PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJN
c29Ob3JtYWwiPjxicj4NCiZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmZ3Q7ICZndDsmZ3Q7
IDxhIGhyZWY9Imh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjIiB0YXJn
ZXQ9Il9ibGFuayI+DQpodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL3NmYzwv
YT48YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJmd0OyAmZ3Q7PGJyPg0KJm5ic3A7
ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgJmd0OyBfX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fXzxicj4NCiZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAm
Z3Q7ICZndDsgc2ZjIG1haWxpbmcgbGlzdDx1PjwvdT48dT48L3U+PC9wPg0KPC9kaXY+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIj4mbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJmd0OyAmZ3Q7IDxh
IGhyZWY9Im1haWx0bzpzZmNAaWV0Zi5vcmciIHRhcmdldD0iX2JsYW5rIj5zZmNAaWV0Zi5vcmc8
L2E+ICZsdDttYWlsdG86PGEgaHJlZj0ibWFpbHRvOnNmY0BpZXRmLm9yZyIgdGFyZ2V0PSJfYmxh
bmsiPnNmY0BpZXRmLm9yZzwvYT4mZ3Q7PHU+PC91Pjx1PjwvdT48L3A+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PGJyPg0KJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgJmd0
OyA8YSBocmVmPSJodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL3NmYyIgdGFy
Z2V0PSJfYmxhbmsiPmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjPC9h
Pjxicj4NCiZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmZ3Q7ICZndDs8YnI+DQo8YnI+DQom
bmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX188YnI+DQombmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgc2ZjIG1h
aWxpbmcgbGlzdDx1PjwvdT48dT48L3U+PC9wPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij4mbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgPGEgaHJlZj0ibWFpbHRvOnNmY0BpZXRmLm9y
ZyIgdGFyZ2V0PSJfYmxhbmsiPnNmY0BpZXRmLm9yZzwvYT4gJmx0O21haWx0bzo8YSBocmVmPSJt
YWlsdG86c2ZjQGlldGYub3JnIiB0YXJnZXQ9Il9ibGFuayI+c2ZjQGlldGYub3JnPC9hPiZndDs8
dT48L3U+PHU+PC91PjwvcD4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48YnI+DQombmJz
cDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgPGEgaHJlZj0iaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFp
bG1hbi9saXN0aW5mby9zZmMiIHRhcmdldD0iX2JsYW5rIj5odHRwczovL3d3dy5pZXRmLm9yZy9t
YWlsbWFuL2xpc3RpbmZvL3NmYzwvYT48YnI+DQo8YnI+DQo8YnI+DQombmJzcDsgJm5ic3A7IF9f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fPGJyPg0KJm5ic3A7
ICZuYnNwOyBzZmMgbWFpbGluZyBsaXN0PHU+PC91Pjx1PjwvdT48L3A+DQo8L2Rpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPiZuYnNwOyAmbmJzcDsgPGEgaHJlZj0ibWFpbHRvOnNmY0BpZXRmLm9y
ZyIgdGFyZ2V0PSJfYmxhbmsiPnNmY0BpZXRmLm9yZzwvYT4gJmx0O21haWx0bzo8YSBocmVmPSJt
YWlsdG86c2ZjQGlldGYub3JnIiB0YXJnZXQ9Il9ibGFuayI+c2ZjQGlldGYub3JnPC9hPiZndDs8
YnI+DQombmJzcDsgJm5ic3A7IDxhIGhyZWY9Imh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4v
bGlzdGluZm8vc2ZjIiB0YXJnZXQ9Il9ibGFuayI+aHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1h
bi9saXN0aW5mby9zZmM8L2E+PHU+PC91Pjx1PjwvdT48L3A+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z
b05vcm1hbCIgc3R5bGU9Im1hcmdpbi1ib3R0b206MTJwdCI+PGJyPg0KPGJyPg0KPGJyPg0KPGJy
Pg0KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX188YnI+DQpz
ZmMgbWFpbGluZyBsaXN0PGJyPg0KPGEgaHJlZj0ibWFpbHRvOnNmY0BpZXRmLm9yZyIgdGFyZ2V0
PSJfYmxhbmsiPnNmY0BpZXRmLm9yZzwvYT48YnI+DQo8YSBocmVmPSJodHRwczovL3d3dy5pZXRm
Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3NmYyIgdGFyZ2V0PSJfYmxhbmsiPmh0dHBzOi8vd3d3Lmll
dGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjPC9hPjx1PjwvdT48dT48L3U+PC9wPg0KPC9kaXY+
DQo8L2Jsb2NrcXVvdGU+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjwvZGl2Pg0K
PC9ibG9ja3F1b3RlPg0KPC9kaXY+DQo8YnI+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Rp
dj4NCjwvc3Bhbj4NCjwvYm9keT4NCjwvaHRtbD4NCg==

--_000_D33406CD13BD96naikumarciscocom_--


From nobody Wed Apr 13 18:29:09 2016
Return-Path: <akatlas@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1900212D9C6 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 18:29:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.699
X-Spam-Level: 
X-Spam-Status: No, score=-102.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s5gxZYhQY7f3 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 18:29:04 -0700 (PDT)
Received: from mail-oi0-x233.google.com (mail-oi0-x233.google.com [IPv6:2607:f8b0:4003:c06::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8397912D8AA for <sfc@ietf.org>; Wed, 13 Apr 2016 18:29:04 -0700 (PDT)
Received: by mail-oi0-x233.google.com with SMTP id p188so80518798oih.2 for <sfc@ietf.org>; Wed, 13 Apr 2016 18:29:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc; bh=6p9L81QT+lb8cLdP4I+NVCsGHg0VGniZEXoy9a2rRO0=; b=zS7AeIsgzvyeigPruX6EetjSPxAplw5LwPswh6jlGPQeAx8WljZVyIxAD7jXA+BVu2 8YPrvB9sK8VJUb5Fcx2OY+ZQ46IMC0dltCXUOeWHXUBD5LWOWgMq/2j2iJQ7VWrE6EQd DARmWWTKper6o0381A6mSHfWin6jcjSCkzPhc7u3NFSBRHJrYdGeMzCjcM+o6YPlt/Pf 6O5gtLzjW4ZwXrUXc44b5tabfTgRPNBy+NWyaqCM8JHBG+n86CpncPSI46GSg/o4Vr4n jWElr8o2YLKFLnq+4DHB/ZSeZB1IH1yQkQpF/pH9I8JoVwYxB3/RToqpq6efd1K5EuWM 5ALQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc; bh=6p9L81QT+lb8cLdP4I+NVCsGHg0VGniZEXoy9a2rRO0=; b=LF69/6UPD/B0xRrZE9GbI2k3Kf2DYfRaEqy56UNs88KYwJual1DL1cpbWo76kLp21r rtrCBgTyaIwRNtEbJQnVGJJrAr6mQoLu0JjtU5782fsFCH6UAPZ3yac9vF7EFDTEftIY r97dT03MGc1g43qY86yJhrvV8Zda2bSUgTDnfx/flLY0VchbYSULKnJWnYoXIbsgP++0 23PhFKMJlkrBRkyaXoEg8+zJNHgAD82I21ZICPqNsFHrLqHC/H+H5mYi3zifzc4Xs1Ak baMvp1hbwGurzqrNVhsNJrQmyIsCQK3HzM+GLOd3t/a4VMHsFxT/Ux2hhlNcZq+YIZhr UuOA==
X-Gm-Message-State: AOPr4FU0F2ub1ErRVWlmwt3fv+ruMxTfqHPw/kRyYGXFvwQGA08bbWRTcmta2y08bKmF36eABBzMqI/7/Nketw==
MIME-Version: 1.0
X-Received: by 10.157.32.15 with SMTP id n15mr6353178ota.85.1460597343882; Wed, 13 Apr 2016 18:29:03 -0700 (PDT)
Received: by 10.60.115.168 with HTTP; Wed, 13 Apr 2016 18:29:03 -0700 (PDT)
In-Reply-To: <CAG4d1rf7Vau5aOiA7LozY8EYNoiEiqReDN5c7bKz5ZZoi3L8Sw@mail.gmail.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <570E4D07.2060405@pi.nu> <CAG4d1rcT1JmnGT-NWkYjd0uQm-kbm5-w7tfnJVs9W07L9Cir1A@mail.gmail.com> <CAG4d1rc=DpsXV3=p9dYX3tom0XLDb_uXJxHbVNennvXf8phoSQ@mail.gmail.com> <CAG4d1rf_KOjjRh9NV40j-SKbxe0Yw82LBPnpVuAoNThm9ZdOjQ@mail.gmail.com> <E8355113905631478EFF04F5AA706E9830F1E1EC@wtl-exchp-2.sandvine.com> <CAG4d1rdpRWqt7tnafTZMFKQ7TwtLg_p=7SzOX0V2YNidrdFwcA@mail.gmail.com> <D33424D2.1219BC%kegray@cisco.com> <CAG4d1rf7Vau5aOiA7LozY8EYNoiEiqReDN5c7bKz5ZZoi3L8Sw@mail.gmail.com>
Date: Wed, 13 Apr 2016 21:29:03 -0400
Message-ID: <CAG4d1rfNr5MOhoxTw6CXWGkD4yWZQ2Y4_+iWL53N_NU4SUFp-A@mail.gmail.com>
From: Alia Atlas <akatlas@gmail.com>
To: "Ken Gray (kegray)" <kegray@cisco.com>
Content-Type: multipart/alternative; boundary=001a113dbe26d7a041053067d190
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/JC3q8jBQVHicgwxm0Bx0RgcEA4E>
Cc: Xuxiaohu <xuxiaohu@huawei.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 01:29:08 -0000

--001a113dbe26d7a041053067d190
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Resending with fewer recipients.

On Wed, Apr 13, 2016 at 9:27 PM, Alia Atlas <akatlas@gmail.com> wrote:

> Hi Ken,
>
> On Wed, Apr 13, 2016 at 7:22 PM, Ken Gray (kegray) <kegray@cisco.com>
> wrote:
>
>> At this point, I'll weigh in with two things:
>>
>> Yes, I support the draft.
>>
>> Aside from the editorial suggestions (welcome, fix that stuff) and the
>> constant returning to wanting to define metadata - which is a deep abyss
>> we seem fascinated with but doesn't HAVE to be done here and now, IMO - =
I
>> have to express both my appreciation for the thoroughness that brings th=
e
>> MPLS nibble issue to the surface and my absolute awe that we would
>> perpetuate that design choice and cripple the NSH header rather than
>> attempt to fix it at it's root.
>
>
> Deployed base, sadly - and a strong need for small microflows to support
> splitting
> traffic among different paths.
>
> Despite it being a good 10 years since the problem was admitted around
> pseudo-wires
> and then admitted again in conversations around MPLS-TP, I've heard no on=
e
> claim
> that this isn't an issue for the MPLS transport.  Of course, my email is
> always open :-)
>
> I will have more comments.
>
> Cheers,
> Alia
>
>
>> >Hi Dave,
>> >
>> >
>> >On Wed, Apr 13, 2016 at 1:34 PM, Dave Dolson
>> ><ddolson@sandvine.com> wrote:
>> >
>> >I=E2=80=99m going to show my ignorance and ask how Ethernet is carried =
over MPLS?
>> >The first nybble is part of the Destination MAC address.
>> >OUIs have been allocated beginning with 4 and also with 6.
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> >Thanks for asking and don't be sorry for not having to live through the
>> >fun and joy of standardizing pseudo-wires.   The very very short form i=
s
>> >that there is a 32-bit code-word defined that sits above the Ethernet
>> >frame and right below the MPLS stack.
>> > This is to deal with implementations that look beneath the MPLS stack =
to
>> >hunt down more fields to hash to get good entropy for ECMP or LAG.
>> >
>> >
>> >
>> >As I recall, when I looked a long long (er, let's not get into how long=
)
>> >time ago, the likeliness of actual collision with allocated OUIs was
>> >quite small.
>> >
>> >
>> >Alia
>> >
>> >
>> >
>> >
>> >
>> >From: sfc [mailto:sfc-bounces@ietf.org]
>> >On Behalf Of Alia Atlas
>> >Sent: Wednesday, April 13, 2016 9:56 AM
>> >To: Loa Andersson
>> >Cc: Thomas Narten; Carlos Pignataro (cpignata);
>> >sfc@ietf.org <mailto:sfc@ietf.org>; Jim Guichard (jguichar); Martin
>> >Stiemerling; Xuxiaohu; Joel M. Halpern
>> >
>> >Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>> >
>> >
>> >
>> >Loa,
>> >Thanks!   I knew it was out there.
>> >Regardless,  the first nibble question can't be resolved by adding more
>> >labels to the stack!    The whole issue is looking at the S bit to gues=
s
>> >what's under the MPLS label stack.  That's why PWE3 uses code-words.
>> >There needs to be an answer beyond handwaving that something can be
>> >invented.
>> >Of all the implementations, what transports is NSH carried over?  Do we
>> >have any diversity?
>> >
>> >Regards,
>> >Alia
>> >On Apr 13, 2016 9:43 AM, "Loa Andersson" <loa@pi.nu> wrote:
>> >Alia,
>> >
>> >I think you are referring to RFC 4182, it is more than a decade
>> >since it was published.
>> >
>> >/Loa
>> >
>> >
>> >On 2016-04-13 21:13, Alia Atlas wrote:
>> >
>> >
>> >Carlos,
>> >
>> >As we all know, it is possible to do many many things with technology -
>> >once we figure out how.
>> >Saying that there are approaches other than reorganizing the first
>> >
>> >nibble is fine.=C3=82  Claiming that we'll
>> >
>> >be anywhere near interoperability or standardization without it being
>> >clarified does not seem plausible.
>> >
>> >For instance, I will note that the description of 0 (Explicit NULL) is
>> >still defined in RFC3032 as implying
>> >
>> >the packet underneath is IPv4.=C3=82  I really did think that we'd talk=
ed in
>> >
>> >MPLS about fixing this - and maybe
>> >Loa or others can give us the reference - but that's what the IANA
>> >pointer has right now.
>> >
>> >I understand the desire to get NSH done - deeply! =C3=82
>> >
>> >
>> >I also hate late surprises and am trying to clear time to do a more
>> >thorough review of NSH as well as
>> >requesting other focused reviews.
>> >
>> >This issue is not new - and the issues I saw in a quick look are those
>> >that are thoroughly documented
>> >
>> >in=C3=82 draft-ietf-rtgwg-dt-encap-01
>> ><https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-encap/>=C3=82 whi=
ch
>> >
>> >considered NSH as one of the encapsulations.
>> >
>> >It seems clear that there *are*=C3=82 transport-specific issues and we =
need a
>> >
>> >place and a way to capture them.
>> >
>> >Regards,
>> >Alia
>> >
>> >On Wed, Apr 13, 2016 at 8:53 AM, Carlos Pignataro (cpignata)
>> >
>> ><cpignata@cisco.com <mailto:cpignata@cisco.com>> wrote:
>> >
>> >    Alia,
>> >
>> >    Thanks for looking into this.
>> >
>> >    It is relevant. I believe ECMP-prevention (anti-aliasing with 0x4
>> >    and 0x6) is necessary for traffic over MPLS expecting in-order
>> >
>> >    delivery.=C3=82
>> >
>> >
>> >    Transporting NSH over MPLS, however, does not necessarily imply
>> >    transporting NSH *directly* following the bottom LSE. There are
>> >
>> >    other ways, as it was done with PWs.=C3=82
>> >
>> >
>> >    I think showing that it is possible to appropriately (i.e.,
>> >    respecting BCPs) transport NSH over MPLS is very important. This ma=
y
>> >    or may not have implications on the NSH base header. I believe
>> >    however that such actual formal specification (beyond showing its
>> >    possible) should not gate NSH.
>> >
>> >    Thanks!
>> >
>> >    =C3=A2=E2=82=AC=E2=80=9D Carlos.
>> >
>> >
>> >    On Apr 12, 2016, at 10:29 PM, Alia Atlas <akatlas@gmail.com
>> >
>> >    <mailto:akatlas@gmail.com>> wrote:
>> >
>> >    Xiaohu, Joel, and SFC WG group,
>> >
>> >    The first nibble question is quite relevant if it is expected that
>> >    the NSH header might be directly under
>> >
>> >    an MPLS label stack.=C3=82  This issue arose rather unpleasantly fo=
r
>> >
>> >    pseudo-wires a long time ago and the
>> >    reasoning for it is much better documented, as Carlos pointed out
>> >    in a different thread, in RFC 4928 Section 3.
>> >
>> >    At the time that PWE3 was working on the control word and whether
>> >    it was to be mandatory (RFC 4385), it was clear that
>> >    there were devices that looked at the first nibble of a packet
>> >    under the MPLS header as a way to determine
>> >    if the packet was IPv4 or IPv6 and obtain flow-diversity from
>> >
>> >    it.=C3=82  The cost of also verifying the associated checksum
>> >
>> >    if available wasn't deemed acceptable for several
>> >
>> >    implementations.=C3=82  Given that determining as much entropy as
>> >
>> >    possible is still really important and that it is non-trivial to
>> >    negotiate/indicate the capability for including
>> >    an Entropy Label in the MPLS stack, I have no reason to believe
>> >    that this shortcut of looking at the first nibble
>> >
>> >    is no longer used or deployed. =C3=82  Feel free to contact me off-=
list
>> >
>> >    if you believe this to be the case.
>> >
>> >    It is clear from the NSH base header:
>> >       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>> >
>> >+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>> >          |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protoc=
ol
>> >|
>> >
>> >+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>> >
>> >    that this consideration has been completely ignored.=C3=82  In fact=
, an
>> >
>> >    NSH base header might have any value
>> >    of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for NSH were
>> >    ever defined, suddenly the traffic might
>> >    be subject to startling reordering if an MPLS transport were to be
>> >    considered.
>> >
>> >    Given a claim of NSH being transport-agnostic and repeated
>> >    emphasis that MPLS, as well as UDP,
>> >    is a valid transport for NSH, I do think this is a significant
>> >    oversight and needs, at a minimum, discussion and
>> >
>> >    explanation, and =C3=82 - quite likely - =C3=82 correction.
>> >
>> >
>> >    While I am on the topic of details of the NSH encapsulation, I
>> >    would request that Section 8 of draft-ietf-rtgwg-dt-encap-01
>> >
>> >    be read and considered! =C3=82  I am not excited by having many
>> >
>> >    different and unique Next Protocol fields defined.
>> >    For instance, I note the definition of a nearly identical Next
>> >    Protocol field in
>> >
>> >https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe
>> ><https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe> .
>> >
>> >    While I am, of course, willing to reason to detailed and
>> >    well-thought out explanations for why each and every new
>> >    encapsulation needs its very own IANA-defined Next Protocol field,
>> >    this seems to me to be highly likely to require
>> >    consolidation so that the same Next Protocol field can be used
>> >    between the various encapsulations.
>> >
>> >    I will work on giving a through review of NSH as soon as
>> >
>> >    practical.=C3=82  I do realize that there are multiple implementati=
ons
>> >
>> >    and while details of how the "Next Protocol" field are documented
>> >    shouldn't have a significant impact there, the
>> >    discussion about the first nibble is likely to.
>> >
>> >    Regards,
>> >    Alia
>> >
>> >
>> >    On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <xuxiaohu@huawei.com
>> >
>> >    <mailto:xuxiaohu@huawei.com>> wrote:
>> >
>> >        Joel,
>> >
>> >        > -----Original Message-----
>> >
>> >        > From: Joel M. Halpern [mailto:jmh@joelhalpern.com
>> ><mailto:jmh@joelhalpern.com>]
>> >        > Sent: Wednesday, April 13, 2016 9:45 AM
>> >
>> >        > To: Xuxiaohu; Thomas
>> >Narten;sfc@ietf.org <mailto:Narten%3Bsfc@ietf.org> <mailto:sfc@ietf.org=
>
>> >        > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>> >        >
>> >        > Xu,
>> >
>> >        >=C3=82  =C3=82  =C3=82  =C3=82 I do not believe that there is =
an MPLS specification
>> >that requires that all
>> >
>> >        > content other than IP must have a first nibble of 0 or 1.
>> >
>> >        When encapsulating NSH over MPLS directly, the first nibble of
>> >        the NSH must not be 4 or 6.
>> >
>> >        > There are specifications where it is discussed as desirable.
>> >        >
>> >        > It is in fact pretty trivial for us to change the format so
>> >that the first three bits are
>> >
>> >        > 0, but it burns several valuable flag bits.=C3=82  It is an S=
FC
>> >working group decision,
>> >
>> >
>> >        That's the reason why I raised the first nibble question.
>> >
>> >        Best regards,
>> >        Xiaohu
>> >
>> >        > not, as far as I can tell, a violation of the MPLS
>> >        specification.
>> >        >
>> >        > Yours,
>> >        > Joel
>> >        >
>> >        > On 4/12/16 9:41 PM, Xuxiaohu wrote:
>> >        > > Hi Thomas,
>> >        > >
>> >        > > It said in the NSH draft:
>> >        > >
>> >
>> >        > >=C3=82  =C3=82  "6.=C3=82  Transport Agnostic: NSH is transp=
ort
>> >        independent and is carried
>> >        > >=C3=82  =C3=82  =C3=82  =C3=82  =C3=82 in an overlay, over e=
xisting underlays.=C3=82  If
>> >        an existing overlay
>> >        > >=C3=82  =C3=82  =C3=82  =C3=82  =C3=82 topology provides the=
 required service path
>> >        connectivity, that
>> >        > >=C3=82  =C3=82  =C3=82  =C3=82  =C3=82 existing overlay may =
be used."
>> >
>> >        > >
>> >        > > That means the NSH should be able to be transported over
>> >        MPLS. However,
>> >        > according to the current NSH format definition, it's not
>> >        safe to carry the NSH
>> >        > over MPLS due to the first nibble issue. Therefore, I
>> >        believe this issue needs to be
>> >        > addressed before publication.
>> >        > >
>> >        > > Best regards,
>> >        > > Xiaohu
>> >        > >
>> >        > >> -----Original Message-----
>> >        > >> From: sfc [mailto:sfc-bounces@ietf.org
>> >        <mailto:sfc-bounces@ietf.org>] On Behalf Of Thomas Narten
>> >        > >> Sent: Thursday, March 31, 2016 10:48 AM
>> >
>> >        > >> To:
>> >sfc@ietf.org <mailto:sfc@ietf.org> <mailto:sfc@ietf.org>
>> >        > >> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>> >        > >>
>> >        > >> Dear WG:
>> >        > >>
>> >        > >> This note begins a WG last call on draft-ietf-sfc-nsh-04.t=
xt
>> >        > >> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>> >        > >>
>> >        > >> The editors of the NSH document have indicated that they
>> have
>> >        > >> addressed all known comments and that there are no open
>> >        issues with
>> >        > >> the current version of the document.
>> >        > >>
>> >        > >> Substantive comments to the list please, editorial
>> >        comments can go
>> >        > >> directly to the document editors.
>> >        > >>
>> >        > >> We'll also get a brief update from the editors at next
>> week's
>> >        > >> meeting. If there are any remaining issues with the
>> >        document, raising
>> >        > >> them before the meeting would be especially helpful.
>> >        > >>
>> >        > >> For the chairs,
>> >        > >> Thomas
>> >        > >>
>> >        > >> _______________________________________________
>> >        > >> sfc mailing list
>> >
>> >        > >> sfc@ietf.org <mailto:sfc@ietf.org>
>> >
>> >        > >>
>> >https://www.ietf.org/mailman/listinfo/sfc
>> ><https://www.ietf.org/mailman/listinfo/sfc>
>> >        > >
>> >        > > _______________________________________________
>> >        > > sfc mailing list
>> >
>> >        > > sfc@ietf.org <mailto:sfc@ietf.org>
>> >
>> >        > > https://www.ietf.org/mailman/listinfo/sfc
>> >        > >
>> >
>> >        _______________________________________________
>> >        sfc mailing list
>> >
>> >        sfc@ietf.org <mailto:sfc@ietf.org>
>> >
>> >        https://www.ietf.org/mailman/listinfo/sfc
>> >
>> >
>> >    _______________________________________________
>> >    sfc mailing list
>> >
>> >    sfc@ietf.org <mailto:sfc@ietf.org>
>> >    https://www.ietf.org/mailman/listinfo/sfc
>> >
>> >
>> >
>> >
>> >_______________________________________________
>> >sfc mailing list
>> >sfc@ietf.org
>> >https://www.ietf.org/mailman/listinfo/sfc
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>>
>>
>

--001a113dbe26d7a041053067d190
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Resending with fewer recipients.<br><div class=3D"gmail_ex=
tra"><br><div class=3D"gmail_quote">On Wed, Apr 13, 2016 at 9:27 PM, Alia A=
tlas <span dir=3D"ltr">&lt;<a href=3D"mailto:akatlas@gmail.com" target=3D"_=
blank">akatlas@gmail.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmai=
l_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left=
:1ex"><div dir=3D"ltr">Hi Ken,<div class=3D"gmail_extra"><br><div class=3D"=
gmail_quote"><span class=3D"">On Wed, Apr 13, 2016 at 7:22 PM, Ken Gray (ke=
gray) <span dir=3D"ltr">&lt;<a href=3D"mailto:kegray@cisco.com" target=3D"_=
blank">kegray@cisco.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail=
_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:=
1ex">At this point, I&#39;ll weigh in with two things:<br>
<br>
Yes, I support the draft.<br>
<br>
Aside from the editorial suggestions (welcome, fix that stuff) and the<br>
constant returning to wanting to define metadata - which is a deep abyss<br=
>
we seem fascinated with but doesn&#39;t HAVE to be done here and now, IMO -=
 I<br>
have to express both my appreciation for the thoroughness that brings the<b=
r>
MPLS nibble issue to the surface and my absolute awe that we would<br>
perpetuate that design choice and cripple the NSH header rather than<br>
attempt to fix it at it&#39;s root.</blockquote><div><br></div></span><div>=
Deployed base, sadly - and a strong need for small microflows to support sp=
litting</div><div>traffic among different paths.</div><div><br></div><div>D=
espite it being a good 10 years since the problem was admitted around pseud=
o-wires</div><div>and then admitted again in conversations around MPLS-TP, =
I&#39;ve heard no one claim</div><div>that this isn&#39;t an issue for the =
MPLS transport.=C2=A0 Of course, my email is always open :-)</div><div><br>=
</div><div>I will have more comments.</div><div><br></div><div>Cheers,</div=
><div>Alia</div><div><div class=3D"h5"><div>=C2=A0</div><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex"><span>&gt;Hi Dave,<br>
&gt;<br>
&gt;<br>
&gt;On Wed, Apr 13, 2016 at 1:34 PM, Dave Dolson<br>
&gt;&lt;<a href=3D"mailto:ddolson@sandvine.com" target=3D"_blank">ddolson@s=
andvine.com</a>&gt; wrote:<br>
&gt;<br>
&gt;I=E2=80=99m going to show my ignorance and ask how Ethernet is carried =
over MPLS?<br>
&gt;The first nybble is part of the Destination MAC address.<br>
&gt;OUIs have been allocated beginning with 4 and also with 6.<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;Thanks for asking and don&#39;t be sorry for not having to live through=
 the<br>
&gt;fun and joy of standardizing pseudo-wires.=C2=A0 =C2=A0The very very sh=
ort form is<br>
&gt;that there is a 32-bit code-word defined that sits above the Ethernet<b=
r>
&gt;frame and right below the MPLS stack.<br>
&gt; This is to deal with implementations that look beneath the MPLS stack =
to<br>
&gt;hunt down more fields to hash to get good entropy for ECMP or LAG.<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;As I recall, when I looked a long long (er, let&#39;s not get into how =
long)<br>
&gt;time ago, the likeliness of actual collision with allocated OUIs was<br=
>
&gt;quite small.<br>
&gt;<br>
&gt;<br>
&gt;Alia<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;From: sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_bl=
ank">sfc-bounces@ietf.org</a>]<br>
&gt;On Behalf Of Alia Atlas<br>
&gt;Sent: Wednesday, April 13, 2016 9:56 AM<br>
&gt;To: Loa Andersson<br>
&gt;Cc: Thomas Narten; Carlos Pignataro (cpignata);<br>
</span>&gt;<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</=
a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.or=
g</a>&gt;; Jim Guichard (jguichar); Martin<br>
<div><div>&gt;Stiemerling; Xuxiaohu; Joel M. Halpern<br>
&gt;<br>
&gt;Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;Loa,<br>
&gt;Thanks!=C2=A0 =C2=A0I knew it was out there.<br>
&gt;Regardless,=C2=A0 the first nibble question can&#39;t be resolved by ad=
ding more<br>
&gt;labels to the stack!=C2=A0 =C2=A0 The whole issue is looking at the S b=
it to guess<br>
&gt;what&#39;s under the MPLS label stack.=C2=A0 That&#39;s why PWE3 uses c=
ode-words.<br>
&gt;There needs to be an answer beyond handwaving that something can be<br>
&gt;invented.<br>
&gt;Of all the implementations, what transports is NSH carried over?=C2=A0 =
Do we<br>
&gt;have any diversity?<br>
&gt;<br>
&gt;Regards,<br>
&gt;Alia<br>
&gt;On Apr 13, 2016 9:43 AM, &quot;Loa Andersson&quot; &lt;<a href=3D"mailt=
o:loa@pi.nu" target=3D"_blank">loa@pi.nu</a>&gt; wrote:<br>
&gt;Alia,<br>
&gt;<br>
&gt;I think you are referring to RFC 4182, it is more than a decade<br>
&gt;since it was published.<br>
&gt;<br>
&gt;/Loa<br>
&gt;<br>
&gt;<br>
&gt;On 2016-04-13 21:13, Alia Atlas wrote:<br>
&gt;<br>
&gt;<br>
&gt;Carlos,<br>
&gt;<br>
&gt;As we all know, it is possible to do many many things with technology -=
<br>
&gt;once we figure out how.<br>
&gt;Saying that there are approaches other than reorganizing the first<br>
&gt;<br>
&gt;nibble is fine.=C3=82=C2=A0 Claiming that we&#39;ll<br>
&gt;<br>
&gt;be anywhere near interoperability or standardization without it being<b=
r>
&gt;clarified does not seem plausible.<br>
&gt;<br>
&gt;For instance, I will note that the description of 0 (Explicit NULL) is<=
br>
&gt;still defined in RFC3032 as implying<br>
&gt;<br>
&gt;the packet underneath is IPv4.=C3=82=C2=A0 I really did think that we&#=
39;d talked in<br>
&gt;<br>
&gt;MPLS about fixing this - and maybe<br>
&gt;Loa or others can give us the reference - but that&#39;s what the IANA<=
br>
&gt;pointer has right now.<br>
&gt;<br>
&gt;I understand the desire to get NSH done - deeply! =C3=82<br>
&gt;<br>
&gt;<br>
&gt;I also hate late surprises and am trying to clear time to do a more<br>
&gt;thorough review of NSH as well as<br>
&gt;requesting other focused reviews.<br>
&gt;<br>
&gt;This issue is not new - and the issues I saw in a quick look are those<=
br>
&gt;that are thoroughly documented<br>
&gt;<br>
&gt;in=C3=82 draft-ietf-rtgwg-dt-encap-01<br>
&gt;&lt;<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-rtgwg-dt-enc=
ap/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc/=
draft-ietf-rtgwg-dt-encap/</a>&gt;=C3=82 which<br>
&gt;<br>
&gt;considered NSH as one of the encapsulations.<br>
&gt;<br>
&gt;It seems clear that there *are*=C3=82 transport-specific issues and we =
need a<br>
&gt;<br>
&gt;place and a way to capture them.<br>
&gt;<br>
&gt;Regards,<br>
&gt;Alia<br>
&gt;<br>
&gt;On Wed, Apr 13, 2016 at 8:53 AM, Carlos Pignataro (cpignata)<br>
&gt;<br>
&gt;&lt;<a href=3D"mailto:cpignata@cisco.com" target=3D"_blank">cpignata@ci=
sco.com</a> &lt;mailto:<a href=3D"mailto:cpignata@cisco.com" target=3D"_bla=
nk">cpignata@cisco.com</a>&gt;&gt; wrote:<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 Alia,<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 Thanks for looking into this.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 It is relevant. I believe ECMP-prevention (anti-aliasing =
with 0x4<br>
&gt;=C2=A0 =C2=A0 and 0x6) is necessary for traffic over MPLS expecting in-=
order<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 delivery.=C3=82<br>
&gt;<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 Transporting NSH over MPLS, however, does not necessarily=
 imply<br>
&gt;=C2=A0 =C2=A0 transporting NSH *directly* following the bottom LSE. The=
re are<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 other ways, as it was done with PWs.=C3=82<br>
&gt;<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 I think showing that it is possible to appropriately (i.e=
.,<br>
&gt;=C2=A0 =C2=A0 respecting BCPs) transport NSH over MPLS is very importan=
t. This may<br>
&gt;=C2=A0 =C2=A0 or may not have implications on the NSH base header. I be=
lieve<br>
&gt;=C2=A0 =C2=A0 however that such actual formal specification (beyond sho=
wing its<br>
&gt;=C2=A0 =C2=A0 possible) should not gate NSH.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 Thanks!<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C3=A2=E2=82=AC=E2=80=9D Carlos.<br>
&gt;<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 On Apr 12, 2016, at 10:29 PM, Alia Atlas &lt;<a href=3D"m=
ailto:akatlas@gmail.com" target=3D"_blank">akatlas@gmail.com</a><br>
&gt;<br>
&gt;=C2=A0 =C2=A0 &lt;mailto:<a href=3D"mailto:akatlas@gmail.com" target=3D=
"_blank">akatlas@gmail.com</a>&gt;&gt; wrote:<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 Xiaohu, Joel, and SFC WG group,<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 The first nibble question is quite relevant if it is expe=
cted that<br>
&gt;=C2=A0 =C2=A0 the NSH header might be directly under<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 an MPLS label stack.=C3=82=C2=A0 This issue arose rather =
unpleasantly for<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 pseudo-wires a long time ago and the<br>
&gt;=C2=A0 =C2=A0 reasoning for it is much better documented, as Carlos poi=
nted out<br>
&gt;=C2=A0 =C2=A0 in a different thread, in RFC 4928 Section 3.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 At the time that PWE3 was working on the control word and=
 whether<br>
&gt;=C2=A0 =C2=A0 it was to be mandatory (RFC 4385), it was clear that<br>
&gt;=C2=A0 =C2=A0 there were devices that looked at the first nibble of a p=
acket<br>
&gt;=C2=A0 =C2=A0 under the MPLS header as a way to determine<br>
&gt;=C2=A0 =C2=A0 if the packet was IPv4 or IPv6 and obtain flow-diversity =
from<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 it.=C3=82=C2=A0 The cost of also verifying the associated=
 checksum<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 if available wasn&#39;t deemed acceptable for several<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 implementations.=C3=82=C2=A0 Given that determining as mu=
ch entropy as<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 possible is still really important and that it is non-tri=
vial to<br>
&gt;=C2=A0 =C2=A0 negotiate/indicate the capability for including<br>
&gt;=C2=A0 =C2=A0 an Entropy Label in the MPLS stack, I have no reason to b=
elieve<br>
&gt;=C2=A0 =C2=A0 that this shortcut of looking at the first nibble<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 is no longer used or deployed. =C3=82=C2=A0 Feel free to =
contact me off-list<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 if you believe this to be the case.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 It is clear from the NSH base header:<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A00 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 =
2 3 4 5 6 7 8 9 0 1<br>
&gt;<br>
&gt;+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 |Ver|O|C|R|R|R|R|R|R|=C2=A0 =C2=A0Le=
ngth=C2=A0 |=C2=A0 =C2=A0 MD Type=C2=A0 =C2=A0 | Next Protocol<br>
&gt;|<br>
&gt;<br>
&gt;+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 that this consideration has been completely ignored.=C3=
=82=C2=A0 In fact, an<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 NSH base header might have any value<br>
&gt;=C2=A0 =C2=A0 of 0b0000, 0b0001, 0b0010, 0b0010 and if a version 01 for=
 NSH were<br>
&gt;=C2=A0 =C2=A0 ever defined, suddenly the traffic might<br>
&gt;=C2=A0 =C2=A0 be subject to startling reordering if an MPLS transport w=
ere to be<br>
&gt;=C2=A0 =C2=A0 considered.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 Given a claim of NSH being transport-agnostic and repeate=
d<br>
&gt;=C2=A0 =C2=A0 emphasis that MPLS, as well as UDP,<br>
&gt;=C2=A0 =C2=A0 is a valid transport for NSH, I do think this is a signif=
icant<br>
&gt;=C2=A0 =C2=A0 oversight and needs, at a minimum, discussion and<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 explanation, and =C3=82 - quite likely - =C3=82 correctio=
n.<br>
&gt;<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 While I am on the topic of details of the NSH encapsulati=
on, I<br>
&gt;=C2=A0 =C2=A0 would request that Section 8 of draft-ietf-rtgwg-dt-encap=
-01<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 be read and considered! =C3=82=C2=A0 I am not excited by =
having many<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 different and unique Next Protocol fields defined.<br>
&gt;=C2=A0 =C2=A0 For instance, I note the definition of a nearly identical=
 Next<br>
&gt;=C2=A0 =C2=A0 Protocol field in<br>
&gt;<br>
&gt;<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-gpe" =
rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc/draft=
-ietf-nvo3-vxlan-gpe</a><br>
&gt;&lt;<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxlan-g=
pe" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc/d=
raft-ietf-nvo3-vxlan-gpe</a>&gt; .<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 While I am, of course, willing to reason to detailed and<=
br>
&gt;=C2=A0 =C2=A0 well-thought out explanations for why each and every new<=
br>
&gt;=C2=A0 =C2=A0 encapsulation needs its very own IANA-defined Next Protoc=
ol field,<br>
&gt;=C2=A0 =C2=A0 this seems to me to be highly likely to require<br>
&gt;=C2=A0 =C2=A0 consolidation so that the same Next Protocol field can be=
 used<br>
&gt;=C2=A0 =C2=A0 between the various encapsulations.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 I will work on giving a through review of NSH as soon as<=
br>
&gt;<br>
&gt;=C2=A0 =C2=A0 practical.=C3=82=C2=A0 I do realize that there are multip=
le implementations<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 and while details of how the &quot;Next Protocol&quot; fi=
eld are documented<br>
&gt;=C2=A0 =C2=A0 shouldn&#39;t have a significant impact there, the<br>
&gt;=C2=A0 =C2=A0 discussion about the first nibble is likely to.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 Regards,<br>
&gt;=C2=A0 =C2=A0 Alia<br>
&gt;<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu &lt;<a href=3D"=
mailto:xuxiaohu@huawei.com" target=3D"_blank">xuxiaohu@huawei.com</a><br>
&gt;<br>
&gt;=C2=A0 =C2=A0 &lt;mailto:<a href=3D"mailto:xuxiaohu@huawei.com" target=
=3D"_blank">xuxiaohu@huawei.com</a>&gt;&gt; wrote:<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 Joel,<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; -----Original Message-----<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; From: Joel M. Halpern [mailto:<a href=
=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a><b=
r>
&gt;&lt;mailto:<a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh=
@joelhalpern.com</a>&gt;]<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; Sent: Wednesday, April 13, 2016 9:45 A=
M<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; To: Xuxiaohu; Thomas<br>
</div></div>&gt;<a href=3D"mailto:Narten%3Bsfc@ietf.org" target=3D"_blank">=
Narten;sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:Narten%253Bsfc@ietf.or=
g" target=3D"_blank">Narten%3Bsfc@ietf.org</a>&gt; &lt;mailto:<a href=3D"ma=
ilto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt;<br>
<div><div>&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; Subject: Re: [sfc] WG last c=
all for draft-ietf-sfc-nsh-04.txt<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; Xu,<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt;=C3=82=C2=A0 =C3=82=C2=A0 =C3=82=C2=A0 =
=C3=82 I do not believe that there is an MPLS specification<br>
&gt;that requires that all<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; content other than IP must have a firs=
t nibble of 0 or 1.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 When encapsulating NSH over MPLS directly, =
the first nibble of<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 the NSH must not be 4 or 6.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; There are specifications where it is d=
iscussed as desirable.<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; It is in fact pretty trivial for us to=
 change the format so<br>
&gt;that the first three bits are<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; 0, but it burns several valuable flag =
bits.=C3=82=C2=A0 It is an SFC<br>
&gt;working group decision,<br>
&gt;<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 That&#39;s the reason why I raised the firs=
t nibble question.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 Best regards,<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 Xiaohu<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; not, as far as I can tell, a violation=
 of the MPLS<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 specification.<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; Yours,<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; Joel<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; On 4/12/16 9:41 PM, Xuxiaohu wrote:<br=
>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; Hi Thomas,<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; It said in the NSH draft:<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;=C3=82=C2=A0 =C3=82=C2=A0 &quot;6.=
=C3=82=C2=A0 Transport Agnostic: NSH is transport<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 independent and is carried<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;=C3=82=C2=A0 =C3=82=C2=A0 =C3=82=
=C2=A0 =C3=82=C2=A0 =C3=82 in an overlay, over existing underlays.=C3=82=C2=
=A0 If<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 an existing overlay<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;=C3=82=C2=A0 =C3=82=C2=A0 =C3=82=
=C2=A0 =C3=82=C2=A0 =C3=82 topology provides the required service path<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 connectivity, that<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;=C3=82=C2=A0 =C3=82=C2=A0 =C3=82=
=C2=A0 =C3=82=C2=A0 =C3=82 existing overlay may be used.&quot;<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; That means the NSH should be able=
 to be transported over<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 MPLS. However,<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; according to the current NSH format de=
finition, it&#39;s not<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 safe to carry the NSH<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; over MPLS due to the first nibble issu=
e. Therefore, I<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 believe this issue needs to be<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; addressed before publication.<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; Best regards,<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; Xiaohu<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; -----Original Message-----<br=
>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; From: sfc [mailto:<a href=3D"=
mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ietf.org</a><br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &lt;mailto:<a href=3D"mailto:sfc-bounces@ie=
tf.org" target=3D"_blank">sfc-bounces@ietf.org</a>&gt;] On Behalf Of Thomas=
 Narten<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; Sent: Thursday, March 31, 201=
6 10:48 AM<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; To:<br>
</div></div>&gt;<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.=
org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ie=
tf.org</a>&gt; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank"=
>sfc@ietf.org</a>&gt;<br>
<div><div>&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; Subject: [sfc] WG l=
ast call for draft-ietf-sfc-nsh-04.txt<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; Dear WG:<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; This note begins a WG last ca=
ll on draft-ietf-sfc-nsh-04.txt<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; (<a href=3D"https://datatrack=
er.ietf.org/doc/draft-ietf-sfc-nsh/" rel=3D"noreferrer" target=3D"_blank">h=
ttps://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/</a>).<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; The editors of the NSH docume=
nt have indicated that they have<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; addressed all known comments =
and that there are no open<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 issues with<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; the current version of the do=
cument.<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; Substantive comments to the l=
ist please, editorial<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 comments can go<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; directly to the document edit=
ors.<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; We&#39;ll also get a brief up=
date from the editors at next week&#39;s<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; meeting. If there are any rem=
aining issues with the<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 document, raising<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; them before the meeting would=
 be especially helpful.<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; For the chairs,<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; Thomas<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; _____________________________=
__________________<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; sfc mailing list<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt; <a href=3D"mailto:sfc@ietf.or=
g" target=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf=
.org" target=3D"_blank">sfc@ietf.org</a>&gt;<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;&gt;<br>
&gt;<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;&lt;<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"norefe=
rrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a>&gt;<b=
r>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; _________________________________=
______________<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; sfc mailing list<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; <a href=3D"mailto:sfc@ietf.org" t=
arget=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org=
" target=3D"_blank">sfc@ietf.org</a>&gt;<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt; <a href=3D"https://www.ietf.org/m=
ailman/listinfo/sfc" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.=
org/mailman/listinfo/sfc</a><br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &gt; &gt;<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 ___________________________________________=
____<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 sfc mailing list<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 <a href=3D"mailto:sfc@ietf.org" target=3D"_=
blank">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=
=3D"_blank">sfc@ietf.org</a>&gt;<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 <a href=3D"https://www.ietf.org/mailman/lis=
tinfo/sfc" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/mailma=
n/listinfo/sfc</a><br>
&gt;<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 _______________________________________________<br>
&gt;=C2=A0 =C2=A0 sfc mailing list<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@iet=
f.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@=
ietf.org</a>&gt;<br>
&gt;=C2=A0 =C2=A0 <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=
=3D"noreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc=
</a><br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;_______________________________________________<br>
&gt;sfc mailing list<br>
&gt;<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br>
&gt;<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
<br>
</div></div></blockquote></div></div></div><br></div></div>
</blockquote></div><br></div></div>

--001a113dbe26d7a041053067d190--


From nobody Wed Apr 13 20:41:58 2016
Return-Path: <xuxiaohu@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1F3812E625 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 20:41:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.217
X-Spam-Level: 
X-Spam-Status: No, score=-5.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lfsH85b6T-ta for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 20:41:55 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA01112E61F for <sfc@ietf.org>; Wed, 13 Apr 2016 20:41:53 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml703-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CMD17015; Thu, 14 Apr 2016 03:41:51 +0000 (GMT)
Received: from NKGEML413-HUB.china.huawei.com (10.98.56.74) by lhreml703-cah.china.huawei.com (10.201.5.104) with Microsoft SMTP Server (TLS) id 14.3.235.1; Thu, 14 Apr 2016 04:41:50 +0100
Received: from NKGEML515-MBX.china.huawei.com ([fe80::a54a:89d2:c471:ff]) by NKGEML413-HUB.china.huawei.com ([10.98.56.74]) with mapi id 14.03.0235.001; Thu, 14 Apr 2016 11:41:39 +0800
From: Xuxiaohu <xuxiaohu@huawei.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Alia Atlas <akatlas@gmail.com>, Martin Stiemerling <mls.ietf@gmail.com>, "jguichar@cisco.com" <jguichar@cisco.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfgoOh5TUt/KkmiZB4K1T/tUZ+HM4ag//98hgCAAIcBwP//hWUAgAAR84CAAha5oA==
Date: Thu, 14 Apr 2016 03:41:40 +0000
Message-ID: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539F32@NKGEML515-MBX.china.huawei.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <570DBDFF.4070305@joelhalpern.com>
In-Reply-To: <570DBDFF.4070305@joelhalpern.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.111.99.55]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090202.570F1180.0003, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 7f390b4846863f306fe54fcbe9ebbbe3
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/r0OlmwhRP8drnT9CMg1pqE4v54M>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 03:41:57 -0000

DQoNCj4gLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCj4gRnJvbTogSm9lbCBNLiBIYWxwZXJu
IFttYWlsdG86am1oQGpvZWxoYWxwZXJuLmNvbV0NCj4gU2VudDogV2VkbmVzZGF5LCBBcHJpbCAx
MywgMjAxNiAxMTozMyBBTQ0KPiBUbzogQWxpYSBBdGxhczsgWHV4aWFvaHU7IE1hcnRpbiBTdGll
bWVybGluZzsgamd1aWNoYXJAY2lzY28uY29tDQo+IENjOiBKb2VsIE0uIEhhbHBlcm47IFRob21h
cyBOYXJ0ZW47IHNmY0BpZXRmLm9yZw0KPiBTdWJqZWN0OiBSZTogW3NmY10gV0cgbGFzdCBjYWxs
IGZvciBkcmFmdC1pZXRmLXNmYy1uc2gtMDQudHh0DQo+IA0KPiBXaXRoIHJlZ2FyZCB0byBNUExT
IGVuY2Fwc3VsYXRpb24sIEkgYW0gbm90IG9iamVjdGluZyB0byBjb25zaWRlcmluZyBpZiB3ZSB3
YW50DQo+IHRvIHJlYXJyYW5nZSB0aGluZ3MgdG8gbWFrZSBpdCBzaW1wbGVyIHRvIGNhcnJ5IE5T
SCBpbiBNUExTLg0KPiANCj4gR2l2ZW4gdGhhdCB0aGUgSUVURiBoYXMgbm90IHJhdGlmaWVkIGEg
c3RhbmRhcmRzIHRyYWNrIFJGQyBzdGF0aW5nIHRoYXQgaXQgaXMNCj4gcmVxdWlyZWQgZm9yIE1Q
TFMgY2FycmlhZ2UgdG8gYXZvaWQgdGhlIHZhbHVlcywgSSB3YXMgb2JqZWN0aW5nIHRoZSBYdQ0K
PiBvdmVyc3RhdGluZyB0aGUgc2l0dWF0aW9uLg0KPiANCj4gSXQgaXMgbm90IGFjdHVhbGx5IGhh
cmQgdG8gYXZvaWQgdGhlIHZhbHVlcy4gIElmIHdlIGZlZWwgaXQgaXMgaW1ucG9ydGFudCAoYW5k
IEkgYW0NCj4gdGVtcHRlZCB0byBhZ3JlZSB0aGF0IGl0IGlzIHdvcnRoIGNvbnNpZGVyaW5nKSB3
ZSBjYW4gcmVhcnJhbmdlIHNvbWUgcmVzZXJ2ZWQNCj4gYml0cyBzbyB0aGF0IHRoZSBmaXJzdCB0
aHJlZSBiaXRzIGFyZSAwLCB0aGUgbmV4dCB0d28gYXJlIHRoZSB2ZXJzaW9uLCBhbmQgdGhlDQo+
IHJlbWFpbmluZyBiaXRzIGFyZSBmbGFncy4gIE1ha2VzIHVzIGEgbGl0dGxlIHN0YXJ2ZWQgZm9y
IGZsYWdzLCBidXQgaWYgd2UgYWdyZWUgdGhhdA0KPiBNUExTIGhhcyBzdG9sZW4gdGhyZWUgYml0
cyBvZiBoZWFkZXIsIHNvIGJlIGl0Lg0KDQpJdCdkIGJldHRlciB0byBiZSBkZXRlcm1pbmVkIGJ5
IHRoZSBJRVRGIHdoZXRoZXIgb3Igbm90IE1QTFMgc2hvdWxkIGNvbnRpbnVvdXNseSBzdGVhbCB0
aGUgZmlyc3QgbmliYmxlIG9mIGFueSBlbWVyZ2luZyBlbmNhcHN1bGF0aW9uIGhlYWRlciwgSU1I
Ty4NCg0KQmVzdCByZWdhcmRzLA0KWGlhb2h1DQoNCj4gVGhlcmUgYXJlIG90aGVyIGFuc3dlcnMu
ICBXZSBjb3VsZCwgZm9yIGV4YW1wbGUsIGFncmVlIHRoYXQgd2hlbiBOU0ggaXMNCj4gY2Fycmll
ZCBvdmVyIE1QTFMsIGEgZHVtbXkgMCBsYWJlbCBpcyBpbnNlcnRlZCBhZnRlciB0aGUgYm90dG9t
IG9mIHN0YWNrLiAgTm8NCj4gd29yc2UgdGhhbiBtYW55IHRoaW5ncyBNUExTIGhhcyBkb25lLiAg
KEkgY291bGQgYXJndWUgYm90aCBzaWRlcyBvZiB3aGljaA0KPiBhbnN3ZXIgaXMgcmlnaHQsIGFu
ZCBub3QgcGVyc3VhZGUgbXlzZWxmIG9mIGVpdGhlciBvbmUuKQ0KPiANCj4gT24gdGhlIG5leHQg
cHJvdG9jb2wgSURzLCB0aGUgbGFzdCB0aW1lIHdlIGxvb2tlZCB3ZSBjb3VsZCBub3QgZmluZCBh
biBJRA0KPiByZWdpc3RyYXRpb24gdGhhdCB3YXMgcmVhc29uYWJseSBzbWFsbCBhbmQgY292ZXJl
ZCB0aGUgbmVlZGVkIG1lYW5pbmdzLiAgSQ0KPiBub3RlIHRoYXQgZXZlbiB0aGUgc2VjdGlvbiB5
b3UgcG9pbnQgdG8gY29uY2x1ZGVzIHRoYXQgdGhlcmUgbWF5IHdlbGwgYmUgZ29vZA0KPiByZWFz
b25zIGZvciB1c2luZyBhIHNlcGFyYXRlIElEIHNwYWNlLg0KPiANCj4gWW91cnMsDQo+IEpvZWwN
Cj4gDQo+IE9uIDQvMTIvMTYgMTA6MjkgUE0sIEFsaWEgQXRsYXMgd3JvdGU6DQo+ID4gWGlhb2h1
LCBKb2VsLCBhbmQgU0ZDIFdHIGdyb3VwLA0KPiA+DQo+ID4gVGhlIGZpcnN0IG5pYmJsZSBxdWVz
dGlvbiBpcyBxdWl0ZSByZWxldmFudCBpZiBpdCBpcyBleHBlY3RlZCB0aGF0IHRoZQ0KPiA+IE5T
SCBoZWFkZXIgbWlnaHQgYmUgZGlyZWN0bHkgdW5kZXIgYW4gTVBMUyBsYWJlbCBzdGFjay4gIFRo
aXMgaXNzdWUNCj4gPiBhcm9zZSByYXRoZXIgdW5wbGVhc2FudGx5IGZvciBwc2V1ZG8td2lyZXMg
YSBsb25nIHRpbWUgYWdvIGFuZCB0aGUNCj4gPiByZWFzb25pbmcgZm9yIGl0IGlzIG11Y2ggYmV0
dGVyIGRvY3VtZW50ZWQsIGFzIENhcmxvcyBwb2ludGVkIG91dCBpbiBhDQo+ID4gZGlmZmVyZW50
IHRocmVhZCwgaW4gUkZDIDQ5MjggU2VjdGlvbiAzLg0KPiA+DQo+ID4gQXQgdGhlIHRpbWUgdGhh
dCBQV0UzIHdhcyB3b3JraW5nIG9uIHRoZSBjb250cm9sIHdvcmQgYW5kIHdoZXRoZXIgaXQNCj4g
PiB3YXMgdG8gYmUgbWFuZGF0b3J5IChSRkMgNDM4NSksIGl0IHdhcyBjbGVhciB0aGF0IHRoZXJl
IHdlcmUgZGV2aWNlcw0KPiA+IHRoYXQgbG9va2VkIGF0IHRoZSBmaXJzdCBuaWJibGUgb2YgYSBw
YWNrZXQgdW5kZXIgdGhlIE1QTFMgaGVhZGVyIGFzIGENCj4gPiB3YXkgdG8gZGV0ZXJtaW5lIGlm
IHRoZSBwYWNrZXQgd2FzIElQdjQgb3IgSVB2NiBhbmQgb2J0YWluDQo+ID4gZmxvdy1kaXZlcnNp
dHkgZnJvbSBpdC4gIFRoZSBjb3N0IG9mIGFsc28gdmVyaWZ5aW5nIHRoZSBhc3NvY2lhdGVkDQo+
ID4gY2hlY2tzdW0gaWYgYXZhaWxhYmxlIHdhc24ndCBkZWVtZWQgYWNjZXB0YWJsZSBmb3Igc2V2
ZXJhbA0KPiA+IGltcGxlbWVudGF0aW9ucy4NCj4gPiBHaXZlbiB0aGF0IGRldGVybWluaW5nIGFz
IG11Y2ggZW50cm9weSBhcyBwb3NzaWJsZSBpcyBzdGlsbCByZWFsbHkNCj4gPiBpbXBvcnRhbnQg
YW5kIHRoYXQgaXQgaXMgbm9uLXRyaXZpYWwgdG8gbmVnb3RpYXRlL2luZGljYXRlIHRoZQ0KPiA+
IGNhcGFiaWxpdHkgZm9yIGluY2x1ZGluZyBhbiBFbnRyb3B5IExhYmVsIGluIHRoZSBNUExTIHN0
YWNrLCBJIGhhdmUgbm8NCj4gPiByZWFzb24gdG8gYmVsaWV2ZSB0aGF0IHRoaXMgc2hvcnRjdXQg
b2YgbG9va2luZyBhdCB0aGUgZmlyc3QgbmliYmxlDQo+ID4gaXMgbm8gbG9uZ2VyIHVzZWQgb3Ig
ZGVwbG95ZWQuICAgRmVlbCBmcmVlIHRvIGNvbnRhY3QgbWUgb2ZmLWxpc3QgaWYgeW91DQo+ID4g
YmVsaWV2ZSB0aGlzIHRvIGJlIHRoZSBjYXNlLg0KPiA+DQo+ID4gSXQgaXMgY2xlYXIgZnJvbSB0
aGUgTlNIIGJhc2UgaGVhZGVyOg0KPiA+DQo+ID4gICAgMCAxIDIgMyA0IDUgNiA3IDggOSAwIDEg
MiAzIDQgNSA2IDcgOCA5IDAgMSAyIDMgNCA1IDYgNyA4IDkgMCAxDQo+ID4gICAgICAgKy0rLSst
Ky0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0r
LSsNCj4gPiAgICAgICB8VmVyfE98Q3xSfFJ8UnxSfFJ8UnwgICBMZW5ndGggIHwgICAgTUQgVHlw
ZSAgICB8IE5leHQNCj4gUHJvdG9jb2wgfA0KPiA+DQo+ID4gKy0rLSstKy0rLSstKy0rLSstKy0r
LSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSsNCj4gPg0KPiA+IHRo
YXQgdGhpcyBjb25zaWRlcmF0aW9uIGhhcyBiZWVuIGNvbXBsZXRlbHkgaWdub3JlZC4gIEluIGZh
Y3QsIGFuIE5TSA0KPiA+IGJhc2UgaGVhZGVyIG1pZ2h0IGhhdmUgYW55IHZhbHVlIG9mIDBiMDAw
MCwgMGIwMDAxLCAwYjAwMTAsIDBiMDAxMCBhbmQNCj4gPiBpZiBhIHZlcnNpb24gMDEgZm9yIE5T
SCB3ZXJlIGV2ZXIgZGVmaW5lZCwgc3VkZGVubHkgdGhlIHRyYWZmaWMgbWlnaHQNCj4gPiBiZSBz
dWJqZWN0IHRvIHN0YXJ0bGluZyByZW9yZGVyaW5nIGlmIGFuIE1QTFMgdHJhbnNwb3J0IHdlcmUg
dG8gYmUNCj4gPiBjb25zaWRlcmVkLg0KPiA+DQo+ID4gR2l2ZW4gYSBjbGFpbSBvZiBOU0ggYmVp
bmcgdHJhbnNwb3J0LWFnbm9zdGljIGFuZCByZXBlYXRlZCBlbXBoYXNpcw0KPiA+IHRoYXQgTVBM
UywgYXMgd2VsbCBhcyBVRFAsIGlzIGEgdmFsaWQgdHJhbnNwb3J0IGZvciBOU0gsIEkgZG8gdGhp
bmsNCj4gPiB0aGlzIGlzIGEgc2lnbmlmaWNhbnQgb3ZlcnNpZ2h0IGFuZCBuZWVkcywgYXQgYSBt
aW5pbXVtLCBkaXNjdXNzaW9uDQo+ID4gYW5kIGV4cGxhbmF0aW9uLCBhbmQgIC0gcXVpdGUgbGlr
ZWx5IC0gIGNvcnJlY3Rpb24uDQo+ID4NCj4gPiBXaGlsZSBJIGFtIG9uIHRoZSB0b3BpYyBvZiBk
ZXRhaWxzIG9mIHRoZSBOU0ggZW5jYXBzdWxhdGlvbiwgSSB3b3VsZA0KPiA+IHJlcXVlc3QgdGhh
dCBTZWN0aW9uIDggb2YgZHJhZnQtaWV0Zi1ydGd3Zy1kdC1lbmNhcC0wMQ0KPiA+IGJlIHJlYWQg
YW5kIGNvbnNpZGVyZWQhICAgSSBhbSBub3QgZXhjaXRlZCBieSBoYXZpbmcgbWFueSBkaWZmZXJl
bnQgYW5kDQo+ID4gdW5pcXVlIE5leHQgUHJvdG9jb2wgZmllbGRzIGRlZmluZWQuDQo+ID4gRm9y
IGluc3RhbmNlLCBJIG5vdGUgdGhlIGRlZmluaXRpb24gb2YgYSBuZWFybHkgaWRlbnRpY2FsIE5l
eHQNCj4gPiBQcm90b2NvbCBmaWVsZCBpbiBodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2Rv
Yy9kcmFmdC1pZXRmLW52bzMtdnhsYW4tZ3BlIC4NCj4gPg0KPiA+IFdoaWxlIEkgYW0sIG9mIGNv
dXJzZSwgd2lsbGluZyB0byByZWFzb24gdG8gZGV0YWlsZWQgYW5kIHdlbGwtdGhvdWdodA0KPiA+
IG91dCBleHBsYW5hdGlvbnMgZm9yIHdoeSBlYWNoIGFuZCBldmVyeSBuZXcgZW5jYXBzdWxhdGlv
biBuZWVkcyBpdHMNCj4gPiB2ZXJ5IG93biBJQU5BLWRlZmluZWQgTmV4dCBQcm90b2NvbCBmaWVs
ZCwgdGhpcyBzZWVtcyB0byBtZSB0byBiZQ0KPiA+IGhpZ2hseSBsaWtlbHkgdG8gcmVxdWlyZSBj
b25zb2xpZGF0aW9uIHNvIHRoYXQgdGhlIHNhbWUgTmV4dCBQcm90b2NvbA0KPiA+IGZpZWxkIGNh
biBiZSB1c2VkIGJldHdlZW4gdGhlIHZhcmlvdXMgZW5jYXBzdWxhdGlvbnMuDQo+ID4NCj4gPiBJ
IHdpbGwgd29yayBvbiBnaXZpbmcgYSB0aHJvdWdoIHJldmlldyBvZiBOU0ggYXMgc29vbiBhcyBw
cmFjdGljYWwuICBJDQo+ID4gZG8gcmVhbGl6ZSB0aGF0IHRoZXJlIGFyZSBtdWx0aXBsZSBpbXBs
ZW1lbnRhdGlvbnMgYW5kIHdoaWxlIGRldGFpbHMNCj4gPiBvZiBob3cgdGhlICJOZXh0IFByb3Rv
Y29sIiBmaWVsZCBhcmUgZG9jdW1lbnRlZCBzaG91bGRuJ3QgaGF2ZSBhDQo+ID4gc2lnbmlmaWNh
bnQgaW1wYWN0IHRoZXJlLCB0aGUgZGlzY3Vzc2lvbiBhYm91dCB0aGUgZmlyc3QgbmliYmxlIGlz
DQo+ID4gbGlrZWx5IHRvLg0KPiA+DQo+ID4gUmVnYXJkcywNCj4gPiBBbGlhDQo+ID4NCj4gPg0K
PiA+IE9uIFR1ZSwgQXByIDEyLCAyMDE2IGF0IDk6NTMgUE0sIFh1eGlhb2h1IDx4dXhpYW9odUBo
dWF3ZWkuY29tDQo+ID4gPG1haWx0bzp4dXhpYW9odUBodWF3ZWkuY29tPj4gd3JvdGU6DQo+ID4N
Cj4gPiAgICAgSm9lbCwNCj4gPg0KPiA+ICAgICA+IC0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0t
DQo+ID4gICAgID4gRnJvbTogSm9lbCBNLiBIYWxwZXJuIFttYWlsdG86am1oQGpvZWxoYWxwZXJu
LmNvbQ0KPiA8bWFpbHRvOmptaEBqb2VsaGFscGVybi5jb20+XQ0KPiA+ICAgICA+IFNlbnQ6IFdl
ZG5lc2RheSwgQXByaWwgMTMsIDIwMTYgOTo0NSBBTQ0KPiA+ICAgICA+IFRvOiBYdXhpYW9odTsg
VGhvbWFzIE5hcnRlbjtzZmNAaWV0Zi5vcmcgPG1haWx0bzpzZmNAaWV0Zi5vcmc+DQo+ID4gICAg
ID4gU3ViamVjdDogUmU6IFtzZmNdIFdHIGxhc3QgY2FsbCBmb3IgZHJhZnQtaWV0Zi1zZmMtbnNo
LTA0LnR4dA0KPiA+ICAgICA+DQo+ID4gICAgID4gWHUsDQo+ID4gICAgID4gICAgICAgSSBkbyBu
b3QgYmVsaWV2ZSB0aGF0IHRoZXJlIGlzIGFuIE1QTFMgc3BlY2lmaWNhdGlvbiB0aGF0IHJlcXVp
cmVzDQo+IHRoYXQgYWxsDQo+ID4gICAgID4gY29udGVudCBvdGhlciB0aGFuIElQIG11c3QgaGF2
ZSBhIGZpcnN0IG5pYmJsZSBvZiAwIG9yIDEuDQo+ID4NCj4gPiAgICAgV2hlbiBlbmNhcHN1bGF0
aW5nIE5TSCBvdmVyIE1QTFMgZGlyZWN0bHksIHRoZSBmaXJzdCBuaWJibGUgb2YgdGhlDQo+ID4g
ICAgIE5TSCBtdXN0IG5vdCBiZSA0IG9yIDYuDQo+ID4NCj4gPiAgICAgPiBUaGVyZSBhcmUgc3Bl
Y2lmaWNhdGlvbnMgd2hlcmUgaXQgaXMgZGlzY3Vzc2VkIGFzIGRlc2lyYWJsZS4NCj4gPiAgICAg
Pg0KPiA+ICAgICA+IEl0IGlzIGluIGZhY3QgcHJldHR5IHRyaXZpYWwgZm9yIHVzIHRvIGNoYW5n
ZSB0aGUgZm9ybWF0IHNvIHRoYXQgdGhlIGZpcnN0DQo+IHRocmVlIGJpdHMgYXJlDQo+ID4gICAg
ID4gMCwgYnV0IGl0IGJ1cm5zIHNldmVyYWwgdmFsdWFibGUgZmxhZyBiaXRzLiAgSXQgaXMgYW4g
U0ZDDQo+ID4gd29ya2luZyBncm91cCBkZWNpc2lvbiwNCj4gPg0KPiA+ICAgICBUaGF0J3MgdGhl
IHJlYXNvbiB3aHkgSSByYWlzZWQgdGhlIGZpcnN0IG5pYmJsZSBxdWVzdGlvbi4NCj4gPg0KPiA+
ICAgICBCZXN0IHJlZ2FyZHMsDQo+ID4gICAgIFhpYW9odQ0KPiA+DQo+ID4gICAgICA+IG5vdCwg
YXMgZmFyIGFzIEkgY2FuIHRlbGwsIGEgdmlvbGF0aW9uIG9mIHRoZSBNUExTIHNwZWNpZmljYXRp
b24uDQo+ID4gICAgICA+DQo+ID4gICAgICA+IFlvdXJzLA0KPiA+ICAgICAgPiBKb2VsDQo+ID4g
ICAgICA+DQo+ID4gICAgICA+IE9uIDQvMTIvMTYgOTo0MSBQTSwgWHV4aWFvaHUgd3JvdGU6DQo+
ID4gICAgICA+ID4gSGkgVGhvbWFzLA0KPiA+ICAgICAgPiA+DQo+ID4gICAgICA+ID4gSXQgc2Fp
ZCBpbiB0aGUgTlNIIGRyYWZ0Og0KPiA+ICAgICAgPiA+DQo+ID4gICAgICA+ID4gICAgIjYuICBU
cmFuc3BvcnQgQWdub3N0aWM6IE5TSCBpcyB0cmFuc3BvcnQgaW5kZXBlbmRlbnQgYW5kIGlzDQo+
ID4gICAgIGNhcnJpZWQNCj4gPiAgICAgID4gPiAgICAgICAgIGluIGFuIG92ZXJsYXksIG92ZXIg
ZXhpc3RpbmcgdW5kZXJsYXlzLiAgSWYgYW4gZXhpc3RpbmcNCj4gPiAgICAgb3ZlcmxheQ0KPiA+
ICAgICAgPiA+ICAgICAgICAgdG9wb2xvZ3kgcHJvdmlkZXMgdGhlIHJlcXVpcmVkIHNlcnZpY2Ug
cGF0aA0KPiA+ICAgICBjb25uZWN0aXZpdHksIHRoYXQNCj4gPiAgICAgID4gPiAgICAgICAgIGV4
aXN0aW5nIG92ZXJsYXkgbWF5IGJlIHVzZWQuIg0KPiA+ICAgICAgPiA+DQo+ID4gICAgICA+ID4g
VGhhdCBtZWFucyB0aGUgTlNIIHNob3VsZCBiZSBhYmxlIHRvIGJlIHRyYW5zcG9ydGVkIG92ZXIg
TVBMUy4NCj4gPiAgICAgSG93ZXZlciwNCj4gPiAgICAgID4gYWNjb3JkaW5nIHRvIHRoZSBjdXJy
ZW50IE5TSCBmb3JtYXQgZGVmaW5pdGlvbiwgaXQncyBub3Qgc2FmZSB0bw0KPiA+ICAgICBjYXJy
eSB0aGUgTlNIDQo+ID4gICAgICA+IG92ZXIgTVBMUyBkdWUgdG8gdGhlIGZpcnN0IG5pYmJsZSBp
c3N1ZS4gVGhlcmVmb3JlLCBJIGJlbGlldmUNCj4gPiAgICAgdGhpcyBpc3N1ZSBuZWVkcyB0byBi
ZQ0KPiA+ICAgICAgPiBhZGRyZXNzZWQgYmVmb3JlIHB1YmxpY2F0aW9uLg0KPiA+ICAgICAgPiA+
DQo+ID4gICAgICA+ID4gQmVzdCByZWdhcmRzLA0KPiA+ICAgICAgPiA+IFhpYW9odQ0KPiA+ICAg
ICAgPiA+DQo+ID4gICAgICA+ID4+IC0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tDQo+ID4gICAg
ICA+ID4+IEZyb206IHNmYyBbbWFpbHRvOnNmYy1ib3VuY2VzQGlldGYub3JnDQo+ID4gICAgIDxt
YWlsdG86c2ZjLWJvdW5jZXNAaWV0Zi5vcmc+XSBPbiBCZWhhbGYgT2YgVGhvbWFzIE5hcnRlbg0K
PiA+ICAgICAgPiA+PiBTZW50OiBUaHVyc2RheSwgTWFyY2ggMzEsIDIwMTYgMTA6NDggQU0NCj4g
PiAgICAgID4gPj4gVG86IHNmY0BpZXRmLm9yZyA8bWFpbHRvOnNmY0BpZXRmLm9yZz4NCj4gPiAg
ICAgID4gPj4gU3ViamVjdDogW3NmY10gV0cgbGFzdCBjYWxsIGZvciBkcmFmdC1pZXRmLXNmYy1u
c2gtMDQudHh0DQo+ID4gICAgICA+ID4+DQo+ID4gICAgICA+ID4+IERlYXIgV0c6DQo+ID4gICAg
ICA+ID4+DQo+ID4gICAgICA+ID4+IFRoaXMgbm90ZSBiZWdpbnMgYSBXRyBsYXN0IGNhbGwgb24g
ZHJhZnQtaWV0Zi1zZmMtbnNoLTA0LnR4dA0KPiA+ICAgICAgPiA+PiAoaHR0cHM6Ly9kYXRhdHJh
Y2tlci5pZXRmLm9yZy9kb2MvZHJhZnQtaWV0Zi1zZmMtbnNoLykuDQo+ID4gICAgICA+ID4+DQo+
ID4gICAgICA+ID4+IFRoZSBlZGl0b3JzIG9mIHRoZSBOU0ggZG9jdW1lbnQgaGF2ZSBpbmRpY2F0
ZWQgdGhhdCB0aGV5IGhhdmUNCj4gPiAgICAgID4gPj4gYWRkcmVzc2VkIGFsbCBrbm93biBjb21t
ZW50cyBhbmQgdGhhdCB0aGVyZSBhcmUgbm8gb3BlbiBpc3N1ZXMNCj4gPiAgICAgd2l0aA0KPiA+
ICAgICAgPiA+PiB0aGUgY3VycmVudCB2ZXJzaW9uIG9mIHRoZSBkb2N1bWVudC4NCj4gPiAgICAg
ID4gPj4NCj4gPiAgICAgID4gPj4gU3Vic3RhbnRpdmUgY29tbWVudHMgdG8gdGhlIGxpc3QgcGxl
YXNlLCBlZGl0b3JpYWwgY29tbWVudHMgY2FuIGdvDQo+ID4gICAgICA+ID4+IGRpcmVjdGx5IHRv
IHRoZSBkb2N1bWVudCBlZGl0b3JzLg0KPiA+ICAgICAgPiA+Pg0KPiA+ICAgICAgPiA+PiBXZSds
bCBhbHNvIGdldCBhIGJyaWVmIHVwZGF0ZSBmcm9tIHRoZSBlZGl0b3JzIGF0IG5leHQgd2Vlaydz
DQo+ID4gICAgICA+ID4+IG1lZXRpbmcuIElmIHRoZXJlIGFyZSBhbnkgcmVtYWluaW5nIGlzc3Vl
cyB3aXRoIHRoZSBkb2N1bWVudCwNCj4gPiAgICAgcmFpc2luZw0KPiA+ICAgICAgPiA+PiB0aGVt
IGJlZm9yZSB0aGUgbWVldGluZyB3b3VsZCBiZSBlc3BlY2lhbGx5IGhlbHBmdWwuDQo+ID4gICAg
ICA+ID4+DQo+ID4gICAgICA+ID4+IEZvciB0aGUgY2hhaXJzLA0KPiA+ICAgICAgPiA+PiBUaG9t
YXMNCj4gPiAgICAgID4gPj4NCj4gPiAgICAgID4gPj4gX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX18NCj4gPiAgICAgID4gPj4gc2ZjIG1haWxpbmcgbGlzdA0K
PiA+ICAgICAgPiA+PiBzZmNAaWV0Zi5vcmcgPG1haWx0bzpzZmNAaWV0Zi5vcmc+DQo+ID4gICAg
ICA+ID4+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjDQo+ID4gICAg
ICA+ID4NCj4gPiAgICAgID4gPiBfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fXw0KPiA+ICAgICAgPiA+IHNmYyBtYWlsaW5nIGxpc3QNCj4gPiAgICAgID4gPiBz
ZmNAaWV0Zi5vcmcgPG1haWx0bzpzZmNAaWV0Zi5vcmc+DQo+ID4gICAgICA+ID4gaHR0cHM6Ly93
d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zZmMNCj4gPiAgICAgID4gPg0KPiA+DQo+ID4g
ICAgIF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+ID4g
ICAgIHNmYyBtYWlsaW5nIGxpc3QNCj4gPiAgICAgc2ZjQGlldGYub3JnIDxtYWlsdG86c2ZjQGll
dGYub3JnPg0KPiA+ICAgICBodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL3Nm
Yw0KPiA+DQo+ID4NCg==


From nobody Wed Apr 13 22:41:47 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB06312D987 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 22:41:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dJ6sV0xBvYQ0 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 22:41:45 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D9BF512D938 for <sfc@ietf.org>; Wed, 13 Apr 2016 22:41:44 -0700 (PDT)
Received: from omfedm08.si.francetelecom.fr (unknown [xx.xx.xx.4]) by omfedm14.si.francetelecom.fr (ESMTP service) with ESMTP id 3B0BD22C1CE; Thu, 14 Apr 2016 07:41:43 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.66]) by omfedm08.si.francetelecom.fr (ESMTP service) with ESMTP id 175CE238056; Thu, 14 Apr 2016 07:41:43 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILMA1.corporate.adroot.infra.ftgroup ([fe80::95e2:eb4b:3053:fabf%19]) with mapi id 14.03.0279.002; Thu, 14 Apr 2016 07:41:42 +0200
From: <mohamed.boucadair@orange.com>
To: Ron Parker <Ron_Parker@affirmednetworks.com>, Sumandra Majee <S.Majee@F5.com>, Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfieSAX3MU5GUyUYGxYNRxnVJ+IWo4A///nnACAAMgtoA==
Date: Thu, 14 Apr 2016 05:41:41 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D58279@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <m3egarz7kh.wl-narten@us.ibm.com> <D333E2BE.4FEC1%s.majee@f5.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D77FCF8@MBX021-W3-CA-2.exch021.domain.local>
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B6D77FCF8@MBX021-W3-CA-2.exch021.domain.local>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.14.52416
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/FrUPGnopRHiKSBFUhEHE1OlEjso>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 05:41:47 -0000

Hi Ron, all,

Same position here.

Note, that making the 16-bute optional is just MD#2.

Cheers,
Med

> -----Message d'origine-----
> De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de Ron Parker
> Envoy=E9=A0: mercredi 13 avril 2016 21:44
> =C0=A0: Sumandra Majee; Thomas Narten; sfc@ietf.org
> Objet=A0: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Sumandra,
>=20
> I don't object to the scratchpad nature of the MD-type-1 metadata.   But =
I
> have a small reservation and a large reservation around other aspects of
> it:
>=20
> * small reservation -- why call this 4 context headers of 4 bytes each?
> It would be much more intuitive to call it a 16 byte scratch pad.   The
> former implies structure that is present, at best, in an implementation-
> specific manner.
>=20
> * large reservation -- since this is a scratch pad, it does not seem
> justifiable to make it mandatory.
>=20
> My objections would be removed if it were a 16-byte scratchpad that was
> optional.
>=20
> Thanks.
>=20
>    Ron
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Sumandra Majee
> Sent: Wednesday, April 13, 2016 3:11 PM
> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Thomas,
>=20
> I do support the adoption of this draft.
>=20
> The overriding concern seems to be that for MD type 1 the semantics of
> context header is not standardized, and my view is that it is GOOD that
> this draft considers context info area to be a scratchpad.
>=20
> A) I don=B9t think neither DC allocation and mobility allocation of conte=
xt
> headers will satisfy all cases. Our implementation uses context header
> scratchpad to put some different information.
>=20
> B) Standardizing context header too early also has a higher chance of not
> meeting the actual implementation need. This is a new technology that
> doesn=B9t have much milage.
>=20
> C) YES interoperability is an issue. And I would like to see the
> allocation draft(s) reserve 3/4 bits to specify the allocation type/schem=
a
> itself. I would like to see a context header registry for MD type 1
> allocation itself. However that can be addressed separately in the
> allocation draft(s).
>=20
> Sumandra
>=20
>=20
> On 3/30/16, 7:48 PM, "sfc on behalf of Thomas Narten"
> <sfc-bounces@ietf.org on behalf of narten@us.ibm.com> wrote:
>=20
> >Dear WG:
> >
> >This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> >(https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> >
> >The editors of the NSH document have indicated that they have addressed
> >all known comments and that there are no open issues with the current
> >version of the document.
> >
> >Substantive comments to the list please, editorial comments can go
> >directly to the document editors.
> >
> >We'll also get a brief update from the editors at next week's meeting.
> >If there are any remaining issues with the document, raising them
> >before the meeting would be especially helpful.
> >
> >For the chairs,
> >Thomas
> >
> >_______________________________________________
> >sfc mailing list
> >sfc@ietf.org
> >https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Apr 14 00:43:04 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3FD5012DF05 for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 00:43:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.915
X-Spam-Level: 
X-Spam-Status: No, score=-2.915 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e1qAeLLmVX3B for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 00:42:58 -0700 (PDT)
Received: from relais-inet.orange.com (relais-nor35.orange.com [80.12.70.35]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5434712DF31 for <sfc@ietf.org>; Thu, 14 Apr 2016 00:42:58 -0700 (PDT)
Received: from opfednr00.francetelecom.fr (unknown [xx.xx.xx.64]) by opfednr23.francetelecom.fr (ESMTP service) with ESMTP id CF0CEC0453; Thu, 14 Apr 2016 09:42:56 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.61]) by opfednr00.francetelecom.fr (ESMTP service) with ESMTP id 993D51A007A; Thu, 14 Apr 2016 09:42:56 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7E.corporate.adroot.infra.ftgroup ([fe80::b91c:ea2c:ac8a:7462%19]) with mapi id 14.03.0279.002; Thu, 14 Apr 2016 09:42:56 +0200
From: <mohamed.boucadair@orange.com>
To: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfPQCYv/wVVMUagOUO32rRCGp+Er+AwgARg/TA=
Date: Thu, 14 Apr 2016 07:42:55 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/H-_DKcMHPEXOdAofR-xg9H6AGhg>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 07:43:02 -0000

R-,

In addition to other pending issues raised for this draft, I would like to =
raise this additional one about Section 6.=20

=3D=3D
6.  Fragmentation Considerations

   NSH and the associated transport header are "added" to the
   encapsulated packet/frame.  This additional information increases the
   size of the packet.  In order the ensure proper forwarding of NSH
   data, several options for handling fragmentation and re-assembly
   exist:

   1.  Jumbo Frames, when supported, enable the transport of NSH and
       associated transport packets without requiring fragmentation.

   2.  Path MTU Discovery [RFC1191]"describes a technique for
       dynamically discovering the maximum transmission unit (MTU) of an
       arbitrary internet path" and can be utilized to ensure the the
       required packet size is used.

   3.  [RFC6830] describes two schemes for fragmentation and re-assembly
       in section 5.4.
=3D=3D

* The text is weak for a Standard track document that is intended to solve =
the problem in https://tools.ietf.org/html/rfc7498#section-2.12. There shou=
ld be a clear behavior to be followed by an implementation. Further, I woul=
d avoid the use of words such as "can".

* The text covers only fragmentation when it is induced by SFC operations, =
it does not discuss the treatment of a fragment when received in an SFC dom=
ain. IMHO, the draft should also specify the behavior of the Classifier wit=
h regards to fragments for the sake of proper SFC operation. Applying class=
ification policies may require the full packet, not only a fragment. In par=
ticular, dedicated resources should dedicated for handling out of order fra=
gments. Of course, it is out of scope of this document to describe how SFs =
handle fragments.=20

* If an SFC header is prepended for all fragments, I'm not sure there is an=
y particular issue at the SFF level...except if stripping/adding context TL=
Vs depends on the full packet (not just fragment). It is warranted to consi=
der a little bit this point before declaring there is no issue.=20

* The text states "several options". This may be interpreted as if implemen=
ting one of them is sufficient...which is not true. The first two points co=
ntribute to minimize the fragmentation risk, but fragmentation may still be=
 experienced (e.g., other shims are prepended by other nodes for some other=
 purposes, nested nsh, etc.)

* The first two points have nothing to do with reassembly.

* The support of jumbo frames by a router/device does not mean that it can =
make use of it. Appropriate MTU configuration should be undertaken in a con=
sistent manner within an SFC domain. The text should be updated to make it =
is about (consistent) MTU configuration.=20

* BTW, shouldn't the text be reworded to recommended to increase the MTU of=
 **all nodes** of an SFC-enabled domain by at least the length of SFC heade=
r + transport header? =20

* Bullet 2, how PMTU discovery is actually used in this context? Do you ass=
ume that all SFC-aware nodes will issue such messages towards other SFC-awa=
re node, arbitrary destination, else?=20

* Bullet 2, I would drop "describes a technique for dynamically discovering=
 the maximum transmission unit (MTU) of an arbitrary internet path". =20

* Bullet 2, s/ the the/the.

* The reference to the LISP specification raises two concerns and one comme=
nt:

(1) I don't think it is a good approach that fragments induced by the netwo=
rk are passed to their ultimate destinations as such (stateless). IMO, reas=
sembly should be done within the SFC domain (responsible for fragmentation)=
 not passed away.
(2) Does the stateful mode require all SFC data plane elements maintain a f=
ull list of MTU for the any SFF/SF instance of the SFC domain?=20
=20
The current text suggests that [RFC6830] should be listed as normative refe=
rence (not an informative one). I would personally favor removing the refer=
ence to LISP (as it is an Experimental RFC).=20

* The security section of the draft may be augmented with informational fra=
gmentation-related pointers to: e.g., RFC1858 (Security Considerations for =
IP Fragment Filtering), RFC3128 (Protection Against a Variant of the Tiny F=
ragment Attack), and RFC 4963 (IPv4 Reassembly Errors at High Data Rates).=
=20

Cheers,
Med

> -----Message d'origine-----
> De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de
> mohamed.boucadair@orange.com
> Envoy=E9=A0: lundi 11 avril 2016 13:14
> =C0=A0: Thomas Narten; sfc@ietf.org
> Objet=A0: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Dear Thomas, all,
>=20
> As I mentioned during the meeting, there are several issues that are not
> covered in the last version of the draft. I already provided examples of
> the issues offline as requested by Martin.
>=20
> Cheers,
> Med
>=20
> > -----Message d'origine-----
> > De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten
> > Envoy=E9=A0: jeudi 31 mars 2016 04:48
> > =C0=A0: sfc@ietf.org
> > Objet=A0: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >
> > Dear WG:
> >
> > This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> > (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> >
> > The editors of the NSH document have indicated that they have
> > addressed all known comments and that there are no open issues with
> > the current version of the document.
> >
> > Substantive comments to the list please, editorial comments can go
> > directly to the document editors.
> >
> > We'll also get a brief update from the editors at next week's
> > meeting. If there are any remaining issues with the document, raising
> > them before the meeting would be especially helpful.
> >
> > For the chairs,
> > Thomas
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Apr 14 04:52:49 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D5E112DB7B for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 04:52:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vn2LU7YuLwaw for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 04:52:42 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2A11B12D915 for <sfc@ietf.org>; Thu, 14 Apr 2016 04:52:42 -0700 (PDT)
Received: from omfedm07.si.francetelecom.fr (unknown [xx.xx.xx.3]) by omfedm14.si.francetelecom.fr (ESMTP service) with ESMTP id 0F39322C597; Thu, 14 Apr 2016 13:52:40 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.2]) by omfedm07.si.francetelecom.fr (ESMTP service) with ESMTP id DE85B4C073; Thu, 14 Apr 2016 13:52:39 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM21.corporate.adroot.infra.ftgroup ([fe80::e92a:c932:907e:8f06%19]) with mapi id 14.03.0279.002; Thu, 14 Apr 2016 13:52:40 +0200
From: <mohamed.boucadair@orange.com>
To: sfc issue tracker <trac+sfc@tools.ietf.org>, "draft-ietf-sfc-nsh@tools.ietf.org" <draft-ietf-sfc-nsh@tools.ietf.org>, "paulq@cisco.com" <paulq@cisco.com>
Thread-Topic: [sfc] #6 (nsh): Version Handling
Thread-Index: AQHRcN7DL6tYZH0XK0mVw+KjTs/H8Z+Jpigg
Date: Thu, 14 Apr 2016 11:52:39 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D58531@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <067.24f7ef0bb98de131151711a2cbc27822@tools.ietf.org> <082.d987d3daaa86c0b6ea9dac155fde49b7@tools.ietf.org>
In-Reply-To: <082.d987d3daaa86c0b6ea9dac155fde49b7@tools.ietf.org>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.14.111516
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/5vH2qI89ugQVip3DOfjcZKx_cZY>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #6 (nsh): Version Handling
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 11:52:47 -0000

Paul, Uri,=20

Wouldn't you at least add changes as agreed with Joel here: https://www.iet=
f.org/mail-archive/web/sfc/current/msg04165.html?

BTW,=20

Cheers,
Med

> -----Message d'origine-----
> De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de sfc issue tracker
> Envoy=E9=A0: vendredi 26 f=E9vrier 2016 22:44
> =C0=A0: draft-ietf-sfc-nsh@tools.ietf.org; paulq@cisco.com
> Cc=A0: sfc@ietf.org
> Objet=A0: Re: [sfc] #6 (nsh): Version Handling
>=20
> #6: Version Handling
>=20
> Changes (by paulq@cisco.com):
>=20
>  * status:  new =3D> closed
>  * resolution:   =3D> wontfix
>=20
>=20
> Comment:
>=20
>  Reply: Discussed on list: http://www.ietf.org/mail-
>  archive/web/sfc/current/msg03149.html.  There was no consensus to change=
d
>  the adopted format, in fact the value of version bits seems well accepte=
d
>  and therefore no changes are needed and the topic should be marked as
>  resolved in the tracker.
>=20
> --
> -------------------------------------+-----------------------------------=
-
> -
>  Reporter:                           |       Owner:  draft-ietf-sfc-
>   mohamed.boucadair@orange.com       |  nsh@tools.ietf.org
>      Type:  defect                   |      Status:  closed
>  Priority:  major                    |   Milestone:
> Component:  nsh                      |     Version:
>  Severity:  -                        |  Resolution:  wontfix
>  Keywords:                           |
> -------------------------------------+-----------------------------------=
-
> -
>=20
> Ticket URL: <https://trac.tools.ietf.org/wg/sfc/trac/ticket/6#comment:1>
> sfc <https://tools.ietf.org/sfc/>
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Apr 14 04:56:12 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 70EDC12DB29 for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 04:56:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ToPJ_cMVI93i for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 04:56:09 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7551A12D5F2 for <sfc@ietf.org>; Thu, 14 Apr 2016 04:56:09 -0700 (PDT)
Received: from omfedm06.si.francetelecom.fr (unknown [xx.xx.xx.2]) by omfedm11.si.francetelecom.fr (ESMTP service) with ESMTP id E7ACA3B40E0; Thu, 14 Apr 2016 13:56:07 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.2]) by omfedm06.si.francetelecom.fr (ESMTP service) with ESMTP id BC0FC27C078; Thu, 14 Apr 2016 13:56:07 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM21.corporate.adroot.infra.ftgroup ([fe80::e92a:c932:907e:8f06%19]) with mapi id 14.03.0279.002; Thu, 14 Apr 2016 13:56:07 +0200
From: <mohamed.boucadair@orange.com>
To: sfc issue tracker <trac+sfc@tools.ietf.org>, "draft-ietf-sfc-nsh@tools.ietf.org" <draft-ietf-sfc-nsh@tools.ietf.org>, "paulq@cisco.com" <paulq@cisco.com>
Thread-Topic: [sfc] #4 (nsh): Reuse the IPFIX registry for identifying context types
Thread-Index: AQHRcN6T3P69iiAdNESw+BActik9SZ+JpJKQ
Date: Thu, 14 Apr 2016 11:56:06 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D58554@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <067.2e537206d49515dea942156a26002995@tools.ietf.org> <082.0e88669a7a0e57dbff78b6b891875fb0@tools.ietf.org>
In-Reply-To: <082.0e88669a7a0e57dbff78b6b891875fb0@tools.ietf.org>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.14.100616
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/XYlqJNfWZh4lJymDX056WfIoKtc>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] #4 (nsh): Reuse the IPFIX registry for identifying context types
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 11:56:11 -0000
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From nobody Thu Apr 14 06:34:01 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E6DA12E113 for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 06:34:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level: 
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gxc1iUTFp29e for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 06:33:58 -0700 (PDT)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id 548E112E09C for <sfc@ietf.org>; Thu, 14 Apr 2016 06:33:58 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Thu, 14 Apr 2016 09:33:57 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>, "uri.elzur@intel.com" <uri.elzur@intel.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfOeSAX3MU5GUyUYGxYNRxnVJ+GxnOggABNP4CAAFnrgIAAhouggAGYfZA=
Date: Thu, 14 Apr 2016 13:33:56 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F20863@wtl-exchp-2.sandvine.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <E8355113905631478EFF04F5AA706E9830F1BBAC@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D77F0B6@MBX021-W3-CA-2.exch021.domain.local> <14F8542B-9EE1-40DF-8DA2-E6E5048A16A3@cisco.com> <E8355113905631478EFF04F5AA706E9830F1D4A7@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F1D4A7@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/OsSi9ICvU3sBwZbv4QZ1ZBejCXQ>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 13:34:00 -0000

Paul and Uri, can you please comment as to whether you agree or disagree wi=
th this wording?

I feel that it allows the actual content to be opaque while giving guidance=
 for
service functions that create or replay packets in the chain.

>From my point of view, this is how such devices will work anyhow.

-Dave



-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
Sent: Wednesday, April 13, 2016 9:13 AM
To: Paul Quinn (paulq); Ron Parker
Cc: Thomas Narten; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Paul,
Are you unhappy with the metadata constraints I suggested below?
Perhaps qualified by "In the absence of out-of-band configuration..." ?

I believe that the schemes proposed in these drafts satisfy the constraints=
:
- draft-sfc-nsh-dc-allocation-4,=20
- draft-napper-sfc-nsh-broadband-allocation-00=20

(I thought there were more allocation schemes, but I guess they expired.)

I'll update it here:

   In the absence of out-of-band configuration to indicate otherwise,
   metadata used in NSH headers must meet the condition that
   a transport-layer-stateful Service Function can save away
   metadata values that it has witnessed.  An injected packet can
   therefore be assigned a clone of metadata taken from an earlier
   packet going in the same direction.  For example, a Service Function
   can send a TCP packet using metadata cloned from another TCP packet
   of the same connection and direction.
=20
   Note that the Service Function need not know the meaning of the
   metadata; it just needs to know it is safe to clone in this manner.


-Dave



-----Original Message-----
From: Paul Quinn (paulq) [mailto:paulq@cisco.com]=20
Sent: Tuesday, April 12, 2016 9:03 PM
To: Ron Parker
Cc: Dave Dolson; Thomas Narten; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Ron, Dave,

The draft describes the metadata as opaque, and really NSH is just the enve=
lop for it.  The same can be said for the TLV as well -- there's no spec in=
 NSH, not should there be.  In both cases, the metadata can/should/(must?) =
be define in auxiliary drafts.  There are several drafts re: metadata that =
can be discussed and eventually standardized.  It also bears mentioning tha=
t the control plane, today in opensource, defines the type 1 semantics.  Th=
at schemes works well, and mixed implementations can play together.

So, perhaps the best way forward:

1.  Agree on the envelop and the use of that envelop
2.  As a WG, adopt --> standardize the opaque data, and the TLVs
3.  As a WG, work on more detailed of use of the control plane to, when nee=
ded, define semantics

Thoughts?

Thanks,
Paul


> On Apr 12, 2016, at 3:41 PM, Ron Parker <Ron_Parker@affirmednetworks.com>=
 wrote:
>=20
> Dave,
>=20
> I, too, have raised this issue on the thread.   I think you hit the nail =
on the head regarding interoperability, which is the primary reason for hav=
ing a specification, at all.    My mental model for the type-1 mandatory co=
ntext headers is that of a composite 16-byte locally defined scratchpad.   =
I struggle with having its definition completely undefined in the document =
and still making it mandatory.   =20
>=20
> Much of the justification offered has been to be friendly to hardware.   =
Surely hardware needs to know the exact format and meaning of these 16 byte=
s.
>=20
>   Ron
>=20
>=20
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
> Sent: Tuesday, April 12, 2016 3:29 PM
> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
>=20
> The NSH draft indicates that MD-Type 1 MUST be supported, yet the Mandato=
ry Context Header fields are not defined in the document.
>=20
> Issues with metadata semantics have been raised various times on this lis=
t and in drafts, and never satisfactorily addressed.
> Examples:
> https://tools.ietf.org/html/draft-vallamkonda-sfc-metadata-model-00.txt
> https://www.ietf.org/archive/id/draft-wang-sfc-md-type-issues-00.txt
> https://www.ietf.org/archive/id/draft-penno-sfc-packet-02.txt
> https://mailarchive.ietf.org/arch/msg/sfc/2YvBakDgJ_hjY-BGvgWdcTTUDIs
>=20
>=20
> So I don't feel this draft sufficiently explains the MD-Type 1 metadata w=
ell enough to explain how one can make an interoperable implementation.
>=20
> The draft references metadata allocation drafts, but they have not been a=
dopted yet, so (as I understand it) these "works in progress" cannot suppor=
t draft-ietf-sfc-nsh.
>=20
>=20
> I think it might be acceptable to say that the metadata must be undirecti=
onally clonable (or better phrase).
> In other words,
>=20
>   Metadata used in NSH headers must been the condition that
>   a transport-layer-stateful Service Function can save away
>   metadata values that it has witnessed.  An injected packet can
>   therefore be assigned a clone of metadata taken from an earlier
>   packet going in the same direction.  For example, a Service Function
>   can send a TCP packet using metadata cloned from another TCP packet
>   of the same connection and direction.
>=20
>   Note that the Service Function need not know the meaning of the
>   metadata; it just needs to know it is safe to clone in this manner.
>=20
>=20
>=20
> Another alternative would be to import one of the metadata allocation sch=
emes into this draft as MD-Type 1, and allow IANA to allocate MD-types for =
other schemes.
>=20
>=20
>=20
> -Dave
>=20
>=20
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
> Sent: Wednesday, March 30, 2016 10:48 PM
> To: sfc@ietf.org
> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Dear WG:
>=20
> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt (https://dat=
atracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>=20
> The editors of the NSH document have indicated that they have addressed a=
ll known comments and that there are no open issues with the current versio=
n of the document.
>=20
> Substantive comments to the list please, editorial comments can go direct=
ly to the document editors.
>=20
> We'll also get a brief update from the editors at next week's meeting. If=
 there are any remaining issues with the document, raising them before the =
meeting would be especially helpful.
>=20
> For the chairs,
> Thomas
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Apr 14 08:06:37 2016
Return-Path: <xuxiaohu@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A5DC12DBAC for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 19:51:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.217
X-Spam-Level: 
X-Spam-Status: No, score=-5.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YXZ4JNaqa_U0 for <sfc@ietfa.amsl.com>; Wed, 13 Apr 2016 19:51:45 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ACDE212E0A1 for <sfc@ietf.org>; Wed, 13 Apr 2016 19:51:42 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml703-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CMD13583; Thu, 14 Apr 2016 02:51:39 +0000 (GMT)
Received: from NKGEML411-HUB.china.huawei.com (10.98.56.70) by lhreml703-cah.china.huawei.com (10.201.5.104) with Microsoft SMTP Server (TLS) id 14.3.235.1; Thu, 14 Apr 2016 03:51:38 +0100
Received: from NKGEML515-MBX.china.huawei.com ([fe80::a54a:89d2:c471:ff]) by nkgeml411-hub.china.huawei.com ([10.98.56.70]) with mapi id 14.03.0235.001; Thu, 14 Apr 2016 10:51:31 +0800
From: Xuxiaohu <xuxiaohu@huawei.com>
To: "Ken Gray (kegray)" <kegray@cisco.com>, Alia Atlas <akatlas@gmail.com>, Dave Dolson <ddolson@sandvine.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRlYwzoOh5TUt/KkmiZB4K1T/tUZ+HpCQAgAAKq4CAAFaeAIAAucyA
Date: Thu, 14 Apr 2016 02:51:31 +0000
Message-ID: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539EC3@NKGEML515-MBX.china.huawei.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <017AECEC-35AB-478B-A7F8-55B059720074@cisco.com> <CAG4d1rcFQWooeJDRnfx_t+m=ZJ34jf4LuJXu+n2QeKS-yODmcQ@mail.gmail.com> <570E4D07.2060405@pi.nu> <CAG4d1rcT1JmnGT-NWkYjd0uQm-kbm5-w7tfnJVs9W07L9Cir1A@mail.gmail.com> <CAG4d1rc=DpsXV3=p9dYX3tom0XLDb_uXJxHbVNennvXf8phoSQ@mail.gmail.com> <CAG4d1rf_KOjjRh9NV40j-SKbxe0Yw82LBPnpVuAoNThm9ZdOjQ@mail.gmail.com> <E8355113905631478EFF04F5AA706E9830F1E1EC@wtl-exchp-2.sandvine.com> <CAG4d1rdpRWqt7tnafTZMFKQ7TwtLg_p=7SzOX0V2YNidrdFwcA@mail.gmail.com> <D33424D2.1219BC%kegray@cisco.com>
In-Reply-To: <D33424D2.1219BC%kegray@cisco.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.111.99.55]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020201.570F05BC.007E, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 7f390b4846863f306fe54fcbe9ebbbe3
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/WClObxpbo536YoxuYvzxcgSUl3U>
X-Mailman-Approved-At: Thu, 14 Apr 2016 08:06:36 -0700
Cc: Thomas Narten <narten@us.ibm.com>, "Carlos Pignataro \(cpignata\)" <cpignata@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, "Jim Guichard \(jguichar\)" <jguichar@cisco.com>, Martin Stiemerling <mls.ietf@gmail.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 02:51:48 -0000

DQoNCj4gLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCj4gRnJvbTogS2VuIEdyYXkgKGtlZ3Jh
eSkgW21haWx0bzprZWdyYXlAY2lzY28uY29tXQ0KPiBTZW50OiBUaHVyc2RheSwgQXByaWwgMTQs
IDIwMTYgNzoyMiBBTQ0KPiBUbzogQWxpYSBBdGxhczsgRGF2ZSBEb2xzb24NCj4gQ2M6IFRob21h
cyBOYXJ0ZW47IENhcmxvcyBQaWduYXRhcm8gKGNwaWduYXRhKTsgc2ZjQGlldGYub3JnOyBKaW0g
R3VpY2hhcmQNCj4gKGpndWljaGFyKTsgTWFydGluIFN0aWVtZXJsaW5nOyBYdXhpYW9odTsgSm9l
bCBNLiBIYWxwZXJuOyBMb2EgQW5kZXJzc29uDQo+IFN1YmplY3Q6IFJlOiBbc2ZjXSBXRyBsYXN0
IGNhbGwgZm9yIGRyYWZ0LWlldGYtc2ZjLW5zaC0wNC50eHQNCj4gDQo+IEF0IHRoaXMgcG9pbnQs
IEknbGwgd2VpZ2ggaW4gd2l0aCB0d28gdGhpbmdzOg0KPiANCj4gWWVzLCBJIHN1cHBvcnQgdGhl
IGRyYWZ0Lg0KPiANCj4gQXNpZGUgZnJvbSB0aGUgZWRpdG9yaWFsIHN1Z2dlc3Rpb25zICh3ZWxj
b21lLCBmaXggdGhhdCBzdHVmZikgYW5kIHRoZSBjb25zdGFudA0KPiByZXR1cm5pbmcgdG8gd2Fu
dGluZyB0byBkZWZpbmUgbWV0YWRhdGEgLSB3aGljaCBpcyBhIGRlZXAgYWJ5c3Mgd2Ugc2VlbQ0K
PiBmYXNjaW5hdGVkIHdpdGggYnV0IGRvZXNuJ3QgSEFWRSB0byBiZSBkb25lIGhlcmUgYW5kIG5v
dywgSU1PIC0gSSBoYXZlIHRvDQo+IGV4cHJlc3MgYm90aCBteSBhcHByZWNpYXRpb24gZm9yIHRo
ZSB0aG9yb3VnaG5lc3MgdGhhdCBicmluZ3MgdGhlIE1QTFMgbmliYmxlDQo+IGlzc3VlIHRvIHRo
ZSBzdXJmYWNlIGFuZCBteSBhYnNvbHV0ZSBhd2UgdGhhdCB3ZSB3b3VsZCBwZXJwZXR1YXRlIHRo
YXQgZGVzaWduDQo+IGNob2ljZSBhbmQgY3JpcHBsZSB0aGUgTlNIIGhlYWRlciByYXRoZXIgdGhh
biBhdHRlbXB0IHRvIGZpeCBpdCBhdCBpdCdzIHJvb3QuDQoNCkFncmVlIHRoYXQgdGhlIHJvb3Qg
b2YgdGhpcyBpc3N1ZSBpcyB0aGUgbGFjayBvZiBhIHByb3RvY29sIGlkZW50aWZpZXIgZmllbGQg
aW4gdGhlIE1QTFMgZW5jYXBzdWxhdGlvbiBoZWFkZXIuIFRoYXQncyB0aGUgcmVhc29uIHdoeSBJ
IHJhaXNlZCB0aGUgZmlyc3QgbmliYmxlIGlzc3VlIGFzc29jaWF0ZWQgd2l0aCBNUExTIGVuY2Fw
c3VsYXRpb24gKGh0dHBzOi8vbWFpbGFyY2hpdmUuaWV0Zi5vcmcvYXJjaC9tc2cvYmllci9RbUJt
R0tuOEFfUTVsWlNGTmNGTlZIS3ZFamMpIHRvIEJJRVIsIFNGQyBhbmQgTVBMUyBtYWlsaW5nLWxp
c3RzLiBTaG91bGQgdGhpcyBpc3N1ZSBiZSBhZGRyZXNzZWQgYnkgZWFjaCBuZXcgZW5jYXBzdWxh
dGlvbiBoZWFkZXIgb3IgZml4ZWQgYnkgdGhlIE1QTFMgaXRzZWxmIGlzIHdvcnRod2hpbGUgdG8g
YmUgZGlzY3Vzc2VkIHdpZGVseS4NCg0KQmVzdCByZWdhcmRzLA0KWGlhb2h1DQoNCj4gPkhpIERh
dmUsDQo+ID4NCj4gPg0KPiA+T24gV2VkLCBBcHIgMTMsIDIwMTYgYXQgMTozNCBQTSwgRGF2ZSBE
b2xzb24gPGRkb2xzb25Ac2FuZHZpbmUuY29tPg0KPiA+d3JvdGU6DQo+ID4NCj4gPknigJltIGdv
aW5nIHRvIHNob3cgbXkgaWdub3JhbmNlIGFuZCBhc2sgaG93IEV0aGVybmV0IGlzIGNhcnJpZWQg
b3ZlciBNUExTPw0KPiA+VGhlIGZpcnN0IG55YmJsZSBpcyBwYXJ0IG9mIHRoZSBEZXN0aW5hdGlv
biBNQUMgYWRkcmVzcy4NCj4gPk9VSXMgaGF2ZSBiZWVuIGFsbG9jYXRlZCBiZWdpbm5pbmcgd2l0
aCA0IGFuZCBhbHNvIHdpdGggNi4NCj4gPg0KPiA+DQo+ID4NCj4gPg0KPiA+DQo+ID4NCj4gPg0K
PiA+DQo+ID4NCj4gPlRoYW5rcyBmb3IgYXNraW5nIGFuZCBkb24ndCBiZSBzb3JyeSBmb3Igbm90
IGhhdmluZyB0byBsaXZlIHRocm91Z2ggdGhlDQo+ID5mdW4gYW5kIGpveSBvZiBzdGFuZGFyZGl6
aW5nIHBzZXVkby13aXJlcy4gICBUaGUgdmVyeSB2ZXJ5IHNob3J0IGZvcm0gaXMNCj4gPnRoYXQg
dGhlcmUgaXMgYSAzMi1iaXQgY29kZS13b3JkIGRlZmluZWQgdGhhdCBzaXRzIGFib3ZlIHRoZSBF
dGhlcm5ldA0KPiA+ZnJhbWUgYW5kIHJpZ2h0IGJlbG93IHRoZSBNUExTIHN0YWNrLg0KPiA+IFRo
aXMgaXMgdG8gZGVhbCB3aXRoIGltcGxlbWVudGF0aW9ucyB0aGF0IGxvb2sgYmVuZWF0aCB0aGUg
TVBMUyBzdGFjaw0KPiA+dG8gaHVudCBkb3duIG1vcmUgZmllbGRzIHRvIGhhc2ggdG8gZ2V0IGdv
b2QgZW50cm9weSBmb3IgRUNNUCBvciBMQUcuDQo+ID4NCj4gPg0KPiA+DQo+ID5BcyBJIHJlY2Fs
bCwgd2hlbiBJIGxvb2tlZCBhIGxvbmcgbG9uZyAoZXIsIGxldCdzIG5vdCBnZXQgaW50byBob3cN
Cj4gPmxvbmcpIHRpbWUgYWdvLCB0aGUgbGlrZWxpbmVzcyBvZiBhY3R1YWwgY29sbGlzaW9uIHdp
dGggYWxsb2NhdGVkIE9VSXMNCj4gPndhcyBxdWl0ZSBzbWFsbC4NCj4gPg0KPiA+DQo+ID5BbGlh
DQo+ID4NCj4gPg0KPiA+DQo+ID4NCj4gPg0KPiA+RnJvbTogc2ZjIFttYWlsdG86c2ZjLWJvdW5j
ZXNAaWV0Zi5vcmddIE9uIEJlaGFsZiBPZiBBbGlhIEF0bGFzDQo+ID5TZW50OiBXZWRuZXNkYXks
IEFwcmlsIDEzLCAyMDE2IDk6NTYgQU0NCj4gPlRvOiBMb2EgQW5kZXJzc29uDQo+ID5DYzogVGhv
bWFzIE5hcnRlbjsgQ2FybG9zIFBpZ25hdGFybyAoY3BpZ25hdGEpOyBzZmNAaWV0Zi5vcmcNCj4g
PjxtYWlsdG86c2ZjQGlldGYub3JnPjsgSmltIEd1aWNoYXJkIChqZ3VpY2hhcik7IE1hcnRpbiBT
dGllbWVybGluZzsNCj4gPlh1eGlhb2h1OyBKb2VsIE0uIEhhbHBlcm4NCj4gPg0KPiA+U3ViamVj
dDogUmU6IFtzZmNdIFdHIGxhc3QgY2FsbCBmb3IgZHJhZnQtaWV0Zi1zZmMtbnNoLTA0LnR4dA0K
PiA+DQo+ID4NCj4gPg0KPiA+TG9hLA0KPiA+VGhhbmtzISAgIEkga25ldyBpdCB3YXMgb3V0IHRo
ZXJlLg0KPiA+UmVnYXJkbGVzcywgIHRoZSBmaXJzdCBuaWJibGUgcXVlc3Rpb24gY2FuJ3QgYmUg
cmVzb2x2ZWQgYnkgYWRkaW5nIG1vcmUNCj4gPmxhYmVscyB0byB0aGUgc3RhY2shICAgIFRoZSB3
aG9sZSBpc3N1ZSBpcyBsb29raW5nIGF0IHRoZSBTIGJpdCB0byBndWVzcw0KPiA+d2hhdCdzIHVu
ZGVyIHRoZSBNUExTIGxhYmVsIHN0YWNrLiAgVGhhdCdzIHdoeSBQV0UzIHVzZXMgY29kZS13b3Jk
cy4NCj4gPlRoZXJlIG5lZWRzIHRvIGJlIGFuIGFuc3dlciBiZXlvbmQgaGFuZHdhdmluZyB0aGF0
IHNvbWV0aGluZyBjYW4gYmUNCj4gPmludmVudGVkLg0KPiA+T2YgYWxsIHRoZSBpbXBsZW1lbnRh
dGlvbnMsIHdoYXQgdHJhbnNwb3J0cyBpcyBOU0ggY2FycmllZCBvdmVyPyAgRG8gd2UNCj4gPmhh
dmUgYW55IGRpdmVyc2l0eT8NCj4gPg0KPiA+UmVnYXJkcywNCj4gPkFsaWENCj4gPk9uIEFwciAx
MywgMjAxNiA5OjQzIEFNLCAiTG9hIEFuZGVyc3NvbiIgPGxvYUBwaS5udT4gd3JvdGU6DQo+ID5B
bGlhLA0KPiA+DQo+ID5JIHRoaW5rIHlvdSBhcmUgcmVmZXJyaW5nIHRvIFJGQyA0MTgyLCBpdCBp
cyBtb3JlIHRoYW4gYSBkZWNhZGUgc2luY2UNCj4gPml0IHdhcyBwdWJsaXNoZWQuDQo+ID4NCj4g
Pi9Mb2ENCj4gPg0KPiA+DQo+ID5PbiAyMDE2LTA0LTEzIDIxOjEzLCBBbGlhIEF0bGFzIHdyb3Rl
Og0KPiA+DQo+ID4NCj4gPkNhcmxvcywNCj4gPg0KPiA+QXMgd2UgYWxsIGtub3csIGl0IGlzIHBv
c3NpYmxlIHRvIGRvIG1hbnkgbWFueSB0aGluZ3Mgd2l0aCB0ZWNobm9sb2d5IC0NCj4gPm9uY2Ug
d2UgZmlndXJlIG91dCBob3cuDQo+ID5TYXlpbmcgdGhhdCB0aGVyZSBhcmUgYXBwcm9hY2hlcyBv
dGhlciB0aGFuIHJlb3JnYW5pemluZyB0aGUgZmlyc3QNCj4gPg0KPiA+bmliYmxlIGlzIGZpbmUu
w4IgIENsYWltaW5nIHRoYXQgd2UnbGwNCj4gPg0KPiA+YmUgYW55d2hlcmUgbmVhciBpbnRlcm9w
ZXJhYmlsaXR5IG9yIHN0YW5kYXJkaXphdGlvbiB3aXRob3V0IGl0IGJlaW5nDQo+ID5jbGFyaWZp
ZWQgZG9lcyBub3Qgc2VlbSBwbGF1c2libGUuDQo+ID4NCj4gPkZvciBpbnN0YW5jZSwgSSB3aWxs
IG5vdGUgdGhhdCB0aGUgZGVzY3JpcHRpb24gb2YgMCAoRXhwbGljaXQgTlVMTCkgaXMNCj4gPnN0
aWxsIGRlZmluZWQgaW4gUkZDMzAzMiBhcyBpbXBseWluZw0KPiA+DQo+ID50aGUgcGFja2V0IHVu
ZGVybmVhdGggaXMgSVB2NC7DgiAgSSByZWFsbHkgZGlkIHRoaW5rIHRoYXQgd2UnZCB0YWxrZWQg
aW4NCj4gPg0KPiA+TVBMUyBhYm91dCBmaXhpbmcgdGhpcyAtIGFuZCBtYXliZQ0KPiA+TG9hIG9y
IG90aGVycyBjYW4gZ2l2ZSB1cyB0aGUgcmVmZXJlbmNlIC0gYnV0IHRoYXQncyB3aGF0IHRoZSBJ
QU5BDQo+ID5wb2ludGVyIGhhcyByaWdodCBub3cuDQo+ID4NCj4gPkkgdW5kZXJzdGFuZCB0aGUg
ZGVzaXJlIHRvIGdldCBOU0ggZG9uZSAtIGRlZXBseSEgw4INCj4gPg0KPiA+DQo+ID5JIGFsc28g
aGF0ZSBsYXRlIHN1cnByaXNlcyBhbmQgYW0gdHJ5aW5nIHRvIGNsZWFyIHRpbWUgdG8gZG8gYSBt
b3JlDQo+ID50aG9yb3VnaCByZXZpZXcgb2YgTlNIIGFzIHdlbGwgYXMgcmVxdWVzdGluZyBvdGhl
ciBmb2N1c2VkIHJldmlld3MuDQo+ID4NCj4gPlRoaXMgaXNzdWUgaXMgbm90IG5ldyAtIGFuZCB0
aGUgaXNzdWVzIEkgc2F3IGluIGEgcXVpY2sgbG9vayBhcmUgdGhvc2UNCj4gPnRoYXQgYXJlIHRo
b3JvdWdobHkgZG9jdW1lbnRlZA0KPiA+DQo+ID5pbsOCIGRyYWZ0LWlldGYtcnRnd2ctZHQtZW5j
YXAtMDENCj4gPjxodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9kcmFmdC1pZXRmLXJ0
Z3dnLWR0LWVuY2FwLz7DgiB3aGljaA0KPiA+DQo+ID5jb25zaWRlcmVkIE5TSCBhcyBvbmUgb2Yg
dGhlIGVuY2Fwc3VsYXRpb25zLg0KPiA+DQo+ID5JdCBzZWVtcyBjbGVhciB0aGF0IHRoZXJlICph
cmUqw4IgdHJhbnNwb3J0LXNwZWNpZmljIGlzc3VlcyBhbmQgd2UgbmVlZA0KPiA+YQ0KPiA+DQo+
ID5wbGFjZSBhbmQgYSB3YXkgdG8gY2FwdHVyZSB0aGVtLg0KPiA+DQo+ID5SZWdhcmRzLA0KPiA+
QWxpYQ0KPiA+DQo+ID5PbiBXZWQsIEFwciAxMywgMjAxNiBhdCA4OjUzIEFNLCBDYXJsb3MgUGln
bmF0YXJvIChjcGlnbmF0YSkNCj4gPg0KPiA+PGNwaWduYXRhQGNpc2NvLmNvbSA8bWFpbHRvOmNw
aWduYXRhQGNpc2NvLmNvbT4+IHdyb3RlOg0KPiA+DQo+ID4gICAgQWxpYSwNCj4gPg0KPiA+ICAg
IFRoYW5rcyBmb3IgbG9va2luZyBpbnRvIHRoaXMuDQo+ID4NCj4gPiAgICBJdCBpcyByZWxldmFu
dC4gSSBiZWxpZXZlIEVDTVAtcHJldmVudGlvbiAoYW50aS1hbGlhc2luZyB3aXRoIDB4NA0KPiA+
ICAgIGFuZCAweDYpIGlzIG5lY2Vzc2FyeSBmb3IgdHJhZmZpYyBvdmVyIE1QTFMgZXhwZWN0aW5n
IGluLW9yZGVyDQo+ID4NCj4gPiAgICBkZWxpdmVyeS7Dgg0KPiA+DQo+ID4NCj4gPiAgICBUcmFu
c3BvcnRpbmcgTlNIIG92ZXIgTVBMUywgaG93ZXZlciwgZG9lcyBub3QgbmVjZXNzYXJpbHkgaW1w
bHkNCj4gPiAgICB0cmFuc3BvcnRpbmcgTlNIICpkaXJlY3RseSogZm9sbG93aW5nIHRoZSBib3R0
b20gTFNFLiBUaGVyZSBhcmUNCj4gPg0KPiA+ICAgIG90aGVyIHdheXMsIGFzIGl0IHdhcyBkb25l
IHdpdGggUFdzLsOCDQo+ID4NCj4gPg0KPiA+ICAgIEkgdGhpbmsgc2hvd2luZyB0aGF0IGl0IGlz
IHBvc3NpYmxlIHRvIGFwcHJvcHJpYXRlbHkgKGkuZS4sDQo+ID4gICAgcmVzcGVjdGluZyBCQ1Bz
KSB0cmFuc3BvcnQgTlNIIG92ZXIgTVBMUyBpcyB2ZXJ5IGltcG9ydGFudC4gVGhpcyBtYXkNCj4g
PiAgICBvciBtYXkgbm90IGhhdmUgaW1wbGljYXRpb25zIG9uIHRoZSBOU0ggYmFzZSBoZWFkZXIu
IEkgYmVsaWV2ZQ0KPiA+ICAgIGhvd2V2ZXIgdGhhdCBzdWNoIGFjdHVhbCBmb3JtYWwgc3BlY2lm
aWNhdGlvbiAoYmV5b25kIHNob3dpbmcgaXRzDQo+ID4gICAgcG9zc2libGUpIHNob3VsZCBub3Qg
Z2F0ZSBOU0guDQo+ID4NCj4gPiAgICBUaGFua3MhDQo+ID4NCj4gPiAgICDDouKCrOKAnSBDYXJs
b3MuDQo+ID4NCj4gPg0KPiA+ICAgIE9uIEFwciAxMiwgMjAxNiwgYXQgMTA6MjkgUE0sIEFsaWEg
QXRsYXMgPGFrYXRsYXNAZ21haWwuY29tDQo+ID4NCj4gPiAgICA8bWFpbHRvOmFrYXRsYXNAZ21h
aWwuY29tPj4gd3JvdGU6DQo+ID4NCj4gPiAgICBYaWFvaHUsIEpvZWwsIGFuZCBTRkMgV0cgZ3Jv
dXAsDQo+ID4NCj4gPiAgICBUaGUgZmlyc3QgbmliYmxlIHF1ZXN0aW9uIGlzIHF1aXRlIHJlbGV2
YW50IGlmIGl0IGlzIGV4cGVjdGVkIHRoYXQNCj4gPiAgICB0aGUgTlNIIGhlYWRlciBtaWdodCBi
ZSBkaXJlY3RseSB1bmRlcg0KPiA+DQo+ID4gICAgYW4gTVBMUyBsYWJlbCBzdGFjay7DgiAgVGhp
cyBpc3N1ZSBhcm9zZSByYXRoZXIgdW5wbGVhc2FudGx5IGZvcg0KPiA+DQo+ID4gICAgcHNldWRv
LXdpcmVzIGEgbG9uZyB0aW1lIGFnbyBhbmQgdGhlDQo+ID4gICAgcmVhc29uaW5nIGZvciBpdCBp
cyBtdWNoIGJldHRlciBkb2N1bWVudGVkLCBhcyBDYXJsb3MgcG9pbnRlZCBvdXQNCj4gPiAgICBp
biBhIGRpZmZlcmVudCB0aHJlYWQsIGluIFJGQyA0OTI4IFNlY3Rpb24gMy4NCj4gPg0KPiA+ICAg
IEF0IHRoZSB0aW1lIHRoYXQgUFdFMyB3YXMgd29ya2luZyBvbiB0aGUgY29udHJvbCB3b3JkIGFu
ZCB3aGV0aGVyDQo+ID4gICAgaXQgd2FzIHRvIGJlIG1hbmRhdG9yeSAoUkZDIDQzODUpLCBpdCB3
YXMgY2xlYXIgdGhhdA0KPiA+ICAgIHRoZXJlIHdlcmUgZGV2aWNlcyB0aGF0IGxvb2tlZCBhdCB0
aGUgZmlyc3QgbmliYmxlIG9mIGEgcGFja2V0DQo+ID4gICAgdW5kZXIgdGhlIE1QTFMgaGVhZGVy
IGFzIGEgd2F5IHRvIGRldGVybWluZQ0KPiA+ICAgIGlmIHRoZSBwYWNrZXQgd2FzIElQdjQgb3Ig
SVB2NiBhbmQgb2J0YWluIGZsb3ctZGl2ZXJzaXR5IGZyb20NCj4gPg0KPiA+ICAgIGl0LsOCICBU
aGUgY29zdCBvZiBhbHNvIHZlcmlmeWluZyB0aGUgYXNzb2NpYXRlZCBjaGVja3N1bQ0KPiA+DQo+
ID4gICAgaWYgYXZhaWxhYmxlIHdhc24ndCBkZWVtZWQgYWNjZXB0YWJsZSBmb3Igc2V2ZXJhbA0K
PiA+DQo+ID4gICAgaW1wbGVtZW50YXRpb25zLsOCICBHaXZlbiB0aGF0IGRldGVybWluaW5nIGFz
IG11Y2ggZW50cm9weSBhcw0KPiA+DQo+ID4gICAgcG9zc2libGUgaXMgc3RpbGwgcmVhbGx5IGlt
cG9ydGFudCBhbmQgdGhhdCBpdCBpcyBub24tdHJpdmlhbCB0bw0KPiA+ICAgIG5lZ290aWF0ZS9p
bmRpY2F0ZSB0aGUgY2FwYWJpbGl0eSBmb3IgaW5jbHVkaW5nDQo+ID4gICAgYW4gRW50cm9weSBM
YWJlbCBpbiB0aGUgTVBMUyBzdGFjaywgSSBoYXZlIG5vIHJlYXNvbiB0byBiZWxpZXZlDQo+ID4g
ICAgdGhhdCB0aGlzIHNob3J0Y3V0IG9mIGxvb2tpbmcgYXQgdGhlIGZpcnN0IG5pYmJsZQ0KPiA+
DQo+ID4gICAgaXMgbm8gbG9uZ2VyIHVzZWQgb3IgZGVwbG95ZWQuIMOCICBGZWVsIGZyZWUgdG8g
Y29udGFjdCBtZSBvZmYtbGlzdA0KPiA+DQo+ID4gICAgaWYgeW91IGJlbGlldmUgdGhpcyB0byBi
ZSB0aGUgY2FzZS4NCj4gPg0KPiA+ICAgIEl0IGlzIGNsZWFyIGZyb20gdGhlIE5TSCBiYXNlIGhl
YWRlcjoNCj4gPiAgICAgICAwIDEgMiAzIDQgNSA2IDcgOCA5IDAgMSAyIDMgNCA1IDYgNyA4IDkg
MCAxIDIgMyA0IDUgNiA3IDggOSAwIDENCj4gPg0KPiA+Ky0rLSstKy0rLSstKy0rLSstKy0rLSst
Ky0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSsNCj4gPiAgICAgICAgICB8
VmVyfE98Q3xSfFJ8UnxSfFJ8UnwgICBMZW5ndGggIHwgICAgTUQgVHlwZSAgICB8IE5leHQNCj4g
UHJvdG9jb2wNCj4gPnwNCj4gPg0KPiA+Ky0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0r
LSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSsNCj4gPg0KPiA+ICAgIHRoYXQgdGhpcyBj
b25zaWRlcmF0aW9uIGhhcyBiZWVuIGNvbXBsZXRlbHkgaWdub3JlZC7DgiAgSW4gZmFjdCwgYW4N
Cj4gPg0KPiA+ICAgIE5TSCBiYXNlIGhlYWRlciBtaWdodCBoYXZlIGFueSB2YWx1ZQ0KPiA+ICAg
IG9mIDBiMDAwMCwgMGIwMDAxLCAwYjAwMTAsIDBiMDAxMCBhbmQgaWYgYSB2ZXJzaW9uIDAxIGZv
ciBOU0ggd2VyZQ0KPiA+ICAgIGV2ZXIgZGVmaW5lZCwgc3VkZGVubHkgdGhlIHRyYWZmaWMgbWln
aHQNCj4gPiAgICBiZSBzdWJqZWN0IHRvIHN0YXJ0bGluZyByZW9yZGVyaW5nIGlmIGFuIE1QTFMg
dHJhbnNwb3J0IHdlcmUgdG8gYmUNCj4gPiAgICBjb25zaWRlcmVkLg0KPiA+DQo+ID4gICAgR2l2
ZW4gYSBjbGFpbSBvZiBOU0ggYmVpbmcgdHJhbnNwb3J0LWFnbm9zdGljIGFuZCByZXBlYXRlZA0K
PiA+ICAgIGVtcGhhc2lzIHRoYXQgTVBMUywgYXMgd2VsbCBhcyBVRFAsDQo+ID4gICAgaXMgYSB2
YWxpZCB0cmFuc3BvcnQgZm9yIE5TSCwgSSBkbyB0aGluayB0aGlzIGlzIGEgc2lnbmlmaWNhbnQN
Cj4gPiAgICBvdmVyc2lnaHQgYW5kIG5lZWRzLCBhdCBhIG1pbmltdW0sIGRpc2N1c3Npb24gYW5k
DQo+ID4NCj4gPiAgICBleHBsYW5hdGlvbiwgYW5kIMOCIC0gcXVpdGUgbGlrZWx5IC0gw4IgY29y
cmVjdGlvbi4NCj4gPg0KPiA+DQo+ID4gICAgV2hpbGUgSSBhbSBvbiB0aGUgdG9waWMgb2YgZGV0
YWlscyBvZiB0aGUgTlNIIGVuY2Fwc3VsYXRpb24sIEkNCj4gPiAgICB3b3VsZCByZXF1ZXN0IHRo
YXQgU2VjdGlvbiA4IG9mIGRyYWZ0LWlldGYtcnRnd2ctZHQtZW5jYXAtMDENCj4gPg0KPiA+ICAg
IGJlIHJlYWQgYW5kIGNvbnNpZGVyZWQhIMOCICBJIGFtIG5vdCBleGNpdGVkIGJ5IGhhdmluZyBt
YW55DQo+ID4NCj4gPiAgICBkaWZmZXJlbnQgYW5kIHVuaXF1ZSBOZXh0IFByb3RvY29sIGZpZWxk
cyBkZWZpbmVkLg0KPiA+ICAgIEZvciBpbnN0YW5jZSwgSSBub3RlIHRoZSBkZWZpbml0aW9uIG9m
IGEgbmVhcmx5IGlkZW50aWNhbCBOZXh0DQo+ID4gICAgUHJvdG9jb2wgZmllbGQgaW4NCj4gPg0K
PiA+aHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvZHJhZnQtaWV0Zi1udm8zLXZ4bGFu
LWdwZQ0KPiA+PGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWlldGYtbnZv
My12eGxhbi1ncGU+IC4NCj4gPg0KPiA+ICAgIFdoaWxlIEkgYW0sIG9mIGNvdXJzZSwgd2lsbGlu
ZyB0byByZWFzb24gdG8gZGV0YWlsZWQgYW5kDQo+ID4gICAgd2VsbC10aG91Z2h0IG91dCBleHBs
YW5hdGlvbnMgZm9yIHdoeSBlYWNoIGFuZCBldmVyeSBuZXcNCj4gPiAgICBlbmNhcHN1bGF0aW9u
IG5lZWRzIGl0cyB2ZXJ5IG93biBJQU5BLWRlZmluZWQgTmV4dCBQcm90b2NvbCBmaWVsZCwNCj4g
PiAgICB0aGlzIHNlZW1zIHRvIG1lIHRvIGJlIGhpZ2hseSBsaWtlbHkgdG8gcmVxdWlyZQ0KPiA+
ICAgIGNvbnNvbGlkYXRpb24gc28gdGhhdCB0aGUgc2FtZSBOZXh0IFByb3RvY29sIGZpZWxkIGNh
biBiZSB1c2VkDQo+ID4gICAgYmV0d2VlbiB0aGUgdmFyaW91cyBlbmNhcHN1bGF0aW9ucy4NCj4g
Pg0KPiA+ICAgIEkgd2lsbCB3b3JrIG9uIGdpdmluZyBhIHRocm91Z2ggcmV2aWV3IG9mIE5TSCBh
cyBzb29uIGFzDQo+ID4NCj4gPiAgICBwcmFjdGljYWwuw4IgIEkgZG8gcmVhbGl6ZSB0aGF0IHRo
ZXJlIGFyZSBtdWx0aXBsZSBpbXBsZW1lbnRhdGlvbnMNCj4gPg0KPiA+ICAgIGFuZCB3aGlsZSBk
ZXRhaWxzIG9mIGhvdyB0aGUgIk5leHQgUHJvdG9jb2wiIGZpZWxkIGFyZSBkb2N1bWVudGVkDQo+
ID4gICAgc2hvdWxkbid0IGhhdmUgYSBzaWduaWZpY2FudCBpbXBhY3QgdGhlcmUsIHRoZQ0KPiA+
ICAgIGRpc2N1c3Npb24gYWJvdXQgdGhlIGZpcnN0IG5pYmJsZSBpcyBsaWtlbHkgdG8uDQo+ID4N
Cj4gPiAgICBSZWdhcmRzLA0KPiA+ICAgIEFsaWENCj4gPg0KPiA+DQo+ID4gICAgT24gVHVlLCBB
cHIgMTIsIDIwMTYgYXQgOTo1MyBQTSwgWHV4aWFvaHUgPHh1eGlhb2h1QGh1YXdlaS5jb20NCj4g
Pg0KPiA+ICAgIDxtYWlsdG86eHV4aWFvaHVAaHVhd2VpLmNvbT4+IHdyb3RlOg0KPiA+DQo+ID4g
ICAgICAgIEpvZWwsDQo+ID4NCj4gPiAgICAgICAgPiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0t
LQ0KPiA+DQo+ID4gICAgICAgID4gRnJvbTogSm9lbCBNLiBIYWxwZXJuIFttYWlsdG86am1oQGpv
ZWxoYWxwZXJuLmNvbQ0KPiA+PG1haWx0bzpqbWhAam9lbGhhbHBlcm4uY29tPl0NCj4gPiAgICAg
ICAgPiBTZW50OiBXZWRuZXNkYXksIEFwcmlsIDEzLCAyMDE2IDk6NDUgQU0NCj4gPg0KPiA+ICAg
ICAgICA+IFRvOiBYdXhpYW9odTsgVGhvbWFzDQo+ID5OYXJ0ZW47c2ZjQGlldGYub3JnIDxtYWls
dG86TmFydGVuJTNCc2ZjQGlldGYub3JnPiA8bWFpbHRvOnNmY0BpZXRmLm9yZz4NCj4gPiAgICAg
ICAgPiBTdWJqZWN0OiBSZTogW3NmY10gV0cgbGFzdCBjYWxsIGZvciBkcmFmdC1pZXRmLXNmYy1u
c2gtMDQudHh0DQo+ID4gICAgICAgID4NCj4gPiAgICAgICAgPiBYdSwNCj4gPg0KPiA+ICAgICAg
ICA+w4IgIMOCICDDgiAgw4IgSSBkbyBub3QgYmVsaWV2ZSB0aGF0IHRoZXJlIGlzIGFuIE1QTFMN
Cj4gPnNwZWNpZmljYXRpb24gdGhhdCByZXF1aXJlcyB0aGF0IGFsbA0KPiA+DQo+ID4gICAgICAg
ID4gY29udGVudCBvdGhlciB0aGFuIElQIG11c3QgaGF2ZSBhIGZpcnN0IG5pYmJsZSBvZiAwIG9y
IDEuDQo+ID4NCj4gPiAgICAgICAgV2hlbiBlbmNhcHN1bGF0aW5nIE5TSCBvdmVyIE1QTFMgZGly
ZWN0bHksIHRoZSBmaXJzdCBuaWJibGUgb2YNCj4gPiAgICAgICAgdGhlIE5TSCBtdXN0IG5vdCBi
ZSA0IG9yIDYuDQo+ID4NCj4gPiAgICAgICAgPiBUaGVyZSBhcmUgc3BlY2lmaWNhdGlvbnMgd2hl
cmUgaXQgaXMgZGlzY3Vzc2VkIGFzIGRlc2lyYWJsZS4NCj4gPiAgICAgICAgPg0KPiA+ICAgICAg
ICA+IEl0IGlzIGluIGZhY3QgcHJldHR5IHRyaXZpYWwgZm9yIHVzIHRvIGNoYW5nZSB0aGUgZm9y
bWF0IHNvDQo+ID50aGF0IHRoZSBmaXJzdCB0aHJlZSBiaXRzIGFyZQ0KPiA+DQo+ID4gICAgICAg
ID4gMCwgYnV0IGl0IGJ1cm5zIHNldmVyYWwgdmFsdWFibGUgZmxhZyBiaXRzLsOCICBJdCBpcyBh
biBTRkMNCj4gPndvcmtpbmcgZ3JvdXAgZGVjaXNpb24sDQo+ID4NCj4gPg0KPiA+ICAgICAgICBU
aGF0J3MgdGhlIHJlYXNvbiB3aHkgSSByYWlzZWQgdGhlIGZpcnN0IG5pYmJsZSBxdWVzdGlvbi4N
Cj4gPg0KPiA+ICAgICAgICBCZXN0IHJlZ2FyZHMsDQo+ID4gICAgICAgIFhpYW9odQ0KPiA+DQo+
ID4gICAgICAgID4gbm90LCBhcyBmYXIgYXMgSSBjYW4gdGVsbCwgYSB2aW9sYXRpb24gb2YgdGhl
IE1QTFMNCj4gPiAgICAgICAgc3BlY2lmaWNhdGlvbi4NCj4gPiAgICAgICAgPg0KPiA+ICAgICAg
ICA+IFlvdXJzLA0KPiA+ICAgICAgICA+IEpvZWwNCj4gPiAgICAgICAgPg0KPiA+ICAgICAgICA+
IE9uIDQvMTIvMTYgOTo0MSBQTSwgWHV4aWFvaHUgd3JvdGU6DQo+ID4gICAgICAgID4gPiBIaSBU
aG9tYXMsDQo+ID4gICAgICAgID4gPg0KPiA+ICAgICAgICA+ID4gSXQgc2FpZCBpbiB0aGUgTlNI
IGRyYWZ0Og0KPiA+ICAgICAgICA+ID4NCj4gPg0KPiA+ICAgICAgICA+ID7DgiAgw4IgICI2LsOC
ICBUcmFuc3BvcnQgQWdub3N0aWM6IE5TSCBpcyB0cmFuc3BvcnQNCj4gPiAgICAgICAgaW5kZXBl
bmRlbnQgYW5kIGlzIGNhcnJpZWQNCj4gPiAgICAgICAgPiA+w4IgIMOCICDDgiAgw4IgIMOCIGlu
IGFuIG92ZXJsYXksIG92ZXIgZXhpc3RpbmcgdW5kZXJsYXlzLsOCICBJZg0KPiA+ICAgICAgICBh
biBleGlzdGluZyBvdmVybGF5DQo+ID4gICAgICAgID4gPsOCICDDgiAgw4IgIMOCICDDgiB0b3Bv
bG9neSBwcm92aWRlcyB0aGUgcmVxdWlyZWQgc2VydmljZSBwYXRoDQo+ID4gICAgICAgIGNvbm5l
Y3Rpdml0eSwgdGhhdA0KPiA+ICAgICAgICA+ID7DgiAgw4IgIMOCICDDgiAgw4IgZXhpc3Rpbmcg
b3ZlcmxheSBtYXkgYmUgdXNlZC4iDQo+ID4NCj4gPiAgICAgICAgPiA+DQo+ID4gICAgICAgID4g
PiBUaGF0IG1lYW5zIHRoZSBOU0ggc2hvdWxkIGJlIGFibGUgdG8gYmUgdHJhbnNwb3J0ZWQgb3Zl
cg0KPiA+ICAgICAgICBNUExTLiBIb3dldmVyLA0KPiA+ICAgICAgICA+IGFjY29yZGluZyB0byB0
aGUgY3VycmVudCBOU0ggZm9ybWF0IGRlZmluaXRpb24sIGl0J3Mgbm90DQo+ID4gICAgICAgIHNh
ZmUgdG8gY2FycnkgdGhlIE5TSA0KPiA+ICAgICAgICA+IG92ZXIgTVBMUyBkdWUgdG8gdGhlIGZp
cnN0IG5pYmJsZSBpc3N1ZS4gVGhlcmVmb3JlLCBJDQo+ID4gICAgICAgIGJlbGlldmUgdGhpcyBp
c3N1ZSBuZWVkcyB0byBiZQ0KPiA+ICAgICAgICA+IGFkZHJlc3NlZCBiZWZvcmUgcHVibGljYXRp
b24uDQo+ID4gICAgICAgID4gPg0KPiA+ICAgICAgICA+ID4gQmVzdCByZWdhcmRzLA0KPiA+ICAg
ICAgICA+ID4gWGlhb2h1DQo+ID4gICAgICAgID4gPg0KPiA+ICAgICAgICA+ID4+IC0tLS0tT3Jp
Z2luYWwgTWVzc2FnZS0tLS0tDQo+ID4gICAgICAgID4gPj4gRnJvbTogc2ZjIFttYWlsdG86c2Zj
LWJvdW5jZXNAaWV0Zi5vcmcNCj4gPiAgICAgICAgPG1haWx0bzpzZmMtYm91bmNlc0BpZXRmLm9y
Zz5dIE9uIEJlaGFsZiBPZiBUaG9tYXMgTmFydGVuDQo+ID4gICAgICAgID4gPj4gU2VudDogVGh1
cnNkYXksIE1hcmNoIDMxLCAyMDE2IDEwOjQ4IEFNDQo+ID4NCj4gPiAgICAgICAgPiA+PiBUbzoN
Cj4gPnNmY0BpZXRmLm9yZyA8bWFpbHRvOnNmY0BpZXRmLm9yZz4gPG1haWx0bzpzZmNAaWV0Zi5v
cmc+DQo+ID4gICAgICAgID4gPj4gU3ViamVjdDogW3NmY10gV0cgbGFzdCBjYWxsIGZvciBkcmFm
dC1pZXRmLXNmYy1uc2gtMDQudHh0DQo+ID4gICAgICAgID4gPj4NCj4gPiAgICAgICAgPiA+PiBE
ZWFyIFdHOg0KPiA+ICAgICAgICA+ID4+DQo+ID4gICAgICAgID4gPj4gVGhpcyBub3RlIGJlZ2lu
cyBhIFdHIGxhc3QgY2FsbCBvbiBkcmFmdC1pZXRmLXNmYy1uc2gtMDQudHh0DQo+ID4gICAgICAg
ID4gPj4gKGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWlldGYtc2ZjLW5z
aC8pLg0KPiA+ICAgICAgICA+ID4+DQo+ID4gICAgICAgID4gPj4gVGhlIGVkaXRvcnMgb2YgdGhl
IE5TSCBkb2N1bWVudCBoYXZlIGluZGljYXRlZCB0aGF0IHRoZXkgaGF2ZQ0KPiA+ICAgICAgICA+
ID4+IGFkZHJlc3NlZCBhbGwga25vd24gY29tbWVudHMgYW5kIHRoYXQgdGhlcmUgYXJlIG5vIG9w
ZW4NCj4gPiAgICAgICAgaXNzdWVzIHdpdGgNCj4gPiAgICAgICAgPiA+PiB0aGUgY3VycmVudCB2
ZXJzaW9uIG9mIHRoZSBkb2N1bWVudC4NCj4gPiAgICAgICAgPiA+Pg0KPiA+ICAgICAgICA+ID4+
IFN1YnN0YW50aXZlIGNvbW1lbnRzIHRvIHRoZSBsaXN0IHBsZWFzZSwgZWRpdG9yaWFsDQo+ID4g
ICAgICAgIGNvbW1lbnRzIGNhbiBnbw0KPiA+ICAgICAgICA+ID4+IGRpcmVjdGx5IHRvIHRoZSBk
b2N1bWVudCBlZGl0b3JzLg0KPiA+ICAgICAgICA+ID4+DQo+ID4gICAgICAgID4gPj4gV2UnbGwg
YWxzbyBnZXQgYSBicmllZiB1cGRhdGUgZnJvbSB0aGUgZWRpdG9ycyBhdCBuZXh0IHdlZWsncw0K
PiA+ICAgICAgICA+ID4+IG1lZXRpbmcuIElmIHRoZXJlIGFyZSBhbnkgcmVtYWluaW5nIGlzc3Vl
cyB3aXRoIHRoZQ0KPiA+ICAgICAgICBkb2N1bWVudCwgcmFpc2luZw0KPiA+ICAgICAgICA+ID4+
IHRoZW0gYmVmb3JlIHRoZSBtZWV0aW5nIHdvdWxkIGJlIGVzcGVjaWFsbHkgaGVscGZ1bC4NCj4g
PiAgICAgICAgPiA+Pg0KPiA+ICAgICAgICA+ID4+IEZvciB0aGUgY2hhaXJzLA0KPiA+ICAgICAg
ICA+ID4+IFRob21hcw0KPiA+ICAgICAgICA+ID4+DQo+ID4gICAgICAgID4gPj4gX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCj4gPiAgICAgICAgPiA+PiBz
ZmMgbWFpbGluZyBsaXN0DQo+ID4NCj4gPiAgICAgICAgPiA+PiBzZmNAaWV0Zi5vcmcgPG1haWx0
bzpzZmNAaWV0Zi5vcmc+DQo+ID4NCj4gPiAgICAgICAgPiA+Pg0KPiA+aHR0cHM6Ly93d3cuaWV0
Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zZmMNCj4gPjxodHRwczovL3d3dy5pZXRmLm9yZy9tYWls
bWFuL2xpc3RpbmZvL3NmYz4NCj4gPiAgICAgICAgPiA+DQo+ID4gICAgICAgID4gPiBfX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KPiA+ICAgICAgICA+ID4g
c2ZjIG1haWxpbmcgbGlzdA0KPiA+DQo+ID4gICAgICAgID4gPiBzZmNAaWV0Zi5vcmcgPG1haWx0
bzpzZmNAaWV0Zi5vcmc+DQo+ID4NCj4gPiAgICAgICAgPiA+IGh0dHBzOi8vd3d3LmlldGYub3Jn
L21haWxtYW4vbGlzdGluZm8vc2ZjDQo+ID4gICAgICAgID4gPg0KPiA+DQo+ID4gICAgICAgIF9f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+ID4gICAgICAg
IHNmYyBtYWlsaW5nIGxpc3QNCj4gPg0KPiA+ICAgICAgICBzZmNAaWV0Zi5vcmcgPG1haWx0bzpz
ZmNAaWV0Zi5vcmc+DQo+ID4NCj4gPiAgICAgICAgaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1h
bi9saXN0aW5mby9zZmMNCj4gPg0KPiA+DQo+ID4gICAgX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX18NCj4gPiAgICBzZmMgbWFpbGluZyBsaXN0DQo+ID4NCj4g
PiAgICBzZmNAaWV0Zi5vcmcgPG1haWx0bzpzZmNAaWV0Zi5vcmc+DQo+ID4gICAgaHR0cHM6Ly93
d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zZmMNCj4gPg0KPiA+DQo+ID4NCj4gPg0KPiA+
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCj4gPnNmYyBt
YWlsaW5nIGxpc3QNCj4gPnNmY0BpZXRmLm9yZw0KPiA+aHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFp
bG1hbi9saXN0aW5mby9zZmMNCj4gPg0KPiA+DQo+ID4NCj4gPg0KPiA+DQo+ID4NCj4gPg0KPiA+
DQo+ID4NCj4gPg0KPiA+DQo+ID4NCj4gPg0KPiA+DQoNCg==


From nobody Thu Apr 14 08:24:55 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BEFAC12D942 for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 08:24:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.895
X-Spam-Level: 
X-Spam-Status: No, score=-2.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FMpWe_gcavsC for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 08:24:49 -0700 (PDT)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id B097C12D85D for <sfc@ietf.org>; Thu, 14 Apr 2016 08:24:49 -0700 (PDT)
Received: from BLR-EXCHP-2.sandvine.com (192.168.196.172) by WTL-EXCHP-3.sandvine.com (192.168.196.177) with Microsoft SMTP Server (TLS) id 14.3.195.1; Thu, 14 Apr 2016 11:24:49 -0400
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by blr-exchp-2.sandvine.com ([fe80::6c6d:7108:c63c:9055%14]) with mapi id 14.03.0181.006; Thu, 14 Apr 2016 11:24:48 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: TLV class of variable-length metadata should have a restricted range
Thread-Index: AdGWYcf4eX5Az/rjTQOEcq50WzDr6Q==
Date: Thu, 14 Apr 2016 15:24:48 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830F20CDAwtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/35S9Xlpg_4tE_BPlW_R8Ea1DGLI>
Subject: [sfc] TLV class of variable-length metadata should have a restricted range
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 15:24:54 -0000

--_000_E8355113905631478EFF04F5AA706E9830F20CDAwtlexchp2sandvi_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Regarding the TLV Class of variable-length metadata, https://tools.ietf.org=
/html/draft-ietf-sfc-nsh-04#section-3.5.1
It is common for such fields to reserve ranges, allowing for future growth =
into unanticipated uses.

E.g., off the top of my head,
classes 0 to 0x1ff --> types allocated by IETF
classes 0x200 to 0x7fff --> allocated by IANA
Classes 0x8000 to 0xbfff --> reserved, do not use
classes 0xc000 to 0xefff --> locally administered
classes 0xf000 to 0xffff --> experimental

Or similar? I'm not sure what the best practice for this is.

Generally, I'd want to try something experimentally before requesting IANA =
allocation for it (experimental),
or maybe types are too specific to warrant IANA allocation (locally adminis=
tered).

Can something like this be added to draft-ietf-sfc-nsh ?


David Dolson
Senior Software Architect, Sandvine Inc.


--_000_E8355113905631478EFF04F5AA706E9830F20CDAwtlexchp2sandvi_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Regarding the TLV Class of variable-length metadata,=
 <a href=3D"https://tools.ietf.org/html/draft-ietf-sfc-nsh-04#section-3.5.1=
">
https://tools.ietf.org/html/draft-ietf-sfc-nsh-04#section-3.5.1</a><o:p></o=
:p></p>
<p class=3D"MsoNormal">It is common for such fields to reserve ranges, allo=
wing for future growth into unanticipated uses.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">E.g., off the top of my head,<o:p></o:p></p>
<p class=3D"MsoNormal">classes 0 to 0x1ff --&gt; types allocated by IETF<o:=
p></o:p></p>
<p class=3D"MsoNormal">classes 0x200 to 0x7fff --&gt; allocated by IANA<o:p=
></o:p></p>
<p class=3D"MsoNormal">Classes 0x8000 to 0xbfff --&gt; reserved, do not use=
<o:p></o:p></p>
<p class=3D"MsoNormal">classes 0xc000 to 0xefff --&gt; locally administered=
<o:p></o:p></p>
<p class=3D"MsoNormal">classes 0xf000 to 0xffff --&gt; experimental<o:p></o=
:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Or similar? I&#8217;m not sure what the best practic=
e for this is.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Generally, I&#8217;d want to try something experimen=
tally before requesting IANA allocation for it (experimental),
<o:p></o:p></p>
<p class=3D"MsoNormal">or maybe types are too specific to warrant IANA allo=
cation (locally administered).<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Can something like this be added to draft-ietf-sfc-n=
sh ?<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">David Dolson<o:p></o:p></p>
<p class=3D"MsoNormal">Senior Software Architect, Sandvine Inc.<o:p></o:p><=
/p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_E8355113905631478EFF04F5AA706E9830F20CDAwtlexchp2sandvi_--


From nobody Thu Apr 14 08:30:12 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DB7D12E102 for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 08:30:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CXCCu0v4QLxp for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 08:30:08 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 54D5912DBF1 for <sfc@ietf.org>; Thu, 14 Apr 2016 08:30:08 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 110FC461876; Thu, 14 Apr 2016 08:30:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1460647808; bh=gu2Jje4gn5/x4TPkpTdfidSmxOn8To0Oc04EZvuV9QM=; h=Subject:To:References:From:Date:In-Reply-To:From; b=VIUVdT4JD0iRPmkel178DaUX9JIXo6voQoN9DKTUI7D/lI4bxnc22hKKWAGNQv7HZ +OQDl/tUn2CPrcmyUF++xH3QaNnQJn8E8ra5M4z5X0+grTFF0W5/7Yi4DhePfPi8R6 zI1zztIPBRZriMKGlz3wZaGiHVZVZv9UFc5U7lf8=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 90B81461870; Thu, 14 Apr 2016 08:30:07 -0700 (PDT)
To: Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <570FB777.4020202@joelhalpern.com>
Date: Thu, 14 Apr 2016 11:29:59 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/6kxDW1gg3mziY6wW_snkn4FvaOo>
Subject: Re: [sfc] TLV class of variable-length metadata should have a restricted range
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 15:30:10 -0000

That seems sensible.  (I am not sure why we need such a large range of 
classes, but I suspect I am missing something there.)

Yours,
Joel

On 4/14/16 11:24 AM, Dave Dolson wrote:
> Regarding the TLV Class of variable-length metadata,
> https://tools.ietf.org/html/draft-ietf-sfc-nsh-04#section-3.5.1
>
> It is common for such fields to reserve ranges, allowing for future
> growth into unanticipated uses.
>
> E.g., off the top of my head,
>
> classes 0 to 0x1ff --> types allocated by IETF
>
> classes 0x200 to 0x7fff --> allocated by IANA
>
> Classes 0x8000 to 0xbfff --> reserved, do not use
>
> classes 0xc000 to 0xefff --> locally administered
>
> classes 0xf000 to 0xffff --> experimental
>
> Or similar? I’m not sure what the best practice for this is.
>
> Generally, I’d want to try something experimentally before requesting
> IANA allocation for it (experimental),
>
> or maybe types are too specific to warrant IANA allocation (locally
> administered).
>
> Can something like this be added to draft-ietf-sfc-nsh ?
>
> David Dolson
>
> Senior Software Architect, Sandvine Inc.
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Thu Apr 14 08:32:52 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6FCF812E660 for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 08:32:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level: 
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fU_CaXQg4H26 for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 08:32:49 -0700 (PDT)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id DDDE512E65B for <sfc@ietf.org>; Thu, 14 Apr 2016 08:32:48 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Thu, 14 Apr 2016 11:32:48 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] TLV class of variable-length metadata should have a restricted range
Thread-Index: AdGWYcf4eX5Az/rjTQOEcq50WzDr6QAIkBaAAAhSecA=
Date: Thu, 14 Apr 2016 15:32:48 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F20D5A@wtl-exchp-2.sandvine.com>
References: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com> <570FB777.4020202@joelhalpern.com>
In-Reply-To: <570FB777.4020202@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/5TaFolO9BIWnJWp6ohrMWKYak5w>
Subject: Re: [sfc] TLV class of variable-length metadata should have a restricted range
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 15:32:51 -0000

I was just brainstorming some classes. I expect more experienced contributo=
rs can
make arguments to whittle it down.


-----Original Message-----
From: Joel M. Halpern [mailto:jmh@joelhalpern.com]=20
Sent: Thursday, April 14, 2016 11:30 AM
To: Dave Dolson; sfc@ietf.org
Subject: Re: [sfc] TLV class of variable-length metadata should have a rest=
ricted range

That seems sensible.  (I am not sure why we need such a large range of=20
classes, but I suspect I am missing something there.)

Yours,
Joel

On 4/14/16 11:24 AM, Dave Dolson wrote:
> Regarding the TLV Class of variable-length metadata,
> https://tools.ietf.org/html/draft-ietf-sfc-nsh-04#section-3.5.1
>
> It is common for such fields to reserve ranges, allowing for future
> growth into unanticipated uses.
>
> E.g., off the top of my head,
>
> classes 0 to 0x1ff --> types allocated by IETF
>
> classes 0x200 to 0x7fff --> allocated by IANA
>
> Classes 0x8000 to 0xbfff --> reserved, do not use
>
> classes 0xc000 to 0xefff --> locally administered
>
> classes 0xf000 to 0xffff --> experimental
>
> Or similar? I'm not sure what the best practice for this is.
>
> Generally, I'd want to try something experimentally before requesting
> IANA allocation for it (experimental),
>
> or maybe types are too specific to warrant IANA allocation (locally
> administered).
>
> Can something like this be added to draft-ietf-sfc-nsh ?
>
> David Dolson
>
> Senior Software Architect, Sandvine Inc.
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Thu Apr 14 10:03:43 2016
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9275612DB67 for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 10:03:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v8bS5qjvJ1g2 for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 10:03:40 -0700 (PDT)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E870B12D96F for <sfc@ietf.org>; Thu, 14 Apr 2016 10:03:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2209; q=dns/txt; s=iport; t=1460653419; x=1461863019; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=vrPoOc0l6Vf2FdkOqYFfS+Aec7lEQNJ1hHdVwKeRFM4=; b=USU5q4Pxe2sOfbnQPfnHbll2q9lRzI4e1KiX6qiH88Me52RReXVjtSa8 U5Uc1foIgmZSQrcMGgkE1YetZDOgLYyGAG6+hPTJpxLnklFTp72BqB10a XiFiH3wDrKOsEjLnP6EAo8QlFzVEiDsAZiLIEBwXaTcahBOciy2u20UXp s=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AMAgDYzA9X/5NdJa1egziBUAa6KQENg?= =?us-ascii?q?XGGDgKBPDgUAQEBAQEBAWUnhEEBAQEDAR0dPwUHBAIBCA4DBAEBAR4JBzIUCQg?= =?us-ascii?q?CBA4FiCEIwmwBAQEBAQEBAQEBAQEBAQEBAQEBAQEVhiGBdYJWhD2DLYIrAQSHc?= =?us-ascii?q?IcUiQcBjgyBZ4ROiFuGIYkHAR4BAUKDZ2yISH4BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,485,1454976000"; d="scan'208";a="260687867"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 14 Apr 2016 17:03:39 +0000
Received: from XCH-ALN-009.cisco.com (xch-aln-009.cisco.com [173.36.7.19]) by rcdn-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id u3EH3dx8008225 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 14 Apr 2016 17:03:39 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-009.cisco.com (173.36.7.19) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 14 Apr 2016 12:03:38 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Thu, 14 Apr 2016 12:03:38 -0500
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: Dave Dolson <ddolson@sandvine.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfXi0m0zbDrFUiQMfrqrpCL9J+HIR6AgAADWICAAFnogIAAy/MAgAGYJgCAADqXAA==
Date: Thu, 14 Apr 2016 17:03:38 +0000
Message-ID: <0B2F4CF8-B94B-461F-92B2-ACC214D3E907@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <E8355113905631478EFF04F5AA706E9830F1BBAC@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D77F0B6@MBX021-W3-CA-2.exch021.domain.local> <14F8542B-9EE1-40DF-8DA2-E6E5048A16A3@cisco.com> <E8355113905631478EFF04F5AA706E9830F1D4A7@wtl-exchp-2.sandvine.com> <E8355113905631478EFF04F5AA706E9830F20863@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F20863@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.131.118.100]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <EF1F82DA8216F746BE33456A41FFC383@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/SLWTtT4xBsG2G5wYTvWuz2RgDt4>
Cc: "uri.elzur@intel.com" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 17:03:41 -0000

Hi Dave,

Sorry, I was traveling yesterday.  In principal I don't have any issues wit=
h the text since it doesn't impose requirements but rather clarifies a poss=
ible behavior.

I do wonder about how common this will be: a control of sorts is needed for=
 semantic meaning -- in type 1 or type 2 cases.

Paul

> On Apr 14, 2016, at 9:33 AM, Dave Dolson <ddolson@sandvine.com> wrote:
>=20
> Paul and Uri, can you please comment as to whether you agree or disagree =
with this wording?
>=20
> I feel that it allows the actual content to be opaque while giving guidan=
ce for
> service functions that create or replay packets in the chain.
>=20
> From my point of view, this is how such devices will work anyhow.
>=20
> -Dave
>=20
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
> Sent: Wednesday, April 13, 2016 9:13 AM
> To: Paul Quinn (paulq); Ron Parker
> Cc: Thomas Narten; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Paul,
> Are you unhappy with the metadata constraints I suggested below?
> Perhaps qualified by "In the absence of out-of-band configuration..." ?
>=20
> I believe that the schemes proposed in these drafts satisfy the constrain=
ts:
> - draft-sfc-nsh-dc-allocation-4,=20
> - draft-napper-sfc-nsh-broadband-allocation-00=20
>=20
> (I thought there were more allocation schemes, but I guess they expired.)
>=20
> I'll update it here:
>=20
>   In the absence of out-of-band configuration to indicate otherwise,
>   metadata used in NSH headers must meet the condition that
>   a transport-layer-stateful Service Function can save away
>   metadata values that it has witnessed.  An injected packet can
>   therefore be assigned a clone of metadata taken from an earlier
>   packet going in the same direction.  For example, a Service Function
>   can send a TCP packet using metadata cloned from another TCP packet
>   of the same connection and direction.
>=20
>   Note that the Service Function need not know the meaning of the
>   metadata; it just needs to know it is safe to clone in this manner.
>=20
>=20
> -Dave
>=20
>=20


From nobody Thu Apr 14 10:20:37 2016
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F74B12DD5D for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 10:20:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HCjYCtN_wb-V for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 10:20:34 -0700 (PDT)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9E50812DD29 for <sfc@ietf.org>; Thu, 14 Apr 2016 10:20:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4897; q=dns/txt; s=iport; t=1460654434; x=1461864034; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=sbJwnbKNi8PNixI8BUNcmOa2NqicS/WAioOSM1LbxjM=; b=kNCYBNXSzFKE0bI/arrOIkTKYgEAGaB4mo9uZcwPJB7pIVTr6ykBECsp gCGLaxCPEwQ+lQl8yML6MFeAi7OPKUaPG3D62rglzJ+OZPTg71+oSEo1G h3PhUhh7qLGxKFsP9nZCQyakXDKQSxKgeGbJUZMKzVWw4bQS7sbCsEqIV o=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AMAgC+0A9X/4QNJK1egziBUAa6KQENg?= =?us-ascii?q?XGGDgKBPTgUAQEBAQEBAWUnhEEBAQEDAR0dMQ4FCwIBCBgeEDIlAgQOBRuIBgj?= =?us-ascii?q?CbAEBAQEBAQEBAQEBAQEBAQEBAQEBARWGIYF1glaEDi+DLYIrBZMdhG4BjgwKg?= =?us-ascii?q?V2ETohbhiGJBwEeAQFCg2dsiEh+AQEB?=
X-IronPort-AV: E=Sophos;i="5.24,485,1454976000"; d="scan'208";a="260006594"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 14 Apr 2016 17:20:33 +0000
Received: from XCH-RCD-007.cisco.com (xch-rcd-007.cisco.com [173.37.102.17]) by alln-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id u3EHKX4j024041 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 14 Apr 2016 17:20:33 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-007.cisco.com (173.37.102.17) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 14 Apr 2016 12:20:33 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Thu, 14 Apr 2016 12:20:32 -0500
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: "Bottorff, Paul" <paul.bottorff@hpe.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfXi0m0zbDrFUiQMfrqrpCL9J+I3xSAgAFCswA=
Date: Thu, 14 Apr 2016 17:20:32 +0000
Message-ID: <E98F1C7D-0F3D-4F90-94F6-48061643E797@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <TU4PR84MB015931A06895E5B3094D1668FE960@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM>
In-Reply-To: <TU4PR84MB015931A06895E5B3094D1668FE960@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.131.118.100]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <6AA2C6232E3B6F4D9889A2658C3EDCFB@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/DVgFuwzO010XkXYoLaZO3hxTfk8>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 17:20:36 -0000

Paul B.

Some comments inline.



> On Apr 13, 2016, at 6:05 PM, Bottorff, Paul <paul.bottorff@hpe.com> wrote=
:
>=20
> Hi Thomas:
>=20
> I do not support last call on draft-eitf-sfc-nsh-04. The risk of rushing =
to close a format before we have clear agreement on the forwarding principl=
es and features is just too high.
>=20
> The major problems with the current draft are:=20
> 1)the service address formed by the combined SPI+SI appears to have a num=
ber of deficiencies which lead to transport dependencies and to layer viola=
tions,

PQ>  You draw this broad stoke, however, it is relatively unsubstantiated w=
ith technical facts.  The WG discussed the representation of the SPI/SI pri=
or to NSH adoption.  The SPI/SI are not transport values -- and please don'=
t conflate transport (and the associated requirements) with address family.=
 =20


> 2)there is no resolution to forward/reverse addressing necessary for supp=
ort of many L4-high service functions,

PQ> That is factually incorrect and I think derives from your opinion that =
SPI/SI =3D=3D address family: in general, you can create two unidirectional=
 chains and use them for forward and reverse traffic.  This has been review=
ed with /by  L4+ vendors/experts.


> 3)there is no resolution to encoding hierarchies which are of importance =
to SFC applications in NFV environments,

PQ> Encoding hierarchies is an optimization of the base protocol to support=
 scaling in a large deployment; in any case such optimization does not requ=
ire changes to the base SFC encapsulation.

> 4)the draft needs a transport service interface and a description of the =
mappings used for the service layer onto the transport layer,

PQ> I am not sure what you mean by "transport service interface" - it is tr=
ue that the SPI/SI need to map to a transport layer forwarding entry but I =
don't know what you are implying.


> 5)the draft specifies two independent formats for encoding the NSH header=
 which is likely to divide the market slowing the deployment of NSH.

PQ>  The draft actually specifies two metadata formats for flexibility and =
the market will decide which is most appropriate based on specific use case=
s.  The evidence is clear: a wide-range of _implementations_ already exist.=
 In fact, the real impediment to deployment is esoteric opinion.



>=20
>> From my point of view the SFC formed service plane layer network with a =
peer dialog between the SCF, SFF and SF.  The Service Path Header (SPI+SI) =
forms the address for this service plane. As it stands there is an attempt =
to overload the function of the SI as both the SF identifier with the Servi=
ce Path and as a form of loop detection, however the coupling has resulted =
in two problems:=20
> 1)Since every SF in a path must have a sequential SI, in the event we nee=
d to insert or delete a SF it is necessary to update the SFF forwarding ent=
ries for the entire chain. To fix this either the SI should be allowed to t=
ake non-sequential values along the chain or should not be used for SF addr=
essing.

PQ> This is not a true statement; if an SF needs to be added or deleted the=
n it is necessary to update the SFF forwarding entries for all SFFs downstr=
eam of where the change occurs.=20


> 2)Since the SI is only decremented on SF hops it can't guard against a lo=
op between SFFs or SCFs, hence SI is not a reliable method for loop squelch=
ing. If a TTL is needed it needs to be separated from SI. Given that there =
is no clear alternative to TTL for loop squelching at the service layer I b=
elieve we do need to include an effective TTL to go forward.

PQ> The SI can provide a simple loop check within the serivce plane but it'=
s primary semantic value is one of location.  The transport itself can prov=
ide loop detection as well as SFF verification of SPI/SI + source. =20


> 3)Every other successful address space has needed to add a few bits to su=
pport QoS options. I would suggest taking 3-4 bits from the MD-type and to =
reserve for QoS handling.

PQ>  Again, this is blurring the lines: QoS is handled, as expected by the =
selection transport.  This is a feature, not a bug, architecturally speakin=
g. =20

> 4)In may data centers we have multi-vendor deployments. In these environm=
ents we may have different managers assigning chains. There should to be so=
me convention for splitting the address space between these vendors. The mo=
st desirable solution to this is to add an assigned organization ID to the =
address space. An alternative would be to separate the SPI into a 4 and 20 =
bit field designating the high 4 bits as a local manager ID.
>=20

PQ>  You are conflating federation/configuration and frame format.  The mul=
ti-manager scenario is a control-plane/management-plane function.=


From nobody Thu Apr 14 11:27:54 2016
Return-Path: <louis.fourie@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0EA812DE8F for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 11:27:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.217
X-Spam-Level: 
X-Spam-Status: No, score=-5.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Oitbc4Jl0u1C for <sfc@ietfa.amsl.com>; Thu, 14 Apr 2016 11:27:50 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 75FB612DE8B for <sfc@ietf.org>; Thu, 14 Apr 2016 11:27:49 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml704-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CHL06968; Thu, 14 Apr 2016 18:27:47 +0000 (GMT)
Received: from SJCEML702-CHM.china.huawei.com (10.218.25.35) by lhreml704-cah.china.huawei.com (10.201.5.130) with Microsoft SMTP Server (TLS) id 14.3.235.1; Thu, 14 Apr 2016 19:27:46 +0100
Received: from SJCEML701-CHM.china.huawei.com ([169.254.3.126]) by SJCEML702-CHM.china.huawei.com ([169.254.4.137]) with mapi id 14.03.0235.001;  Thu, 14 Apr 2016 11:27:42 -0700
From: Henry Fourie <louis.fourie@huawei.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>, "Bottorff, Paul" <paul.bottorff@hpe.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivgDMsOkopwHd0anrI1vjTQhzZ+JAJuAgAFCswD//5tbsA==
Date: Thu, 14 Apr 2016 18:27:40 +0000
Message-ID: <0F8583BBE82FA449A8B78417CC07559A09559A80@SJCEML701-CHM.china.huawei.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <TU4PR84MB015931A06895E5B3094D1668FE960@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <E98F1C7D-0F3D-4F90-94F6-48061643E797@cisco.com>
In-Reply-To: <E98F1C7D-0F3D-4F90-94F6-48061643E797@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.47.136.28]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020201.570FE123.0269, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.3.126, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: f00e12aefba01234b913f67e0c7526fe
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/tDdDhCGQ0dph0cCP5K6iscfaBSI>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 18:27:53 -0000

Paul,
   Updating SFF forwarding entries on all downstream SFFs can introduce dis=
ruption
of traffic on the service path. It would help if there is a mechanism where=
 a=20
chain update to add/remove an SF can be localized to its subtending SFF onl=
y.

 - Louis=20


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Paul Quinn (paulq)
Sent: Thursday, April 14, 2016 10:21 AM
To: Bottorff, Paul
Cc: Thomas Narten; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Paul B.

Some comments inline.



> On Apr 13, 2016, at 6:05 PM, Bottorff, Paul <paul.bottorff@hpe.com> wrote=
:
>=20
> Hi Thomas:
>=20
> I do not support last call on draft-eitf-sfc-nsh-04. The risk of rushing =
to close a format before we have clear agreement on the forwarding principl=
es and features is just too high.
>=20
> The major problems with the current draft are:=20
> 1)the service address formed by the combined SPI+SI appears to have a num=
ber of deficiencies which lead to transport dependencies and to layer viola=
tions,

PQ>  You draw this broad stoke, however, it is relatively unsubstantiated w=
ith technical facts.  The WG discussed the representation of the SPI/SI pri=
or to NSH adoption.  The SPI/SI are not transport values -- and please don'=
t conflate transport (and the associated requirements) with address family.=
 =20


> 2)there is no resolution to forward/reverse addressing necessary for supp=
ort of many L4-high service functions,

PQ> That is factually incorrect and I think derives from your opinion that =
SPI/SI =3D=3D address family: in general, you can create two unidirectional=
 chains and use them for forward and reverse traffic.  This has been review=
ed with /by  L4+ vendors/experts.


> 3)there is no resolution to encoding hierarchies which are of importance =
to SFC applications in NFV environments,

PQ> Encoding hierarchies is an optimization of the base protocol to support=
 scaling in a large deployment; in any case such optimization does not requ=
ire changes to the base SFC encapsulation.

> 4)the draft needs a transport service interface and a description of the =
mappings used for the service layer onto the transport layer,

PQ> I am not sure what you mean by "transport service interface" - it is tr=
ue that the SPI/SI need to map to a transport layer forwarding entry but I =
don't know what you are implying.


> 5)the draft specifies two independent formats for encoding the NSH header=
 which is likely to divide the market slowing the deployment of NSH.

PQ>  The draft actually specifies two metadata formats for flexibility and =
the market will decide which is most appropriate based on specific use case=
s.  The evidence is clear: a wide-range of _implementations_ already exist.=
 In fact, the real impediment to deployment is esoteric opinion.



>=20
>> From my point of view the SFC formed service plane layer network with a =
peer dialog between the SCF, SFF and SF.  The Service Path Header (SPI+SI) =
forms the address for this service plane. As it stands there is an attempt =
to overload the function of the SI as both the SF identifier with the Servi=
ce Path and as a form of loop detection, however the coupling has resulted =
in two problems:=20
> 1)Since every SF in a path must have a sequential SI, in the event we nee=
d to insert or delete a SF it is necessary to update the SFF forwarding ent=
ries for the entire chain. To fix this either the SI should be allowed to t=
ake non-sequential values along the chain or should not be used for SF addr=
essing.

PQ> This is not a true statement; if an SF needs to be added or deleted the=
n it is necessary to update the SFF forwarding entries for all SFFs downstr=
eam of where the change occurs.=20


> 2)Since the SI is only decremented on SF hops it can't guard against a lo=
op between SFFs or SCFs, hence SI is not a reliable method for loop squelch=
ing. If a TTL is needed it needs to be separated from SI. Given that there =
is no clear alternative to TTL for loop squelching at the service layer I b=
elieve we do need to include an effective TTL to go forward.

PQ> The SI can provide a simple loop check within the serivce plane but it'=
s primary semantic value is one of location.  The transport itself can prov=
ide loop detection as well as SFF verification of SPI/SI + source. =20


> 3)Every other successful address space has needed to add a few bits to su=
pport QoS options. I would suggest taking 3-4 bits from the MD-type and to =
reserve for QoS handling.

PQ>  Again, this is blurring the lines: QoS is handled, as expected by the =
selection transport.  This is a feature, not a bug, architecturally speakin=
g. =20

> 4)In may data centers we have multi-vendor deployments. In these environm=
ents we may have different managers assigning chains. There should to be so=
me convention for splitting the address space between these vendors. The mo=
st desirable solution to this is to add an assigned organization ID to the =
address space. An alternative would be to separate the SPI into a 4 and 20 =
bit field designating the high 4 bits as a local manager ID.
>=20

PQ>  You are conflating federation/configuration and frame format.  The mul=
ti-manager scenario is a control-plane/management-plane function.
_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Fri Apr 15 09:42:59 2016
Return-Path: <prvs=90649d16f=S.Majee@f5.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA6AC12DE03 for <sfc@ietfa.amsl.com>; Fri, 15 Apr 2016 09:42:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.017
X-Spam-Level: 
X-Spam-Status: No, score=-8.017 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=f5.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P_AqgpY3osxO for <sfc@ietfa.amsl.com>; Fri, 15 Apr 2016 09:42:53 -0700 (PDT)
Received: from mail.f5.com (mail.f5.com [208.85.209.139]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8FBE612DDDB for <sfc@ietf.org>; Fri, 15 Apr 2016 09:42:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=f5.com; i=@f5.com; q=dns/txt; s=seattle; t=1460738573; x=1492274573; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=OmTfBIzenWQKwVPClcLv/49/J88s2FymX6UO+4VRn5o=; b=LxbY5F498/0tMPeQoTx3gY7R/iK4RbdRdDMXNV3tb0iqagGEp48cH/Sp NI2WfLD/3d6po48hoCEy2RYjbMPKavYbG7mIpEdPALNR+p2rq5bj3iwr1 COb0UVkVgOuoypfFiQmRSnWVZbR/2BT3HRh8HrR8oCaTwqidVSqjRM3dG M=;
X-IronPort-AV: E=Sophos;i="5.24,488,1454976000"; d="scan'208";a="213981343"
Received: from oracle-apps.f5net.com (HELO exchmail.f5net.com) ([192.168.10.235]) by mail.f5.com with ESMTP/TLS/AES256-SHA; 15 Apr 2016 16:42:53 +0000
Received: from SEAEXCHMBX02.olympus.F5Net.com (192.168.15.224) by SEAEXCHMBX08.olympus.F5Net.com (192.168.15.227) with Microsoft SMTP Server (TLS) id 15.0.1156.6; Fri, 15 Apr 2016 09:42:52 -0700
Received: from SEAEXCHMBX02.olympus.F5Net.com ([fe80::dd5e:c398:17d9:927f]) by seaexchmbx02.olympus.F5Net.com ([fe80::dd5e:c398:17d9:927f%13]) with mapi id 15.00.1156.000; Fri, 15 Apr 2016 09:42:52 -0700
From: Sumandra Majee <S.Majee@F5.com>
To: "Bottorff, Paul" <paul.bottorff@hpe.com>, Nilanjan Sarkar <nsarkar@sandvine.com>
Thread-Topic: [sfc] A request for Metadata allocation schemes
Thread-Index: AdGQDZcInpioWvGORw+Jt9cutzS71wA06k3BABaJqpAABVdClwAYRqoAAAgzRgABWIwR5Q==
Date: Fri, 15 Apr 2016 16:42:52 +0000
Message-ID: <1460738575691.54747@F5.com>
References: <E8355113905631478EFF04F5AA706E9830F0AC6D@wtl-exchp-2.sandvine.com> <1460042865963.25707@F5.com>, <E8355113905631478EFF04F5AA706E9830F11EA7@wtl-exchp-2.sandvine.com>, <1460091126273.230@F5.com> <1D15709113D6B34BAE5E128F392059CA01268568BE@blr-exch-1.sandvine.com>, <TU4PR84MB01596CB74B2CC2D7395C545BFE910@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM>
In-Reply-To: <TU4PR84MB01596CB74B2CC2D7395C545BFE910@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.168.15.239]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/MSc6RvkbU0NaK4nJ0ID5qi_S2aI>
Cc: "sfc@ietf.org" <sfc@ietf.org>, Dave Dolson <ddolson@sandvine.com>
Subject: Re: [sfc] A request for Metadata allocation schemes
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Apr 2016 16:42:56 -0000

RGF2ZSwgUGF1bCBhbmQgTmlsYW5qYW4sCgpJIGFtIG5vdCBvcHBvc2VkIHRvIGhhdmluZyBhIGRp
cmVjdGlvbiBiaXQgaW4gdGhlIG1ldGFkYXRhLCB5ZXMgaXQgbWlnaHQgYmVjb21lIG5lY2Vzc2l0
eSBpbiBjZXJ0YWluIHNpdHVhdGlvbi4gSSBhbSBub3Qgc3VyZSBpZiB3ZSBuZWVkIHRoaXMgc2Vu
c2Ugb2YgZGlyZWN0aW9uIGZvciBtYWpvcml0eSBvZiB1c2UgY2FzZXMuCgpJIGFtIGdlbmVyYWxs
eSBvcHBvc2VkIHRvIHN0YW5kYXJkaXppbmcgbWV0YWRhdGEgYWxsb2NhdGlvbiB0aGlzIGVhcmx5
LgoKV2hhdCBJIHdvdWxkIHJlYWxseSBsaWtlIHRvIGhhdmUgYSBtZXRhZGF0YSByZWdpc3RyeSBh
bmQgYSBzY2hlbWUgZm9yIHRoYXQuICAKX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fXwpGcm9tOiBCb3R0b3JmZiwgUGF1bCA8cGF1bC5ib3R0b3JmZkBocGUuY29tPgpTZW50
OiBGcmlkYXksIEFwcmlsIDgsIDIwMTYgNjoxMCBBTQpUbzogTmlsYW5qYW4gU2Fya2FyOyBTdW1h
bmRyYSBNYWplZQpDYzogRGF2ZSBEb2xzb247IHNmY0BpZXRmLm9yZwpTdWJqZWN0OiBSRTogW3Nm
Y10gQSByZXF1ZXN0IGZvciBNZXRhZGF0YSBhbGxvY2F0aW9uIHNjaGVtZXMKCkhpIE5pbGFuamFu
LCBTdW1hbmRyYSwgRGF2ZToKCkFncmVlZCwgdGhlIGNhc2Ugd2hlcmUgdGhlcmUgYXJlIHR3byBw
b3J0cyAob3IgdHdvIHZOSUNzKSwgdGhlbiB3ZSBjYW4gdXNlIHRoZSBTQSAob3IgU0lQKSB0byBk
ZXRlcm1pbmUgdGhlIGRpcmVjdGlvbi4KClRob3VnaCB0aGlzIGRvZXMgbm90IHdvcmsgZm9yIGEg
c2luZ2xlIGFybWVkIFNGIEkgc3VzcGVjdCB0aGUgU0ZzIHdoaWNoIG5lZWQgdG8gZm9ybSByZXZl
cnNlIHBhdGhzIGFyZSBkdWFsIGFybWVkIHRvZGF5LiBJZiB3ZSBzaW1wbHkgc2F5IHRoYXQgU0Zz
IHdoaWNoIG5lZWQgdG8gcmV2ZXJzZSBkaXJlY3Rpb25zIGFsc28gbmVlZCB0byBiZSBkdWFsIGFy
bWVkLCB0aGVuIHRoaXMgY291bGQgYmUgYSB1bml2ZXJzYWwgc29sdXRpb24uIFRoZSBvdGhlciBu
aWNlIHRoaW5nIGFib3V0IGl0IGlzIHRoYXQgaXQgd29ya3MgZm9yIG11bHRpLWFybWVkIGJyYW5j
aGluZyBhbHNvLiBTbyBpZiBJIGhhdmUgYW4gU0Ygd2l0aCBOIGVncmVzcyBwb3J0cyAob3Igdk5J
Q3MpIHRoZW4gdGhlIFNGIGNhbiBicmFuY2ggTiB3YXlzIHNpbXBseSBieSBzZW5kaW5nIHRvIHRo
ZSBjb3JyZWN0IGVncmVzcyBwb3J0LiBUaGlzIHNlZW1zIG5hdHVyYWwgZnJvbSBhbiBTRiBjb2Rp
bmcgcG9pbnQgb2Ygdmlldy4KCkNoZWVycywKClBhdWwKCi0tLS0tT3JpZ2luYWwgTWVzc2FnZS0t
LS0tCkZyb206IHNmYyBbbWFpbHRvOnNmYy1ib3VuY2VzQGlldGYub3JnXSBPbiBCZWhhbGYgT2Yg
TmlsYW5qYW4gU2Fya2FyClNlbnQ6IEZyaWRheSwgQXByaWwgMDgsIDIwMTYgMjoxNiBBTQpUbzog
U3VtYW5kcmEgTWFqZWUgPFMuTWFqZWVARjUuY29tPgpDYzogRGF2ZSBEb2xzb24gPGRkb2xzb25A
c2FuZHZpbmUuY29tPjsgc2ZjQGlldGYub3JnClN1YmplY3Q6IFJlOiBbc2ZjXSBBIHJlcXVlc3Qg
Zm9yIE1ldGFkYXRhIGFsbG9jYXRpb24gc2NoZW1lcwoKV2lsbCBhIFNGIGRldmljZSBoYXZlIDIg
cG9ydHM/IFByb2JsZW0gd2FzIHRvIGZpbmQgYW4gIElQIHBhY2tldCBkaXJlY3Rpb24gaW4gYSBz
aW5nbGUgcG9ydCBTRiBkZXZpY2UuIEluIGNhc2UgdGhlcmUgYXJlIDIgcG9ydHMsIG9uZSBpcyBj
b25uZWN0ZWQgdG8gc3Vic2NyaWJlcnMgYW5kIGFub3RoZXIgaXMgY29ubmVjdGVkIHRvIGludGVy
bmV0LCB0aGVuIHRoZXJlIGlzIG5vIGlzc3VlLgoKUmVnYXJkcywKTmlsYW5qYW4KKHNlbnQgZnJv
bSBteSBtb2JpbGUgcGhvbmUpCgpPbiA4IEFwciAyMDE2IDEwOjIyLCBTdW1hbmRyYSBNYWplZSA8
Uy5NYWplZUBGNS5jb20+IHdyb3RlOgoK4oCLSSB0aGluayB0aGUgcGFydCBvZiB0aGUgcHJvYmxl
bSBsaWVzIGluIHRoZSBkZWZpbml0aW9uIG9mIFVQIGFuZCBET1dOLiBTbyBsZXRzIHRha2Ugc29t
ZSB1c2UgY2FzZXMuCgoKYSkgSW4gY2FzZSBvZiBzZXJ2aWNlIHByb3ZpZGVyIG1hbnkgZnVuY3Rp
b25zIHNpdHMgYXQgdGhlIGJvcmRlciBiZXR3ZWVuIG5ldHdvcmsvaW50ZXJuZXQgIGFuZCBzdWJz
Y3JpYmVyL3VzZXIuIFR5cGljYWxseSB0aGUgdHdvIHNpZGVzIG9mIHRoZSBib3JkZXIgaXMgZGVm
aW5lZCBieSB3YXkgb2YgY29uZmlndXJhdGlvbiwgdGhpcyBpbnRlcmZhY2UvdHVubmVsIHBvaW50
IHRvIHN1YnNjcmliZXIgc2lkZSBhbmQgdGhhdCBwb2ludHMgdG8gdGhlIGludGVybmV0LiBBbnl0
aGluZyBpbmdyZXNzIG9uIHN1YnNjcmliZXIgc2lkZSBpcyBGUk9NIHN1YnNjcmliZXIgYW5kIHZp
Y2UgdmVyc2EuIFRoZSBVUCBvciBET1dOIGlzIG5vdCBzbyB1c2VmdWwuCgoKYikgQ29uc2lkZXIg
YSB0eXBpY2FsIGNsaWVudCBzZXJ2ZXIuICBBc3N1bWluZyB5b3UgbWVhbiBVUDogY2xpZW50IC0+
c2VydmVyL2ZpbmFsIGRlc3RpbmF0aW9uIGFuZCBET1dOIHRoZSBvdGhlciB3YXkuIEEgZmxvdyBh
d2FyZSBzZXJ2aWNlIHdvdWxkIGhhdmUgc3RhdGUgU0lQLT5ESVAgYXMgVVAgYW5kIERJUC0+U0lQ
IGFzIERPV04uIE90aGVycyBsaWtlIHJvdXRlciBldGMuIG1heSBub3QgY2FyZSBhdCBhbGwgYW5k
IHRoYXQgaXMgZmluZS4KCgpJbiBjYXNlIG9mIHNlY3VyaXR5IGRldmljZSB0aGUgaW5ib3VuZCBh
bmQgb3V0Ym91bmQgKG9yIHpvbmVzKSBhcmUgZGVmaW5lZCBieSBjb25maWd1cmF0aW9uIHRoYXQg
aXMgbG9jYWwgdG8gdGhhdCBlbnRpdHkuIFNvIGhhdmluZyBhIGNsYXNzaWZpZXIgc2F5IElOIG9y
IE9VVCB3b3VsZCBiZSB3cm9uZyBpbiB0aGF0IGNhc2UuCgoKU3VtYW5kcmEKCl9fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fCkZyb206IERhdmUgRG9sc29uIDxkZG9sc29uQHNhbmR2aW5l
LmNvbT4KU2VudDogVGh1cnNkYXksIEFwcmlsIDcsIDIwMTYgNzoxMSBQTQpUbzogU3VtYW5kcmEg
TWFqZWU7IHNmY0BpZXRmLm9yZwpTdWJqZWN0OiBSRTogQSByZXF1ZXN0IGZvciBNZXRhZGF0YSBh
bGxvY2F0aW9uIHNjaGVtZXMKClN1bWFuZHJhIChhbmQgb3RoZXJzIHdobyBoYXZlIHF1ZXN0aW9u
ZWQgdGhpcyksIFdoYXQgZG8geW91IG1lYW4gYnkgZGV0ZWN0aW5nIGRpcmVjdGlvbiBmcm9tIHRo
ZSBlbmNhcHN1bGF0ZWQgcGFja2V0PwpJ4oCZbSBoYXZpbmcgdHJvdWJsZSB1bmRlcnN0YW5kaW5n
IGhvdyBvbmUgY291bGQgdGVsbCBmcm9tIGFuIGFyYml0cmFyeSBJUCBwYWNrZXQgd2hpY2ggZGly
ZWN0aW9uIGl0IGlzIGdvaW5nLgooVW5sZXNzIGtub3dpbmcgdGhlIElQIGFkZHJlc3MgYWxsb2Nh
dGlvbiBzY2hlbWUgaW4gdGhlIGlubmVyIG5ldHdvcmvigKY/ICBUaGF0IHdvdWxkIGJlIGFyZHVv
dXMuKQoKQW5kIHBvc3NpYmx5IGluLWJvdW5kLCBvdXQtYm91bmQgYXJlIGJldHRlciBuYW1lcz8K
SSBkb27igJl0IGxpa2UgZm9yd2FyZC9yZXZlcnNlIGJlY2F1c2UgSSBjYW7igJl0IGd1ZXNzIHdo
aWNoIGlzIHdoaWNoLgoKLURhdmUKCkZyb206IFN1bWFuZHJhIE1hamVlIFttYWlsdG86Uy5NYWpl
ZUBGNS5jb21dClNlbnQ6IFRodXJzZGF5LCBBcHJpbCAwNywgMjAxNiAxMjoyNyBQTQpUbzogRGF2
ZSBEb2xzb247IHNmY0BpZXRmLm9yZwpTdWJqZWN0OiBSZTogQSByZXF1ZXN0IGZvciBNZXRhZGF0
YSBhbGxvY2F0aW9uIHNjaGVtZXMKCgrigItEYXZlLAoKCgpUaGUgdXNlIGNhc2UgeW91IGhhdmUg
ZGVmaW5lZCBpcyBzdXBwb3J0ZWQgYnkgbW9zdCBkZXZpY2VzIGJ5IGJpbmRpbmcgcG9saWNpZXMg
ZXhwbGljaXRseSBvbiwKCiAgIGEpIGludGVyZmFjZSBvciBlcXVpdmFsZW50CgogICBiKSBmbG93
IGRpcmVjdGlvbi4gTW9zdCBmbG93IGF3YXJlIGRldmljZXMgaGFzIHRvIGRldGVjdCB0byBhbmQg
ZnJvbSBjb3JyZWN0bHkgdG8gZG8gbG90IG9mIHRobmdzIGNvcnJlY3RseS4KCgoKU28gdGhlIHF1
ZXN0aW9uIGlzIHdoYXQgZG8gd2UgZ2V0IGJ5IGFkZGluZyB0aGlzIGJpdD8gSSBhbSBvcHBvc2Vk
IHRvIHRoZSB0ZXJtIFVQIGFuZCBET1dOIChmcm9tIHNob3cgcG9pbnQgb2Ygdmlldz8pLCByYXRo
ZXIgZm9yd2FyZCBhbmQgcmV2ZXJzZSAoZXZlbiB0aGF0IGlzIGNvbmZ1c2luZykuCgoKClN1bWFu
ZHJhCgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwpGcm9tOiBzZmMgPHNmYy1ib3Vu
Y2VzQGlldGYub3JnPG1haWx0bzpzZmMtYm91bmNlc0BpZXRmLm9yZz4+IG9uIGJlaGFsZiBvZiBE
YXZlIERvbHNvbiA8ZGRvbHNvbkBzYW5kdmluZS5jb208bWFpbHRvOmRkb2xzb25Ac2FuZHZpbmUu
Y29tPj4KU2VudDogV2VkbmVzZGF5LCBBcHJpbCA2LCAyMDE2IDc6MTMgQU0KVG86IHNmY0BpZXRm
Lm9yZzxtYWlsdG86c2ZjQGlldGYub3JnPgpTdWJqZWN0OiBbc2ZjXSBBIHJlcXVlc3QgZm9yIE1l
dGFkYXRhIGFsbG9jYXRpb24gc2NoZW1lcwoKVG8gdGhvc2UgYXV0aG9ycyBvZiBtZXRhZGF0YSBh
bGxvY2F0aW9ucywgSSBoYXZlIGEgcmVxdWVzdC4KSSBiZWxpZXZlIG1hbnkgdHlwZXMgb2Ygc2Vy
dmljZSBmdW5jdGlvbnMgYXJlIGdvaW5nIHRvIHdhbnQgdG8gZGlzdGluZ3Vpc2ggdXAtbGluayB0
cmFmZmljIGZyb20gZG93bi1saW5rIHRyYWZmaWMuCkUuZy4sIGEgc2VjdXJpdHkgZGV2aWNlIHRy
ZWF0cyBpbi1ib3VuZCB0byB0aGUgcHJvdGVjdGVkIGRldmljZSBkaWZmZXJlbnRseSBmcm9tIG91
dC1ib3VuZC4KRS5nLiwgYW4gYWNjb3VudGluZyBzeXN0ZW0gbmVlZHMgdG8ga25vdyB3aGV0aGVy
IHRvIGNoYXJnZSB0aGUgc291cmNlIG9yIGRlc3RpbmF0aW9uIG5vZGUuCgpTbyBteSByZXF1ZXN0
IGlzIHRvIGFsbG9jYXRlIGEgYml0IGZvciB1cC1saW5rL2Rvd24tbGluayBkaXNjcmltaW5hdGlv
bi4KSSB0aGluayB0aGUgYWx0ZXJuYXRpdmUgaXMgdG8gY29uZmlndXJlIGVhY2ggU0YgYWJvdXQg
ZWFjaCBwYXRoIHdoZXRoZXIgaXQgaXMgdXAgb3IgZG93biwgb3IgdG8gdXNlIHNvbWV0aGluZyBs
aWtlIGFuIGV2ZW4vb2RkIHBhdGggSUQgc2NoZW1lLgoKRG9lcyBhbnlvbmUgZWxzZSBzZWUgdGhp
cyBhcyB1c2VmdWw/CgpJIGJlbGlldmUgYWxsIG9mIHRoZSBhbGxvY2F0aW9uIGRyYWZ0cyBoYXZl
IHJlc2VydmVkIGJpdHMuCgoKRGF2aWQgRG9sc29uClNlbmlvciBTb2Z0d2FyZSBBcmNoaXRlY3QK
U2FuZHZpbmUKCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
CnNmYyBtYWlsaW5nIGxpc3QKc2ZjQGlldGYub3JnCmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxt
YW4vbGlzdGluZm8vc2ZjCg==


From nobody Fri Apr 15 09:49:47 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 298B512D5D4 for <sfc@ietfa.amsl.com>; Fri, 15 Apr 2016 09:49:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level: 
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FYbvkLVOcJy5 for <sfc@ietfa.amsl.com>; Fri, 15 Apr 2016 09:49:43 -0700 (PDT)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) by ietfa.amsl.com (Postfix) with ESMTP id A6EE512D194 for <sfc@ietf.org>; Fri, 15 Apr 2016 09:49:42 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by wtl-exchp-1.sandvine.com ([::1]) with mapi id 14.03.0195.001; Fri, 15 Apr 2016 12:49:41 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: Sumandra Majee <S.Majee@F5.com>
Thread-Topic: [sfc] A request for Metadata allocation schemes
Thread-Index: AdGQDZcInpioWvGORw+Jt9cutzS71wA06k3BABaJqpAABVdClwAR/VYAAAgzRwABZ3a4AAAIWBNg
Date: Fri, 15 Apr 2016 16:49:40 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F2432E@wtl-exchp-2.sandvine.com>
References: <E8355113905631478EFF04F5AA706E9830F0AC6D@wtl-exchp-2.sandvine.com> <1460042865963.25707@F5.com>, <E8355113905631478EFF04F5AA706E9830F11EA7@wtl-exchp-2.sandvine.com>, <1460091126273.230@F5.com> <1D15709113D6B34BAE5E128F392059CA01268568BE@blr-exch-1.sandvine.com>, <TU4PR84MB01596CB74B2CC2D7395C545BFE910@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <1460738575691.54747@F5.com>
In-Reply-To: <1460738575691.54747@F5.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/TOlJFab-TKslhwWMeOz2xHpkPBg>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] A request for Metadata allocation schemes
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Apr 2016 16:49:45 -0000
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From nobody Fri Apr 15 14:36:44 2016
Return-Path: <paul.bottorff@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D8B2F12D507 for <sfc@ietfa.amsl.com>; Fri, 15 Apr 2016 14:36:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aCe3UthfxGED for <sfc@ietfa.amsl.com>; Fri, 15 Apr 2016 14:36:40 -0700 (PDT)
Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1bon0759.outbound.protection.outlook.com [IPv6:2a01:111:f400:fc10::1:759]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6AE8D12D5BD for <sfc@ietf.org>; Fri, 15 Apr 2016 14:36:37 -0700 (PDT)
Received: from TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM (10.162.187.152) by TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM (10.162.187.152) with Microsoft SMTP Server (TLS) id 15.1.453.26; Fri, 15 Apr 2016 21:36:21 +0000
Received: from TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM ([10.162.187.152]) by TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM ([10.162.187.152]) with mapi id 15.01.0453.030; Fri, 15 Apr 2016 21:36:21 +0000
From: "Bottorff, Paul" <paul.bottorff@hpe.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>, "Elzur, Uri" <uri.elzur@intel.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivflTl8PyB805kuSkB1naNwin5+IdPDQgAFZBQCAAcu2oA==
Date: Fri, 15 Apr 2016 21:36:20 +0000
Message-ID: <TU4PR84MB0159620F964FB90F0750531EFE680@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM>
References: <m3egarz7kh.wl-narten@us.ibm.com> <TU4PR84MB015931A06895E5B3094D1668FE960@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <E98F1C7D-0F3D-4F90-94F6-48061643E797@cisco.com>
In-Reply-To: <E98F1C7D-0F3D-4F90-94F6-48061643E797@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=hpe.com;
x-originating-ip: [15.211.195.7]
x-ms-office365-filtering-correlation-id: e4a09ae7-e0a2-4ffa-eb91-08d36575fc7a
x-microsoft-exchange-diagnostics: 1; TU4PR84MB0159; 5:WOuWip4XIb2mOyytI4kVjis8ejor46KbWvjIwLBNNPgjD4qiu5kJLIR8zFPYyAxwvHFtooQ3sJM5GjDkMTG1iNc6GisAXZ9wTr6O2oEHHxBIySdqbiICKmuKsFO2qMRdX+wrWaU1+Qm0EWQ0+PDyuA==; 24:kAaosUdsqyFGkWjeFVs4n3DYbroiGrhgFEdu2SEpTvjNuKk2unPdV7qNCN9fSmyOmdO+eMCWe0SN8XknnWAzfWkC0m+9majpPItkh7zS0lU=
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:TU4PR84MB0159;
x-microsoft-antispam-prvs: <TU4PR84MB01596C7245A10E44789AFEE7FE680@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM>
x-exchange-antispam-report-test: UriScan:(95692535739014);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(9101521026)(601004)(2401047)(5005006)(8121501046)(3002001)(10201501046)(6055026); SRVR:TU4PR84MB0159; BCL:0; PCL:0; RULEID:; SRVR:TU4PR84MB0159; 
x-forefront-prvs: 0913EA1D60
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(13464003)(24454002)(377454003)(2900100001)(9686002)(2906002)(2950100001)(106116001)(5003600100002)(586003)(4326007)(33656002)(81166005)(86362001)(5002640100001)(102836003)(50986999)(6116002)(3846002)(99286002)(122556002)(87936001)(3280700002)(3660700001)(11100500001)(5004730100002)(5001770100001)(5008740100001)(230783001)(19580395003)(19580405001)(76176999)(1096002)(77096005)(54356999)(1220700001)(92566002)(189998001)(10400500002)(66066001)(7059030); DIR:OUT; SFP:1102; SCL:1; SRVR:TU4PR84MB0159; H:TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM; FPR:; SPF:None; MLV:sfv; LANG:en; 
spamdiagnosticoutput: 1:23
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: hpe.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Apr 2016 21:36:20.9458 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc
X-MS-Exchange-Transport-CrossTenantHeadersStamped: TU4PR84MB0159
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/zZOUPG74g9u5fEA06r2Xfw3DFCE>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Apr 2016 21:36:43 -0000

Hi Paul Q.

Some responses to comments.

Cheers,

Paul

-----Original Message-----
From: Paul Quinn (paulq) [mailto:paulq@cisco.com]=20
Sent: Thursday, April 14, 2016 10:21 AM
To: Bottorff, Paul <paul.bottorff@hpe.com>
Cc: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Paul B.

Some comments inline.



> On Apr 13, 2016, at 6:05 PM, Bottorff, Paul <paul.bottorff@hpe.com> wrote=
:
>=20
> Hi Thomas:
>=20
> I do not support last call on draft-eitf-sfc-nsh-04. The risk of rushing =
to close a format before we have clear agreement on the forwarding principl=
es and features is just too high.
>=20
> The major problems with the current draft are:=20
> 1)the service address formed by the combined SPI+SI appears to have a num=
ber of deficiencies which lead to transport dependencies and to layer viola=
tions,

PQ>  You draw this broad stoke, however, it is relatively unsubstantiated w=
ith technical facts.  The WG discussed the representation of the SPI/SI pri=
or to NSH adoption.  The SPI/SI are not transport values -- and please don'=
t conflate transport (and the associated requirements) with address family.=
 =20
PB> I have never asserted that SPI+SI for a "transport" address. Please don=
't confuse what I've said. The modeling of SPI+SI as a service layer addres=
s is very soundly rooted in classic network layer modeling. It is the asser=
tion that that the service layer is independent from the "transport" layer =
below that indicates the SPI+SI form the address used by the service layer =
dialog. This address is mapped into the "transport" by mapping the SPI+SI i=
nto a transport tunnel and destination address.

> 2)there is no resolution to forward/reverse addressing necessary for supp=
ort of many L4-high service functions,

PQ> That is factually incorrect and I think derives from your opinion that =
SPI/SI =3D=3D address family: in general, you can create two unidirectional=
 chains and use them for forward and reverse traffic.  This has been review=
ed with /by  L4+ vendors/experts.
PB>We have a lot of work on both L4-higher SFs and proxy forwarders for L4-=
higher SFs for MAC Chaining and understand this problem in a lot of detail.=
 Having two unidirectional chains don't solve the forward/reverse traffic p=
roblem because the reverse path SPI/SI are not included in the NSH header a=
nd therefore not available at the time we need to reverse the forwarding di=
rection. Are you mandating every SF and Proxy be provisioned with the forwa=
rd and reverse SPI/SI? If so the solution is unacceptable to me. =20


> 3)there is no resolution to encoding hierarchies which are of importance =
to SFC applications in NFV environments,

PQ> Encoding hierarchies is an optimization of the base protocol to support=
 scaling in a large deployment; in any case such optimization does not requ=
ire changes to the base SFC encapsulation.
PB> A general stacking solution will require some type of support which I b=
elieve should be in the base header so the context words are kept clear for=
 pure meta-data.

> 4)the draft needs a transport service interface and a description of the =
mappings used for the service layer onto the transport layer,

PQ> I am not sure what you mean by "transport service interface" - it is tr=
ue that the SPI/SI need to map to a transport layer forwarding entry but I =
don't know what you are implying.
PB>You are trying to specify a "transport" independent layer, however have =
not specified what services the transport must provide to support the SFC l=
ayer. A service interface is one of the formalized ways to specify the feat=
ure requirements of the underlying layer.

> 5)the draft specifies two independent formats for encoding the NSH header=
 which is likely to divide the market slowing the deployment of NSH.

PQ>  The draft actually specifies two metadata formats for flexibility and =
the market will decide which is most appropriate based on specific use case=
s.  The evidence is clear: a wide-range of _implementations_ already exist.=
 In fact, the real impediment to deployment is esoteric opinion.
PB> This is always the last resort dodge we use in standards, however it al=
ways comes at the price of some market confusion and delay. Even though I c=
an accept this if no middle ground is possible, I don't think we have pushe=
d the parties hard enough toward a converged solution to give it up on it y=
et.

>=20
>> From my point of view the SFC formed service plane layer network with a =
peer dialog between the SCF, SFF and SF.  The Service Path Header (SPI+SI) =
forms the address for this service plane. As it stands there is an attempt =
to overload the function of the SI as both the SF identifier with the Servi=
ce Path and as a form of loop detection, however the coupling has resulted =
in two problems:=20
> 1)Since every SF in a path must have a sequential SI, in the event we nee=
d to insert or delete a SF it is necessary to update the SFF forwarding ent=
ries for the entire chain. To fix this either the SI should be allowed to t=
ake non-sequential values along the chain or should not be used for SF addr=
essing.

PQ> This is not a true statement; if an SF needs to be added or deleted the=
n it is necessary to update the SFF forwarding entries for all SFFs downstr=
eam of where the change occurs.=20
PB> Agreed, I stand corrected.


> 2)Since the SI is only decremented on SF hops it can't guard against a lo=
op between SFFs or SCFs, hence SI is not a reliable method for loop squelch=
ing. If a TTL is needed it needs to be separated from SI. Given that there =
is no clear alternative to TTL for loop squelching at the service layer I b=
elieve we do need to include an effective TTL to go forward.

PQ> The SI can provide a simple loop check within the serivce plane but it'=
s primary semantic value is one of location.  The transport itself can prov=
ide loop detection as well as SFF verification of SPI/SI + source. =20
PB> I both disagree that SI is useful for loop squeltching or that "transpo=
rt" TTL can stop service layer looping. To use the "transport" TTL  the fie=
ld would need to be copied from one "transport" to the next "transport" ove=
r the SFC service layer. Disregarding the fact that this operation is build=
ing a dependency between the "transport" and service layers, which we expre=
ssly are trying to avoid, the TTL fields of the transports are not sized to=
 allow for the expanded path lengths which could be created in chains. In a=
ddition, some of the transports like Ethernet only support TTL for in speci=
al cases (Ethernet only supports TTL when using F-Tag forwarding).

> 3)Every other successful address space has needed to add a few bits to su=
pport QoS options. I would suggest taking 3-4 bits from the MD-type and to =
reserve for QoS handling.

PQ>  Again, this is blurring the lines: QoS is handled, as expected by the =
selection transport.  This is a feature, not a bug, architecturally speakin=
g. =20
PB> Just the opposite, failing to add QoS to the NSH header is blurring the=
 lines between the service layer and the "transport" layer. Consider an a c=
hain which uses both a best effort and an expedited service. Next consider =
building the chain where each hop uses a different type of "transport". As =
we map from one "transport" to the next we may over some hops have less QoS=
 information than others. As we continue to the next "transport" we retain =
the integrity of the end-to-end communication by regenerating QoS from the =
original QoS contained at the service layer a driven down into the "transpo=
rt".=20

> 4)In may data centers we have multi-vendor deployments. In these environm=
ents we may have different managers assigning chains. There should to be so=
me convention for splitting the address space between these vendors. The mo=
st desirable solution to this is to add an assigned organization ID to the =
address space. An alternative would be to separate the SPI into a 4 and 20 =
bit field designating the high 4 bits as a local manager ID.
>=20

PQ>  You are conflating federation/configuration and frame format.  The mul=
ti-manager scenario is a control-plane/management-plane function.
PB> In a multi-manager situation I need a way to avoid collision in the all=
ocation of the SPI/SI space which is being independently allocated by diffe=
rent managers.


From nobody Fri Apr 15 14:54:55 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDEBA12D835 for <sfc@ietfa.amsl.com>; Fri, 15 Apr 2016 14:54:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zhhmmicaHaPb for <sfc@ietfa.amsl.com>; Fri, 15 Apr 2016 14:54:53 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EF0ED12D8C6 for <sfc@ietf.org>; Fri, 15 Apr 2016 14:54:52 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 695405A10EE; Fri, 15 Apr 2016 14:54:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1460757292; bh=Y6QZ7MrT9FYwQSlo6/qHp26xheWhZAnDRDQztz9Av/M=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=qqAINKl6hkQ+xOnJfyj5c+XF76ZH1IQN44CpwrwL/WXZIuUW0VO1mOg1fKeD6ElBO T1VW0Tli/ThesJmGyBY2yuWC18C+RxfIo7GHoze64AW1wK2WP7c+pBMR2394KPj+3+ Z5JvYFuax7Bn3EkB2FXeqCIlL2jLesCe779haMPw=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 584861C013B; Fri, 15 Apr 2016 14:54:51 -0700 (PDT)
To: "Bottorff, Paul" <paul.bottorff@hpe.com>, "Paul Quinn (paulq)" <paulq@cisco.com>, "Elzur, Uri" <uri.elzur@intel.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <TU4PR84MB015931A06895E5B3094D1668FE960@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <E98F1C7D-0F3D-4F90-94F6-48061643E797@cisco.com> <TU4PR84MB0159620F964FB90F0750531EFE680@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <5711631F.6000006@joelhalpern.com>
Date: Fri, 15 Apr 2016 17:54:39 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <TU4PR84MB0159620F964FB90F0750531EFE680@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/lPl_MQx8gtEc5ZJwp4O9Yd4aQA0>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Apr 2016 21:54:55 -0000

Paul B., just to make sure I am reading you correctly, on the issue of 
reverse direction SFPs, I believe the issue you are referring to is 
specifically the case of SFs which need to originate a packet back to 
the source of a packet the SF has processed?
While I think SFs can do better, it would seem that a properly 
configured classifier at the SFF service that SF can take care of that 
case.  Requiring that it be encoded in the SPI seems overkill.

Yours,
Joel

On 4/15/16 5:36 PM, Bottorff, Paul wrote:
> Hi Paul Q.
>
> Some responses to comments.
>
> Cheers,
>
> Paul
>
> -----Original Message-----
> From: Paul Quinn (paulq) [mailto:paulq@cisco.com]
> Sent: Thursday, April 14, 2016 10:21 AM
> To: Bottorff, Paul <paul.bottorff@hpe.com>
> Cc: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> Paul B.
>
> Some comments inline.
>
>
>
>> On Apr 13, 2016, at 6:05 PM, Bottorff, Paul <paul.bottorff@hpe.com> wrote:
>>
>> Hi Thomas:
>>
>> I do not support last call on draft-eitf-sfc-nsh-04. The risk of rushing to close a format before we have clear agreement on the forwarding principles and features is just too high.
>>
>> The major problems with the current draft are:
>> 1)the service address formed by the combined SPI+SI appears to have a number of deficiencies which lead to transport dependencies and to layer violations,
>
> PQ>  You draw this broad stoke, however, it is relatively unsubstantiated with technical facts.  The WG discussed the representation of the SPI/SI prior to NSH adoption.  The SPI/SI are not transport values -- and please don't conflate transport (and the associated requirements) with address family.
> PB> I have never asserted that SPI+SI for a "transport" address. Please don't confuse what I've said. The modeling of SPI+SI as a service layer address is very soundly rooted in classic network layer modeling. It is the assertion that that the service layer is independent from the "transport" layer below that indicates the SPI+SI form the address used by the service layer dialog. This address is mapped into the "transport" by mapping the SPI+SI into a transport tunnel and destination address.
>
>> 2)there is no resolution to forward/reverse addressing necessary for support of many L4-high service functions,
>
> PQ> That is factually incorrect and I think derives from your opinion that SPI/SI == address family: in general, you can create two unidirectional chains and use them for forward and reverse traffic.  This has been reviewed with /by  L4+ vendors/experts.
> PB>We have a lot of work on both L4-higher SFs and proxy forwarders for L4-higher SFs for MAC Chaining and understand this problem in a lot of detail. Having two unidirectional chains don't solve the forward/reverse traffic problem because the reverse path SPI/SI are not included in the NSH header and therefore not available at the time we need to reverse the forwarding direction. Are you mandating every SF and Proxy be provisioned with the forward and reverse SPI/SI? If so the solution is unacceptable to me.
>
>
>> 3)there is no resolution to encoding hierarchies which are of importance to SFC applications in NFV environments,
>
> PQ> Encoding hierarchies is an optimization of the base protocol to support scaling in a large deployment; in any case such optimization does not require changes to the base SFC encapsulation.
> PB> A general stacking solution will require some type of support which I believe should be in the base header so the context words are kept clear for pure meta-data.
>
>> 4)the draft needs a transport service interface and a description of the mappings used for the service layer onto the transport layer,
>
> PQ> I am not sure what you mean by "transport service interface" - it is true that the SPI/SI need to map to a transport layer forwarding entry but I don't know what you are implying.
> PB>You are trying to specify a "transport" independent layer, however have not specified what services the transport must provide to support the SFC layer. A service interface is one of the formalized ways to specify the feature requirements of the underlying layer.
>
>> 5)the draft specifies two independent formats for encoding the NSH header which is likely to divide the market slowing the deployment of NSH.
>
> PQ>  The draft actually specifies two metadata formats for flexibility and the market will decide which is most appropriate based on specific use cases.  The evidence is clear: a wide-range of _implementations_ already exist. In fact, the real impediment to deployment is esoteric opinion.
> PB> This is always the last resort dodge we use in standards, however it always comes at the price of some market confusion and delay. Even though I can accept this if no middle ground is possible, I don't think we have pushed the parties hard enough toward a converged solution to give it up on it yet.
>
>>
>>>  From my point of view the SFC formed service plane layer network with a peer dialog between the SCF, SFF and SF.  The Service Path Header (SPI+SI) forms the address for this service plane. As it stands there is an attempt to overload the function of the SI as both the SF identifier with the Service Path and as a form of loop detection, however the coupling has resulted in two problems:
>> 1)Since every SF in a path must have a sequential SI, in the event we need to insert or delete a SF it is necessary to update the SFF forwarding entries for the entire chain. To fix this either the SI should be allowed to take non-sequential values along the chain or should not be used for SF addressing.
>
> PQ> This is not a true statement; if an SF needs to be added or deleted then it is necessary to update the SFF forwarding entries for all SFFs downstream of where the change occurs.
> PB> Agreed, I stand corrected.
>
>
>> 2)Since the SI is only decremented on SF hops it can't guard against a loop between SFFs or SCFs, hence SI is not a reliable method for loop squelching. If a TTL is needed it needs to be separated from SI. Given that there is no clear alternative to TTL for loop squelching at the service layer I believe we do need to include an effective TTL to go forward.
>
> PQ> The SI can provide a simple loop check within the serivce plane but it's primary semantic value is one of location.  The transport itself can provide loop detection as well as SFF verification of SPI/SI + source.
> PB> I both disagree that SI is useful for loop squeltching or that "transport" TTL can stop service layer looping. To use the "transport" TTL  the field would need to be copied from one "transport" to the next "transport" over the SFC service layer. Disregarding the fact that this operation is building a dependency between the "transport" and service layers, which we expressly are trying to avoid, the TTL fields of the transports are not sized to allow for the expanded path lengths which could be created in chains. In addition, some of the transports like Ethernet only support TTL for in special cases (Ethernet only supports TTL when using F-Tag forwarding).
>
>> 3)Every other successful address space has needed to add a few bits to support QoS options. I would suggest taking 3-4 bits from the MD-type and to reserve for QoS handling.
>
> PQ>  Again, this is blurring the lines: QoS is handled, as expected by the selection transport.  This is a feature, not a bug, architecturally speaking.
> PB> Just the opposite, failing to add QoS to the NSH header is blurring the lines between the service layer and the "transport" layer. Consider an a chain which uses both a best effort and an expedited service. Next consider building the chain where each hop uses a different type of "transport". As we map from one "transport" to the next we may over some hops have less QoS information than others. As we continue to the next "transport" we retain the integrity of the end-to-end communication by regenerating QoS from the original QoS contained at the service layer a driven down into the "transport".
>
>> 4)In may data centers we have multi-vendor deployments. In these environments we may have different managers assigning chains. There should to be some convention for splitting the address space between these vendors. The most desirable solution to this is to add an assigned organization ID to the address space. An alternative would be to separate the SPI into a 4 and 20 bit field designating the high 4 bits as a local manager ID.
>>
>
> PQ>  You are conflating federation/configuration and frame format.  The multi-manager scenario is a control-plane/management-plane function.
> PB> In a multi-manager situation I need a way to avoid collision in the allocation of the SPI/SI space which is being independently allocated by different managers.
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Fri Apr 15 17:00:53 2016
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B81A12D922 for <sfc@ietfa.amsl.com>; Fri, 15 Apr 2016 17:00:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.917
X-Spam-Level: 
X-Spam-Status: No, score=-7.917 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fgMg7bpDi_SG for <sfc@ietfa.amsl.com>; Fri, 15 Apr 2016 17:00:50 -0700 (PDT)
Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by ietfa.amsl.com (Postfix) with ESMTP id C2E1712D914 for <sfc@ietf.org>; Fri, 15 Apr 2016 17:00:50 -0700 (PDT)
Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga103.fm.intel.com with ESMTP; 15 Apr 2016 17:00:50 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.24,489,1455004800"; d="scan'208";a="956036757"
Received: from orsmsx102.amr.corp.intel.com ([10.22.225.129]) by orsmga002.jf.intel.com with ESMTP; 15 Apr 2016 17:00:50 -0700
Received: from orsmsx114.amr.corp.intel.com ([169.254.8.253]) by ORSMSX102.amr.corp.intel.com ([169.254.3.42]) with mapi id 14.03.0248.002; Fri, 15 Apr 2016 17:00:50 -0700
From: "Elzur, Uri" <uri.elzur@intel.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>, Dave Dolson <ddolson@sandvine.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfOQCYv/wVVMUagOUO32rRCGp+GxnOggAB/ioCAAFnrgIAAy/AAgAGYJwCAADqXAIABkJJg
Date: Sat, 16 Apr 2016 00:00:50 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B89958589365584@ORSMSX114.amr.corp.intel.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <E8355113905631478EFF04F5AA706E9830F1BBAC@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D77F0B6@MBX021-W3-CA-2.exch021.domain.local> <14F8542B-9EE1-40DF-8DA2-E6E5048A16A3@cisco.com> <E8355113905631478EFF04F5AA706E9830F1D4A7@wtl-exchp-2.sandvine.com> <E8355113905631478EFF04F5AA706E9830F20863@wtl-exchp-2.sandvine.com> <0B2F4CF8-B94B-461F-92B2-ACC214D3E907@cisco.com>
In-Reply-To: <0B2F4CF8-B94B-461F-92B2-ACC214D3E907@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiNDY1NGEzMjQtZWQwMy00MDU0LWE0MTEtN2QzM2Y0Y2I5NTBkIiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX0lDIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE1LjkuNi42IiwiVHJ1c3RlZExhYmVsSGFzaCI6IjVFMVZFem9pZFwvWWx3bmFBNDhtdXZ2NXJTOGZpc0I4Y2ZCakFzQjZcL1F6RT0ifQ==
x-ctpclassification: CTP_IC
x-originating-ip: [10.22.254.139]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/uhKSXvemCCGEJMw4q7u6CkQHnV8>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Apr 2016 00:00:52 -0000

Catching up (was traveling myself, sigh)

I'm ok with the added text too.  I think it may solve your need/case, not s=
ure how broad it is, but see no harm. It also requires some control plane i=
nteraction as the metadata is not guaranteed to stay constant for the durat=
ion, so the disclaimer you propose is necessary

Thx

Uri ("Oo-Ree")
C: 949-378-7568


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Paul Quinn (paulq)
Sent: Thursday, April 14, 2016 10:04 AM
To: Dave Dolson <ddolson@sandvine.com>
Cc: Elzur, Uri <uri.elzur@intel.com>; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Hi Dave,

Sorry, I was traveling yesterday.  In principal I don't have any issues wit=
h the text since it doesn't impose requirements but rather clarifies a poss=
ible behavior.

I do wonder about how common this will be: a control of sorts is needed for=
 semantic meaning -- in type 1 or type 2 cases.

Paul

> On Apr 14, 2016, at 9:33 AM, Dave Dolson <ddolson@sandvine.com> wrote:
>=20
> Paul and Uri, can you please comment as to whether you agree or disagree =
with this wording?
>=20
> I feel that it allows the actual content to be opaque while giving=20
> guidance for service functions that create or replay packets in the chain=
.
>=20
> From my point of view, this is how such devices will work anyhow.
>=20
> -Dave
>=20
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
> Sent: Wednesday, April 13, 2016 9:13 AM
> To: Paul Quinn (paulq); Ron Parker
> Cc: Thomas Narten; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Paul,
> Are you unhappy with the metadata constraints I suggested below?
> Perhaps qualified by "In the absence of out-of-band configuration..." ?
>=20
> I believe that the schemes proposed in these drafts satisfy the constrain=
ts:
> - draft-sfc-nsh-dc-allocation-4,
> - draft-napper-sfc-nsh-broadband-allocation-00
>=20
> (I thought there were more allocation schemes, but I guess they=20
> expired.)
>=20
> I'll update it here:
>=20
>   In the absence of out-of-band configuration to indicate otherwise,
>   metadata used in NSH headers must meet the condition that
>   a transport-layer-stateful Service Function can save away
>   metadata values that it has witnessed.  An injected packet can
>   therefore be assigned a clone of metadata taken from an earlier
>   packet going in the same direction.  For example, a Service Function
>   can send a TCP packet using metadata cloned from another TCP packet
>   of the same connection and direction.
>=20
>   Note that the Service Function need not know the meaning of the
>   metadata; it just needs to know it is safe to clone in this manner.
>=20
>=20
> -Dave
>=20
>=20

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Fri Apr 15 18:30:26 2016
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E482412DE5E for <sfc@ietfa.amsl.com>; Fri, 15 Apr 2016 18:30:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.917
X-Spam-Level: 
X-Spam-Status: No, score=-7.917 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e7PWmzO3lqi5 for <sfc@ietfa.amsl.com>; Fri, 15 Apr 2016 18:30:22 -0700 (PDT)
Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by ietfa.amsl.com (Postfix) with ESMTP id 4245A12DB1F for <sfc@ietf.org>; Fri, 15 Apr 2016 18:30:22 -0700 (PDT)
Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga101.fm.intel.com with ESMTP; 15 Apr 2016 18:30:22 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.24,489,1455004800"; d="scan'208";a="687073419"
Received: from orsmsx103.amr.corp.intel.com ([10.22.225.130]) by FMSMGA003.fm.intel.com with ESMTP; 15 Apr 2016 18:30:18 -0700
Received: from orsmsx162.amr.corp.intel.com (10.22.240.85) by ORSMSX103.amr.corp.intel.com (10.22.225.130) with Microsoft SMTP Server (TLS) id 14.3.248.2; Fri, 15 Apr 2016 18:30:18 -0700
Received: from orsmsx114.amr.corp.intel.com ([169.254.8.253]) by ORSMSX162.amr.corp.intel.com ([169.254.3.111]) with mapi id 14.03.0248.002; Fri, 15 Apr 2016 18:30:18 -0700
From: "Elzur, Uri" <uri.elzur@intel.com>
To: "Bottorff, Paul" <paul.bottorff@hpe.com>, "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt PaulB thread
Thread-Index: AdGXfY3x41WguKLXSGe1s9NgcX8guw==
Date: Sat, 16 Apr 2016 01:30:17 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B89958589365614@ORSMSX114.amr.corp.intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiYTM3N2NkZDktNWM5OC00YTdjLWJhZDYtOTNhMmJiOTI1Mjg4IiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX0lDIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE1LjkuNi42IiwiVHJ1c3RlZExhYmVsSGFzaCI6Img3OEgxSWdVOUVVWlNHUkNEaVVKdzdPUU5ybWtjeVwvT3E0MDFEZnIrR2prPSJ9
x-ctpclassification: CTP_IC
x-originating-ip: [10.22.254.139]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Yz8U6MT9eXlpahi_nG4CCPpTiDs>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt PaulB thread
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Apr 2016 01:30:25 -0000

Some comments below [UE]

Thx

Uri ("Oo-Ree")
C: 949-378-7568


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Bottorff, Paul
Sent: Friday, April 15, 2016 2:36 PM
To: Paul Quinn (paulq) <paulq@cisco.com>; Elzur, Uri <uri.elzur@intel.com>
Cc: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Hi Paul Q.

Some responses to comments.

Cheers,

Paul

-----Original Message-----
From: Paul Quinn (paulq) [mailto:paulq@cisco.com]=20
Sent: Thursday, April 14, 2016 10:21 AM
To: Bottorff, Paul <paul.bottorff@hpe.com>
Cc: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Paul B.

Some comments inline.



> On Apr 13, 2016, at 6:05 PM, Bottorff, Paul <paul.bottorff@hpe.com> wrote=
:
>=20
> Hi Thomas:
>=20
> I do not support last call on draft-eitf-sfc-nsh-04. The risk of rushing =
to close a format before we have clear agreement on the forwarding principl=
es and features is just too high.
>=20
> The major problems with the current draft are:=20
> 1)the service address formed by the combined SPI+SI appears to have a num=
ber of deficiencies which lead to transport dependencies and to layer viola=
tions,

PQ>  You draw this broad stoke, however, it is relatively unsubstantiated w=
ith technical facts.  The WG discussed the representation of the SPI/SI pri=
or to NSH adoption.  The SPI/SI are not transport values -- and please don'=
t conflate transport (and the associated requirements) with address family.=
 =20
PB> I have never asserted that SPI+SI for a "transport" address. Please don=
't confuse what I've said. The modeling of SPI+SI as a service layer addres=
s is very soundly rooted in classic network layer modeling. It is the asser=
tion that that the service layer is independent from the "transport" layer =
below that indicates the SPI+SI form the address used by the service layer =
dialog. This address is mapped into the "transport" by mapping the SPI+SI i=
nto a transport tunnel and destination address.

[UE] the WG has long recognized the need and advantages of the "service" as=
 a sort of an overlay on top of whatever transport is deployed underneath, =
to enable e2e and seamless stitching over various transports. I'm not sure =
I see why the "Service" amounts to a full transport on top of an underlying=
 transport - this seems like duplication. To me SFC/NSH is more of a specia=
lized form of an overlay. If we look into overlays, we find no QoS, no loop=
 detection, just an identifier unique to that overlay...

> 2)there is no resolution to forward/reverse addressing necessary for supp=
ort of many L4-high service functions,

PQ> That is factually incorrect and I think derives from your opinion that =
SPI/SI =3D=3D address family: in general, you can create two unidirectional=
 chains and use them for forward and reverse traffic.  This has been review=
ed with /by  L4+ vendors/experts.
PB>We have a lot of work on both L4-higher SFs and proxy forwarders for L4-=
higher SFs for MAC Chaining and understand this problem in a lot of detail.=
 Having two unidirectional chains don't solve the forward/reverse traffic p=
roblem because the reverse path SPI/SI are not included in the NSH header a=
nd therefore not available at the time we need to reverse the forwarding di=
rection. Are you mandating every SF and Proxy be provisioned with the forwa=
rd and reverse SPI/SI? If so the solution is unacceptable to me. =20


> 3)there is no resolution to encoding hierarchies which are of importance =
to SFC applications in NFV environments,

PQ> Encoding hierarchies is an optimization of the base protocol to support=
 scaling in a large deployment; in any case such optimization does not requ=
ire changes to the base SFC encapsulation.
PB> A general stacking solution will require some type of support which I b=
elieve should be in the base header so the context words are kept clear for=
 pure meta-data.

> 4)the draft needs a transport service interface and a description of the =
mappings used for the service layer onto the transport layer,

PQ> I am not sure what you mean by "transport service interface" - it is tr=
ue that the SPI/SI need to map to a transport layer forwarding entry but I =
don't know what you are implying.
PB>You are trying to specify a "transport" independent layer, however have =
not specified what services the transport must provide to support the SFC l=
ayer. A service interface is one of the formalized ways to specify the feat=
ure requirements of the underlying layer.


[UE] like in other cases, it implies one can choose the most appropriate tr=
ansport for the app needs. In absence of underlying transport, I see this a=
s a valid concern, but as mentioned above NSH is not a transport

> 5)the draft specifies two independent formats for encoding the NSH header=
 which is likely to divide the market slowing the deployment of NSH.

PQ>  The draft actually specifies two metadata formats for flexibility and =
the market will decide which is most appropriate based on specific use case=
s.  The evidence is clear: a wide-range of _implementations_ already exist.=
 In fact, the real impediment to deployment is esoteric opinion.
PB> This is always the last resort dodge we use in standards, however it al=
ways comes at the price of some market confusion and delay. Even though I c=
an accept this if no middle ground is possible, I don't think we have pushe=
d the parties hard enough toward a converged solution to give it up on it y=
et.


[UE] we have waited more than 2 years, we have multiple implementations. Li=
ke you, I'd love to see more convergence, but the drawback is larger. If we=
 keep dragging standards on, for years, rather than recognizing the higher =
pace of innovation and technology shifts in the market, we end up as accomp=
lices to the diminishing value of std in the industry. It is a delicate bal=
ance. Not sure it will be resloved in a short time to justify holding NSH b=
ack for this =20
>=20
>> From my point of view the SFC formed service plane layer network with a =
peer dialog between the SCF, SFF and SF.  The Service Path Header (SPI+SI) =
forms the address for this service plane. As it stands there is an attempt =
to overload the function of the SI as both the SF identifier with the Servi=
ce Path and as a form of loop detection, however the coupling has resulted =
in two problems:=20
> 1)Since every SF in a path must have a sequential SI, in the event we nee=
d to insert or delete a SF it is necessary to update the SFF forwarding ent=
ries for the entire chain. To fix this either the SI should be allowed to t=
ake non-sequential values along the chain or should not be used for SF addr=
essing.

PQ> This is not a true statement; if an SF needs to be added or deleted the=
n it is necessary to update the SFF forwarding entries for all SFFs downstr=
eam of where the change occurs.=20
PB> Agreed, I stand corrected.


> 2)Since the SI is only decremented on SF hops it can't guard against a lo=
op between SFFs or SCFs, hence SI is not a reliable method for loop squelch=
ing. If a TTL is needed it needs to be separated from SI. Given that there =
is no clear alternative to TTL for loop squelching at the service layer I b=
elieve we do need to include an effective TTL to go forward.

PQ> The SI can provide a simple loop check within the serivce plane but it'=
s primary semantic value is one of location.  The transport itself can prov=
ide loop detection as well as SFF verification of SPI/SI + source. =20
PB> I both disagree that SI is useful for loop squeltching or that "transpo=
rt" TTL can stop service layer looping. To use the "transport" TTL  the fie=
ld would need to be copied from one "transport" to the next "transport" ove=
r the SFC service layer. Disregarding the fact that this operation is build=
ing a dependency between the "transport" and service layers, which we expre=
ssly are trying to avoid, the TTL fields of the transports are not sized to=
 allow for the expanded path lengths which could be created in chains. In a=
ddition, some of the transports like Ethernet only support TTL for in speci=
al cases (Ethernet only supports TTL when using F-Tag forwarding).

[UE] the SI role is - mapping and identification of the SF to be used.  Lik=
e the arguments above, there is no attempt to duplicate each and every tran=
sport service in an SFC/NSH "service" layer. An implementer can benefit fro=
m a smart allocation of the SI space to assist in loop detection, but it is=
 the right choice of the underlying transport that is in charge of providin=
g transport services e.g. loop detection/prevention.  If we take the above =
argument one step forward we will need to provide windowing, congestion con=
trol, etc. etc. I do not see this as the role of this form of an overlay...

> 3)Every other successful address space has needed to add a few bits to su=
pport QoS options. I would suggest taking 3-4 bits from the MD-type and to =
reserve for QoS handling.

PQ>  Again, this is blurring the lines: QoS is handled, as expected by the =
selection transport.  This is a feature, not a bug, architecturally speakin=
g. =20
PB> Just the opposite, failing to add QoS to the NSH header is blurring the=
 lines between the service layer and the "transport" layer. Consider an a c=
hain which uses both a best effort and an expedited service. Next consider =
building the chain where each hop uses a different type of "transport". As =
we map from one "transport" to the next we may over some hops have less QoS=
 information than others. As we continue to the next "transport" we retain =
the integrity of the end-to-end communication by regenerating QoS from the =
original QoS contained at the service layer a driven down into the "transpo=
rt".=20

[UE] this suggest the "service" layer has a role of inter-transport or supe=
r-transport. I disagree. It is the NSH notion of "mapping from NSH to the t=
ransport", that gives the user the perfect control over these phenomenon. A=
 user concerned about this, should pick homogenous transport or most suitab=
le transports. The cost of providing such assurance in a "service" layer is=
 duplicating the transport functionality (and even that will not solve the =
issue if the underlying transport is lagging...)


> 4)In may data centers we have multi-vendor deployments. In these environm=
ents we may have different managers assigning chains. There should to be so=
me convention for splitting the address space between these vendors. The mo=
st desirable solution to this is to add an assigned organization ID to the =
address space. An alternative would be to separate the SPI into a 4 and 20 =
bit field designating the high 4 bits as a local manager ID.
>=20

PQ>  You are conflating federation/configuration and frame format.  The mul=
ti-manager scenario is a control-plane/management-plane function.
PB> In a multi-manager situation I need a way to avoid collision in the all=
ocation of the SPI/SI space which is being independently allocated by diffe=
rent managers.

[UE] same goes to a VXLAN....no such field is present there either. Agree w=
 PaulQ - this is a Control Plane aspect
_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Fri Apr 15 18:35:29 2016
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 919CD12D765 for <sfc@ietfa.amsl.com>; Fri, 15 Apr 2016 18:35:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.917
X-Spam-Level: 
X-Spam-Status: No, score=-7.917 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4gRUSw5hpmSJ for <sfc@ietfa.amsl.com>; Fri, 15 Apr 2016 18:35:26 -0700 (PDT)
Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by ietfa.amsl.com (Postfix) with ESMTP id 15C3312D80D for <sfc@ietf.org>; Fri, 15 Apr 2016 18:35:26 -0700 (PDT)
Received: from orsmga003.jf.intel.com ([10.7.209.27]) by fmsmga102.fm.intel.com with ESMTP; 15 Apr 2016 18:35:25 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.24,489,1455004800"; d="scan'208";a="786012386"
Received: from orsmsx101.amr.corp.intel.com ([10.22.225.128]) by orsmga003.jf.intel.com with ESMTP; 15 Apr 2016 18:35:25 -0700
Received: from orsmsx156.amr.corp.intel.com (10.22.240.22) by ORSMSX101.amr.corp.intel.com (10.22.225.128) with Microsoft SMTP Server (TLS) id 14.3.248.2; Fri, 15 Apr 2016 18:35:25 -0700
Received: from orsmsx114.amr.corp.intel.com ([169.254.8.253]) by ORSMSX156.amr.corp.intel.com ([169.254.8.159]) with mapi id 14.03.0248.002; Fri, 15 Apr 2016 18:35:25 -0700
From: "Elzur, Uri" <uri.elzur@intel.com>
To: Henry Fourie <louis.fourie@huawei.com>, "Paul Quinn (paulq)" <paulq@cisco.com>, "Bottorff, Paul" <paul.bottorff@hpe.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivflQCYv/wVVMUagOUO32rRCGp+IdPDQgAHOXgCAABLCAIABk7Ig
Date: Sat, 16 Apr 2016 01:35:23 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B89958589365644@ORSMSX114.amr.corp.intel.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <TU4PR84MB015931A06895E5B3094D1668FE960@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <E98F1C7D-0F3D-4F90-94F6-48061643E797@cisco.com> <0F8583BBE82FA449A8B78417CC07559A09559A80@SJCEML701-CHM.china.huawei.com>
In-Reply-To: <0F8583BBE82FA449A8B78417CC07559A09559A80@SJCEML701-CHM.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiMmE5OTQ2MzctOTY0Mi00ZjliLTgxZjktMmVkZmIzNDg3ZjM1IiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX0lDIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE1LjkuNi42IiwiVHJ1c3RlZExhYmVsSGFzaCI6IlV0b0pmeUdaMVdWVk8waDNQZ0tPcEF0RWtxelo2WlI2NnVmZTVyZzdXTm89In0=
x-ctpclassification: CTP_IC
x-originating-ip: [10.22.254.139]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/DG997BaKxTJSR-FHroPVyB05Loc>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Apr 2016 01:35:27 -0000

And what is a symmetric return path is desired? Now that poor SFF need to b=
e the traffic cop for the benefit of the downstream SFFs

If we assume that the LB/HA are accomplished by control Plane or by means o=
ther than direct insert/remove, this is not a common case


Thx

Uri ("Oo-Ree")
C: 949-378-7568


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Henry Fourie
Sent: Thursday, April 14, 2016 11:28 AM
To: Paul Quinn (paulq) <paulq@cisco.com>; Bottorff, Paul <paul.bottorff@hpe=
.com>
Cc: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Paul,
   Updating SFF forwarding entries on all downstream SFFs can introduce dis=
ruption of traffic on the service path. It would help if there is a mechani=
sm where a chain update to add/remove an SF can be localized to its subtend=
ing SFF only.

 - Louis=20


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Paul Quinn (paulq)
Sent: Thursday, April 14, 2016 10:21 AM
To: Bottorff, Paul
Cc: Thomas Narten; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Paul B.

Some comments inline.



> On Apr 13, 2016, at 6:05 PM, Bottorff, Paul <paul.bottorff@hpe.com> wrote=
:
>=20
> Hi Thomas:
>=20
> I do not support last call on draft-eitf-sfc-nsh-04. The risk of rushing =
to close a format before we have clear agreement on the forwarding principl=
es and features is just too high.
>=20
> The major problems with the current draft are:=20
> 1)the service address formed by the combined SPI+SI appears to have a=20
> number of deficiencies which lead to transport dependencies and to=20
> layer violations,

PQ>  You draw this broad stoke, however, it is relatively unsubstantiated w=
ith technical facts.  The WG discussed the representation of the SPI/SI pri=
or to NSH adoption.  The SPI/SI are not transport values -- and please don'=
t conflate transport (and the associated requirements) with address family.=
 =20


> 2)there is no resolution to forward/reverse addressing necessary for=20
> support of many L4-high service functions,

PQ> That is factually incorrect and I think derives from your opinion that =
SPI/SI =3D=3D address family: in general, you can create two unidirectional=
 chains and use them for forward and reverse traffic.  This has been review=
ed with /by  L4+ vendors/experts.


> 3)there is no resolution to encoding hierarchies which are of=20
> importance to SFC applications in NFV environments,

PQ> Encoding hierarchies is an optimization of the base protocol to support=
 scaling in a large deployment; in any case such optimization does not requ=
ire changes to the base SFC encapsulation.

> 4)the draft needs a transport service interface and a description of=20
> the mappings used for the service layer onto the transport layer,

PQ> I am not sure what you mean by "transport service interface" - it is tr=
ue that the SPI/SI need to map to a transport layer forwarding entry but I =
don't know what you are implying.


> 5)the draft specifies two independent formats for encoding the NSH header=
 which is likely to divide the market slowing the deployment of NSH.

PQ>  The draft actually specifies two metadata formats for flexibility and =
the market will decide which is most appropriate based on specific use case=
s.  The evidence is clear: a wide-range of _implementations_ already exist.=
 In fact, the real impediment to deployment is esoteric opinion.



>=20
>> From my point of view the SFC formed service plane layer network with a =
peer dialog between the SCF, SFF and SF.  The Service Path Header (SPI+SI) =
forms the address for this service plane. As it stands there is an attempt =
to overload the function of the SI as both the SF identifier with the Servi=
ce Path and as a form of loop detection, however the coupling has resulted =
in two problems:=20
> 1)Since every SF in a path must have a sequential SI, in the event we nee=
d to insert or delete a SF it is necessary to update the SFF forwarding ent=
ries for the entire chain. To fix this either the SI should be allowed to t=
ake non-sequential values along the chain or should not be used for SF addr=
essing.

PQ> This is not a true statement; if an SF needs to be added or deleted the=
n it is necessary to update the SFF forwarding entries for all SFFs downstr=
eam of where the change occurs.=20


> 2)Since the SI is only decremented on SF hops it can't guard against a lo=
op between SFFs or SCFs, hence SI is not a reliable method for loop squelch=
ing. If a TTL is needed it needs to be separated from SI. Given that there =
is no clear alternative to TTL for loop squelching at the service layer I b=
elieve we do need to include an effective TTL to go forward.

PQ> The SI can provide a simple loop check within the serivce plane but it'=
s primary semantic value is one of location.  The transport itself can prov=
ide loop detection as well as SFF verification of SPI/SI + source. =20


> 3)Every other successful address space has needed to add a few bits to su=
pport QoS options. I would suggest taking 3-4 bits from the MD-type and to =
reserve for QoS handling.

PQ>  Again, this is blurring the lines: QoS is handled, as expected by the =
selection transport.  This is a feature, not a bug, architecturally speakin=
g. =20

> 4)In may data centers we have multi-vendor deployments. In these environm=
ents we may have different managers assigning chains. There should to be so=
me convention for splitting the address space between these vendors. The mo=
st desirable solution to this is to add an assigned organization ID to the =
address space. An alternative would be to separate the SPI into a 4 and 20 =
bit field designating the high 4 bits as a local manager ID.
>=20

PQ>  You are conflating federation/configuration and frame format.  The mul=
ti-manager scenario is a control-plane/management-plane function.
_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Fri Apr 15 21:49:13 2016
Return-Path: <gregory.mirsky@ericsson.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F6AD12E053 for <sfc@ietfa.amsl.com>; Fri, 15 Apr 2016 21:49:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.202
X-Spam-Level: 
X-Spam-Status: No, score=-4.202 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kiXryC1wN_kA for <sfc@ietfa.amsl.com>; Fri, 15 Apr 2016 21:49:10 -0700 (PDT)
Received: from usplmg21.ericsson.net (usplmg21.ericsson.net [198.24.6.65]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1EAA112D5A1 for <sfc@ietf.org>; Fri, 15 Apr 2016 21:49:09 -0700 (PDT)
X-AuditID: c6180641-f796f6d000000e1e-ec-5711c41be75e
Received: from EUSAAHC001.ericsson.se (Unknown_Domain [147.117.188.75]) by usplmg21.ericsson.net (Symantec Mail Security) with SMTP id 9D.EC.03614.C14C1175; Sat, 16 Apr 2016 06:48:28 +0200 (CEST)
Received: from EUSAAMB103.ericsson.se ([147.117.188.120]) by EUSAAHC001.ericsson.se ([147.117.188.75]) with mapi id 14.03.0248.002; Sat, 16 Apr 2016 00:49:08 -0400
From: Gregory Mirsky <gregory.mirsky@ericsson.com>
To: "Elzur, Uri" <uri.elzur@intel.com>, Henry Fourie <louis.fourie@huawei.com>, "Paul Quinn (paulq)" <paulq@cisco.com>, "Bottorff, Paul" <paul.bottorff@hpe.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfQNgeSRwVuekuk7duaTmjRXJ+IzlGAgAFCswCAABLBAIACCdaA///vvDA=
Date: Sat, 16 Apr 2016 04:49:07 +0000
Message-ID: <7347100B5761DC41A166AC17F22DF11221A480B3@eusaamb103.ericsson.se>
References: <m3egarz7kh.wl-narten@us.ibm.com> <TU4PR84MB015931A06895E5B3094D1668FE960@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <E98F1C7D-0F3D-4F90-94F6-48061643E797@cisco.com> <0F8583BBE82FA449A8B78417CC07559A09559A80@SJCEML701-CHM.china.huawei.com> <7E05C330D7FD6D4FAD0728C46B89958589365644@ORSMSX114.amr.corp.intel.com>
In-Reply-To: <7E05C330D7FD6D4FAD0728C46B89958589365644@ORSMSX114.amr.corp.intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [147.117.188.12]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrGIsWRmVeSWpSXmKPExsUyuXSPt67MEcFwg98vhC0OLLzDZHGibyqL xc6GfkaL/a+Wslo8ebCV3WLSnrNMDmweU35vZPXYtauR3aPlyFtWjyVLfjJ5LN7zksnj3LU+ 5gC2KC6blNSczLLUIn27BK6MH7feMhassKjYdeYXYwPjDt0uRk4OCQETiW27JjBB2GISF+6t Z+ti5OIQEjjKKPF61gtGCGc5o8Tzq1vYQarYBIwkXmzsYQdJiAgsYZT4+KaFFSTBLOAi8WL3 JEYQW1jAVmLegrvMILaIgJ3E4UsTmSBsP4lr7Y/AalgEVCWW71wL1ssr4Ctxc99XFohtJ5kk Fk46BtbMKRAiceX3NBYQmxHovu+n1jBBLBOXuPVkPtTdAhJL9pxnhrBFJV4+/scKYStJzHl9 jRmiXkdiwe5PbBC2tsSyha+ZIRYLSpyc+YRlAqPYLCRjZyFpmYWkZRaSlgWMLKsYOUqLC3Jy 040MNzECY++YBJvjDsa9vZ6HGAU4GJV4eBOaBcKFWBPLiitzDzFKcDArifB+2y0YLsSbklhZ lVqUH19UmpNafIhRmoNFSZzXO/JfmJBAemJJanZqakFqEUyWiYNTqoFRNzh11uXSw0e2rb39 uph1t+QyrzU7fJ6pXhSIsje7eKhpzpWtaaFHzs//WbOu0vy1jLfJ2diW/8u//RQ+GKBR3p6T HCL8OfW796dGo0JTntT/d2JkLaXVjR8XvLE79u2VY27/yYX9e0pPLPu4bO6KH8XG/+d7qB++ +Py2V/rKy98qJoldyyvLU2Ipzkg01GIuKk4EAAG5kkq5AgAA
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/E0v-9cdl3KMzj1PXCyh3mqdLQt0>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Apr 2016 04:49:12 -0000

Hi Uri,
bi-directional path presumes that the service layer is terminated at egress=
 and ingress, not that client data circle, that may be characteristic of a =
ring or routing loop. And if there's classifier at ingress, then, wouldn't =
there be a classifier at egress? If there's no classifier at the turning SF=
, then isn't that rather case of unidirectional path that is terminated at =
its very ingress?

	Regards,
		Greg

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Friday, April 15, 2016 6:35 PM
To: Henry Fourie; Paul Quinn (paulq); Bottorff, Paul
Cc: Thomas Narten; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

And what is a symmetric return path is desired? Now that poor SFF need to b=
e the traffic cop for the benefit of the downstream SFFs

If we assume that the LB/HA are accomplished by control Plane or by means o=
ther than direct insert/remove, this is not a common case


Thx

Uri ("Oo-Ree")
C: 949-378-7568


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Henry Fourie
Sent: Thursday, April 14, 2016 11:28 AM
To: Paul Quinn (paulq) <paulq@cisco.com>; Bottorff, Paul <paul.bottorff@hpe=
.com>
Cc: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Paul,
   Updating SFF forwarding entries on all downstream SFFs can introduce dis=
ruption of traffic on the service path. It would help if there is a mechani=
sm where a chain update to add/remove an SF can be localized to its subtend=
ing SFF only.

 - Louis=20


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Paul Quinn (paulq)
Sent: Thursday, April 14, 2016 10:21 AM
To: Bottorff, Paul
Cc: Thomas Narten; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Paul B.

Some comments inline.



> On Apr 13, 2016, at 6:05 PM, Bottorff, Paul <paul.bottorff@hpe.com> wrote=
:
>=20
> Hi Thomas:
>=20
> I do not support last call on draft-eitf-sfc-nsh-04. The risk of rushing =
to close a format before we have clear agreement on the forwarding principl=
es and features is just too high.
>=20
> The major problems with the current draft are:=20
> 1)the service address formed by the combined SPI+SI appears to have a=20
> number of deficiencies which lead to transport dependencies and to=20
> layer violations,

PQ>  You draw this broad stoke, however, it is relatively unsubstantiated w=
ith technical facts.  The WG discussed the representation of the SPI/SI pri=
or to NSH adoption.  The SPI/SI are not transport values -- and please don'=
t conflate transport (and the associated requirements) with address family.=
 =20


> 2)there is no resolution to forward/reverse addressing necessary for=20
> support of many L4-high service functions,

PQ> That is factually incorrect and I think derives from your opinion that =
SPI/SI =3D=3D address family: in general, you can create two unidirectional=
 chains and use them for forward and reverse traffic.  This has been review=
ed with /by  L4+ vendors/experts.


> 3)there is no resolution to encoding hierarchies which are of=20
> importance to SFC applications in NFV environments,

PQ> Encoding hierarchies is an optimization of the base protocol to support=
 scaling in a large deployment; in any case such optimization does not requ=
ire changes to the base SFC encapsulation.

> 4)the draft needs a transport service interface and a description of=20
> the mappings used for the service layer onto the transport layer,

PQ> I am not sure what you mean by "transport service interface" - it is tr=
ue that the SPI/SI need to map to a transport layer forwarding entry but I =
don't know what you are implying.


> 5)the draft specifies two independent formats for encoding the NSH header=
 which is likely to divide the market slowing the deployment of NSH.

PQ>  The draft actually specifies two metadata formats for flexibility and =
the market will decide which is most appropriate based on specific use case=
s.  The evidence is clear: a wide-range of _implementations_ already exist.=
 In fact, the real impediment to deployment is esoteric opinion.



>=20
>> From my point of view the SFC formed service plane layer network with a =
peer dialog between the SCF, SFF and SF.  The Service Path Header (SPI+SI) =
forms the address for this service plane. As it stands there is an attempt =
to overload the function of the SI as both the SF identifier with the Servi=
ce Path and as a form of loop detection, however the coupling has resulted =
in two problems:=20
> 1)Since every SF in a path must have a sequential SI, in the event we nee=
d to insert or delete a SF it is necessary to update the SFF forwarding ent=
ries for the entire chain. To fix this either the SI should be allowed to t=
ake non-sequential values along the chain or should not be used for SF addr=
essing.

PQ> This is not a true statement; if an SF needs to be added or deleted the=
n it is necessary to update the SFF forwarding entries for all SFFs downstr=
eam of where the change occurs.=20


> 2)Since the SI is only decremented on SF hops it can't guard against a lo=
op between SFFs or SCFs, hence SI is not a reliable method for loop squelch=
ing. If a TTL is needed it needs to be separated from SI. Given that there =
is no clear alternative to TTL for loop squelching at the service layer I b=
elieve we do need to include an effective TTL to go forward.

PQ> The SI can provide a simple loop check within the serivce plane but it'=
s primary semantic value is one of location.  The transport itself can prov=
ide loop detection as well as SFF verification of SPI/SI + source. =20


> 3)Every other successful address space has needed to add a few bits to su=
pport QoS options. I would suggest taking 3-4 bits from the MD-type and to =
reserve for QoS handling.

PQ>  Again, this is blurring the lines: QoS is handled, as expected by the =
selection transport.  This is a feature, not a bug, architecturally speakin=
g. =20

> 4)In may data centers we have multi-vendor deployments. In these environm=
ents we may have different managers assigning chains. There should to be so=
me convention for splitting the address space between these vendors. The mo=
st desirable solution to this is to add an assigned organization ID to the =
address space. An alternative would be to separate the SPI into a 4 and 20 =
bit field designating the high 4 bits as a local manager ID.
>=20

PQ>  You are conflating federation/configuration and frame format.  The mul=
ti-manager scenario is a control-plane/management-plane function.
_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Sun Apr 17 00:27:57 2016
Return-Path: <loa@pi.nu>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE31612D9E6; Sun, 17 Apr 2016 00:27:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level: 
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vruwt1fmRWeI; Sun, 17 Apr 2016 00:27:53 -0700 (PDT)
Received: from pipi.pi.nu (pipi.pi.nu [83.168.239.141]) (using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 625F612D94D; Sun, 17 Apr 2016 00:27:53 -0700 (PDT)
Received: from [192.168.1.2] (unknown [122.53.41.246]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: loa@pi.nu) by pipi.pi.nu (Postfix) with ESMTPSA id 5E8131802ADA; Sun, 17 Apr 2016 09:27:50 +0200 (CEST)
From: Loa Andersson <loa@pi.nu>
To: "sfc@ietf.org" <sfc@ietf.org>, draft-ietf-sfc-nsh@ietf.org
Message-ID: <57133AED.4080005@pi.nu>
Date: Sun, 17 Apr 2016 15:27:41 +0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/hN-0c4nr9eCjxxNHuzbnzGp8J-g>
Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Apr 2016 07:27:55 -0000

Working Group, authors,

I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to read
it before now) and have a question on how the TLV concept is understood
in the draft.

For example in LDP TLV were defined as Type, Length Value, e.g. (from
RFC 5036 section 3.3):

    LDP uses a Type-Length-Value (TLV) encoding scheme to encode much of
    the information carried in LDP messages.

    An LDP TLV is encoded as a 2 octet field that uses 14 bits to specify
    a Type and 2 bits to specify behavior when an LSR doesn't recognize
    the Type, followed by a 2 octet Length field, followed by a variable
    length Value field.


     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |U|F|        Type               |            Length             |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |                             Value                             |
    ~                                                               ~
    |                                                               |
    |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more complicated
and I'm struggling a bit to understand if the "name" TLV should be used.

 From draft-ietf-sfc-nsh-04

         0                   1                   2                   3
         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        |          TLV Class            |C|    Type     |R|R|R|   Len   |
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        |                      Variable Metadata                        |
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+



                     Figure 6: Variable Context Headers

The draft is not entirely clear in this respect, but I think this is 
what you call a TLV.

Should I understand this way?

Type = TLV Class + C + Type (24 bits)
Length = len (5 bits)
Value = Variable Metadata

A convention we used in MPLS when we have variable length fields is
to use a ~ instead of the |, like this:.

         0                   1                   2                   3
         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        |          TLV Class            |C|    Type     |R|R|R|   Len   |
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        ~                      Variable Metadata                        ~
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

I suggest that this is a good practice that could be adopted here also.

Two more questions:

If the metadata does not align exactly with the 32 bit/4 byte structure,
what is the rules for padding?

A last, but a bit different question, do you need indicators like the U
and F flags in an to indicate what should happen if the node does not
recognize the (TLV Class, C, Type)-field?

/Loa


PS

I will also have a few more editorial comments that will be sent to
the authors within a day or two.


-- 


Loa Andersson                        email: loa@mail01.huawei.com
Senior MPLS Expert                          loa@pi.nu
Huawei Technologies (consultant)     phone: +46 739 81 21 64


From nobody Sun Apr 17 00:48:29 2016
Return-Path: <davidme@marvell.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F098112DE4E for <sfc@ietfa.amsl.com>; Sun, 17 Apr 2016 00:48:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r-GcB8P-CIqm for <sfc@ietfa.amsl.com>; Sun, 17 Apr 2016 00:48:26 -0700 (PDT)
Received: from mx0a-0016f401.pphosted.com (mx0a-0016f401.pphosted.com [67.231.148.174]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 34B1012DE3A for <sfc@ietf.org>; Sun, 17 Apr 2016 00:48:25 -0700 (PDT)
Received: from pps.filterd (m0045849.ppops.net [127.0.0.1]) by mx0a-0016f401.pphosted.com (8.16.0.11/8.16.0.11) with SMTP id u3H7eG14024563; Sun, 17 Apr 2016 00:48:24 -0700
Received: from il-exch02.marvell.com ([199.203.130.102]) by mx0a-0016f401.pphosted.com with ESMTP id 22bjrk2685-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Sun, 17 Apr 2016 00:48:19 -0700
Received: from IL-EXCH01.marvell.com (10.4.102.220) by IL-EXCH02.marvell.com (10.4.102.221) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Sun, 17 Apr 2016 10:48:16 +0300
Received: from IL-EXCH01.marvell.com ([fe80::5d63:81cd:31e2:fc36]) by IL-EXCH01.marvell.com ([fe80::5d63:81cd:31e2:fc36%20]) with mapi id 15.00.1104.000; Sun, 17 Apr 2016 10:48:16 +0300
From: David Melman <davidme@marvell.com>
To: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivflQCYv/wVVMUagOUO32rRCGp+IdPDQgAR4SKA=
Date: Sun, 17 Apr 2016 07:48:16 +0000
Message-ID: <1f074df2928a4050afa7c3c775536574@IL-EXCH01.marvell.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <TU4PR84MB015931A06895E5B3094D1668FE960@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM>
In-Reply-To: <TU4PR84MB015931A06895E5B3094D1668FE960@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.4.102.210]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2016-04-17_05:, , signatures=0
X-Proofpoint-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1603290000 definitions=main-1604170113
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/08h3iif5oeZCseIZXFRzbdSGyyY>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Apr 2016 07:48:28 -0000

Hi Thomas:

I support last call on draft-ietf-sfc-nsh-04.

Regarding MPLS transport, I agree this is not an issue for this draft, whic=
h defines NSH as transport independent.   NSH-over-MPLS should be addressed=
 by the MPLS WG, where a solution needs to be found to resolve the nibble i=
ssue, e.g. CW-like solution.

Regarding MD type 1, 16B opaque context data is a good generic approach.  M=
etadata will evolve over time and be standardized.

David

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
Sent: Wednesday, March 30, 2016 7:48 PM
To: sfc@ietf.org
Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Dear WG:

This note begins a WG last call on draft-ietf-sfc-nsh-04.txt (https://datat=
racker.ietf.org/doc/draft-ietf-sfc-nsh/).

The editors of the NSH document have indicated that they have addressed all=
 known comments and that there are no open issues with the current version =
of the document.

Substantive comments to the list please, editorial comments can go directly=
 to the document editors.

We'll also get a brief update from the editors at next week's meeting. If t=
here are any remaining issues with the document, raising them before the me=
eting would be especially helpful.

For the chairs,
Thomas

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Sun Apr 17 17:05:23 2016
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8688112D17B for <sfc@ietfa.amsl.com>; Sun, 17 Apr 2016 17:05:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.917
X-Spam-Level: 
X-Spam-Status: No, score=-7.917 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zVG-jbxiJyOM for <sfc@ietfa.amsl.com>; Sun, 17 Apr 2016 17:05:19 -0700 (PDT)
Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by ietfa.amsl.com (Postfix) with ESMTP id C45EE12D109 for <sfc@ietf.org>; Sun, 17 Apr 2016 17:05:19 -0700 (PDT)
Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by orsmga103.jf.intel.com with ESMTP; 17 Apr 2016 17:05:18 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.24,499,1455004800"; d="scan'208";a="86864788"
Received: from orsmsx107.amr.corp.intel.com ([10.22.240.5]) by fmsmga004.fm.intel.com with ESMTP; 17 Apr 2016 17:05:19 -0700
Received: from orsmsx151.amr.corp.intel.com (10.22.226.38) by ORSMSX107.amr.corp.intel.com (10.22.240.5) with Microsoft SMTP Server (TLS) id 14.3.248.2; Sun, 17 Apr 2016 17:05:17 -0700
Received: from orsmsx114.amr.corp.intel.com ([169.254.8.253]) by ORSMSX151.amr.corp.intel.com ([169.254.7.222]) with mapi id 14.03.0248.002; Sun, 17 Apr 2016 17:05:17 -0700
From: "Elzur, Uri" <uri.elzur@intel.com>
To: Gregory Mirsky <gregory.mirsky@ericsson.com>, Henry Fourie <louis.fourie@huawei.com>, "Paul Quinn (paulq)" <paulq@cisco.com>, "Bottorff, Paul" <paul.bottorff@hpe.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivflQCYv/wVVMUagOUO32rRCGp+IdPDQgAHOXgCAABLCAIABk7IggACsRICAAkEycA==
Date: Mon, 18 Apr 2016 00:05:16 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B899585893677C0@ORSMSX114.amr.corp.intel.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <TU4PR84MB015931A06895E5B3094D1668FE960@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <E98F1C7D-0F3D-4F90-94F6-48061643E797@cisco.com> <0F8583BBE82FA449A8B78417CC07559A09559A80@SJCEML701-CHM.china.huawei.com> <7E05C330D7FD6D4FAD0728C46B89958589365644@ORSMSX114.amr.corp.intel.com> <7347100B5761DC41A166AC17F22DF11221A480B3@eusaamb103.ericsson.se>
In-Reply-To: <7347100B5761DC41A166AC17F22DF11221A480B3@eusaamb103.ericsson.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiOGEwODU4M2MtNTM5OS00ZTBhLWI4YWEtZDFjOTcwOWU2Mjc3IiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX0lDIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE1LjkuNi42IiwiVHJ1c3RlZExhYmVsSGFzaCI6IlBsYWlWdHprcExzbm9zK2o4RDhJcm5kRWZYNVwvUjYrOUZyZzF2VFwvY2Fzcz0ifQ==
x-ctpclassification: CTP_IC
x-originating-ip: [10.22.254.138]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/y_NbD9ogRGXYN1lTlbH0SVG22r8>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Apr 2016 00:05:21 -0000

Hi Greg

My comment was towards the "inefficiency" stated with the need to update al=
l downstream SFF in case of insertion/removal
It was suggested that a mechanism where "a localized" mechanism may be bett=
er

My comment was that in case of any returning traffic (and the graph may be =
complex...) the affected SFF will know what to do with any returning traffi=
c on any branch of the graph... so it may not be a bad choice to notify all=
 downstream SFFs

The second comment is that in case LB/HA are accomplished by/with control P=
lane, the SFF involved in the LB, for example, may hide these actions (or l=
ocalize them) rendering this to a more rare event=20

Thx

Uri ("Oo-Ree")
C: 949-378-7568


-----Original Message-----
From: Gregory Mirsky [mailto:gregory.mirsky@ericsson.com]=20
Sent: Friday, April 15, 2016 9:49 PM
To: Elzur, Uri <uri.elzur@intel.com>; Henry Fourie <louis.fourie@huawei.com=
>; Paul Quinn (paulq) <paulq@cisco.com>; Bottorff, Paul <paul.bottorff@hpe.=
com>
Cc: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
Subject: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Hi Uri,
bi-directional path presumes that the service layer is terminated at egress=
 and ingress, not that client data circle, that may be characteristic of a =
ring or routing loop. And if there's classifier at ingress, then, wouldn't =
there be a classifier at egress? If there's no classifier at the turning SF=
, then isn't that rather case of unidirectional path that is terminated at =
its very ingress?

	Regards,
		Greg

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Elzur, Uri
Sent: Friday, April 15, 2016 6:35 PM
To: Henry Fourie; Paul Quinn (paulq); Bottorff, Paul
Cc: Thomas Narten; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

And what is a symmetric return path is desired? Now that poor SFF need to b=
e the traffic cop for the benefit of the downstream SFFs

If we assume that the LB/HA are accomplished by control Plane or by means o=
ther than direct insert/remove, this is not a common case


Thx

Uri ("Oo-Ree")
C: 949-378-7568


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Henry Fourie
Sent: Thursday, April 14, 2016 11:28 AM
To: Paul Quinn (paulq) <paulq@cisco.com>; Bottorff, Paul <paul.bottorff@hpe=
.com>
Cc: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Paul,
   Updating SFF forwarding entries on all downstream SFFs can introduce dis=
ruption of traffic on the service path. It would help if there is a mechani=
sm where a chain update to add/remove an SF can be localized to its subtend=
ing SFF only.

 - Louis=20


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Paul Quinn (paulq)
Sent: Thursday, April 14, 2016 10:21 AM
To: Bottorff, Paul
Cc: Thomas Narten; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Paul B.

Some comments inline.



> On Apr 13, 2016, at 6:05 PM, Bottorff, Paul <paul.bottorff@hpe.com> wrote=
:
>=20
> Hi Thomas:
>=20
> I do not support last call on draft-eitf-sfc-nsh-04. The risk of rushing =
to close a format before we have clear agreement on the forwarding principl=
es and features is just too high.
>=20
> The major problems with the current draft are:=20
> 1)the service address formed by the combined SPI+SI appears to have a=20
> number of deficiencies which lead to transport dependencies and to=20
> layer violations,

PQ>  You draw this broad stoke, however, it is relatively unsubstantiated w=
ith technical facts.  The WG discussed the representation of the SPI/SI pri=
or to NSH adoption.  The SPI/SI are not transport values -- and please don'=
t conflate transport (and the associated requirements) with address family.=
 =20


> 2)there is no resolution to forward/reverse addressing necessary for=20
> support of many L4-high service functions,

PQ> That is factually incorrect and I think derives from your opinion that =
SPI/SI =3D=3D address family: in general, you can create two unidirectional=
 chains and use them for forward and reverse traffic.  This has been review=
ed with /by  L4+ vendors/experts.


> 3)there is no resolution to encoding hierarchies which are of=20
> importance to SFC applications in NFV environments,

PQ> Encoding hierarchies is an optimization of the base protocol to support=
 scaling in a large deployment; in any case such optimization does not requ=
ire changes to the base SFC encapsulation.

> 4)the draft needs a transport service interface and a description of=20
> the mappings used for the service layer onto the transport layer,

PQ> I am not sure what you mean by "transport service interface" - it is tr=
ue that the SPI/SI need to map to a transport layer forwarding entry but I =
don't know what you are implying.


> 5)the draft specifies two independent formats for encoding the NSH header=
 which is likely to divide the market slowing the deployment of NSH.

PQ>  The draft actually specifies two metadata formats for flexibility and =
the market will decide which is most appropriate based on specific use case=
s.  The evidence is clear: a wide-range of _implementations_ already exist.=
 In fact, the real impediment to deployment is esoteric opinion.



>=20
>> From my point of view the SFC formed service plane layer network with a =
peer dialog between the SCF, SFF and SF.  The Service Path Header (SPI+SI) =
forms the address for this service plane. As it stands there is an attempt =
to overload the function of the SI as both the SF identifier with the Servi=
ce Path and as a form of loop detection, however the coupling has resulted =
in two problems:=20
> 1)Since every SF in a path must have a sequential SI, in the event we nee=
d to insert or delete a SF it is necessary to update the SFF forwarding ent=
ries for the entire chain. To fix this either the SI should be allowed to t=
ake non-sequential values along the chain or should not be used for SF addr=
essing.

PQ> This is not a true statement; if an SF needs to be added or deleted the=
n it is necessary to update the SFF forwarding entries for all SFFs downstr=
eam of where the change occurs.=20


> 2)Since the SI is only decremented on SF hops it can't guard against a lo=
op between SFFs or SCFs, hence SI is not a reliable method for loop squelch=
ing. If a TTL is needed it needs to be separated from SI. Given that there =
is no clear alternative to TTL for loop squelching at the service layer I b=
elieve we do need to include an effective TTL to go forward.

PQ> The SI can provide a simple loop check within the serivce plane but it'=
s primary semantic value is one of location.  The transport itself can prov=
ide loop detection as well as SFF verification of SPI/SI + source. =20


> 3)Every other successful address space has needed to add a few bits to su=
pport QoS options. I would suggest taking 3-4 bits from the MD-type and to =
reserve for QoS handling.

PQ>  Again, this is blurring the lines: QoS is handled, as expected by the =
selection transport.  This is a feature, not a bug, architecturally speakin=
g. =20

> 4)In may data centers we have multi-vendor deployments. In these environm=
ents we may have different managers assigning chains. There should to be so=
me convention for splitting the address space between these vendors. The mo=
st desirable solution to this is to add an assigned organization ID to the =
address space. An alternative would be to separate the SPI into a 4 and 20 =
bit field designating the high 4 bits as a local manager ID.
>=20

PQ>  You are conflating federation/configuration and frame format.  The mul=
ti-manager scenario is a control-plane/management-plane function.
_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Sun Apr 17 19:25:21 2016
Return-Path: <dm.ietf@outlook.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A92BB12DF5E for <sfc@ietfa.amsl.com>; Sun, 17 Apr 2016 19:25:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m3hnOQDVlzx7 for <sfc@ietfa.amsl.com>; Sun, 17 Apr 2016 19:25:17 -0700 (PDT)
Received: from COL004-OMC2S5.hotmail.com (col004-omc2s5.hotmail.com [65.55.34.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C373A12DD7E for <sfc@ietf.org>; Sun, 17 Apr 2016 19:25:17 -0700 (PDT)
Received: from COL402-EAS238 ([65.55.34.72]) by COL004-OMC2S5.hotmail.com over TLS secured channel with Microsoft SMTPSVC(7.5.7601.23008);  Sun, 17 Apr 2016 19:25:17 -0700
X-TMN: [KDojuPRw94xAC7SQZIvEXh//fe9yhDT3]
X-Originating-Email: [dm.ietf@outlook.com]
Message-ID: <COL402-EAS2380C2152AE89807DDFD033E56B0@phx.gbl>
MIME-Version: 1.0
To: "sfc@ietf.org" <sfc@ietf.org>
From: David May <dm.ietf@outlook.com>
Date: Sun, 17 Apr 2016 22:25:12 -0400
Importance: normal
X-Priority: 3
Thread-Topic: 
Content-Type: multipart/alternative; boundary="_2985B387-46A9-4F9A-BCA0-4C3833BB88CF_"
X-OriginalArrivalTime: 18 Apr 2016 02:25:17.0041 (UTC) FILETIME=[8BE02610:01D19919]
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ccyJqR2ZolMQed0rMSe9Gkd2EcY>
Subject: Re: [sfc] regarding NSH draft last call
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Apr 2016 02:25:19 -0000

--_2985B387-46A9-4F9A-BCA0-4C3833BB88CF_
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"

I support this draft

As an operator, we plan to use a standardized way of classifying and carryi=
ng metadata across various transport options and look to use the metadata f=
or not only service function chaining, but actual policy enforcement in rel=
ation to the transported metadata.  Although still much work in other areas=
, the draft for NSH is sufficient to meet the intent. =20

-Dave May-

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
Sent: Wednesday, March 30, 2016 7:48 PM
To: sfc@ietf.org
Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Dear WG:

This note begins a WG last call on draft-ietf-sfc-nsh-04.txt (https://datat=
racker.ietf.org/doc/draft-ietf-sfc-nsh/).

The editors of the NSH document have indicated that they have addressed all=
 known comments and that there are no open issues with the current version =
of the document.

Substantive comments to the list please, editorial comments can go directly=
 to the document editors.

We'll also get a brief update from the editors at next week's meeting. If t=
here are any remaining issues with the document, raising them before the me=
eting would be especially helpful.

For the chairs,
Thomas

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc



--_2985B387-46A9-4F9A-BCA0-4C3833BB88CF_
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html; charset="utf-8"

<html xmlns:o=3D"urn:schemas-microsoft-com:office:office" xmlns:w=3D"urn:sc=
hemas-microsoft-com:office:word" xmlns:m=3D"http://schemas.microsoft.com/of=
fice/2004/12/omml" xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta ht=
tp-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta name=
=3DGenerator content=3D"Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style></head><body lang=3DEN-US link=3Dblue vlink=3D"#954F72"><div cla=
ss=3DWordSection1><p class=3DMsoNormal>I support this draft</p><p class=3DM=
soNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>As an operator, we plan =
to use a standardized way of classifying and carrying metadata across vario=
us transport options and look to use the metadata for not only service func=
tion chaining, but actual policy enforcement in relation to the transported=
 metadata.=C2=A0 Although still much work in other areas, the draft for NSH=
 is sufficient to meet the intent.=C2=A0 <o:p></o:p></p><p class=3DMsoNorma=
l><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>-Dave May-</p><p class=3DMsoNor=
mal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span style=3D'font-size:12.0=
pt;font-family:"Times New Roman",serif'>-----Original Message-----<br>From:=
 sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto:sfc-bounces@ietf.org</=
a>] On Behalf Of Thomas Narten<br>Sent: Wednesday, March 30, 2016 7:48 PM<b=
r>To: sfc@ietf.org<br>Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04=
.txt<br><br>Dear WG:<br><br>This note begins a WG last call on draft-ietf-s=
fc-nsh-04.txt (<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sfc-n=
sh/">https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/</a>).<br><br>The =
editors of the NSH document have indicated that they have addressed all kno=
wn comments and that there are no open issues with the current version of t=
he document.<br><br>Substantive comments to the list please, editorial comm=
ents can go directly to the document editors.<br><br>We'll also get a brief=
 update from the editors at next week's meeting. If there are any remaining=
 issues with the document, raising them before the meeting would be especia=
lly helpful.<br><br>For the chairs,<br>Thomas<br><br>______________________=
_________________________<br>sfc mailing list<br>sfc@ietf.org<br><a href=3D=
"https://www.ietf.org/mailman/listinfo/sfc">https://www.ietf.org/mailman/li=
stinfo/sfc</a><br><br><br></span><o:p></o:p></p></div></body></html>=

--_2985B387-46A9-4F9A-BCA0-4C3833BB88CF_--


From nobody Mon Apr 18 04:39:25 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3BDCC12B055 for <sfc@ietfa.amsl.com>; Mon, 18 Apr 2016 04:39:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.618
X-Spam-Level: 
X-Spam-Status: No, score=-2.618 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CUSnPNa4779y for <sfc@ietfa.amsl.com>; Mon, 18 Apr 2016 04:39:22 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 90FB312D104 for <sfc@ietf.org>; Mon, 18 Apr 2016 04:39:21 -0700 (PDT)
Received: from omfedm05.si.francetelecom.fr (unknown [xx.xx.xx.1]) by omfedm09.si.francetelecom.fr (ESMTP service) with ESMTP id E8A832DC086; Mon, 18 Apr 2016 13:39:19 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.32]) by omfedm05.si.francetelecom.fr (ESMTP service) with ESMTP id 1160235C076; Mon, 18 Apr 2016 13:39:19 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM32.corporate.adroot.infra.ftgroup ([fe80::8924:188:2124:a046%19]) with mapi id 14.03.0279.002; Mon, 18 Apr 2016 13:39:18 +0200
From: <mohamed.boucadair@orange.com>
To: Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] TLV class of variable-length metadata should have a restricted range
Thread-Index: AdGWYcf4eX5Az/rjTQOEcq50WzDr6QC8LclA
Date: Mon, 18 Apr 2016 11:39:18 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D5BB09@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B933008D5BB09OPEXCLILMA3corp_"
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.18.100316
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/1qWGtW1QVxXdG-OHy2T-bhh-C38>
Subject: Re: [sfc] TLV class of variable-length metadata should have a restricted range
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Apr 2016 11:39:24 -0000

--_000_787AE7BB302AE849A7480A190F8B933008D5BB09OPEXCLILMA3corp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Dave, all,

Thank you for raising this point.

IANA considerations should be sketched in reference to RFC5226 (see https:/=
/tools.ietf.org/html/rfc5226#section-4.1).

IMO, it is reasonable to define ranges:

=B7         assigned via Standards Action

=B7         assigned via Specification Required

=B7         reserved for Private Use

=B7         reserved for Experimental Use

Note that the ranges you are proposing are not aligned with the current TLV=
 encoding (Type is encoded in 7 bits).

Saying that, I still do see value in reusing existing rich registries such =
as IPFIX. Doing so allows to use immediately a code point while ensuring in=
teroperability. A dedicated field in the encoding of the TLV can be defined=
 (or adjust TLV Class?) to point to the registry in use.

BTW, the IANA section should include more details about "TLV Class".

Cheers,
Med

De : sfc [mailto:sfc-bounces@ietf.org] De la part de Dave Dolson
Envoy=E9 : jeudi 14 avril 2016 17:25
=C0 : sfc@ietf.org
Objet : [sfc] TLV class of variable-length metadata should have a restricte=
d range

Regarding the TLV Class of variable-length metadata, https://tools.ietf.org=
/html/draft-ietf-sfc-nsh-04#section-3.5.1
It is common for such fields to reserve ranges, allowing for future growth =
into unanticipated uses.

E.g., off the top of my head,
classes 0 to 0x1ff --> types allocated by IETF
classes 0x200 to 0x7fff --> allocated by IANA
Classes 0x8000 to 0xbfff --> reserved, do not use
classes 0xc000 to 0xefff --> locally administered
classes 0xf000 to 0xffff --> experimental

Or similar? I'm not sure what the best practice for this is.

Generally, I'd want to try something experimentally before requesting IANA =
allocation for it (experimental),
or maybe types are too specific to warrant IANA allocation (locally adminis=
tered).

Can something like this be added to draft-ietf-sfc-nsh ?


David Dolson
Senior Software Architect, Sandvine Inc.


--_000_787AE7BB302AE849A7480A190F8B933008D5BB09OPEXCLILMA3corp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1235580489;
	mso-list-type:hybrid;
	mso-list-template-ids:527468770 -859409618 67895299 67895301 67895297 6789=
5299 67895301 67895297 67895299 67895301;}
@list l0:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Hi Dave, all,
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Thank you for raising this poin=
t.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">IANA considerations should be s=
ketched in reference to RFC5226 (see
<a href=3D"https://tools.ietf.org/html/rfc5226#section-4.1">https://tools.i=
etf.org/html/rfc5226#section-4.1</a>).
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">IMO, it is reasonable to define=
 ranges:<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:10.0p=
t;font-family:Symbol;color:black"><span style=3D"mso-list:Ignore">=B7<span =
style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:10.0=
pt;font-family:&quot;Courier New&quot;;color:black">assigned via Standards =
Action<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:10.0p=
t;font-family:Symbol;color:black"><span style=3D"mso-list:Ignore">=B7<span =
style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:10.0=
pt;font-family:&quot;Courier New&quot;;color:black">assigned via Specificat=
ion Required<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:10.0p=
t;font-family:Symbol;color:black"><span style=3D"mso-list:Ignore">=B7<span =
style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:10.0=
pt;font-family:&quot;Courier New&quot;;color:black">reserved for Private Us=
e<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:10.0p=
t;font-family:Symbol;color:black"><span style=3D"mso-list:Ignore">=B7<span =
style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:10.0=
pt;font-family:&quot;Courier New&quot;;color:black">reserved for Experiment=
al Use<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Note that the ranges you are pr=
oposing are not aligned with the current TLV encoding (Type is encoded in 7=
 bits).
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Saying that, I still do see val=
ue in reusing existing rich registries such as IPFIX. Doing so allows to us=
e immediately a code point while ensuring interoperability.
 A dedicated field in the encoding of the TLV can be defined (or adjust TLV=
 Class?) to point to the registry in use.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">BTW, the IANA section should in=
clude more details about &#8220;TLV Class&#8221;.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc =
[mailto:sfc-bounces@ietf.org]
<b>De la part de</b> Dave Dolson<br>
<b>Envoy=E9&nbsp;:</b> jeudi 14 avril 2016 17:25<br>
<b>=C0&nbsp;:</b> sfc@ietf.org<br>
<b>Objet&nbsp;:</b> [sfc] TLV class of variable-length metadata should have=
 a restricted range<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Regarding the TLV Class of vari=
able-length metadata,
<a href=3D"https://tools.ietf.org/html/draft-ietf-sfc-nsh-04#section-3.5.1"=
>https://tools.ietf.org/html/draft-ietf-sfc-nsh-04#section-3.5.1</a><o:p></=
o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">It is common for such fields to=
 reserve ranges, allowing for future growth into unanticipated uses.<o:p></=
o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">E.g., off the top of my head,<o=
:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">classes 0 to 0x1ff --&gt; types=
 allocated by IETF<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">classes 0x200 to 0x7fff --&gt; =
allocated by IANA<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Classes 0x8000 to 0xbfff --&gt;=
 reserved, do not use<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">classes 0xc000 to 0xefff --&gt;=
 locally administered<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">classes 0xf000 to 0xffff --&gt;=
 experimental<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Or similar? I&#8217;m not sure =
what the best practice for this is.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Generally, I&#8217;d want to tr=
y something experimentally before requesting IANA allocation for it (experi=
mental),
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">or maybe types are too specific=
 to warrant IANA allocation (locally administered).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Can something like this be adde=
d to draft-ietf-sfc-nsh ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">David Dolson<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Senior Software Architect, Sand=
vine Inc.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
</div>
</body>
</html>

--_000_787AE7BB302AE849A7480A190F8B933008D5BB09OPEXCLILMA3corp_--


From nobody Mon Apr 18 07:33:05 2016
Return-Path: <asayeed@redhat.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 22BC512E032 for <sfc@ietfa.amsl.com>; Mon, 18 Apr 2016 07:33:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.621
X-Spam-Level: 
X-Spam-Status: No, score=-2.621 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OMgrFUJ8QZe5 for <sfc@ietfa.amsl.com>; Mon, 18 Apr 2016 07:33:02 -0700 (PDT)
Received: from mail-qk0-f180.google.com (mail-qk0-f180.google.com [209.85.220.180]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A34112E02E for <sfc@ietf.org>; Mon, 18 Apr 2016 07:33:02 -0700 (PDT)
Received: by mail-qk0-f180.google.com with SMTP id n63so45479910qkf.0 for <sfc@ietf.org>; Mon, 18 Apr 2016 07:33:02 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=OnzERlxkl9pPjc4fM9b5o4ndHIuyB13nQqBRidvl4NE=; b=JQrTNnGabRjHabmAfrhmFEuc+895CfD6UbNqK+YwVBNgVreFj1VAczksuP3KwCuCAV gLe8dfAXrUkwWO4ktoUNANQBhfysjvr6cH+tSi7t3bStH7e1kJiWzrII+3J3LTk3riBj TgcJEFvT1YeHytRmqFFn82owKkZMyjfi5QPjVajo8MSiFT0FuvrnYE5SxnDozsyR7e1M kKKN0zct7uk6HJkDc6L7Om5hQTVttdG9gGMRIYRSWn2QcMXAoVQE6Be6htXx6BT0rW7F K6tAcFxiJZwPHiUVOkzKmIne1jEyEajm5Yguw8ndjoZaOEc5vi7H2jRT9oyBW84kwcE1 8oHQ==
X-Gm-Message-State: AOPr4FW0cD8wWeJZl68oegRfAXlQpMcNr0IdiACLmMPuJLmY0TmvRy5YX2gUUnQJAF/zKgl5
X-Received: by 10.55.77.206 with SMTP id a197mr44406571qkb.43.1460989981183; Mon, 18 Apr 2016 07:33:01 -0700 (PDT)
Received: from wlan-196-77.bos.redhat.com (nat-pool-bos-t.redhat.com. [66.187.233.206]) by smtp.gmail.com with ESMTPSA id d192sm6328111qkc.24.2016.04.18.07.32.59 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 18 Apr 2016 07:33:00 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Azhar Sayeed <asayeed@redhat.com>
In-Reply-To: <57133AED.4080005@pi.nu>
Date: Mon, 18 Apr 2016 10:33:31 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <33D1653F-230B-4877-AB8C-C1BAE6C26BD3@redhat.com>
References: <57133AED.4080005@pi.nu>
To: Loa Andersson <loa@pi.nu>
X-Mailer: Apple Mail (2.3124)
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ORD2IVCVoe43dCOH02LzBa65poQ>
Cc: draft-ietf-sfc-nsh@ietf.org, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Apr 2016 14:33:04 -0000

Loa,

+1 Agree and not just LDP, but BFD TLV or any of the ISIS TLVs have the =
same structure - This should also be consistent..the question then is =
can the current TLV structure in draft-~nsh-04 be re-configured to align =
with all the other TLV=E2=80=99s structure?=20

Azhar


> On Apr 17, 2016, at 3:27 AM, Loa Andersson <loa@pi.nu> wrote:
>=20
> Working Group, authors,
>=20
> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to read
> it before now) and have a question on how the TLV concept is =
understood
> in the draft.
>=20
> For example in LDP TLV were defined as Type, Length Value, e.g. (from
> RFC 5036 section 3.3):
>=20
>   LDP uses a Type-Length-Value (TLV) encoding scheme to encode much of
>   the information carried in LDP messages.
>=20
>   An LDP TLV is encoded as a 2 octet field that uses 14 bits to =
specify
>   a Type and 2 bits to specify behavior when an LSR doesn't recognize
>   the Type, followed by a 2 octet Length field, followed by a variable
>   length Value field.
>=20
>=20
>    0                   1                   2                   3
>    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>   |U|F|        Type               |            Length             |
>   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>   |                                                               |
>   |                             Value                             |
>   ~                                                               ~
>   |                                                               |
>   |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>   |                               |
>   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>=20
> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more =
complicated
> and I'm struggling a bit to understand if the "name" TLV should be =
used.
>=20
> =46rom draft-ietf-sfc-nsh-04
>=20
>        0                   1                   2                   3
>        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>       |          TLV Class            |C|    Type     |R|R|R|   Len   =
|
>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>       |                      Variable Metadata                        =
|
>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>=20
>=20
>=20
>                    Figure 6: Variable Context Headers
>=20
> The draft is not entirely clear in this respect, but I think this is =
what you call a TLV.
>=20
> Should I understand this way?
>=20
> Type =3D TLV Class + C + Type (24 bits)
> Length =3D len (5 bits)
> Value =3D Variable Metadata
>=20
> A convention we used in MPLS when we have variable length fields is
> to use a ~ instead of the |, like this:.
>=20
>        0                   1                   2                   3
>        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>       |          TLV Class            |C|    Type     |R|R|R|   Len   =
|
>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>       ~                      Variable Metadata                        =
~
>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>=20
> I suggest that this is a good practice that could be adopted here =
also.
>=20
> Two more questions:
>=20
> If the metadata does not align exactly with the 32 bit/4 byte =
structure,
> what is the rules for padding?
>=20
> A last, but a bit different question, do you need indicators like the =
U
> and F flags in an to indicate what should happen if the node does not
> recognize the (TLV Class, C, Type)-field?
>=20
> /Loa
>=20
>=20
> PS
>=20
> I will also have a few more editorial comments that will be sent to
> the authors within a day or two.
>=20
>=20
> --=20
>=20
>=20
> Loa Andersson                        email: loa@mail01.huawei.com
> Senior MPLS Expert                          loa@pi.nu
> Huawei Technologies (consultant)     phone: +46 739 81 21 64
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Mon Apr 18 07:58:44 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 00D8D12DD16; Mon, 18 Apr 2016 07:58:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level: 
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qD1sZDltoRGe; Mon, 18 Apr 2016 07:58:40 -0700 (PDT)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) by ietfa.amsl.com (Postfix) with ESMTP id 443B912DCF0; Mon, 18 Apr 2016 07:58:40 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by wtl-exchp-1.sandvine.com ([::1]) with mapi id 14.03.0195.001; Mon, 18 Apr 2016 10:58:38 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: Loa Andersson <loa@pi.nu>, "sfc@ietf.org" <sfc@ietf.org>, "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
Thread-Index: AQHRmHqs0gacCRpZF0y3tTXhX+Qh65+P0xzw
Date: Mon, 18 Apr 2016 14:58:38 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F2A6A6@wtl-exchp-2.sandvine.com>
References: <57133AED.4080005@pi.nu>
In-Reply-To: <57133AED.4080005@pi.nu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/AaQTcIhw6-cbn0uSFEkO8WmqimY>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Apr 2016 14:58:43 -0000

On the point of rules for padding, I raised this some time ago
(first bullet in https://mailarchive.ietf.org/arch/msg/sfc/Ag5JBto2inEbAuYI=
nyUh2kK3VYg)

It would be more useful to have length specified in bytes, with padding to =
4-byte alignment.
Otherwise, I guess variable metadata must have a second length field within=
 it?




-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Loa Andersson
Sent: Sunday, April 17, 2016 3:28 AM
To: sfc@ietf.org; draft-ietf-sfc-nsh@ietf.org
Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TL=
Vs in draft-ietf-sfc-nsh

Working Group, authors,

I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to read
it before now) and have a question on how the TLV concept is understood
in the draft.

For example in LDP TLV were defined as Type, Length Value, e.g. (from
RFC 5036 section 3.3):

    LDP uses a Type-Length-Value (TLV) encoding scheme to encode much of
    the information carried in LDP messages.

    An LDP TLV is encoded as a 2 octet field that uses 14 bits to specify
    a Type and 2 bits to specify behavior when an LSR doesn't recognize
    the Type, followed by a 2 octet Length field, followed by a variable
    length Value field.


     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |U|F|        Type               |            Length             |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |                             Value                             |
    ~                                                               ~
    |                                                               |
    |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more complicated
and I'm struggling a bit to understand if the "name" TLV should be used.

 From draft-ietf-sfc-nsh-04

         0                   1                   2                   3
         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        |          TLV Class            |C|    Type     |R|R|R|   Len   |
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        |                      Variable Metadata                        |
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+



                     Figure 6: Variable Context Headers

The draft is not entirely clear in this respect, but I think this is=20
what you call a TLV.

Should I understand this way?

Type =3D TLV Class + C + Type (24 bits)
Length =3D len (5 bits)
Value =3D Variable Metadata

A convention we used in MPLS when we have variable length fields is
to use a ~ instead of the |, like this:.

         0                   1                   2                   3
         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        |          TLV Class            |C|    Type     |R|R|R|   Len   |
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        ~                      Variable Metadata                        ~
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

I suggest that this is a good practice that could be adopted here also.

Two more questions:

If the metadata does not align exactly with the 32 bit/4 byte structure,
what is the rules for padding?

A last, but a bit different question, do you need indicators like the U
and F flags in an to indicate what should happen if the node does not
recognize the (TLV Class, C, Type)-field?

/Loa


PS

I will also have a few more editorial comments that will be sent to
the authors within a day or two.


--=20


Loa Andersson                        email: loa@mail01.huawei.com
Senior MPLS Expert                          loa@pi.nu
Huawei Technologies (consultant)     phone: +46 739 81 21 64

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Mon Apr 18 08:21:06 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9598A12D98D for <sfc@ietfa.amsl.com>; Mon, 18 Apr 2016 08:21:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.895
X-Spam-Level: 
X-Spam-Status: No, score=-2.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A5ik34W-4vag for <sfc@ietfa.amsl.com>; Mon, 18 Apr 2016 08:21:02 -0700 (PDT)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) by ietfa.amsl.com (Postfix) with ESMTP id 8E27A12D9AB for <sfc@ietf.org>; Mon, 18 Apr 2016 08:21:02 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by wtl-exchp-1.sandvine.com ([::1]) with mapi id 14.03.0195.001; Mon, 18 Apr 2016 11:21:01 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] TLV class of variable-length metadata should have a restricted range
Thread-Index: AQHRmWb0PGjqacyz9EidOrx7rW39tJ+P1pwA
Date: Mon, 18 Apr 2016 15:21:00 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F2A80B@wtl-exchp-2.sandvine.com>
References: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008D5BB09@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D5BB09@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830F2A80Bwtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/zVFOThXs3eJBpHaUYkdx_yZas88>
Subject: Re: [sfc] TLV class of variable-length metadata should have a restricted range
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Apr 2016 15:21:04 -0000

--_000_E8355113905631478EFF04F5AA706E9830F2A80Bwtlexchp2sandvi_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Med,
I was discussing the "TLV Class" field, which is 16 bits.

But thank you for finding the BCP for writing IANA considerations.



-Dave



From: mohamed.boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
Sent: Monday, April 18, 2016 7:39 AM
To: Dave Dolson; sfc@ietf.org
Subject: RE: [sfc] TLV class of variable-length metadata should have a rest=
ricted range

Hi Dave, all,

Thank you for raising this point.

IANA considerations should be sketched in reference to RFC5226 (see https:/=
/tools.ietf.org/html/rfc5226#section-4.1).

IMO, it is reasonable to define ranges:

=B7         assigned via Standards Action

=B7         assigned via Specification Required

=B7         reserved for Private Use

=B7         reserved for Experimental Use

Note that the ranges you are proposing are not aligned with the current TLV=
 encoding (Type is encoded in 7 bits).

Saying that, I still do see value in reusing existing rich registries such =
as IPFIX. Doing so allows to use immediately a code point while ensuring in=
teroperability. A dedicated field in the encoding of the TLV can be defined=
 (or adjust TLV Class?) to point to the registry in use.

BTW, the IANA section should include more details about "TLV Class".

Cheers,
Med

De : sfc [mailto:sfc-bounces@ietf.org] De la part de Dave Dolson
Envoy=E9 : jeudi 14 avril 2016 17:25
=C0 : sfc@ietf.org<mailto:sfc@ietf.org>
Objet : [sfc] TLV class of variable-length metadata should have a restricte=
d range

Regarding the TLV Class of variable-length metadata, https://tools.ietf.org=
/html/draft-ietf-sfc-nsh-04#section-3.5.1
It is common for such fields to reserve ranges, allowing for future growth =
into unanticipated uses.

E.g., off the top of my head,
classes 0 to 0x1ff --> types allocated by IETF
classes 0x200 to 0x7fff --> allocated by IANA
Classes 0x8000 to 0xbfff --> reserved, do not use
classes 0xc000 to 0xefff --> locally administered
classes 0xf000 to 0xffff --> experimental

Or similar? I'm not sure what the best practice for this is.

Generally, I'd want to try something experimentally before requesting IANA =
allocation for it (experimental),
or maybe types are too specific to warrant IANA allocation (locally adminis=
tered).

Can something like this be added to draft-ietf-sfc-nsh ?


David Dolson
Senior Software Architect, Sandvine Inc.


--_000_E8355113905631478EFF04F5AA706E9830F2A80Bwtlexchp2sandvi_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle22
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1235580489;
	mso-list-type:hybrid;
	mso-list-template-ids:527468770 -859409618 67895299 67895301 67895297 6789=
5299 67895301 67895297 67895299 67895301;}
@list l0:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Med,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I was discussing the &=
#8220;TLV Class&#8221; field, which is 16 bits.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">But thank you for find=
ing the BCP for writing IANA considerations.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">-Dave<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> mohamed.=
boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
<br>
<b>Sent:</b> Monday, April 18, 2016 7:39 AM<br>
<b>To:</b> Dave Dolson; sfc@ietf.org<br>
<b>Subject:</b> RE: [sfc] TLV class of variable-length metadata should have=
 a restricted range<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black">Hi Dave, all,
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Thank you for raising this point.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">IANA considerations should be sketched in refe=
rence to RFC5226 (see
<a href=3D"https://tools.ietf.org/html/rfc5226#section-4.1">https://tools.i=
etf.org/html/rfc5226#section-4.1</a>).
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">IMO, it is reasonable to define ranges:<o:p></=
o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol;color:black"><span style=3D"mso-list:Ignore">=B7<span style=3D"font:7.=
0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Courier New&quot;;color:black">assigned via Standards Action<o:p></o:=
p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol;color:black"><span style=3D"mso-list:Ignore">=B7<span style=3D"font:7.=
0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Courier New&quot;;color:black">assigned via Specification Required<o:=
p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol;color:black"><span style=3D"mso-list:Ignore">=B7<span style=3D"font:7.=
0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Courier New&quot;;color:black">reserved for Private Use<o:p></o:p></s=
pan></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol;color:black"><span style=3D"mso-list:Ignore">=B7<span style=3D"font:7.=
0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Courier New&quot;;color:black">reserved for Experimental Use<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Note that the ranges you are proposing are not=
 aligned with the current TLV encoding (Type is encoded in 7 bits).
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Saying that, I still do see value in reusing e=
xisting rich registries such as IPFIX. Doing so allows to use immediately a=
 code point while ensuring interoperability. A
 dedicated field in the encoding of the TLV can be defined (or adjust TLV C=
lass?) to point to the registry in use.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">BTW, the IANA section should include more deta=
ils about &#8220;TLV Class&#8221;.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span=
 lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot=
;sans-serif&quot;"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto:sfc=
-bounces@ietf.org</a>]
<b>De la part de</b> Dave Dolson<br>
<b>Envoy=E9&nbsp;:</b> jeudi 14 avril 2016 17:25<br>
<b>=C0&nbsp;:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Objet&nbsp;:</b> [sfc] TLV class of variable-length metadata should have=
 a restricted range<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"FR"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal">Regarding the TLV Class of variable-length metadata,=
 <a href=3D"https://tools.ietf.org/html/draft-ietf-sfc-nsh-04#section-3.5.1=
">
https://tools.ietf.org/html/draft-ietf-sfc-nsh-04#section-3.5.1</a><o:p></o=
:p></p>
<p class=3D"MsoNormal">It is common for such fields to reserve ranges, allo=
wing for future growth into unanticipated uses.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">E.g., off the top of my head,<o:p></o:p></p>
<p class=3D"MsoNormal">classes 0 to 0x1ff --&gt; types allocated by IETF<o:=
p></o:p></p>
<p class=3D"MsoNormal">classes 0x200 to 0x7fff --&gt; allocated by IANA<o:p=
></o:p></p>
<p class=3D"MsoNormal">Classes 0x8000 to 0xbfff --&gt; reserved, do not use=
<o:p></o:p></p>
<p class=3D"MsoNormal">classes 0xc000 to 0xefff --&gt; locally administered=
<o:p></o:p></p>
<p class=3D"MsoNormal">classes 0xf000 to 0xffff --&gt; experimental<o:p></o=
:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Or similar? I&#8217;m not sure what the best practic=
e for this is.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Generally, I&#8217;d want to try something experimen=
tally before requesting IANA allocation for it (experimental),
<o:p></o:p></p>
<p class=3D"MsoNormal">or maybe types are too specific to warrant IANA allo=
cation (locally administered).<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Can something like this be added to draft-ietf-sfc-n=
sh ?<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">David Dolson<o:p></o:p></p>
<p class=3D"MsoNormal">Senior Software Architect, Sandvine Inc.<o:p></o:p><=
/p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_E8355113905631478EFF04F5AA706E9830F2A80Bwtlexchp2sandvi_--


From nobody Mon Apr 18 11:04:42 2016
Return-Path: <don.fedyk@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8D0EF12E457 for <sfc@ietfa.amsl.com>; Mon, 18 Apr 2016 11:04:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.22
X-Spam-Level: 
X-Spam-Status: No, score=-4.22 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4O55M27Dv1WH for <sfc@ietfa.amsl.com>; Mon, 18 Apr 2016 11:04:38 -0700 (PDT)
Received: from g1t5424.austin.hp.com (g1t5424.austin.hp.com [15.216.225.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 87D9D12E456 for <sfc@ietf.org>; Mon, 18 Apr 2016 11:04:37 -0700 (PDT)
Received: from G1W8108.americas.hpqcorp.net (g1w8108.austin.hp.com [16.193.72.60]) (using TLSv1.2 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by g1t5424.austin.hp.com (Postfix) with ESMTPS id 7F2A85B; Mon, 18 Apr 2016 18:04:35 +0000 (UTC)
Received: from G9W8456.americas.hpqcorp.net (16.216.161.95) by G1W8108.americas.hpqcorp.net (16.193.72.60) with Microsoft SMTP Server (TLS) id 15.0.1076.9; Mon, 18 Apr 2016 18:04:25 +0000
Received: from G9W8456.americas.hpqcorp.net (2002:10df:2d9::10df:2d9) by G9W8456.americas.hpqcorp.net (2002:10df:2d9::10df:2d9) with Microsoft SMTP Server (TLS) id 15.0.1076.9; Mon, 18 Apr 2016 18:04:25 +0000
Received: from G9W3616.americas.hpqcorp.net (16.216.186.51) by G9W8456.americas.hpqcorp.net (16.216.161.95) with Microsoft SMTP Server (TLS) id 15.0.1076.9 via Frontend Transport; Mon, 18 Apr 2016 18:04:25 +0000
Received: from G4W3293.americas.hpqcorp.net ([169.254.2.173]) by G9W3616.americas.hpqcorp.net ([16.216.186.51]) with mapi id 14.03.0169.001; Mon, 18 Apr 2016 18:04:22 +0000
From: "Fedyk, Don" <don.fedyk@hpe.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfQ9ZjlrPWHUEW4Ok49bydgVZ+IUfhwgAAV1QCAAAB/UIAAAnuAgAACFbCAAB+GAIAGmV1Q
Date: Mon, 18 Apr 2016 18:04:21 +0000
Message-ID: <A46D9C092EA46F489F135060986AD9FF225C965E@G4W3293.americas.hpqcorp.net>
References: <m3egarz7kh.wl-narten@us.ibm.com> <A46D9C092EA46F489F135060986AD9FF225C4091@G4W3293.americas.hpqcorp.net> <570EA4EE.8040203@joelhalpern.com> <A46D9C092EA46F489F135060986AD9FF225C412E@G4W3293.americas.hpqcorp.net> <570EA76D.8080000@joelhalpern.com> <A46D9C092EA46F489F135060986AD9FF225C41A6@G4W3293.americas.hpqcorp.net> <570EC39E.6050201@joelhalpern.com>
In-Reply-To: <570EC39E.6050201@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [16.210.48.21]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/FrYbJOP2ePT6YCF23ahEwc4ko6Y>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Apr 2016 18:04:40 -0000

Hi Joel

> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Wednesday, April 13, 2016 6:10 PM
> To: Fedyk, Don <don.fedyk@hpe.com>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
<Snip> =20
> So the question I have is what wording in the NSH draft causes you concer=
n.
> Is there wording in the NSH draft that gives the impression that the SPI =
/ SI is
> only an "identifier"?  Is there wording that we could add that would help=
?
[Don]  - Since you bring it up: Short answer yes when you get to section 7.=
4 Figure 14.=20

The wording around service forwarding is a bit disconnected spread over a f=
ew sections as I understand it there are 3 modes of forwarding operations i=
nvolving SFFs and SFs that I can see. It was initially discussions on the l=
ist about identifiers that made me look more deeply at the forwarding.   I'=
ll keep my comments to service forwarding even though these sections also d=
iscuss the mapping to transport I'll focus on SPI and SI handling text.=20

Also note there are two occurrences of SPI/ID and 4 occurrences of SPI/SI w=
hich I assume are both Service Path Identifier and Service Index.  ID is ne=
ver defined but SI is equated to node ID or location.  I think SPI/ID is a =
typo.

With respect to SF and SFF service forwarding=20
Section 4 and Sections 7.1 - 7.3=20
1) SF NSH Aware using SI decrement.   The SFF sends to an SF that does its =
thing, and has access to any metadata and passes the packet back (to the sa=
me SFF) with a decremented SI.   The SFF then looks up the next hop based o=
n the SPI/SI that maps to another SF optionally via a Network transport map=
ping. =20
2) SF NSH Unaware - A proxy does the decrementing of the SI.=20

Observation:  The decrementing of SI keeps the forwarding through an SF to =
a simplistic form. The text describing this mode implies SF tracking using =
SI and uses a programmed lookup of the next SPI/SI.=20

Note: The text about decrementing to zero seems unnecessary given that any =
SFF that receives an SPI with any SI value that is unexpected is a forwardi=
ng mistake.   Zero is just a specific example of the general case of chain =
programming where SPI/SI must make sense at each hop. SI of zero does not m=
ake sense but neither do any other values of SI that are not programmed for=
 that SPI/SI combination.  =20
We have always assumed that a control plane/management plane are used to se=
tup/verify chains and some form of OAM should be used to verify chains.=20

Since the simplistic form does not allow the more complex chains, in Sectio=
n 7.4 you have the third mode.=20
3) SF NSH Aware with reclassification - This mode allows an SF to do anythi=
ng to SPI/SI - not specified exactly what, just that reclassification is al=
lowed and presumably SPI and or SI can be changed/reset.   One might imply =
from reading and figure 14 that this is based on "identifier" (SPI ) lookup=
 and context (or Class) in this example.  It seems to follow that SFs are l=
ess concerned with SI actual values.  This sections implies SPI can be chan=
ged and does not describe what happens to SI. Presumably the SI is set to s=
ome "new' value since an initial classifier would not know what SI should b=
e for all combinations of chains so SI is  location only with respect to a =
specific SPI.=20

Is it true that SI is not consulted when reclassification takes place?  =20

Cheers
Don=20

>=20
> Thanks,
> Joel
>=20
> On 4/13/16 4:39 PM, Fedyk, Don wrote:
> > Joel
> >
> > I think that
> > https://tools.ietf.org/html/draft-kumar-sfc-nsh-forwarding-00
> > clarifies Service Forwarding (along the chain) versus Packet
> > forwarding (elsewhere).    But this draft points out that the NSH
> > draft is "confusing" with respect to some parts of service
> > forwarding.   And when I and others have asked on the list about
> > subtleties of Service forwarding  behaviors and the relationship of
> > chain ID with various packet formats;  the answers were NSH SID and SI
> > were just identifiers.  So while there is not a statement they are
> > non-forwarding identifiers the confusion still exists because the
> > behavior is not clear. I still think NSH SID and SI  behave as an
> > address space - receive a packet; lookup the address; if recognized
> > process; then place the next hop address (includes not modifying the
> > address in some cases) on the packet and forward on.  If the fields
> > don't match expected values;  drop or exception process.
> >
> > Cheers Don
> >
> >
> >> -----Original Message----- From: Joel M. Halpern
> >> [mailto:jmh@joelhalpern.com] Sent: Wednesday, April 13, 2016 4:09 PM
> >> To: Fedyk, Don <don.fedyk@hpe.com>; Thomas Narten
> >> <narten@us.ibm.com>; sfc@ietf.org Subject: Re: [sfc] WG last call for
> >> draft-ietf-sfc-nsh-04.txt
> >>
> >> Given that the draft describes how to use the SFP ID and Index for
> >> forwarding, it would seem very strange to argue that it does not
> >> describe a forwarding behavior, or that those fields are not for use
> >> by forwarding.  It is not REQUIRED that they be used for forwarding
> >> at an SFF, but it is certainly permitted.
> >>
> >> Is there wording in the draft that says that these are non-forwarding
> >> identifiers?  If so, we really should fix that.
> >>
> >> Yours, Joel
> >>
> >> On 4/13/16 4:05 PM, Fedyk, Don wrote:
> >>> Hi Joel
> >>>
> >>> The argument has been put forward that NSH is only carrying
> >>> identifiers.  When I look at NSH service forwarding that I know I
> >>> disagree with that statement.  I think that NSH SID + SI is an
> >>> address space and hence is not completely independent of forwarding.
> >>> The only way I can reason it out is to see other examples of
> >>> complete packet headers and operations per hop.
> >>> There has been a lot of hand waving.
> >>>
> >>> Cheers Don
> >>>
> >>>> -----Original Message----- From: Joel M. Halpern
> >>>> [mailto:jmh@joelhalpern.com] Sent: Wednesday, April 13, 2016
> >>>> 3:59 PM To: Fedyk, Don <don.fedyk@hpe.com>; Thomas Narten
> >>>> <narten@us.ibm.com>; sfc@ietf.org Subject: Re: [sfc] WG last call
> >>>> for draft-ietf-sfc-nsh-04.txt
> >>>>
> >>>> I am having trouble following your argument about forwarding in
> >>>> this email.
> >>>>
> >>>> Yes, transports can carry forwarding information.  The SFC
> >>>> archtiecture allows it.  that does not make including service paht
> >>>> identification in ht NSH header either redundant or incorrect.
> >>>>
> >>>> I do not know what you mean by needing more examples of the
> >>>> forwarding. The draft itself describes how the NSH header SFP ID
> >>>> and index can be used for the SFF forwarding decision.  That
> >>>> description seems quite clear to me.  If there is ambiguity or
> >>>> unclarity, please let the WG know, so we can improve it.
> >>>>
> >>>> Yours, Joel
> >>>>
> >>>> On 4/13/16 3:05 PM, Fedyk, Don wrote:
> >>>>> Hi Thomas
> >>>>>
> >>>>> At this point I do not support a last call on the NSH header.
> >>>>> There is a lot of
> >>>> comments and I don't think it is at a point where it is last call
> >>>> ready.
> >>>>>
> >>>>> I have be banging my head against the wall on this one because I
> >>>>> would like
> >>>> more concrete around the forwarding aspects.  I do accept that
> >>>> there is a draft (draft-kumar-sfc-nsh-forwarding-00 ) now that
> >>>> addresses some the confusion in NSH on forwarding and it helps.
> >>>> Although it seems odd to let a NSH draft progress as confusing and
> >>>> to clarify it later in another draft.
> >>>>>
> >>>>> My main objection is related to the fact that for a draft that
> >>>>> claims it is
> >>>> independent of forwarding it simply has not been proven.  That does
> >>>> not mean we need to specify forwarding but I'd still like to see
> >>>> the data formats of what are being "prototyped" today so I can
> >>>> compare with the other data formats that I know today.
> >>>> For example the MAC chaining draft we authored would like to use
> >>>> NSH for metadata but the MAC chaining local MACs bear a
> >>>> relationship with the NSH SDI & SI. In fact without these fields as
> >>>> mandatory it would be more independent in my case.
> >>>> I'm sure there are similar aspects with other transports types but
> >>>> until I see them and the operations I can't assess transport
> >>>> independence claims.
> >>>>>
> >>>>> There are other inconsistencies that I could live with in the
> >>>>> draft relating to
> >>>> the logic of the MD types etc. (A length field seems to be the only
> >>>> thing that is really needed and local context will determine the
> >>>> contents).  But we have made these comments more than once and
> I've
> >>>> seen little acknowledgment that if the NSH data is basically
> >>>> context driven fixed fields and TLVs could be mixed.
> >>>>>
> >>>>> So in short I support of the drafts goals as a way to carry
> >>>>> metadata but it is
> >>>> not ready for last call yet in my opinion.
> >>>>>
> >>>>> Thanks Don
> >>>>>
> >>>>>> -----Original Message----- From: sfc
> >>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
> >>>>>> Sent: Wednesday, March 30, 2016 10:48 PM To: sfc@ietf.org
> >>>>>> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>>>
> >>>>>> Dear WG:
> >>>>>>
> >>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> >>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> >>>>>>
> >>>>>> The editors of the NSH document have indicated that they have
> >>>>>> addressed all known comments and that there are no open issues
> >>>>>> with the current version of the document.
> >>>>>>
> >>>>>> Substantive comments to the list please, editorial comments can
> >>>>>> go directly to the document editors.
> >>>>>>
> >>>>>> We'll also get a brief update from the editors at next week's
> >>>>>> meeting. If there are any remaining issues with the document,
> >>>>>> raising them before the meeting would be especially helpful.
> >>>>>>
> >>>>>> For the chairs, Thomas
> >>>>>>
> >>>>>> _______________________________________________ sfc
> >> mailing list
> >>>>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >>>>>
> >>>>> _______________________________________________ sfc
> mailing
> >> list
> >>>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >>>>>
> >


From nobody Mon Apr 18 11:25:07 2016
Return-Path: <jmh.direct@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8408512E4F7 for <sfc@ietfa.amsl.com>; Mon, 18 Apr 2016 11:25:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level: 
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kJPeFmrixq7V for <sfc@ietfa.amsl.com>; Mon, 18 Apr 2016 11:25:03 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9C91512E4F6 for <sfc@ietf.org>; Mon, 18 Apr 2016 11:25:03 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 5F1C8240996; Mon, 18 Apr 2016 11:25:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461003903; bh=74Q7/Aa8tF3EdWiy/xMR9Lw7NfJNxq+mRAI6/wS6UEA=; h=Date:Subject:From:To:From; b=Z4Wl+1UeJUJuT2zbz+TKIEpAVp1419KiJWm4p7LqXAThLVOIzpFhFSeZIhEvQLUkI fax9u/4QziILnxyK9XN7OlZrsuoYBiKD81qBua/2Cpz5kVA1DpCmijXDyogdLaTCo3 2qFl8JgbfA43amS1m0XlnN0ojVW3knU7BbVYTJJU=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from [10.97.251.27] (unknown [166.170.32.9]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id D3F7F240828; Mon, 18 Apr 2016 11:25:00 -0700 (PDT)
Date: Mon, 18 Apr 2016 14:24:57 -0400
Message-ID: <uuhgqv71qahij9wctj8wr3iy.1461003897514@email.android.com>
Importance: normal
From: "jmh.direct" <jmh.direct@joelhalpern.com>
To: "Fedyk, Don" <don.fedyk@hpe.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="--_com.samsung.android.email_5635133258029360"
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/2MMFGNuY6FDrmeYr_N42pu9PwTc>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Apr 2016 18:25:06 -0000

----_com.samsung.android.email_5635133258029360
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: base64
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----_com.samsung.android.email_5635133258029360
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: base64
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----_com.samsung.android.email_5635133258029360--


From nobody Mon Apr 18 11:39:08 2016
Return-Path: <paul.bottorff@hpe.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 13CEB12E53F for <sfc@ietfa.amsl.com>; Mon, 18 Apr 2016 11:39:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SoAID_EiiIMA for <sfc@ietfa.amsl.com>; Mon, 18 Apr 2016 11:38:59 -0700 (PDT)
Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1on0782.outbound.protection.outlook.com [IPv6:2a01:111:f400:fc10::782]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3CCBB12E539 for <sfc@ietf.org>; Mon, 18 Apr 2016 11:38:59 -0700 (PDT)
Received: from TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM (10.162.187.152) by TU4PR84MB0160.NAMPRD84.PROD.OUTLOOK.COM (10.162.187.153) with Microsoft SMTP Server (TLS) id 15.1.466.19; Mon, 18 Apr 2016 18:38:41 +0000
Received: from TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM ([10.162.187.152]) by TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM ([10.162.187.152]) with mapi id 15.01.0466.022; Mon, 18 Apr 2016 18:38:41 +0000
From: "Bottorff, Paul" <paul.bottorff@hpe.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "Paul Quinn (paulq)" <paulq@cisco.com>, "Elzur, Uri" <uri.elzur@intel.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivflTl8PyB805kuSkB1naNwin5+IdPDQgAFZBQCAAcu2oIAAEzaAgAR+egA=
Date: Mon, 18 Apr 2016 18:38:41 +0000
Message-ID: <TU4PR84MB0159F72D76A3087680620E0FFE6B0@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM>
References: <m3egarz7kh.wl-narten@us.ibm.com> <TU4PR84MB015931A06895E5B3094D1668FE960@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <E98F1C7D-0F3D-4F90-94F6-48061643E797@cisco.com> <TU4PR84MB0159620F964FB90F0750531EFE680@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <5711631F.6000006@joelhalpern.com>
In-Reply-To: <5711631F.6000006@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: joelhalpern.com; dkim=none (message not signed) header.d=none;joelhalpern.com; dmarc=none action=none header.from=hpe.com;
x-originating-ip: [15.211.195.7]
x-ms-office365-filtering-correlation-id: 8775bd7c-7138-41d7-70e5-08d367b8aa13
x-microsoft-exchange-diagnostics: 1; TU4PR84MB0160; 5:EF3e6f6nBNeSyTxc98nN5n/GHxtGS/pj3gMM09cdRfslh1tJhdZ+yxFMgnm7GU1dczFu+8fWHIDwWZVFa5OENaqxAM6TfruxLfb4dB2G7QrotXRxAhydTHi3k0biwiG0FWMzxhrfqJ5XC6j4zdVGF20ksX1QaZQu46z3Adp2ygwetgWvGZM+plpZQNA8mz/f; 24:vr8xX8tscHGuqDzyOfQEGSNQx5FOdWHzQOzQs4JHPEB+Z5Guagiz7wmTL41kDCNFYJUWgzTfGVcAPG8XdtYSuEUIm8u+znDJ+XhEbFpVXVY=; 7:gJj241s4WitgkrHybqIlQsq2UONmoR2O5fixiZUqX3/OnhAjAiOSZUxpVpOvq/fMNuzEtmyc8r1x6owkvtBunzd9bR2jBOlXhvd/kYZVr9KSKcHpGfmjEQmOaCTLFF3C7CJMpQZv+f0NgScvhzXPtdAKx9cTNTZM44BuwBLOZVNhpPpXOaLtFTgzQjWZvsIXUR6/5CqUZLIzXBb8aZ2QbE9zp3eRe+wMY+JQ7aVE6C4=
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:TU4PR84MB0160;
x-microsoft-antispam-prvs: <TU4PR84MB01605606D6BBDD2D914EBB28FE6B0@TU4PR84MB0160.NAMPRD84.PROD.OUTLOOK.COM>
x-exchange-antispam-report-test: UriScan:(95692535739014);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(9101521026)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(6055026); SRVR:TU4PR84MB0160; BCL:0; PCL:0; RULEID:; SRVR:TU4PR84MB0160; 
x-forefront-prvs: 0916FC3A18
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(13464003)(24454002)(377454003)(43544003)(15975445007)(2900100001)(2906002)(6116002)(102836003)(3846002)(586003)(86362001)(92566002)(5001770100001)(10400500002)(2950100001)(93886004)(11100500001)(122556002)(1096002)(5008740100001)(189998001)(77096005)(1220700001)(50986999)(230783001)(76176999)(33656002)(19580405001)(19580395003)(66066001)(4326007)(81166005)(106116001)(5002640100001)(9686002)(54356999)(87936001)(5003600100002)(7059030); DIR:OUT; SFP:1102; SCL:1; SRVR:TU4PR84MB0160; H:TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM; FPR:; SPF:None; MLV:sfv; LANG:en; 
spamdiagnosticoutput: 1:23
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: hpe.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Apr 2016 18:38:41.3319 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc
X-MS-Exchange-Transport-CrossTenantHeadersStamped: TU4PR84MB0160
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/r2AENcWXyV3xkkTQIa52sbKKEyM>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Apr 2016 18:39:03 -0000

Hi Joel:

Some comments below,

Cheers,

Paul

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
Sent: Friday, April 15, 2016 2:55 PM
To: Bottorff, Paul <paul.bottorff@hpe.com>; Paul Quinn (paulq) <paulq@cisco=
.com>; Elzur, Uri <uri.elzur@intel.com>
Cc: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Paul B., just to make sure I am reading you correctly, on the issue of reve=
rse direction SFPs, I believe the issue you are referring to is specificall=
y the case of SFs which need to originate a packet back to the source of a =
packet the SF has processed?
PB>Yes, this is the original reference. This is also something which OAM so=
metimes depends on since an OAM may generate a reply.

While I think SFs can do better, it would seem that a properly configured c=
lassifier at the SFF service that SF can take care of that case.  Requiring=
 that it be encoded in the SPI seems overkill.
PB>Fixing this at the SFF requires some indication for flag from the SF to =
indicate the frame is traveling (or is to travel) in the reverse direction.=
 I have proposed that using the transport source address could be used at t=
he SFF to make this determination, however have received pushback on this s=
olution since it does not work for single armed SFs. Since the SA solution =
may not be acceptable, I believe we need to provide a forward/reverse indic=
ator.

Yours,
Joel

On 4/15/16 5:36 PM, Bottorff, Paul wrote:
> Hi Paul Q.
>
> Some responses to comments.
>
> Cheers,
>
> Paul
>
> -----Original Message-----
> From: Paul Quinn (paulq) [mailto:paulq@cisco.com]
> Sent: Thursday, April 14, 2016 10:21 AM
> To: Bottorff, Paul <paul.bottorff@hpe.com>
> Cc: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> Paul B.
>
> Some comments inline.
>
>
>
>> On Apr 13, 2016, at 6:05 PM, Bottorff, Paul <paul.bottorff@hpe.com> wrot=
e:
>>
>> Hi Thomas:
>>
>> I do not support last call on draft-eitf-sfc-nsh-04. The risk of rushing=
 to close a format before we have clear agreement on the forwarding princip=
les and features is just too high.
>>
>> The major problems with the current draft are:
>> 1)the service address formed by the combined SPI+SI appears to have a=20
>> number of deficiencies which lead to transport dependencies and to=20
>> layer violations,
>
> PQ>  You draw this broad stoke, however, it is relatively unsubstantiated=
 with technical facts.  The WG discussed the representation of the SPI/SI p=
rior to NSH adoption.  The SPI/SI are not transport values -- and please do=
n't conflate transport (and the associated requirements) with address famil=
y.
> PB> I have never asserted that SPI+SI for a "transport" address. Please d=
on't confuse what I've said. The modeling of SPI+SI as a service layer addr=
ess is very soundly rooted in classic network layer modeling. It is the ass=
ertion that that the service layer is independent from the "transport" laye=
r below that indicates the SPI+SI form the address used by the service laye=
r dialog. This address is mapped into the "transport" by mapping the SPI+SI=
 into a transport tunnel and destination address.
>
>> 2)there is no resolution to forward/reverse addressing necessary for=20
>> support of many L4-high service functions,
>
> PQ> That is factually incorrect and I think derives from your opinion tha=
t SPI/SI =3D=3D address family: in general, you can create two unidirection=
al chains and use them for forward and reverse traffic.  This has been revi=
ewed with /by  L4+ vendors/experts.
> PB>We have a lot of work on both L4-higher SFs and proxy forwarders for L=
4-higher SFs for MAC Chaining and understand this problem in a lot of detai=
l. Having two unidirectional chains don't solve the forward/reverse traffic=
 problem because the reverse path SPI/SI are not included in the NSH header=
 and therefore not available at the time we need to reverse the forwarding =
direction. Are you mandating every SF and Proxy be provisioned with the for=
ward and reverse SPI/SI? If so the solution is unacceptable to me.
>
>
>> 3)there is no resolution to encoding hierarchies which are of=20
>> importance to SFC applications in NFV environments,
>
> PQ> Encoding hierarchies is an optimization of the base protocol to suppo=
rt scaling in a large deployment; in any case such optimization does not re=
quire changes to the base SFC encapsulation.
> PB> A general stacking solution will require some type of support which I=
 believe should be in the base header so the context words are kept clear f=
or pure meta-data.
>
>> 4)the draft needs a transport service interface and a description of=20
>> the mappings used for the service layer onto the transport layer,
>
> PQ> I am not sure what you mean by "transport service interface" - it is =
true that the SPI/SI need to map to a transport layer forwarding entry but =
I don't know what you are implying.
> PB>You are trying to specify a "transport" independent layer, however hav=
e not specified what services the transport must provide to support the SFC=
 layer. A service interface is one of the formalized ways to specify the fe=
ature requirements of the underlying layer.
>
>> 5)the draft specifies two independent formats for encoding the NSH heade=
r which is likely to divide the market slowing the deployment of NSH.
>
> PQ>  The draft actually specifies two metadata formats for flexibility an=
d the market will decide which is most appropriate based on specific use ca=
ses.  The evidence is clear: a wide-range of _implementations_ already exis=
t. In fact, the real impediment to deployment is esoteric opinion.
> PB> This is always the last resort dodge we use in standards, however it =
always comes at the price of some market confusion and delay. Even though I=
 can accept this if no middle ground is possible, I don't think we have pus=
hed the parties hard enough toward a converged solution to give it up on it=
 yet.
>
>>
>>>  From my point of view the SFC formed service plane layer network with =
a peer dialog between the SCF, SFF and SF.  The Service Path Header (SPI+SI=
) forms the address for this service plane. As it stands there is an attemp=
t to overload the function of the SI as both the SF identifier with the Ser=
vice Path and as a form of loop detection, however the coupling has resulte=
d in two problems:
>> 1)Since every SF in a path must have a sequential SI, in the event we ne=
ed to insert or delete a SF it is necessary to update the SFF forwarding en=
tries for the entire chain. To fix this either the SI should be allowed to =
take non-sequential values along the chain or should not be used for SF add=
ressing.
>
> PQ> This is not a true statement; if an SF needs to be added or deleted t=
hen it is necessary to update the SFF forwarding entries for all SFFs downs=
tream of where the change occurs.
> PB> Agreed, I stand corrected.
>
>
>> 2)Since the SI is only decremented on SF hops it can't guard against a l=
oop between SFFs or SCFs, hence SI is not a reliable method for loop squelc=
hing. If a TTL is needed it needs to be separated from SI. Given that there=
 is no clear alternative to TTL for loop squelching at the service layer I =
believe we do need to include an effective TTL to go forward.
>
> PQ> The SI can provide a simple loop check within the serivce plane but i=
t's primary semantic value is one of location.  The transport itself can pr=
ovide loop detection as well as SFF verification of SPI/SI + source.
> PB> I both disagree that SI is useful for loop squeltching or that "trans=
port" TTL can stop service layer looping. To use the "transport" TTL  the f=
ield would need to be copied from one "transport" to the next "transport" o=
ver the SFC service layer. Disregarding the fact that this operation is bui=
lding a dependency between the "transport" and service layers, which we exp=
ressly are trying to avoid, the TTL fields of the transports are not sized =
to allow for the expanded path lengths which could be created in chains. In=
 addition, some of the transports like Ethernet only support TTL for in spe=
cial cases (Ethernet only supports TTL when using F-Tag forwarding).
>
>> 3)Every other successful address space has needed to add a few bits to s=
upport QoS options. I would suggest taking 3-4 bits from the MD-type and to=
 reserve for QoS handling.
>
> PQ>  Again, this is blurring the lines: QoS is handled, as expected by th=
e selection transport.  This is a feature, not a bug, architecturally speak=
ing.
> PB> Just the opposite, failing to add QoS to the NSH header is blurring t=
he lines between the service layer and the "transport" layer. Consider an a=
 chain which uses both a best effort and an expedited service. Next conside=
r building the chain where each hop uses a different type of "transport". A=
s we map from one "transport" to the next we may over some hops have less Q=
oS information than others. As we continue to the next "transport" we retai=
n the integrity of the end-to-end communication by regenerating QoS from th=
e original QoS contained at the service layer a driven down into the "trans=
port".
>
>> 4)In may data centers we have multi-vendor deployments. In these environ=
ments we may have different managers assigning chains. There should to be s=
ome convention for splitting the address space between these vendors. The m=
ost desirable solution to this is to add an assigned organization ID to the=
 address space. An alternative would be to separate the SPI into a 4 and 20=
 bit field designating the high 4 bits as a local manager ID.
>>
>
> PQ>  You are conflating federation/configuration and frame format.  The m=
ulti-manager scenario is a control-plane/management-plane function.
> PB> In a multi-manager situation I need a way to avoid collision in the a=
llocation of the SPI/SI space which is being independently allocated by dif=
ferent managers.
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Mon Apr 18 22:06:12 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E489D12DB71 for <sfc@ietfa.amsl.com>; Mon, 18 Apr 2016 22:06:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AfAfTUPIFAxX for <sfc@ietfa.amsl.com>; Mon, 18 Apr 2016 22:06:08 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 665DF12DC6F for <sfc@ietf.org>; Mon, 18 Apr 2016 22:06:08 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id D87C32672BE; Mon, 18 Apr 2016 22:06:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461042367; bh=Q4QuZuUwTofo6qiiwPQ1MOdXFaq45RZzKyuZrKtN2dk=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=p2ym4TppyAJVxuPrfWmWJGveObRAKQRLrG0qtnoIrX1dJrdD2CdPSkRbhF0mx9px7 hkeQNKl5zg44hNjEpVbpEFwMQ+4B66XrEnP21+uFW8npQyHK2Kd8ZlTKjKw1ENZRsV S19Q7ei7UgRw5oy9JQ5VbrObH39JNi1yjfti59Dg=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (50-193-35-17-static.hfc.comcastbusiness.net [50.193.35.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 4B676240E6E; Mon, 18 Apr 2016 22:06:07 -0700 (PDT)
To: "Bottorff, Paul" <paul.bottorff@hpe.com>, "Paul Quinn (paulq)" <paulq@cisco.com>, "Elzur, Uri" <uri.elzur@intel.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <TU4PR84MB015931A06895E5B3094D1668FE960@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <E98F1C7D-0F3D-4F90-94F6-48061643E797@cisco.com> <TU4PR84MB0159620F964FB90F0750531EFE680@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <5711631F.6000006@joelhalpern.com> <TU4PR84MB0159F72D76A3087680620E0FFE6B0@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <5715BCB6.3090407@joelhalpern.com>
Date: Tue, 19 Apr 2016 01:05:58 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <TU4PR84MB0159F72D76A3087680620E0FFE6B0@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/6q0XTTsNocUX1FK4za7j1PN7R9E>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Apr 2016 05:06:10 -0000

Paul B., if we are using a classifier to generate the NSH header, then 
all we need to do is send the packet back either without an NSH, or with 
an NSH with a bit indicating that reclassification is needed.  The 
source and destination addresses in the packet will tell the classifier 
what it needs to know in order to generate the right NSH header.

Other options include configuring the SF with the reverse direction SPI 
/ SI.

None of these require a direction bit in the neader.  Which is good, as 
trying to define forward and backwards is pretty confusing in a network.

Yours,
Joel

On 4/18/16 2:38 PM, Bottorff, Paul wrote:
> Hi Joel:
>
> Some comments below,
>
> Cheers,
>
> Paul
>
> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org] On
> Behalf Of Joel M. Halpern Sent: Friday, April 15, 2016 2:55 PM To:
> Bottorff, Paul <paul.bottorff@hpe.com>; Paul Quinn (paulq)
> <paulq@cisco.com>; Elzur, Uri <uri.elzur@intel.com> Cc: Thomas Narten
> <narten@us.ibm.com>; sfc@ietf.org Subject: Re: [sfc] WG last call for
> draft-ietf-sfc-nsh-04.txt
>
> Paul B., just to make sure I am reading you correctly, on the issue
> of reverse direction SFPs, I believe the issue you are referring to
> is specifically the case of SFs which need to originate a packet back
> to the source of a packet the SF has processed? PB>Yes, this is the
> original reference. This is also something which OAM sometimes
> depends on since an OAM may generate a reply.
>
> While I think SFs can do better, it would seem that a properly
> configured classifier at the SFF service that SF can take care of
> that case.  Requiring that it be encoded in the SPI seems overkill.
> PB>Fixing this at the SFF requires some indication for flag from the
> SF to indicate the frame is traveling (or is to travel) in the
> reverse direction. I have proposed that using the transport source
> address could be used at the SFF to make this determination, however
> have received pushback on this solution since it does not work for
> single armed SFs. Since the SA solution may not be acceptable, I
> believe we need to provide a forward/reverse indicator.
>
> Yours, Joel
>
> On 4/15/16 5:36 PM, Bottorff, Paul wrote:
>> Hi Paul Q.
>>
>> Some responses to comments.
>>
>> Cheers,
>>
>> Paul
>>
>> -----Original Message----- From: Paul Quinn (paulq)
>> [mailto:paulq@cisco.com] Sent: Thursday, April 14, 2016 10:21 AM
>> To: Bottorff, Paul <paul.bottorff@hpe.com> Cc: Thomas Narten
>> <narten@us.ibm.com>; sfc@ietf.org Subject: Re: [sfc] WG last call
>> for draft-ietf-sfc-nsh-04.txt
>>
>> Paul B.
>>
>> Some comments inline.
>>
>>
>>
>>> On Apr 13, 2016, at 6:05 PM, Bottorff, Paul
>>> <paul.bottorff@hpe.com> wrote:
>>>
>>> Hi Thomas:
>>>
>>> I do not support last call on draft-eitf-sfc-nsh-04. The risk of
>>> rushing to close a format before we have clear agreement on the
>>> forwarding principles and features is just too high.
>>>
>>> The major problems with the current draft are: 1)the service
>>> address formed by the combined SPI+SI appears to have a number of
>>> deficiencies which lead to transport dependencies and to layer
>>> violations,
>>
>> PQ>  You draw this broad stoke, however, it is relatively
>> unsubstantiated with technical facts.  The WG discussed the
>> representation of the SPI/SI prior to NSH adoption.  The SPI/SI are
>> not transport values -- and please don't conflate transport (and
>> the associated requirements) with address family. PB> I have never
>> asserted that SPI+SI for a "transport" address. Please don't
>> confuse what I've said. The modeling of SPI+SI as a service layer
>> address is very soundly rooted in classic network layer modeling.
>> It is the assertion that that the service layer is independent from
>> the "transport" layer below that indicates the SPI+SI form the
>> address used by the service layer dialog. This address is mapped
>> into the "transport" by mapping the SPI+SI into a transport tunnel
>> and destination address.
>>
>>> 2)there is no resolution to forward/reverse addressing necessary
>>> for support of many L4-high service functions,
>>
>> PQ> That is factually incorrect and I think derives from your
>> opinion that SPI/SI == address family: in general, you can create
>> two unidirectional chains and use them for forward and reverse
>> traffic.  This has been reviewed with /by  L4+ vendors/experts.
>> PB>We have a lot of work on both L4-higher SFs and proxy forwarders
>> for L4-higher SFs for MAC Chaining and understand this problem in a
>> lot of detail. Having two unidirectional chains don't solve the
>> forward/reverse traffic problem because the reverse path SPI/SI are
>> not included in the NSH header and therefore not available at the
>> time we need to reverse the forwarding direction. Are you mandating
>> every SF and Proxy be provisioned with the forward and reverse
>> SPI/SI? If so the solution is unacceptable to me.
>>
>>
>>> 3)there is no resolution to encoding hierarchies which are of
>>> importance to SFC applications in NFV environments,
>>
>> PQ> Encoding hierarchies is an optimization of the base protocol to
>> support scaling in a large deployment; in any case such
>> optimization does not require changes to the base SFC
>> encapsulation. PB> A general stacking solution will require some
>> type of support which I believe should be in the base header so the
>> context words are kept clear for pure meta-data.
>>
>>> 4)the draft needs a transport service interface and a description
>>> of the mappings used for the service layer onto the transport
>>> layer,
>>
>> PQ> I am not sure what you mean by "transport service interface" -
>> it is true that the SPI/SI need to map to a transport layer
>> forwarding entry but I don't know what you are implying. PB>You are
>> trying to specify a "transport" independent layer, however have not
>> specified what services the transport must provide to support the
>> SFC layer. A service interface is one of the formalized ways to
>> specify the feature requirements of the underlying layer.
>>
>>> 5)the draft specifies two independent formats for encoding the
>>> NSH header which is likely to divide the market slowing the
>>> deployment of NSH.
>>
>> PQ>  The draft actually specifies two metadata formats for
>> flexibility and the market will decide which is most appropriate
>> based on specific use cases.  The evidence is clear: a wide-range
>> of _implementations_ already exist. In fact, the real impediment to
>> deployment is esoteric opinion. PB> This is always the last resort
>> dodge we use in standards, however it always comes at the price of
>> some market confusion and delay. Even though I can accept this if
>> no middle ground is possible, I don't think we have pushed the
>> parties hard enough toward a converged solution to give it up on it
>> yet.
>>
>>>
>>>> From my point of view the SFC formed service plane layer
>>>> network with a peer dialog between the SCF, SFF and SF.  The
>>>> Service Path Header (SPI+SI) forms the address for this service
>>>> plane. As it stands there is an attempt to overload the
>>>> function of the SI as both the SF identifier with the Service
>>>> Path and as a form of loop detection, however the coupling has
>>>> resulted in two problems:
>>> 1)Since every SF in a path must have a sequential SI, in the
>>> event we need to insert or delete a SF it is necessary to update
>>> the SFF forwarding entries for the entire chain. To fix this
>>> either the SI should be allowed to take non-sequential values
>>> along the chain or should not be used for SF addressing.
>>
>> PQ> This is not a true statement; if an SF needs to be added or
>> deleted then it is necessary to update the SFF forwarding entries
>> for all SFFs downstream of where the change occurs. PB> Agreed, I
>> stand corrected.
>>
>>
>>> 2)Since the SI is only decremented on SF hops it can't guard
>>> against a loop between SFFs or SCFs, hence SI is not a reliable
>>> method for loop squelching. If a TTL is needed it needs to be
>>> separated from SI. Given that there is no clear alternative to
>>> TTL for loop squelching at the service layer I believe we do need
>>> to include an effective TTL to go forward.
>>
>> PQ> The SI can provide a simple loop check within the serivce plane
>> but it's primary semantic value is one of location.  The transport
>> itself can provide loop detection as well as SFF verification of
>> SPI/SI + source. PB> I both disagree that SI is useful for loop
>> squeltching or that "transport" TTL can stop service layer looping.
>> To use the "transport" TTL  the field would need to be copied from
>> one "transport" to the next "transport" over the SFC service layer.
>> Disregarding the fact that this operation is building a dependency
>> between the "transport" and service layers, which we expressly are
>> trying to avoid, the TTL fields of the transports are not sized to
>> allow for the expanded path lengths which could be created in
>> chains. In addition, some of the transports like Ethernet only
>> support TTL for in special cases (Ethernet only supports TTL when
>> using F-Tag forwarding).
>>
>>> 3)Every other successful address space has needed to add a few
>>> bits to support QoS options. I would suggest taking 3-4 bits from
>>> the MD-type and to reserve for QoS handling.
>>
>> PQ>  Again, this is blurring the lines: QoS is handled, as expected
>> by the selection transport.  This is a feature, not a bug,
>> architecturally speaking. PB> Just the opposite, failing to add QoS
>> to the NSH header is blurring the lines between the service layer
>> and the "transport" layer. Consider an a chain which uses both a
>> best effort and an expedited service. Next consider building the
>> chain where each hop uses a different type of "transport". As we
>> map from one "transport" to the next we may over some hops have
>> less QoS information than others. As we continue to the next
>> "transport" we retain the integrity of the end-to-end communication
>> by regenerating QoS from the original QoS contained at the service
>> layer a driven down into the "transport".
>>
>>> 4)In may data centers we have multi-vendor deployments. In these
>>> environments we may have different managers assigning chains.
>>> There should to be some convention for splitting the address
>>> space between these vendors. The most desirable solution to this
>>> is to add an assigned organization ID to the address space. An
>>> alternative would be to separate the SPI into a 4 and 20 bit
>>> field designating the high 4 bits as a local manager ID.
>>>
>>
>> PQ>  You are conflating federation/configuration and frame format.
>> The multi-manager scenario is a control-plane/management-plane
>> function. PB> In a multi-manager situation I need a way to avoid
>> collision in the allocation of the SPI/SI space which is being
>> independently allocated by different managers.
>>
>> _______________________________________________ sfc mailing list
>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>
>
> _______________________________________________ sfc mailing list
> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Mon Apr 18 23:43:09 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 450DE12D55E for <sfc@ietfa.amsl.com>; Mon, 18 Apr 2016 23:43:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.618
X-Spam-Level: 
X-Spam-Status: No, score=-2.618 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JGnuAVA1TgpK for <sfc@ietfa.amsl.com>; Mon, 18 Apr 2016 23:43:03 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C456C12D0C6 for <sfc@ietf.org>; Mon, 18 Apr 2016 23:43:02 -0700 (PDT)
Received: from omfedm05.si.francetelecom.fr (unknown [xx.xx.xx.1]) by omfedm11.si.francetelecom.fr (ESMTP service) with ESMTP id 0C79F3B454F; Tue, 19 Apr 2016 08:43:01 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.24]) by omfedm05.si.francetelecom.fr (ESMTP service) with ESMTP id D8C9335C05A; Tue, 19 Apr 2016 08:43:00 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7D.corporate.adroot.infra.ftgroup ([fe80::9044:c5ee:4dd2:4f16%19]) with mapi id 14.03.0279.002; Tue, 19 Apr 2016 08:43:00 +0200
From: <mohamed.boucadair@orange.com>
To: Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] TLV class of variable-length metadata should have a restricted range
Thread-Index: AQHRmWb0PGjqacyz9EidOrx7rW39tJ+P1pwAgAECt7A=
Date: Tue, 19 Apr 2016 06:42:59 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D5C3B4@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008D5BB09@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <E8355113905631478EFF04F5AA706E9830F2A80B@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F2A80B@wtl-exchp-2.sandvine.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B933008D5C3B4OPEXCLILMA3corp_"
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.3.14.165416
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/o1KHliEqeG0LzmLCiYBCosF_8Fw>
Subject: Re: [sfc] TLV class of variable-length metadata should have a restricted range
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Apr 2016 06:43:07 -0000

--_000_787AE7BB302AE849A7480A190F8B933008D5C3B4OPEXCLILMA3corp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Dave,

I'm puzzled here. Why do we need a large range of =AB TLV Class =BB?  Would=
n't few bits be sufficient (e.g., 3 or 4 bits)?

Thank you.

Cheers,
Med

De : Dave Dolson [mailto:ddolson@sandvine.com]
Envoy=E9 : lundi 18 avril 2016 17:21
=C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org
Objet : RE: [sfc] TLV class of variable-length metadata should have a restr=
icted range

Med,
I was discussing the "TLV Class" field, which is 16 bits.

But thank you for finding the BCP for writing IANA considerations.



-Dave



From: mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> [ma=
ilto:mohamed.boucadair@orange.com]
Sent: Monday, April 18, 2016 7:39 AM
To: Dave Dolson; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] TLV class of variable-length metadata should have a rest=
ricted range

Hi Dave, all,

Thank you for raising this point.

IANA considerations should be sketched in reference to RFC5226 (see https:/=
/tools.ietf.org/html/rfc5226#section-4.1).

IMO, it is reasonable to define ranges:

=B7         assigned via Standards Action

=B7         assigned via Specification Required

=B7         reserved for Private Use

=B7         reserved for Experimental Use

Note that the ranges you are proposing are not aligned with the current TLV=
 encoding (Type is encoded in 7 bits).

Saying that, I still do see value in reusing existing rich registries such =
as IPFIX. Doing so allows to use immediately a code point while ensuring in=
teroperability. A dedicated field in the encoding of the TLV can be defined=
 (or adjust TLV Class?) to point to the registry in use.

BTW, the IANA section should include more details about "TLV Class".

Cheers,
Med

De : sfc [mailto:sfc-bounces@ietf.org] De la part de Dave Dolson
Envoy=E9 : jeudi 14 avril 2016 17:25
=C0 : sfc@ietf.org<mailto:sfc@ietf.org>
Objet : [sfc] TLV class of variable-length metadata should have a restricte=
d range

Regarding the TLV Class of variable-length metadata, https://tools.ietf.org=
/html/draft-ietf-sfc-nsh-04#section-3.5.1
It is common for such fields to reserve ranges, allowing for future growth =
into unanticipated uses.

E.g., off the top of my head,
classes 0 to 0x1ff --> types allocated by IETF
classes 0x200 to 0x7fff --> allocated by IANA
Classes 0x8000 to 0xbfff --> reserved, do not use
classes 0xc000 to 0xefff --> locally administered
classes 0xf000 to 0xffff --> experimental

Or similar? I'm not sure what the best practice for this is.

Generally, I'd want to try something experimentally before requesting IANA =
allocation for it (experimental),
or maybe types are too specific to warrant IANA allocation (locally adminis=
tered).

Can something like this be added to draft-ietf-sfc-nsh ?


David Dolson
Senior Software Architect, Sandvine Inc.


--_000_787AE7BB302AE849A7480A190F8B933008D5C3B4OPEXCLILMA3corp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Texte de bulles Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.TextedebullesCar
	{mso-style-name:"Texte de bulles Car";
	mso-style-priority:99;
	mso-style-link:"Texte de bulles";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
p.BalloonText, li.BalloonText, div.BalloonText
	{mso-style-name:"Balloon Text";
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle25
	{mso-style-type:personal-reply;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:"Courier New";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1235580489;
	mso-list-type:hybrid;
	mso-list-template-ids:527468770 -859409618 67895299 67895301 67895297 6789=
5299 67895301 67895297 67895299 67895301;}
@list l0:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Hi Dave,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">I&#8217;m puzzled here. Why do =
we need a large range of =AB&nbsp;TLV Class&nbsp;=BB? &nbsp;Wouldn&#8217;t =
few bits be sufficient (e.g., 3 or 4 bits)?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Thank you.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Dave=
 Dolson [mailto:ddolson@sandvine.com]
<br>
<b>Envoy=E9&nbsp;:</b> lundi 18 avril 2016 17:21<br>
<b>=C0&nbsp;:</b> BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org<br>
<b>Objet&nbsp;:</b> RE: [sfc] TLV class of variable-length metadata should =
have a restricted range<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">Med,<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">I was d=
iscussing the &#8220;TLV Class&#8221; field, which is 16 bits.<o:p></o:p></=
span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">But tha=
nk you for finding the BCP for writing IANA considerations.<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">-Dave<o=
:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span =
lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&qu=
ot;sans-serif&quot;">
<a href=3D"mailto:mohamed.boucadair@orange.com">mohamed.boucadair@orange.co=
m</a> [<a href=3D"mailto:mohamed.boucadair@orange.com">mailto:mohamed.bouca=
dair@orange.com</a>]
<br>
<b>Sent:</b> Monday, April 18, 2016 7:39 AM<br>
<b>To:</b> Dave Dolson; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br=
>
<b>Subject:</b> RE: [sfc] TLV class of variable-length metadata should have=
 a restricted range<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Hi Dave, all,
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Thank you for raising this poin=
t.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">IANA considerations should be s=
ketched in reference to RFC5226 (see
<a href=3D"https://tools.ietf.org/html/rfc5226#section-4.1">https://tools.i=
etf.org/html/rfc5226#section-4.1</a>).
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">IMO, it is reasonable to define=
 ranges:<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo2"><![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:10.0p=
t;font-family:Symbol;color:black"><span style=3D"mso-list:Ignore">=B7<span =
style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:10.0=
pt;font-family:&quot;Courier New&quot;;color:black">assigned via Standards =
Action<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo2"><![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:10.0p=
t;font-family:Symbol;color:black"><span style=3D"mso-list:Ignore">=B7<span =
style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:10.0=
pt;font-family:&quot;Courier New&quot;;color:black">assigned via Specificat=
ion Required<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo2"><![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:10.0p=
t;font-family:Symbol;color:black"><span style=3D"mso-list:Ignore">=B7<span =
style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:10.0=
pt;font-family:&quot;Courier New&quot;;color:black">reserved for Private Us=
e<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo2"><![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:10.0p=
t;font-family:Symbol;color:black"><span style=3D"mso-list:Ignore">=B7<span =
style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:10.0=
pt;font-family:&quot;Courier New&quot;;color:black">reserved for Experiment=
al Use<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Note that the ranges you are pr=
oposing are not aligned with the current TLV encoding (Type is encoded in 7=
 bits).
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Saying that, I still do see val=
ue in reusing existing rich registries such as IPFIX. Doing so allows to us=
e immediately a code point while ensuring interoperability.
 A dedicated field in the encoding of the TLV can be defined (or adjust TLV=
 Class?) to point to the registry in use.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">BTW, the IANA section should in=
clude more details about &#8220;TLV Class&#8221;.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc =
[<a href=3D"mailto:sfc-bounces@ietf.org">mailto:sfc-bounces@ietf.org</a>]
<b>De la part de</b> Dave Dolson<br>
<b>Envoy=E9&nbsp;:</b> jeudi 14 avril 2016 17:25<br>
<b>=C0&nbsp;:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Objet&nbsp;:</b> [sfc] TLV class of variable-length metadata should have=
 a restricted range<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Regarding the TLV Class of vari=
able-length metadata,
<a href=3D"https://tools.ietf.org/html/draft-ietf-sfc-nsh-04#section-3.5.1"=
>https://tools.ietf.org/html/draft-ietf-sfc-nsh-04#section-3.5.1</a><o:p></=
o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">It is common for such fields to=
 reserve ranges, allowing for future growth into unanticipated uses.<o:p></=
o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">E.g., off the top of my head,<o=
:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">classes 0 to 0x1ff --&gt; types=
 allocated by IETF<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">classes 0x200 to 0x7fff --&gt; =
allocated by IANA<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Classes 0x8000 to 0xbfff --&gt;=
 reserved, do not use<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">classes 0xc000 to 0xefff --&gt;=
 locally administered<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">classes 0xf000 to 0xffff --&gt;=
 experimental<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Or similar? I&#8217;m not sure =
what the best practice for this is.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Generally, I&#8217;d want to tr=
y something experimentally before requesting IANA allocation for it (experi=
mental),
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">or maybe types are too specific=
 to warrant IANA allocation (locally administered).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Can something like this be adde=
d to draft-ietf-sfc-nsh ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">David Dolson<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Senior Software Architect, Sand=
vine Inc.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
</div>
</div>
</body>
</html>

--_000_787AE7BB302AE849A7480A190F8B933008D5C3B4OPEXCLILMA3corp_--


From nobody Tue Apr 19 00:48:11 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E646212ECDD; Tue, 19 Apr 2016 00:48:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qta8yqIGRUhM; Tue, 19 Apr 2016 00:48:08 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BF2BD12D629; Tue, 19 Apr 2016 00:48:07 -0700 (PDT)
Received: from omfedm05.si.francetelecom.fr (unknown [xx.xx.xx.1]) by omfedm12.si.francetelecom.fr (ESMTP service) with ESMTP id 4CA7D18C5D6; Tue, 19 Apr 2016 09:48:06 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.75]) by omfedm05.si.francetelecom.fr (ESMTP service) with ESMTP id 2A94E35C06A; Tue, 19 Apr 2016 09:48:06 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILMA4.corporate.adroot.infra.ftgroup ([fe80::65de:2f08:41e6:ebbe%19]) with mapi id 14.03.0279.002; Tue, 19 Apr 2016 09:48:05 +0200
From: <mohamed.boucadair@orange.com>
To: Loa Andersson <loa@pi.nu>, "sfc@ietf.org" <sfc@ietf.org>, "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
Thread-Index: AQHRmHqtfmDbftCilE6QL9AG6Y6vN5+Q4utQ
Date: Tue, 19 Apr 2016 07:48:05 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D5C41E@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <57133AED.4080005@pi.nu>
In-Reply-To: <57133AED.4080005@pi.nu>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.3.14.165416
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/mP9EX4g8rHsR0z7uwLp-dZk-Pu4>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Apr 2016 07:48:10 -0000

Dear Loa, all,=20

Thank you for raising this point about the encoding of the optional context=
 information. =20

I agree that the use of TLV term is confusing. What about using another ter=
m, e.g., "Information Elements", "Options", or "Context Element"?=20

As an input to this discussion, below a proposal for an encoding that achie=
ves the following goals:

* Shorten the encoding of the Class field.
* Allow for more type code points.
* Avoids requiring padding for the sake of compact headers.
* Allows to include the ID of the entity that injected the context informat=
ion (OPTIONAL).=20
* Inherit rich registries such as IPFIX.

NOTE: This proposal does not include a dedicated flag bit to indicate wheth=
er the context element is mandatory-to-process or optional-to-process becau=
se further discussion/text specification is required: e.g.,
* Wouldn't be sufficient to supply that information using the control plane=
?
* If that information is supplied in both the context element and configure=
d to a SFC-aware function, how conflicts are managed?
* What is the behavior for processing mandatory-to-process elements (partic=
ularly, when it is not supported)? =20
* Is it required to recommend an ordering of supplying the mandatory-to-pro=
cess or optional-to-process elements?
* Is it required to preserve the same ordering when forwarding a packet?

=3D=3DPROPOSAL=3D=3D=3D=3D =20

Base version
        0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |Class  |            Type               | FLAGS |     Length    |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      //                           Data (Variable)                    //
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Version with Originator ID:
        0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |Class  |            Type               | Flags |     Length    |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      //Originator Len|     Originator ID (Variable)(Optional)       //
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      //                           Data (Variable)                    //
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

      The description of the fields is as follows:

      Class:  In order to foster service innovation, this field
         allows to inherit from existing code point registries that are
         likely to be useful in a SFC context.  The following values are
         reserved by this specification:
         0:  See IANA section.
         1:  IPFIX [IPFIX].

      Type:  Indicates the code point of the context element.  If
         "Class" field is non-null, the interpretation of this field MUST
         conform to the one defined for that specific class registry. See I=
ANA section.

      Flags:  The Flags field comprises a set of 4 flags:

             +-+-+-+-+
             |S|r|r|r|
             +-+-+-+-+

             where "rrr" are reserved bits for future assignment as
             additional flag bits. r bits MUST each be sent as zero and MUS=
T be
             ignored on receipt.

             When set, the S-flag indicates that an Originator ID field is
             present in the context element.  This flag is set by default t=
o 0, meaning
             there is no Originator ID field present in the element.

      Originator ID (Optional):  Conveys the identifier of the entity that =
injected
         this context element in the NSH header (e.g., a service
         function identifier, a classifier, etc.).  This document does
         not make any assumption about the structure of the information
         carried in this field because this is deployment-specific.
         This information is used by SFC-aware elements to enforce
         policies such as: process a context information if and only if
         it was supplied by a given entity.  This information can be
         used as a safeguard against misbehaving nodes that inject
         illegitimate data in the NSH header.

         This field MUST be included only if S-bit is set.    =20

      Length:  Indicates, in octets, the length of the data carried in
         the context element.

      Data (Variable):  The semantics of this field depend on the
         "Class" and "Type" fields.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Opinions?

Cheers,
Med

> -----Message d'origine-----
> De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de Loa Andersson
> Envoy=E9=A0: dimanche 17 avril 2016 09:28
> =C0=A0: sfc@ietf.org; draft-ietf-sfc-nsh@ietf.org
> Objet=A0: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on
> TLVs in draft-ietf-sfc-nsh
>=20
> Working Group, authors,
>=20
> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to read
> it before now) and have a question on how the TLV concept is understood
> in the draft.
>=20
> For example in LDP TLV were defined as Type, Length Value, e.g. (from
> RFC 5036 section 3.3):
>=20
>     LDP uses a Type-Length-Value (TLV) encoding scheme to encode much of
>     the information carried in LDP messages.
>=20
>     An LDP TLV is encoded as a 2 octet field that uses 14 bits to specify
>     a Type and 2 bits to specify behavior when an LSR doesn't recognize
>     the Type, followed by a 2 octet Length field, followed by a variable
>     length Value field.
>=20
>=20
>      0                   1                   2                   3
>      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>     |U|F|        Type               |            Length             |
>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>     |                                                               |
>     |                             Value                             |
>     ~                                                               ~
>     |                                                               |
>     |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>     |                               |
>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>=20
> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more complicated
> and I'm struggling a bit to understand if the "name" TLV should be used.
>=20
>  From draft-ietf-sfc-nsh-04
>=20
>          0                   1                   2                   3
>          0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>         |          TLV Class            |C|    Type     |R|R|R|   Len   |
>         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>         |                      Variable Metadata                        |
>         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>=20
>=20
>=20
>                      Figure 6: Variable Context Headers
>=20
> The draft is not entirely clear in this respect, but I think this is
> what you call a TLV.
>=20
> Should I understand this way?
>=20
> Type =3D TLV Class + C + Type (24 bits)
> Length =3D len (5 bits)
> Value =3D Variable Metadata
>=20
> A convention we used in MPLS when we have variable length fields is
> to use a ~ instead of the |, like this:.
>=20
>          0                   1                   2                   3
>          0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>         |          TLV Class            |C|    Type     |R|R|R|   Len   |
>         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>         ~                      Variable Metadata                        ~
>         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>=20
> I suggest that this is a good practice that could be adopted here also.
>=20
> Two more questions:
>=20
> If the metadata does not align exactly with the 32 bit/4 byte structure,
> what is the rules for padding?
>=20
> A last, but a bit different question, do you need indicators like the U
> and F flags in an to indicate what should happen if the node does not
> recognize the (TLV Class, C, Type)-field?
>=20
> /Loa
>=20
>=20
> PS
>=20
> I will also have a few more editorial comments that will be sent to
> the authors within a day or two.
>=20
>=20
> --
>=20
>=20
> Loa Andersson                        email: loa@mail01.huawei.com
> Senior MPLS Expert                          loa@pi.nu
> Huawei Technologies (consultant)     phone: +46 739 81 21 64
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Apr 19 13:16:02 2016
Return-Path: <asayeed@redhat.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A885C12D635 for <sfc@ietfa.amsl.com>; Tue, 19 Apr 2016 13:16:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5VsDSjEBTqYO for <sfc@ietfa.amsl.com>; Tue, 19 Apr 2016 13:15:58 -0700 (PDT)
Received: from mail-qg0-f48.google.com (mail-qg0-f48.google.com [209.85.192.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1ED9F12DE0A for <sfc@ietf.org>; Tue, 19 Apr 2016 13:15:58 -0700 (PDT)
Received: by mail-qg0-f48.google.com with SMTP id f74so14770218qge.2 for <sfc@ietf.org>; Tue, 19 Apr 2016 13:15:58 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=jI5FH0XP6sLJF2SjHXfahU2U8R5OgJ+H8H3GEcWBRQg=; b=T/ZQMhruIsd+06UBPzqOsiVwRCf2e1v23IOdvkV9+oQLtVWdQ7IurKny67AhblwUcW c2KsuiL2e/ts+PL76QZ3uoKEZVIuYduKhnaFpGByc4LClSlEVAsNjy0XKojTR89CBUuS y+DkVXCcAISelQqw/bR2fCy8R/Hqy0R8ssR9ELKl8TvYU3EItgnInsgldweyl5zFgSYJ efoNJuYNERZfY9sB8PlpaPSQ6OnQHQgjnAwpMcMxHY1IGSQsnxZpEifpp86Gf+Ddr04R Yrt9MgO+E/0ipLj0nxAB6iBOlY5zDL+UIL98oJAEDzq3FnVEVQoC2hzBKjVR1ioz03pX 3axw==
X-Gm-Message-State: AOPr4FUgCwTcmcVswQ7dZ1onO9G8WOra2V1zSsybdHBNchi0xV6qedcO9A8P1F1xeNYk0zxG
X-Received: by 10.140.82.20 with SMTP id g20mr6004310qgd.69.1461096957058; Tue, 19 Apr 2016 13:15:57 -0700 (PDT)
Received: from wlan-196-77.bos.redhat.com (nat-pool-bos-t.redhat.com. [66.187.233.206]) by smtp.gmail.com with ESMTPSA id l66sm18969878qhc.42.2016.04.19.13.15.55 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 19 Apr 2016 13:15:56 -0700 (PDT)
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Azhar Sayeed <asayeed@redhat.com>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D5C41E@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Date: Tue, 19 Apr 2016 16:16:34 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <D72A4B70-0D86-41A3-8D6B-BBEE12C9AC73@redhat.com>
References: <57133AED.4080005@pi.nu> <787AE7BB302AE849A7480A190F8B933008D5C41E@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
To: mohamed.boucadair@orange.com
X-Mailer: Apple Mail (2.3124)
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/-7FsTVP_8_iVuRMfKq-9k81wTyg>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Apr 2016 20:16:01 -0000

Hi Med,

You can still encode this as a TLV by re-arranging the fields with Type =
first, length and then value - In the value portions you can a mandatory =
bytes that encode the flags, class, originator id and then variable =
metadata

So here is an option.

Type - 16 bits
Length - 16 bits
Value:
Flags - 4 bits
Class - 4 bits
Originator Length - 8 bits
Originator ID - Variable
Data Variable

+1 to the idea of originator id.


Azhar



> On Apr 19, 2016, at 3:48 AM, mohamed.boucadair@orange.com wrote:
>=20
> Dear Loa, all,=20
>=20
> Thank you for raising this point about the encoding of the optional =
context information. =20
>=20
> I agree that the use of TLV term is confusing. What about using =
another term, e.g., "Information Elements", "Options", or "Context =
Element"?=20
>=20
> As an input to this discussion, below a proposal for an encoding that =
achieves the following goals:
>=20
> * Shorten the encoding of the Class field.
> * Allow for more type code points.
> * Avoids requiring padding for the sake of compact headers.
> * Allows to include the ID of the entity that injected the context =
information (OPTIONAL).=20
> * Inherit rich registries such as IPFIX.
>=20
> NOTE: This proposal does not include a dedicated flag bit to indicate =
whether the context element is mandatory-to-process or =
optional-to-process because further discussion/text specification is =
required: e.g.,
> * Wouldn't be sufficient to supply that information using the control =
plane?
> * If that information is supplied in both the context element and =
configured to a SFC-aware function, how conflicts are managed?
> * What is the behavior for processing mandatory-to-process elements =
(particularly, when it is not supported)? =20
> * Is it required to recommend an ordering of supplying the =
mandatory-to-process or optional-to-process elements?
> * Is it required to preserve the same ordering when forwarding a =
packet?
>=20
> =3D=3DPROPOSAL=3D=3D=3D=3D =20
>=20
> Base version
>        0                   1                   2                   3
>       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>      |Class  |            Type               | FLAGS |     Length    |
>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>      //                           Data (Variable)                    =
//
>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> Version with Originator ID:
>        0                   1                   2                   3
>       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>      |Class  |            Type               | Flags |     Length    |
>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>      //Originator Len|     Originator ID (Variable)(Optional)       //
>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>      //                           Data (Variable)                    =
//
>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>=20
>      The description of the fields is as follows:
>=20
>      Class:  In order to foster service innovation, this field
>         allows to inherit from existing code point registries that are
>         likely to be useful in a SFC context.  The following values =
are
>         reserved by this specification:
>         0:  See IANA section.
>         1:  IPFIX [IPFIX].
>=20
>      Type:  Indicates the code point of the context element.  If
>         "Class" field is non-null, the interpretation of this field =
MUST
>         conform to the one defined for that specific class registry. =
See IANA section.
>=20
>      Flags:  The Flags field comprises a set of 4 flags:
>=20
>             +-+-+-+-+
>             |S|r|r|r|
>             +-+-+-+-+
>=20
>             where "rrr" are reserved bits for future assignment as
>             additional flag bits. r bits MUST each be sent as zero and =
MUST be
>             ignored on receipt.
>=20
>             When set, the S-flag indicates that an Originator ID field =
is
>             present in the context element.  This flag is set by =
default to 0, meaning
>             there is no Originator ID field present in the element.
>=20
>      Originator ID (Optional):  Conveys the identifier of the entity =
that injected
>         this context element in the NSH header (e.g., a service
>         function identifier, a classifier, etc.).  This document does
>         not make any assumption about the structure of the information
>         carried in this field because this is deployment-specific.
>         This information is used by SFC-aware elements to enforce
>         policies such as: process a context information if and only if
>         it was supplied by a given entity.  This information can be
>         used as a safeguard against misbehaving nodes that inject
>         illegitimate data in the NSH header.
>=20
>         This field MUST be included only if S-bit is set.    =20
>=20
>      Length:  Indicates, in octets, the length of the data carried in
>         the context element.
>=20
>      Data (Variable):  The semantics of this field depend on the
>         "Class" and "Type" fields.
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>=20
> Opinions?
>=20
> Cheers,
> Med
>=20
>> -----Message d'origine-----
>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Loa Andersson
>> Envoy=E9 : dimanche 17 avril 2016 09:28
>> =C0 : sfc@ietf.org; draft-ietf-sfc-nsh@ietf.org
>> Objet : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions =
on
>> TLVs in draft-ietf-sfc-nsh
>>=20
>> Working Group, authors,
>>=20
>> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to =
read
>> it before now) and have a question on how the TLV concept is =
understood
>> in the draft.
>>=20
>> For example in LDP TLV were defined as Type, Length Value, e.g. (from
>> RFC 5036 section 3.3):
>>=20
>>    LDP uses a Type-Length-Value (TLV) encoding scheme to encode much =
of
>>    the information carried in LDP messages.
>>=20
>>    An LDP TLV is encoded as a 2 octet field that uses 14 bits to =
specify
>>    a Type and 2 bits to specify behavior when an LSR doesn't =
recognize
>>    the Type, followed by a 2 octet Length field, followed by a =
variable
>>    length Value field.
>>=20
>>=20
>>     0                   1                   2                   3
>>     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>    |U|F|        Type               |            Length             |
>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>    |                                                               |
>>    |                             Value                             |
>>    ~                                                               ~
>>    |                                                               |
>>    |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>    |                               |
>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>=20
>> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more =
complicated
>> and I'm struggling a bit to understand if the "name" TLV should be =
used.
>>=20
>> =46rom draft-ietf-sfc-nsh-04
>>=20
>>         0                   1                   2                   3
>>         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 =
1
>>        =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>        |          TLV Class            |C|    Type     |R|R|R|   Len  =
 |
>>        =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>        |                      Variable Metadata                       =
 |
>>        =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>=20
>>=20
>>=20
>>                     Figure 6: Variable Context Headers
>>=20
>> The draft is not entirely clear in this respect, but I think this is
>> what you call a TLV.
>>=20
>> Should I understand this way?
>>=20
>> Type =3D TLV Class + C + Type (24 bits)
>> Length =3D len (5 bits)
>> Value =3D Variable Metadata
>>=20
>> A convention we used in MPLS when we have variable length fields is
>> to use a ~ instead of the |, like this:.
>>=20
>>         0                   1                   2                   3
>>         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 =
1
>>        =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>        |          TLV Class            |C|    Type     |R|R|R|   Len  =
 |
>>        =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>        ~                      Variable Metadata                       =
 ~
>>        =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>=20
>> I suggest that this is a good practice that could be adopted here =
also.
>>=20
>> Two more questions:
>>=20
>> If the metadata does not align exactly with the 32 bit/4 byte =
structure,
>> what is the rules for padding?
>>=20
>> A last, but a bit different question, do you need indicators like the =
U
>> and F flags in an to indicate what should happen if the node does not
>> recognize the (TLV Class, C, Type)-field?
>>=20
>> /Loa
>>=20
>>=20
>> PS
>>=20
>> I will also have a few more editorial comments that will be sent to
>> the authors within a day or two.
>>=20
>>=20
>> --
>>=20
>>=20
>> Loa Andersson                        email: loa@mail01.huawei.com
>> Senior MPLS Expert                          loa@pi.nu
>> Huawei Technologies (consultant)     phone: +46 739 81 21 64
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Apr 19 19:35:23 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1C5012EA6C; Tue, 19 Apr 2016 19:35:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YbJq3iB3eOpQ; Tue, 19 Apr 2016 19:35:20 -0700 (PDT)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0739112EA6A; Tue, 19 Apr 2016 19:35:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=7316; q=dns/txt; s=iport; t=1461119719; x=1462329319; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=1dppRpFirN6bt+qNoI/9r8RX7GHArczF232wwmpzLf0=; b=A8fOcW4JAmTQMu8rmf2GDRyUVpunnxXtwgLyuPfzmKqxj0C9ySl8JGo6 qqdkLsnrz8zeKGMwr2kg81JvusIzojUBt2XE6Ytsv1vCug0NE6bIQsRZM xac/zdEBa9ODxk0TT84AkGyjJK9p2YtJgRM+AYQrS339WtujCybZV9maC M=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BKAwCz6RZX/5xdJa1egzhTfQa5cg6Bc?= =?us-ascii?q?RcLghiDVAKBRjgUAQEBAQEBAWUnhEEBAQEDAQEBARoGRAQDCwUJAgIBCBgqAgI?= =?us-ascii?q?bDAslAgQOBQ6IEwgOrAWRPQEBAQEBAQEBAQEBAQEBAQEBAQEBAQ0EBASGHYF1g?= =?us-ascii?q?laEDxEBgx4rgisFjVOFS4RwAYMngWZtiBiBZod3hTSPKwEeAUOCM4E1bAGHXjZ?= =?us-ascii?q?+AQEB?=
X-IronPort-AV: E=Sophos;i="5.24,507,1454976000";  d="asc'?scan'208";a="99177277"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 Apr 2016 02:35:18 +0000
Received: from XCH-RTP-020.cisco.com (xch-rtp-020.cisco.com [64.101.220.160]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id u3K2ZIgn018186 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 20 Apr 2016 02:35:18 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-020.cisco.com (64.101.220.160) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Tue, 19 Apr 2016 22:35:17 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Tue, 19 Apr 2016 22:35:17 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Loa Andersson <loa@pi.nu>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
Thread-Index: AQHRmHqvPG9+wCOo5UWLeYjmbm2Pnp+SbKQA
Date: Wed, 20 Apr 2016 02:35:17 +0000
Message-ID: <46AB5547-90B8-4F2D-B72B-644F3FDC3E70@cisco.com>
References: <57133AED.4080005@pi.nu>
In-Reply-To: <57133AED.4080005@pi.nu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.251.155]
Content-Type: multipart/signed; boundary="Apple-Mail=_BB565229-06DF-4A73-8288-A0788411007E"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/OK-EhVCVlCvZdkGIoQcVQRJlw8Q>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 02:35:22 -0000

--Apple-Mail=_BB565229-06DF-4A73-8288-A0788411007E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi, Loa,

Good analysis on the format of these information elements.

My sense is that a hierarchical syntax (such as the =
Class/Type-Length-Value) provides much more flexibility than a flat =
Type-Length-Value alone.

We=E2=80=99ve built quite a number of protocols with this structure and =
allocation scheme. For example, RSVP =
(https://tools.ietf.org/html/rfc3209#section-7.2), L2TPv3 =
(https://tools.ietf.org/html/rfc3931#section-5.1), ICMP Multi-Part =
Extensions (https://tools.ietf.org/html/rfc4884#section-8).

Regardless of what we call the fields (e.g., Class and Type, or Type and =
Sub-Type, or =E2=80=A6), there are clear technical advantages to this, =
including the ability to delegate allocation, vendor types, etc.

In regards to the U/F bits in LDP, I think the C-bit in NSH TLVs =
achieves what=E2=80=99s really needed for an SFC Encap.

Lastly, you call out padding and 32-bit-word alignment. This is a great =
point.

The way things seems structured now, there=E2=80=99s a Len field =
measured in 32-bit words. It=E2=80=99s not clear what happens when the =
Metadata (Value) itself is not 32-bit-word-aligned. This needs fixing.

Looking at the Length definition:

   Length: Length of the variable metadata, in 4-byte words.  A value of
   0x0 or higher can be used.  A value of 0x0 denotes a TLV header
   without a Variable Metadata field.

Comments:
* First, instead of =E2=80=9C4-byte=E2=80=9D words, this needs to be =
=E2=80=9C4-octet=E2=80=9D or =E2=80=9C32-bit=E2=80=9D words. Byte is =
strictly machine dependent (7 bits, 8 bits, etc).
* Second, =E2=80=9Ca value of 0x0 or higher=E2=80=9D for an unsigned =
value does not say much.

Hope these help.

Thanks,

=E2=80=94 Carlos.

> On Apr 17, 2016, at 3:27 AM, Loa Andersson <loa@pi.nu> wrote:
>=20
> Working Group, authors,
>=20
> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to read
> it before now) and have a question on how the TLV concept is =
understood
> in the draft.
>=20
> For example in LDP TLV were defined as Type, Length Value, e.g. (from
> RFC 5036 section 3.3):
>=20
>   LDP uses a Type-Length-Value (TLV) encoding scheme to encode much of
>   the information carried in LDP messages.
>=20
>   An LDP TLV is encoded as a 2 octet field that uses 14 bits to =
specify
>   a Type and 2 bits to specify behavior when an LSR doesn't recognize
>   the Type, followed by a 2 octet Length field, followed by a variable
>   length Value field.
>=20
>=20
>    0                   1                   2                   3
>    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>   |U|F|        Type               |            Length             |
>   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>   |                                                               |
>   |                             Value                             |
>   ~                                                               ~
>   |                                                               |
>   |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>   |                               |
>   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>=20
> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more =
complicated
> and I'm struggling a bit to understand if the "name" TLV should be =
used.
>=20
> =46rom draft-ietf-sfc-nsh-04
>=20
>        0                   1                   2                   3
>        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>       |          TLV Class            |C|    Type     |R|R|R|   Len   =
|
>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>       |                      Variable Metadata                        =
|
>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>=20
>=20
>=20
>                    Figure 6: Variable Context Headers
>=20
> The draft is not entirely clear in this respect, but I think this is =
what you call a TLV.
>=20
> Should I understand this way?
>=20
> Type =3D TLV Class + C + Type (24 bits)
> Length =3D len (5 bits)
> Value =3D Variable Metadata
>=20
> A convention we used in MPLS when we have variable length fields is
> to use a ~ instead of the |, like this:.
>=20
>        0                   1                   2                   3
>        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>       |          TLV Class            |C|    Type     |R|R|R|   Len   =
|
>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>       ~                      Variable Metadata                        =
~
>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>=20
> I suggest that this is a good practice that could be adopted here =
also.
>=20
> Two more questions:
>=20
> If the metadata does not align exactly with the 32 bit/4 byte =
structure,
> what is the rules for padding?
>=20
> A last, but a bit different question, do you need indicators like the =
U
> and F flags in an to indicate what should happen if the node does not
> recognize the (TLV Class, C, Type)-field?
>=20
> /Loa
>=20
>=20
> PS
>=20
> I will also have a few more editorial comments that will be sent to
> the authors within a day or two.
>=20
>=20
> --
>=20
>=20
> Loa Andersson                        email: loa@mail01.huawei.com
> Senior MPLS Expert                          loa@pi.nu
> Huawei Technologies (consultant)     phone: +46 739 81 21 64
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


--Apple-Mail=_BB565229-06DF-4A73-8288-A0788411007E
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=i94P
-----END PGP SIGNATURE-----

--Apple-Mail=_BB565229-06DF-4A73-8288-A0788411007E--


From nobody Tue Apr 19 19:41:58 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1698B12EAC5; Tue, 19 Apr 2016 19:41:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N997cdt4W06b; Tue, 19 Apr 2016 19:41:55 -0700 (PDT)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 417F312EAC4; Tue, 19 Apr 2016 19:41:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=7219; q=dns/txt; s=iport; t=1461120115; x=1462329715; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=7SisTyZyfYPtjFb+id/MKPdR6gKoN3Utrt8MUY0AzUM=; b=f6Lvexa1H5+giwODBo7GFYKU7Ski3+HMRHymDAXI4ez29qdVNHWw3r5X DIelTPygNZO4/d9FwDR61aY8gPtb7Rfb/IvvYYTGJMQ9B+RddRkAy9mwv F6DfkZlre0T8fwVQVlmtzk9AAPBByKWd8hgKrlnefhf4/j0pEQjKZw4k+ E=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BLAwCA6xZX/5BdJa1egzhTfQa5cg6Bc?= =?us-ascii?q?RcLghiDVAKBRjgUAQEBAQEBAWUnhEEBAQEDAQEBARoGRAQDCwUJAgIBBgIOCio?= =?us-ascii?q?CAhsMCyUCBA4FDogTCA6OcJ0XkT4BAQEBAQEBAQEBAQEBAQEBAQEBAQENBAQEh?= =?us-ascii?q?h2BdQiCToQPEQGDHiuCKwWNU4o7AYMngWaJBYFmh3eFNI8rAR4BQ4IzgTVsh18?= =?us-ascii?q?2fgEBAQ?=
X-IronPort-AV: E=Sophos;i="5.24,507,1454976000";  d="asc'?scan'208";a="262047823"
Received: from rcdn-core-8.cisco.com ([173.37.93.144]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 Apr 2016 02:41:54 +0000
Received: from XCH-RTP-018.cisco.com (xch-rtp-018.cisco.com [64.101.220.158]) by rcdn-core-8.cisco.com (8.14.5/8.14.5) with ESMTP id u3K2frBm006496 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 20 Apr 2016 02:41:54 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-018.cisco.com (64.101.220.158) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Tue, 19 Apr 2016 22:41:52 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Tue, 19 Apr 2016 22:41:52 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Azhar Sayeed <asayeed@redhat.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
Thread-Index: AQHRmHqvPG9+wCOo5UWLeYjmbm2Pnp+QEKeAgAJd1QA=
Date: Wed, 20 Apr 2016 02:41:52 +0000
Message-ID: <592C0220-7CE8-46A6-8181-2AA7EF1CA63D@cisco.com>
References: <57133AED.4080005@pi.nu> <33D1653F-230B-4877-AB8C-C1BAE6C26BD3@redhat.com>
In-Reply-To: <33D1653F-230B-4877-AB8C-C1BAE6C26BD3@redhat.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.251.155]
Content-Type: multipart/signed; boundary="Apple-Mail=_2BA9FAD3-8161-4976-92EB-3781E872F0F1"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/pGklMrMaG20cYg2oeY15v1vLJSE>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 02:41:57 -0000

--Apple-Mail=_2BA9FAD3-8161-4976-92EB-3781E872F0F1
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Azhar,

-1 :-)

Within the IETF-specified protocols, we can certainly find examples of =
most syntax and structures, from the simple to the too creative ones. =
Finding a protocol with a specific TLV structure does not mean that =
that=E2=80=99s the best for every protocol use.

You say: "This should also be consistent=E2=80=9D.

However, just to understand your point, what is the technical reason for =
NSH TLV structs having to match BFD structs and ISIS structs? And why =
not, say, RSVP=E2=80=99s or ICMP Multipart=E2=80=99s or L2TPv3=E2=80=99s =
(which, incidentally, use a Class/Type-length-value format)?

When you say =E2=80=9C to align with all the other TLV=E2=80=99s =
structure=E2=80=9D =E2=80=94 I ask: why?

If we think of the goal of flexibility (main goal of Type 2) in the =
context of most flexible allocation, a hierarchical scheme is a =
technical answer. Given the rich ecosystem of vendors and open source =
projects, the proposed structure, in my humble opinion, future proofs =
the design.

=E2=80=94 Carlos.

> On Apr 18, 2016, at 10:33 AM, Azhar Sayeed <asayeed@redhat.com> wrote:
>=20
> Loa,
>=20
> +1 Agree and not just LDP, but BFD TLV or any of the ISIS TLVs have =
the same structure - This should also be consistent..the question then =
is can the current TLV structure in draft-~nsh-04 be re-configured to =
align with all the other TLV=E2=80=99s structure?
>=20
> Azhar
>=20
>=20
>> On Apr 17, 2016, at 3:27 AM, Loa Andersson <loa@pi.nu> wrote:
>>=20
>> Working Group, authors,
>>=20
>> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to =
read
>> it before now) and have a question on how the TLV concept is =
understood
>> in the draft.
>>=20
>> For example in LDP TLV were defined as Type, Length Value, e.g. (from
>> RFC 5036 section 3.3):
>>=20
>>  LDP uses a Type-Length-Value (TLV) encoding scheme to encode much of
>>  the information carried in LDP messages.
>>=20
>>  An LDP TLV is encoded as a 2 octet field that uses 14 bits to =
specify
>>  a Type and 2 bits to specify behavior when an LSR doesn't recognize
>>  the Type, followed by a 2 octet Length field, followed by a variable
>>  length Value field.
>>=20
>>=20
>>   0                   1                   2                   3
>>   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>  |U|F|        Type               |            Length             |
>>  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>  |                                                               |
>>  |                             Value                             |
>>  ~                                                               ~
>>  |                                                               |
>>  |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>  |                               |
>>  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>=20
>> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more =
complicated
>> and I'm struggling a bit to understand if the "name" TLV should be =
used.
>>=20
>> =46rom draft-ietf-sfc-nsh-04
>>=20
>>       0                   1                   2                   3
>>       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>      =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>      |          TLV Class            |C|    Type     |R|R|R|   Len   =
|
>>      =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>      |                      Variable Metadata                        =
|
>>      =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>=20
>>=20
>>=20
>>                   Figure 6: Variable Context Headers
>>=20
>> The draft is not entirely clear in this respect, but I think this is =
what you call a TLV.
>>=20
>> Should I understand this way?
>>=20
>> Type =3D TLV Class + C + Type (24 bits)
>> Length =3D len (5 bits)
>> Value =3D Variable Metadata
>>=20
>> A convention we used in MPLS when we have variable length fields is
>> to use a ~ instead of the |, like this:.
>>=20
>>       0                   1                   2                   3
>>       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>      =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>      |          TLV Class            |C|    Type     |R|R|R|   Len   =
|
>>      =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>      ~                      Variable Metadata                        =
~
>>      =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>=20
>> I suggest that this is a good practice that could be adopted here =
also.
>>=20
>> Two more questions:
>>=20
>> If the metadata does not align exactly with the 32 bit/4 byte =
structure,
>> what is the rules for padding?
>>=20
>> A last, but a bit different question, do you need indicators like the =
U
>> and F flags in an to indicate what should happen if the node does not
>> recognize the (TLV Class, C, Type)-field?
>>=20
>> /Loa
>>=20
>>=20
>> PS
>>=20
>> I will also have a few more editorial comments that will be sent to
>> the authors within a day or two.
>>=20
>>=20
>> --
>>=20
>>=20
>> Loa Andersson                        email: loa@mail01.huawei.com
>> Senior MPLS Expert                          loa@pi.nu
>> Huawei Technologies (consultant)     phone: +46 739 81 21 64
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


--Apple-Mail=_2BA9FAD3-8161-4976-92EB-3781E872F0F1
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=oYOk
-----END PGP SIGNATURE-----

--Apple-Mail=_2BA9FAD3-8161-4976-92EB-3781E872F0F1--


From nobody Tue Apr 19 22:44:49 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 977AF12D706; Tue, 19 Apr 2016 22:44:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IDIm_dH1At3l; Tue, 19 Apr 2016 22:44:45 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6616E12E13D; Tue, 19 Apr 2016 22:44:44 -0700 (PDT)
Received: from omfedm06.si.francetelecom.fr (unknown [xx.xx.xx.2]) by omfedm13.si.francetelecom.fr (ESMTP service) with ESMTP id 9646F32448D; Wed, 20 Apr 2016 07:44:42 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.18]) by omfedm06.si.francetelecom.fr (ESMTP service) with ESMTP id 7381727C066; Wed, 20 Apr 2016 07:44:42 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM34.corporate.adroot.infra.ftgroup ([fe80::cba:56d0:a732:ef5a%19]) with mapi id 14.03.0279.002; Wed, 20 Apr 2016 07:44:42 +0200
From: <mohamed.boucadair@orange.com>
To: Azhar Sayeed <asayeed@redhat.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
Thread-Index: AQHRmnhJd43LowhZakKM36eRU4WnUJ+SVxCQ
Date: Wed, 20 Apr 2016 05:44:41 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D5CBB0@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <57133AED.4080005@pi.nu> <787AE7BB302AE849A7480A190F8B933008D5C41E@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D72A4B70-0D86-41A3-8D6B-BBEE12C9AC73@redhat.com>
In-Reply-To: <D72A4B70-0D86-41A3-8D6B-BBEE12C9AC73@redhat.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.5]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.20.51518
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/pkSv8_3rXAVZtw-WXuu5QTC9dwI>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 05:44:47 -0000

Hi Azhar,=20

Thank you for the feedback and the support for the originator ID.=20

The re-arranging of the fields you propose is indeed another option, but it=
 does not allow a compact header, e.g., 16 bits for the length is too much =
for the cases I'm aware of + it is not optimal if no originator ID is to be=
 supplied for instance.=20

Having the class, type, flags, and length in the first 32 bits would lead t=
o a compact header.=20

Cheers,
Med

> -----Message d'origine-----
> De=A0: Azhar Sayeed [mailto:asayeed@redhat.com]
> Envoy=E9=A0: mardi 19 avril 2016 22:17
> =C0=A0: BOUCADAIR Mohamed IMT/OLN
> Cc=A0: Loa Andersson; sfc@ietf.org; draft-ietf-sfc-nsh@ietf.org
> Objet=A0: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Question=
s
> on TLVs in draft-ietf-sfc-nsh
>=20
> Hi Med,
>=20
> You can still encode this as a TLV by re-arranging the fields with Type
> first, length and then value - In the value portions you can a mandatory
> bytes that encode the flags, class, originator id and then variable
> metadata
>=20
> So here is an option.
>=20
> Type - 16 bits
> Length - 16 bits
> Value:
> Flags - 4 bits
> Class - 4 bits
> Originator Length - 8 bits
> Originator ID - Variable
> Data Variable
>=20
> +1 to the idea of originator id.
>=20
>=20
> Azhar
>=20
>=20
>=20
> > On Apr 19, 2016, at 3:48 AM, mohamed.boucadair@orange.com wrote:
> >
> > Dear Loa, all,
> >
> > Thank you for raising this point about the encoding of the optional
> context information.
> >
> > I agree that the use of TLV term is confusing. What about using another
> term, e.g., "Information Elements", "Options", or "Context Element"?
> >
> > As an input to this discussion, below a proposal for an encoding that
> achieves the following goals:
> >
> > * Shorten the encoding of the Class field.
> > * Allow for more type code points.
> > * Avoids requiring padding for the sake of compact headers.
> > * Allows to include the ID of the entity that injected the context
> information (OPTIONAL).
> > * Inherit rich registries such as IPFIX.
> >
> > NOTE: This proposal does not include a dedicated flag bit to indicate
> whether the context element is mandatory-to-process or optional-to-proces=
s
> because further discussion/text specification is required: e.g.,
> > * Wouldn't be sufficient to supply that information using the control
> plane?
> > * If that information is supplied in both the context element and
> configured to a SFC-aware function, how conflicts are managed?
> > * What is the behavior for processing mandatory-to-process elements
> (particularly, when it is not supported)?
> > * Is it required to recommend an ordering of supplying the mandatory-to=
-
> process or optional-to-process elements?
> > * Is it required to preserve the same ordering when forwarding a packet=
?
> >
> > =3D=3DPROPOSAL=3D=3D=3D=3D
> >
> > Base version
> >        0                   1                   2                   3
> >       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
> >      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >      |Class  |            Type               | FLAGS |     Length    |
> >      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >      //                           Data (Variable)                    //
> >      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> > Version with Originator ID:
> >        0                   1                   2                   3
> >       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
> >      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >      |Class  |            Type               | Flags |     Length    |
> >      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >      //Originator Len|     Originator ID (Variable)(Optional)       //
> >      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >      //                           Data (Variable)                    //
> >      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >
> >      The description of the fields is as follows:
> >
> >      Class:  In order to foster service innovation, this field
> >         allows to inherit from existing code point registries that are
> >         likely to be useful in a SFC context.  The following values are
> >         reserved by this specification:
> >         0:  See IANA section.
> >         1:  IPFIX [IPFIX].
> >
> >      Type:  Indicates the code point of the context element.  If
> >         "Class" field is non-null, the interpretation of this field MUS=
T
> >         conform to the one defined for that specific class registry. Se=
e
> IANA section.
> >
> >      Flags:  The Flags field comprises a set of 4 flags:
> >
> >             +-+-+-+-+
> >             |S|r|r|r|
> >             +-+-+-+-+
> >
> >             where "rrr" are reserved bits for future assignment as
> >             additional flag bits. r bits MUST each be sent as zero and
> MUST be
> >             ignored on receipt.
> >
> >             When set, the S-flag indicates that an Originator ID field
> is
> >             present in the context element.  This flag is set by defaul=
t
> to 0, meaning
> >             there is no Originator ID field present in the element.
> >
> >      Originator ID (Optional):  Conveys the identifier of the entity
> that injected
> >         this context element in the NSH header (e.g., a service
> >         function identifier, a classifier, etc.).  This document does
> >         not make any assumption about the structure of the information
> >         carried in this field because this is deployment-specific.
> >         This information is used by SFC-aware elements to enforce
> >         policies such as: process a context information if and only if
> >         it was supplied by a given entity.  This information can be
> >         used as a safeguard against misbehaving nodes that inject
> >         illegitimate data in the NSH header.
> >
> >         This field MUST be included only if S-bit is set.
> >
> >      Length:  Indicates, in octets, the length of the data carried in
> >         the context element.
> >
> >      Data (Variable):  The semantics of this field depend on the
> >         "Class" and "Type" fields.
> > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
> >
> > Opinions?
> >
> > Cheers,
> > Med
> >
> >> -----Message d'origine-----
> >> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Loa Andersson
> >> Envoy=E9 : dimanche 17 avril 2016 09:28
> >> =C0 : sfc@ietf.org; draft-ietf-sfc-nsh@ietf.org
> >> Objet : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions o=
n
> >> TLVs in draft-ietf-sfc-nsh
> >>
> >> Working Group, authors,
> >>
> >> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to read
> >> it before now) and have a question on how the TLV concept is understoo=
d
> >> in the draft.
> >>
> >> For example in LDP TLV were defined as Type, Length Value, e.g. (from
> >> RFC 5036 section 3.3):
> >>
> >>    LDP uses a Type-Length-Value (TLV) encoding scheme to encode much o=
f
> >>    the information carried in LDP messages.
> >>
> >>    An LDP TLV is encoded as a 2 octet field that uses 14 bits to
> specify
> >>    a Type and 2 bits to specify behavior when an LSR doesn't recognize
> >>    the Type, followed by a 2 octet Length field, followed by a variabl=
e
> >>    length Value field.
> >>
> >>
> >>     0                   1                   2                   3
> >>     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
> >>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>    |U|F|        Type               |            Length             |
> >>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>    |                                                               |
> >>    |                             Value                             |
> >>    ~                                                               ~
> >>    |                                                               |
> >>    |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>    |                               |
> >>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>
> >> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more complicate=
d
> >> and I'm struggling a bit to understand if the "name" TLV should be
> used.
> >>
> >> From draft-ietf-sfc-nsh-04
> >>
> >>         0                   1                   2                   3
> >>         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 =
1
> >>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-
> +
> >>        |          TLV Class            |C|    Type     |R|R|R|   Len
> |
> >>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-
> +
> >>        |                      Variable Metadata
> |
> >>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-
> +
> >>
> >>
> >>
> >>                     Figure 6: Variable Context Headers
> >>
> >> The draft is not entirely clear in this respect, but I think this is
> >> what you call a TLV.
> >>
> >> Should I understand this way?
> >>
> >> Type =3D TLV Class + C + Type (24 bits)
> >> Length =3D len (5 bits)
> >> Value =3D Variable Metadata
> >>
> >> A convention we used in MPLS when we have variable length fields is
> >> to use a ~ instead of the |, like this:.
> >>
> >>         0                   1                   2                   3
> >>         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 =
1
> >>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-
> +
> >>        |          TLV Class            |C|    Type     |R|R|R|   Len
> |
> >>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-
> +
> >>        ~                      Variable Metadata
> ~
> >>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-
> +
> >>
> >> I suggest that this is a good practice that could be adopted here also=
.
> >>
> >> Two more questions:
> >>
> >> If the metadata does not align exactly with the 32 bit/4 byte
> structure,
> >> what is the rules for padding?
> >>
> >> A last, but a bit different question, do you need indicators like the =
U
> >> and F flags in an to indicate what should happen if the node does not
> >> recognize the (TLV Class, C, Type)-field?
> >>
> >> /Loa
> >>
> >>
> >> PS
> >>
> >> I will also have a few more editorial comments that will be sent to
> >> the authors within a day or two.
> >>
> >>
> >> --
> >>
> >>
> >> Loa Andersson                        email: loa@mail01.huawei.com
> >> Senior MPLS Expert                          loa@pi.nu
> >> Huawei Technologies (consultant)     phone: +46 739 81 21 64
> >>
> >> _______________________________________________
> >> sfc mailing list
> >> sfc@ietf.org
> >> https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Apr 19 23:30:09 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4184F12EBE9; Tue, 19 Apr 2016 23:30:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.915
X-Spam-Level: 
X-Spam-Status: No, score=-2.915 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Oow9Itt6_tne; Tue, 19 Apr 2016 23:30:04 -0700 (PDT)
Received: from relais-inet.orange.com (relais-nor35.orange.com [80.12.70.35]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A331812EBE4; Tue, 19 Apr 2016 23:30:04 -0700 (PDT)
Received: from opfednr05.francetelecom.fr (unknown [xx.xx.xx.69]) by opfednr26.francetelecom.fr (ESMTP service) with ESMTP id 32EED20455; Wed, 20 Apr 2016 08:30:03 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.24]) by opfednr05.francetelecom.fr (ESMTP service) with ESMTP id 01E8920057; Wed, 20 Apr 2016 08:30:03 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7D.corporate.adroot.infra.ftgroup ([fe80::9044:c5ee:4dd2:4f16%19]) with mapi id 14.03.0279.002; Wed, 20 Apr 2016 08:30:02 +0200
From: <mohamed.boucadair@orange.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, Loa Andersson <loa@pi.nu>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
Thread-Index: AQHRmHqvd43LowhZakKM36eRU4WnUJ+SbKQA///5YnA=
Date: Wed, 20 Apr 2016 06:30:02 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D5CC0B@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <57133AED.4080005@pi.nu> <46AB5547-90B8-4F2D-B72B-644F3FDC3E70@cisco.com>
In-Reply-To: <46AB5547-90B8-4F2D-B72B-644F3FDC3E70@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.5]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ZLDFoCfTHX7_QYvzb6139imL4hU>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 06:30:07 -0000

SGkgYWxsLCANCg0KSSBhZ3JlZSB3aXRoIENhcmxvcyB0aGF0IGEgaGllcmFyY2hpY2FsIHN0cnVj
dHVyZSBpcyBtb3JlIGZsZXhpYmxlLCBidXQgSSBoYXZlIHRoZSBmb2xsb3dpbmcgY29tbWVudHM6
IA0KDQoqIEFsbW9zdCBhbGwgdGhlIFJGQ3MgcXVvdGVkIGJ5IENhcmxvcyBkbyBub3QgY2xhaW0g
dG8gdXNlIGEgVExWIHN0cnVjdHVyZSBvciB0aGUgVExWIHRlcm0uIEl0IGlzIHJlYXNvbmFibGUg
dG8gdXBkYXRlIHRoZSBuc2ggc3BlYyB0byB1c2UgYSB0ZXJtIHRoYXQgZG9lcyBub3QgbGVhZCB0
byBjb25mdXNpb24uIEkgc2VlIHRoYXQgQ2FybG9zIGlzIHVzaW5nICJpbmZvcm1hdGlvbiBlbGVt
ZW50Ii4gSXQgaXMgYWxzbyBpbiBteSBmYXZvcml0ZSBsaXN0ICh3aXRoIGEgcHJlZmVyZW5jZSBm
b3IgY29udGV4dCBlbGVtZW50KS4gDQoqIFNvbWUgb2YgdGhlc2UgUkZDcyB1c2UgYSBiaXQgdGhh
dCBpcyBzaW1pbGFyIHRvIHRoZSBDLWJpdCwgYnV0IHRoZXkgcmlnaHRmdWxseSBkb24ndCBtaXgg
aXQgd2l0aCB0aGUgSUQgb2YgdGhlIGF0dHJpYnV0ZS4gDQoqIFNvbWUgb2YgdGhlc2UgUkZDcyBz
cGVjaWZ5IChlLmcuLCBTZWN0aW9uIDUuMiBvZiBSRkMzOTMxKSBpbiBkZXRhaWxzIHRoZSBiZWhh
dmlvciB3aGVuIHRoZSAiQy1iaXQiLWxpa2UgaXMgc2V0LiANCg0KVGhlIE5TSCBzcGVjIHN0aWxs
IG5lZWQgbW9yZSB3b3JrLiANCg0KQ2hlZXJzLA0KTWVkDQoNCj4gLS0tLS1NZXNzYWdlIGQnb3Jp
Z2luZS0tLS0tDQo+IERlwqA6IHNmYyBbbWFpbHRvOnNmYy1ib3VuY2VzQGlldGYub3JnXSBEZSBs
YSBwYXJ0IGRlIENhcmxvcyBQaWduYXRhcm8NCj4gKGNwaWduYXRhKQ0KPiBFbnZvecOpwqA6IG1l
cmNyZWRpIDIwIGF2cmlsIDIwMTYgMDQ6MzUNCj4gw4DCoDogTG9hIEFuZGVyc3Nvbg0KPiBDY8Kg
OiBkcmFmdC1pZXRmLXNmYy1uc2hAaWV0Zi5vcmc7IHNmY0BpZXRmLm9yZw0KPiBPYmpldMKgOiBS
ZTogW3NmY10gV0cgbGFzdCBjYWxsIGZvciBkcmFmdC1pZXRmLXNmYy1uc2gtMDQudHh0IC0gUXVl
c3Rpb25zDQo+IG9uIFRMVnMgaW4gZHJhZnQtaWV0Zi1zZmMtbnNoDQo+IA0KPiBIaSwgTG9hLA0K
PiANCj4gR29vZCBhbmFseXNpcyBvbiB0aGUgZm9ybWF0IG9mIHRoZXNlIGluZm9ybWF0aW9uIGVs
ZW1lbnRzLg0KPiANCj4gTXkgc2Vuc2UgaXMgdGhhdCBhIGhpZXJhcmNoaWNhbCBzeW50YXggKHN1
Y2ggYXMgdGhlIENsYXNzL1R5cGUtTGVuZ3RoLQ0KPiBWYWx1ZSkgcHJvdmlkZXMgbXVjaCBtb3Jl
IGZsZXhpYmlsaXR5IHRoYW4gYSBmbGF0IFR5cGUtTGVuZ3RoLVZhbHVlIGFsb25lLg0KPiANCj4g
V2XigJl2ZSBidWlsdCBxdWl0ZSBhIG51bWJlciBvZiBwcm90b2NvbHMgd2l0aCB0aGlzIHN0cnVj
dHVyZSBhbmQgYWxsb2NhdGlvbg0KPiBzY2hlbWUuIEZvciBleGFtcGxlLCBSU1ZQIChodHRwczov
L3Rvb2xzLmlldGYub3JnL2h0bWwvcmZjMzIwOSNzZWN0aW9uLQ0KPiA3LjIpLCBMMlRQdjMgKGh0
dHBzOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9yZmMzOTMxI3NlY3Rpb24tNS4xKSwgSUNNUA0KPiBN
dWx0aS1QYXJ0IEV4dGVuc2lvbnMgKGh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9yZmM0ODg0
I3NlY3Rpb24tOCkuDQo+IA0KPiBSZWdhcmRsZXNzIG9mIHdoYXQgd2UgY2FsbCB0aGUgZmllbGRz
IChlLmcuLCBDbGFzcyBhbmQgVHlwZSwgb3IgVHlwZSBhbmQNCj4gU3ViLVR5cGUsIG9yIOKApiks
IHRoZXJlIGFyZSBjbGVhciB0ZWNobmljYWwgYWR2YW50YWdlcyB0byB0aGlzLCBpbmNsdWRpbmcN
Cj4gdGhlIGFiaWxpdHkgdG8gZGVsZWdhdGUgYWxsb2NhdGlvbiwgdmVuZG9yIHR5cGVzLCBldGMu
DQo+IA0KPiBJbiByZWdhcmRzIHRvIHRoZSBVL0YgYml0cyBpbiBMRFAsIEkgdGhpbmsgdGhlIEMt
Yml0IGluIE5TSCBUTFZzIGFjaGlldmVzDQo+IHdoYXTigJlzIHJlYWxseSBuZWVkZWQgZm9yIGFu
IFNGQyBFbmNhcC4NCj4gDQo+IExhc3RseSwgeW91IGNhbGwgb3V0IHBhZGRpbmcgYW5kIDMyLWJp
dC13b3JkIGFsaWdubWVudC4gVGhpcyBpcyBhIGdyZWF0DQo+IHBvaW50Lg0KPiANCj4gVGhlIHdh
eSB0aGluZ3Mgc2VlbXMgc3RydWN0dXJlZCBub3csIHRoZXJl4oCZcyBhIExlbiBmaWVsZCBtZWFz
dXJlZCBpbiAzMi0NCj4gYml0IHdvcmRzLiBJdOKAmXMgbm90IGNsZWFyIHdoYXQgaGFwcGVucyB3
aGVuIHRoZSBNZXRhZGF0YSAoVmFsdWUpIGl0c2VsZiBpcw0KPiBub3QgMzItYml0LXdvcmQtYWxp
Z25lZC4gVGhpcyBuZWVkcyBmaXhpbmcuDQo+IA0KPiBMb29raW5nIGF0IHRoZSBMZW5ndGggZGVm
aW5pdGlvbjoNCj4gDQo+ICAgIExlbmd0aDogTGVuZ3RoIG9mIHRoZSB2YXJpYWJsZSBtZXRhZGF0
YSwgaW4gNC1ieXRlIHdvcmRzLiAgQSB2YWx1ZSBvZg0KPiAgICAweDAgb3IgaGlnaGVyIGNhbiBi
ZSB1c2VkLiAgQSB2YWx1ZSBvZiAweDAgZGVub3RlcyBhIFRMViBoZWFkZXINCj4gICAgd2l0aG91
dCBhIFZhcmlhYmxlIE1ldGFkYXRhIGZpZWxkLg0KPiANCj4gQ29tbWVudHM6DQo+ICogRmlyc3Qs
IGluc3RlYWQgb2Yg4oCcNC1ieXRl4oCdIHdvcmRzLCB0aGlzIG5lZWRzIHRvIGJlIOKAnDQtb2N0
ZXTigJ0gb3Ig4oCcMzItYml04oCdDQo+IHdvcmRzLiBCeXRlIGlzIHN0cmljdGx5IG1hY2hpbmUg
ZGVwZW5kZW50ICg3IGJpdHMsIDggYml0cywgZXRjKS4NCj4gKiBTZWNvbmQsIOKAnGEgdmFsdWUg
b2YgMHgwIG9yIGhpZ2hlcuKAnSBmb3IgYW4gdW5zaWduZWQgdmFsdWUgZG9lcyBub3Qgc2F5DQo+
IG11Y2guDQo+IA0KPiBIb3BlIHRoZXNlIGhlbHAuDQo+IA0KPiBUaGFua3MsDQo+IA0KPiDigJQg
Q2FybG9zLg0KPiANCj4gPiBPbiBBcHIgMTcsIDIwMTYsIGF0IDM6MjcgQU0sIExvYSBBbmRlcnNz
b24gPGxvYUBwaS5udT4gd3JvdGU6DQo+ID4NCj4gPiBXb3JraW5nIEdyb3VwLCBhdXRob3JzLA0K
PiA+DQo+ID4gSSdtIHJlYWRpbmcgZHJhZnQtaWV0Zi1zZmMtbnNoLTA0IChzb3JyeSB0byBub3Qg
aGF2ZSBiZWVuIGFibGUgdG8gcmVhZA0KPiA+IGl0IGJlZm9yZSBub3cpIGFuZCBoYXZlIGEgcXVl
c3Rpb24gb24gaG93IHRoZSBUTFYgY29uY2VwdCBpcyB1bmRlcnN0b29kDQo+ID4gaW4gdGhlIGRy
YWZ0Lg0KPiA+DQo+ID4gRm9yIGV4YW1wbGUgaW4gTERQIFRMViB3ZXJlIGRlZmluZWQgYXMgVHlw
ZSwgTGVuZ3RoIFZhbHVlLCBlLmcuIChmcm9tDQo+ID4gUkZDIDUwMzYgc2VjdGlvbiAzLjMpOg0K
PiA+DQo+ID4gICBMRFAgdXNlcyBhIFR5cGUtTGVuZ3RoLVZhbHVlIChUTFYpIGVuY29kaW5nIHNj
aGVtZSB0byBlbmNvZGUgbXVjaCBvZg0KPiA+ICAgdGhlIGluZm9ybWF0aW9uIGNhcnJpZWQgaW4g
TERQIG1lc3NhZ2VzLg0KPiA+DQo+ID4gICBBbiBMRFAgVExWIGlzIGVuY29kZWQgYXMgYSAyIG9j
dGV0IGZpZWxkIHRoYXQgdXNlcyAxNCBiaXRzIHRvIHNwZWNpZnkNCj4gPiAgIGEgVHlwZSBhbmQg
MiBiaXRzIHRvIHNwZWNpZnkgYmVoYXZpb3Igd2hlbiBhbiBMU1IgZG9lc24ndCByZWNvZ25pemUN
Cj4gPiAgIHRoZSBUeXBlLCBmb2xsb3dlZCBieSBhIDIgb2N0ZXQgTGVuZ3RoIGZpZWxkLCBmb2xs
b3dlZCBieSBhIHZhcmlhYmxlDQo+ID4gICBsZW5ndGggVmFsdWUgZmllbGQuDQo+ID4NCj4gPg0K
PiA+ICAgIDAgICAgICAgICAgICAgICAgICAgMSAgICAgICAgICAgICAgICAgICAyICAgICAgICAg
ICAgICAgICAgIDMNCj4gPiAgICAwIDEgMiAzIDQgNSA2IDcgOCA5IDAgMSAyIDMgNCA1IDYgNyA4
IDkgMCAxIDIgMyA0IDUgNiA3IDggOSAwIDENCj4gPiAgICstKy0rLSstKy0rLSstKy0rLSstKy0r
LSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rDQo+ID4gICB8VXxGfCAg
ICAgICAgVHlwZSAgICAgICAgICAgICAgIHwgICAgICAgICAgICBMZW5ndGggICAgICAgICAgICAg
fA0KPiA+ICAgKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSst
Ky0rLSstKy0rLSstKy0rLSsNCj4gPiAgIHwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB8DQo+ID4gICB8ICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICBWYWx1ZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgfA0KPiA+ICAg
fiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgIH4NCj4gPiAgIHwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICB8DQo+ID4gICB8ICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKw0KPiA+ICAgfCAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICB8DQo+ID4gICArLSstKy0rLSstKy0rLSstKy0rLSstKy0r
LSstKy0rLSsNCj4gPg0KPiA+IEluIGRyYWZ0LWlldGYtc2ZjLW5zaC0wNCB0aGUgVExWIHN0cnVj
dHVyZSBzZWVtcyBhIGJpdCBtb3JlIGNvbXBsaWNhdGVkDQo+ID4gYW5kIEknbSBzdHJ1Z2dsaW5n
IGEgYml0IHRvIHVuZGVyc3RhbmQgaWYgdGhlICJuYW1lIiBUTFYgc2hvdWxkIGJlIHVzZWQuDQo+
ID4NCj4gPiBGcm9tIGRyYWZ0LWlldGYtc2ZjLW5zaC0wNA0KPiA+DQo+ID4gICAgICAgIDAgICAg
ICAgICAgICAgICAgICAgMSAgICAgICAgICAgICAgICAgICAyICAgICAgICAgICAgICAgICAgIDMN
Cj4gPiAgICAgICAgMCAxIDIgMyA0IDUgNiA3IDggOSAwIDEgMiAzIDQgNSA2IDcgOCA5IDAgMSAy
IDMgNCA1IDYgNyA4IDkgMCAxDQo+ID4gICAgICAgKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0r
LSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSsNCj4gPiAgICAgICB8ICAgICAg
ICAgIFRMViBDbGFzcyAgICAgICAgICAgIHxDfCAgICBUeXBlICAgICB8UnxSfFJ8ICAgTGVuICAg
fA0KPiA+ICAgICAgICstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSst
Ky0rLSstKy0rLSstKy0rLSstKy0rDQo+ID4gICAgICAgfCAgICAgICAgICAgICAgICAgICAgICBW
YXJpYWJsZSBNZXRhZGF0YSAgICAgICAgICAgICAgICAgICAgICAgIHwNCj4gPiAgICAgICArLSst
Ky0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0r
LSstKw0KPiA+DQo+ID4NCj4gPg0KPiA+ICAgICAgICAgICAgICAgICAgICBGaWd1cmUgNjogVmFy
aWFibGUgQ29udGV4dCBIZWFkZXJzDQo+ID4NCj4gPiBUaGUgZHJhZnQgaXMgbm90IGVudGlyZWx5
IGNsZWFyIGluIHRoaXMgcmVzcGVjdCwgYnV0IEkgdGhpbmsgdGhpcyBpcw0KPiB3aGF0IHlvdSBj
YWxsIGEgVExWLg0KPiA+DQo+ID4gU2hvdWxkIEkgdW5kZXJzdGFuZCB0aGlzIHdheT8NCj4gPg0K
PiA+IFR5cGUgPSBUTFYgQ2xhc3MgKyBDICsgVHlwZSAoMjQgYml0cykNCj4gPiBMZW5ndGggPSBs
ZW4gKDUgYml0cykNCj4gPiBWYWx1ZSA9IFZhcmlhYmxlIE1ldGFkYXRhDQo+ID4NCj4gPiBBIGNv
bnZlbnRpb24gd2UgdXNlZCBpbiBNUExTIHdoZW4gd2UgaGF2ZSB2YXJpYWJsZSBsZW5ndGggZmll
bGRzIGlzDQo+ID4gdG8gdXNlIGEgfiBpbnN0ZWFkIG9mIHRoZSB8LCBsaWtlIHRoaXM6Lg0KPiA+
DQo+ID4gICAgICAgIDAgICAgICAgICAgICAgICAgICAgMSAgICAgICAgICAgICAgICAgICAyICAg
ICAgICAgICAgICAgICAgIDMNCj4gPiAgICAgICAgMCAxIDIgMyA0IDUgNiA3IDggOSAwIDEgMiAz
IDQgNSA2IDcgOCA5IDAgMSAyIDMgNCA1IDYgNyA4IDkgMCAxDQo+ID4gICAgICAgKy0rLSstKy0r
LSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSsN
Cj4gPiAgICAgICB8ICAgICAgICAgIFRMViBDbGFzcyAgICAgICAgICAgIHxDfCAgICBUeXBlICAg
ICB8UnxSfFJ8ICAgTGVuICAgfA0KPiA+ICAgICAgICstKy0rLSstKy0rLSstKy0rLSstKy0rLSst
Ky0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rDQo+ID4gICAgICAgfiAgICAg
ICAgICAgICAgICAgICAgICBWYXJpYWJsZSBNZXRhZGF0YSAgICAgICAgICAgICAgICAgICAgICAg
IH4NCj4gPiAgICAgICArLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0rLSstKy0r
LSstKy0rLSstKy0rLSstKy0rLSstKw0KPiA+DQo+ID4gSSBzdWdnZXN0IHRoYXQgdGhpcyBpcyBh
IGdvb2QgcHJhY3RpY2UgdGhhdCBjb3VsZCBiZSBhZG9wdGVkIGhlcmUgYWxzby4NCj4gPg0KPiA+
IFR3byBtb3JlIHF1ZXN0aW9uczoNCj4gPg0KPiA+IElmIHRoZSBtZXRhZGF0YSBkb2VzIG5vdCBh
bGlnbiBleGFjdGx5IHdpdGggdGhlIDMyIGJpdC80IGJ5dGUgc3RydWN0dXJlLA0KPiA+IHdoYXQg
aXMgdGhlIHJ1bGVzIGZvciBwYWRkaW5nPw0KPiA+DQo+ID4gQSBsYXN0LCBidXQgYSBiaXQgZGlm
ZmVyZW50IHF1ZXN0aW9uLCBkbyB5b3UgbmVlZCBpbmRpY2F0b3JzIGxpa2UgdGhlIFUNCj4gPiBh
bmQgRiBmbGFncyBpbiBhbiB0byBpbmRpY2F0ZSB3aGF0IHNob3VsZCBoYXBwZW4gaWYgdGhlIG5v
ZGUgZG9lcyBub3QNCj4gPiByZWNvZ25pemUgdGhlIChUTFYgQ2xhc3MsIEMsIFR5cGUpLWZpZWxk
Pw0KPiA+DQo+ID4gL0xvYQ0KPiA+DQo+ID4NCj4gPiBQUw0KPiA+DQo+ID4gSSB3aWxsIGFsc28g
aGF2ZSBhIGZldyBtb3JlIGVkaXRvcmlhbCBjb21tZW50cyB0aGF0IHdpbGwgYmUgc2VudCB0bw0K
PiA+IHRoZSBhdXRob3JzIHdpdGhpbiBhIGRheSBvciB0d28uDQo+ID4NCj4gPg0KPiA+IC0tDQo+
ID4NCj4gPg0KPiA+IExvYSBBbmRlcnNzb24gICAgICAgICAgICAgICAgICAgICAgICBlbWFpbDog
bG9hQG1haWwwMS5odWF3ZWkuY29tDQo+ID4gU2VuaW9yIE1QTFMgRXhwZXJ0ICAgICAgICAgICAg
ICAgICAgICAgICAgICBsb2FAcGkubnUNCj4gPiBIdWF3ZWkgVGVjaG5vbG9naWVzIChjb25zdWx0
YW50KSAgICAgcGhvbmU6ICs0NiA3MzkgODEgMjEgNjQNCj4gPg0KPiA+IF9fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+ID4gc2ZjIG1haWxpbmcgbGlzdA0K
PiA+IHNmY0BpZXRmLm9yZw0KPiA+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGlu
Zm8vc2ZjDQoNCg==


From nobody Wed Apr 20 00:51:41 2016
Return-Path: <loa@pi.nu>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDF9612ECF9; Wed, 20 Apr 2016 00:51:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level: 
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a_87CKBf689s; Wed, 20 Apr 2016 00:51:37 -0700 (PDT)
Received: from pipi.pi.nu (pipi.pi.nu [83.168.239.141]) (using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DAF4812ECD2; Wed, 20 Apr 2016 00:51:36 -0700 (PDT)
Received: from [192.168.1.2] (unknown [122.53.41.246]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: loa@pi.nu) by pipi.pi.nu (Postfix) with ESMTPSA id 6A6AD1802BDF; Wed, 20 Apr 2016 09:51:34 +0200 (CEST)
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
References: <57133AED.4080005@pi.nu> <46AB5547-90B8-4F2D-B72B-644F3FDC3E70@cisco.com>
From: Loa Andersson <loa@pi.nu>
Message-ID: <571734F7.4030804@pi.nu>
Date: Wed, 20 Apr 2016 15:51:19 +0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <46AB5547-90B8-4F2D-B72B-644F3FDC3E70@cisco.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/2G2M-pp8Ffp-YxQMH5lS4AVeB2g>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 07:51:40 -0000

Carlos,

Thanks for this, I don't think we are too far apart, and I have a
suggestion that I hope resolve this.

On 2016-04-20 10:35, Carlos Pignataro (cpignata) wrote:
> Hi, Loa,
>
> Good analysis on the format of these information elements.
>
> My sense is that a hierarchical syntax (such as the Class/Type-Length-Value) provides much more flexibility than a flat Type-Length-Value alone.

I tend to agree with that, but that is an argument on if the flexibility
is needed. I think it is for the NSH.

My point is that TLV is "named" for its structure, if an element does
notm have that structure it is simply not a TLV.

On the highest level I do not have a problem with the layout of the
Variable Context Headers, but currently it is not clear why we call
it a TLV. It could be made clear though.
>
> Weâ€™ve built quite a number of protocols with this structure and allocation scheme. For example, RSVP (https://tools.ietf.org/html/rfc3209#section-7.2), L2TPv3 (https://tools.ietf.org/html/rfc3931#section-5.1), ICMP Multi-Part Extensions (https://tools.ietf.org/html/rfc4884#section-8).
>
Indeed, but of the three documents you refer to only the L2TPv3
document mention TLV, and only on a very high level in the terminology
section.

> Regardless of what we call the fields (e.g., Class and Type, or Type and Sub-Type, or â€¦), there are clear technical advantages to this, including the ability to delegate allocation, vendor types, etc.
>
My point was that what we call things matter.

> In regards to the U/F bits in LDP, I think the C-bit in NSH TLVs achieves whatâ€™s really needed for an SFC Encap.
>
This is the response I expected, though I'm still not entirely
comfortable, e.g. what do you do if you don't recognize the class
and the C bit is not set?

> Lastly, you call out padding and 32-bit-word alignment. This is a great point.
>
> The way things seems structured now, thereâ€™s a Len field measured in 32-bit words. Itâ€™s not clear what happens when the Metadata (Value) itself is not 32-bit-word-aligned. This needs fixing.
>
> Looking at the Length definition:
>
>     Length: Length of the variable metadata, in 4-byte words.  A value of
>     0x0 or higher can be used.  A value of 0x0 denotes a TLV header
>     without a Variable Metadata field.
>
> Comments:
> * First, instead of â€œ4-byteâ€ words, this needs to be â€œ4-octetâ€ or â€œ32-bitâ€ words. Byte is strictly machine dependent (7 bits, 8 bits, etc).
> * Second, â€œa value of 0x0 or higherâ€ for an unsigned value does not say much.

Agree to changing to "octet".

Actually the Len field is 5 bits, gives us 32 variants, zero means
"none", while 31 means 31 x 4 = 124 octets.

What I suggest that we add (we can continue to discuss sizes of the 
differnt fields). I've not look closely where my text would fit
exactly.

3.5.1. Optional Variable Length Metadata

   Optional variable length metadata are encoded as Variable Context
   Header TLVs The Variable Context Headers TLV has the same structure
   as TLVs defined in e.g. the LDP and BFD protocols, Type, Length and
   Value.

   However in the Variable Context Header TLV the Type field have an
   internal structure TLV Class, C-bit and Type.

    The format of the optional variable length context header TLVs, is as
    described below.

         0                   1                   2                   3
         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        |          TLV Class            |C| TLV-Type    |R|R|R|   Len   |
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        |                      Variable Metadata                        |
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+



                     Figure 6: Variable Context Headers

    Type: The type field has three sub-fields, TLV Class, TLV Type and
    Len, the TLV-Type and Len fields have an internal structure.

      TLV Class: The TLV Class field is 16 bits and describes the scope
      of the "Type" field.  In some cases, the TLV Class will identify a
      specific vendor, in others, the TLV Class will identify specific
      standards body allocated types.  A new IANA registry will be
      created for TLV Class type.

      Type: The TLV-Type field is 8 bits and the specifies the type of
      information carried in the Variable Metadata field, within the
      scope of a given TLV Class.  Value allocation is the responsibility
      of the TLV Class owner.

      The Critical bit (C-bit); 1 bit, encoding the criticality of the
      TLV-type. The C-bit is part of the TLV-Type field and is
      consistent with IPv6 option types. The C-bit (the most significant
      bit of the TLV-Type field) indicates whether the TLV is mandatory
      for the receiver to understand/process.  This effectively allocates
      TLV-Type values 0 to 127 for non-critical options and Type values
      128 to 255 for critical options.  Figure 7 below illustrates the
      placement of the Critical bit within the Type field.

      +-+-+-+-+-+-+-+-+
      |C|     Type    |
      +-+-+-+-+-+-+-+-+


         Figure 7: Critical Bit Placement Within the TLV Type Field


      If a receiver receives an encapsulated packet containing a TLV with
      the Critical bit set to 0x1 in the Type field and it does not
      understand how to process the Type, it MUST drop the packet.
      Transit devices MUST NOT drop packets based on the setting of this
      bit.

      Length: The length field is 8 bits are reserved, three most
      significant bits (R) are reserved for future use. The length field
      indicates the length of the variable metadata, in 4-octet words. A
      value of 0x0 or higher can be used. A value of 0x0 denotes a
      Variable Context Header TLV without a Variable Metadata field.

Note: as always when I write English a grammar review is necessary!

Hope I did not screw this up too badly.

/Loa




>
> Hope these help.
>
> Thanks,
>
> â€” Carlos.
>
>> On Apr 17, 2016, at 3:27 AM, Loa Andersson <loa@pi.nu> wrote:
>>
>> Working Group, authors,
>>
>> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to read
>> it before now) and have a question on how the TLV concept is understood
>> in the draft.
>>
>> For example in LDP TLV were defined as Type, Length Value, e.g. (from
>> RFC 5036 section 3.3):
>>
>>    LDP uses a Type-Length-Value (TLV) encoding scheme to encode much of
>>    the information carried in LDP messages.
>>
>>    An LDP TLV is encoded as a 2 octet field that uses 14 bits to specify
>>    a Type and 2 bits to specify behavior when an LSR doesn't recognize
>>    the Type, followed by a 2 octet Length field, followed by a variable
>>    length Value field.
>>
>>
>>     0                   1                   2                   3
>>     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>    |U|F|        Type               |            Length             |
>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>    |                                                               |
>>    |                             Value                             |
>>    ~                                                               ~
>>    |                                                               |
>>    |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>    |                               |
>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>
>> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more complicated
>> and I'm struggling a bit to understand if the "name" TLV should be used.
>>
>>  From draft-ietf-sfc-nsh-04
>>
>>         0                   1                   2                   3
>>         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>        |          TLV Class            |C|    Type     |R|R|R|   Len   |
>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>        |                      Variable Metadata                        |
>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>
>>
>>
>>                     Figure 6: Variable Context Headers
>>
>> The draft is not entirely clear in this respect, but I think this is what you call a TLV.
>>
>> Should I understand this way?
>>
>> Type = TLV Class + C + Type (24 bits)
>> Length = len (5 bits)
>> Value = Variable Metadata
>>
>> A convention we used in MPLS when we have variable length fields is
>> to use a ~ instead of the |, like this:.
>>
>>         0                   1                   2                   3
>>         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>        |          TLV Class            |C|    Type     |R|R|R|   Len   |
>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>        ~                      Variable Metadata                        ~
>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>
>> I suggest that this is a good practice that could be adopted here also.
>>
>> Two more questions:
>>
>> If the metadata does not align exactly with the 32 bit/4 byte structure,
>> what is the rules for padding?
>>
>> A last, but a bit different question, do you need indicators like the U
>> and F flags in an to indicate what should happen if the node does not
>> recognize the (TLV Class, C, Type)-field?
>>
>> /Loa
>>
>>
>> PS
>>
>> I will also have a few more editorial comments that will be sent to
>> the authors within a day or two.
>>
>>
>> --
>>
>>
>> Loa Andersson                        email: loa@mail01.huawei.com
>> Senior MPLS Expert                          loa@pi.nu
>> Huawei Technologies (consultant)     phone: +46 739 81 21 64
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Wed Apr 20 01:09:50 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C7C5A12D68E; Wed, 20 Apr 2016 01:09:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.915
X-Spam-Level: 
X-Spam-Status: No, score=-2.915 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ydmm_SMGCdOj; Wed, 20 Apr 2016 01:09:47 -0700 (PDT)
Received: from relais-inet.orange.com (relais-nor35.orange.com [80.12.70.35]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BF96912D639; Wed, 20 Apr 2016 01:09:46 -0700 (PDT)
Received: from opfednr03.francetelecom.fr (unknown [xx.xx.xx.67]) by opfednr20.francetelecom.fr (ESMTP service) with ESMTP id 5109640250; Wed, 20 Apr 2016 10:09:45 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.18]) by opfednr03.francetelecom.fr (ESMTP service) with ESMTP id 06F611A0059; Wed, 20 Apr 2016 10:09:45 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM34.corporate.adroot.infra.ftgroup ([fe80::cba:56d0:a732:ef5a%19]) with mapi id 14.03.0279.002; Wed, 20 Apr 2016 10:09:44 +0200
From: <mohamed.boucadair@orange.com>
To: Loa Andersson <loa@pi.nu>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
Thread-Index: AQHRmtl/5AyYQOBYvkqAcGlGZ5oRl5+Sf5fQ
Date: Wed, 20 Apr 2016 08:09:43 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D5CCE1@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <57133AED.4080005@pi.nu> <46AB5547-90B8-4F2D-B72B-644F3FDC3E70@cisco.com> <571734F7.4030804@pi.nu>
In-Reply-To: <571734F7.4030804@pi.nu>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.5]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/tGyOqpd9iinY35C4WdUMKlwQUt0>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 08:09:49 -0000
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=


From nobody Wed Apr 20 06:05:12 2016
Return-Path: <nobinm@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C34612D15B for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 06:05:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zUJtfkbM-jJ9 for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 06:05:08 -0700 (PDT)
Received: from mail-wm0-x22e.google.com (mail-wm0-x22e.google.com [IPv6:2a00:1450:400c:c09::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6F64912D114 for <sfc@ietf.org>; Wed, 20 Apr 2016 06:05:08 -0700 (PDT)
Received: by mail-wm0-x22e.google.com with SMTP id e201so49853961wme.0 for <sfc@ietf.org>; Wed, 20 Apr 2016 06:05:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:date:message-id:subject:from:to:cc; bh=9u5GgU56tvzTvEedbWl2HP8LQHD9xaFYM0BqsQxL4g0=; b=XMNJR8uFqlDW33W7yevn/7KUuEWnrVlX0WiTPu/er7aZXj6JP5zvL17x5jaUXRRyyz Uol2C4O1+SdQVM793j9YDcdRWeBSIW+/Q/gsqgBrxRMYEUp+zikTFZBryxOXgM5FygSf ytoWRVLER7GP9iEGIa03NrYTBWBdjmkRIPfHwJ8DNlnkfNsWygR3EWk53ApRMqsJkoS0 DQ8CmjBjuguew5XmPsAdWeauQQyO5IwS0Nr6i5p2oaDWdKvJ5FEFkpLjASI50PEBhUt9 yXQC4BB8y4rV79bNXa1gt+Ilwv6Irld+xdHQHgM8WYGqdIeaZSvcliqr4f1CeRJI1wf1 uBoQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:date:message-id:subject:from:to:cc; bh=9u5GgU56tvzTvEedbWl2HP8LQHD9xaFYM0BqsQxL4g0=; b=dRru+OHp3LXIhJYAHQAyfkNN5cwyCqUb0yzFE4qRO0MSGsfhQ46B0v/sY/PEDrGRAe Yz847mgbUl6CDeyUrcfjojs0t2WyPFiuI2OvFMRef4PD6c6vmPrUxWKJsp7ga/5wv5XZ ahGMLs5SZLjW33JcT1JGC/7kKfVxIXkZIzX658aOLJICh4L5MVNkS9QYhnqklN1L8A2n Jh9oiIUydMbpdKPlZQIj3vjEvFi+DTb/F5mpPuO00zWPUzee1VDkt+PJ+Ejswpc67ijd dTslIlZgZPkQw9mJNOy2btplcKAzuThJsO6wybOgRaqwZkeY2sr7fN9asp0qPNWhcMQc o3wg==
X-Gm-Message-State: AOPr4FUNSwc+YBHwS5tvECLHT+U5QURiacDIESnlwPK3mcVO24wmTmOnsQld65/6lW4O0n/BvcI+rhP1GfPRVw==
MIME-Version: 1.0
X-Received: by 10.194.2.210 with SMTP id 18mr9283673wjw.55.1461157506976; Wed, 20 Apr 2016 06:05:06 -0700 (PDT)
Received: by 10.28.87.19 with HTTP; Wed, 20 Apr 2016 06:05:06 -0700 (PDT)
Date: Wed, 20 Apr 2016 18:35:06 +0530
Message-ID: <CAH0NxEo9HJNUoSzUTFPU0iR37k8xPeMC-3VEFaF7Ygz8+7QHWg@mail.gmail.com>
From: Nobin Mathew <nobinm@gmail.com>
To: anil.sn@huawei.com, gaurav.agrawal@huawei.com, vinods.kumar@huawei.com
Content-Type: multipart/alternative; boundary=047d7b3a860a2a18710530ea3e71
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/4F2d28aSQ_c1GsUnrmfyP7adyhQ>
Cc: sfc@ietf.org
Subject: [sfc] Few Querries from draft-agv-sfc-packet-delay-measurement-00
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 13:05:11 -0000

--047d7b3a860a2a18710530ea3e71
Content-Type: text/plain; charset=UTF-8

Hi Anil Kumar S N, Gaurav Agrawal,Vinod Kumar S,

I have few question with respect to the delay calculation method
described in the draft "draft-agv-sfc-packet-delay-measurement-00".
Please let me know your opinion on this queries.


1)
-------------------------draft section---------------------------------------
   3.6 Incoming Packets Processing at MA

      On receiving the packet with NSH header following operations are
      carried out:

      Step 1: Detection of PM Context Header in a packet, by verifying
              the PM TLV Class as allocated by IANA.
              (If not detected, move to step 6)

      Step 2: Check if PM Type field value is 6 to 10.
              (If not move to step 6).

      Step 3: If PM Type Value = 7 to 10 move directly to Step 5

      Step 4: Check Presence of self Service index in Service Index List
              (If not present, move to step 6)
---------------------------------------------------------------------------

MA can be SF or SFF , but based on the steps given here, SFF cannot do
the time recording or report to collector because
step 4 checks the SI index and SFF we do not have Si index.

[ SI: List of participating Service functions in the SFP. It SHOULD be
   in decreasing order of the SI for optimized traversal of the SI
   participation. ]

So i thing we need to address SFF scenario as well.


2)
     +---+                                          +----+
     |SF |--------------------+        +------------|SF  |
     |   |....... ----------+  \      / /+----------|    |
     +---+                   \  \    / /            +----+
                         +---2 -3-+-4--5--+
                         |   SF Forwarder |
                   -----1|      (SFF)     |6------
                         +-------+--------+

As per the method specified in this draft MA will record 'timestamp'
when a packet ENTER and EXIT and this 'timestamp'
will be notified to the controller. but if we consider the above
topology SFF has multiple entry and exit ports so
each time these entries[timestamp] will be overwritten by the MA when
the packet traverse and we will not get the correct delay
because of this.

I feel we need to track each ENTRY and EXIT separately to track the
delay correctly.



3)
------------------------------draft
section----------------------------------------------------------------
3.8 MA Reporting the statistics to Collector

   Reporting timer will run on Each MA. Consistency of this timer should
   be ensured across the entire MA in the SFP, ensuring the same is out
   of scope of this document.

   On expiry of this timer following information needs to be sent to the
   Collector.

       - Service Index

       - PM Type Value

       - Value of all the collected Rx-Time[P][W], Rx-Sum-Time[P][W],
         & Rx-Sample-Count[P][W] parameters along with the
         corresponding PMF ID and Window Id

       - Value of all the collected Tx-Time[P][W], Tx-Sum-Time[P][W],
         & Tx-Sample-Count[P][W] parameters along with the
         corresponding PMF ID and Window Id

   MA may delete the parameters after sending the same to collector.
-----------------------------------------------------------------------------------------------------------

If the MA is in SFF the what is the ID to track the device, Service
index can be used for SF but not for SFF ?



4)
------------------------draft section------------------------------------------
   - If Value = 0x7, 0x8, 0x9, 0x10
          o No need to encode SI, since the type dictates the involved
            participating MA
-------------------------------------------------------------------------------

I think 0x10 should be 0xA ?




5)
----------------------------draft section---------------------------------------

3.7 Outgoing Packets Processing at MA

      At outgoing port of MA following operations are carried out.

      Step 1: If Option 1 is used then go to Step 2a, if Option 2 is
              used then go to Step 2b

      Step 2: If Option 1 is used then go to Step 2a, if Option 2 is
              used then go to Step 2b
--------------------------------------------------------------------------------

Steps 1 and 2 is same here.


Regards
Nobin

--047d7b3a860a2a18710530ea3e71
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><pre>Hi Anil Kumar S N, Gaurav Agrawal,Vinod Kumar S,<br><=
br>I have few question with respect to the delay calculation method describ=
ed in the draft &quot;draft-agv-sfc-packet-delay-measurement-00&quot;.<br>P=
lease let me know your opinion on this queries.<br><br><br>1) <br>---------=
----------------draft section---------------------------------------<br>   =
3.6 Incoming Packets Processing at MA<br><br>      On receiving the packet =
with NSH header following operations are <br>      carried out:<br><br>    =
  Step 1: Detection of PM Context Header in a packet, by verifying <br>    =
          the PM TLV Class as allocated by IANA.<br>              (If not d=
etected, move to step 6) <br><br>      Step 2: Check if PM Type field value=
 is 6 to 10. <br>              (If not move to step 6).<br><br>      Step 3=
: If PM Type Value =3D 7 to 10 move directly to Step 5<br><br>      Step 4:=
 Check Presence of self Service index in Service Index List<br>            =
  (If not present, move to step 6)<br>-------------------------------------=
--------------------------------------<br><br>MA can be SF or SFF , but bas=
ed on the steps given here, SFF cannot do the time recording or report to c=
ollector because<br>step 4 checks the SI index and SFF we do not have Si in=
dex.<br><br>[ SI: List of participating Service functions in the SFP. It SH=
OULD be <br>   in decreasing order of the SI for optimized traversal of the=
 SI <br>   participation. ]<br><br>So i thing we need to address SFF scenar=
io as well.<br><br><br>2) <br>     +---+                                   =
       +----+<br>     |SF |--------------------+        +------------|SF  |=
<br>     |   |....... ----------+  \      / /+----------|    | <br>     +--=
-+                   \  \    / /            +----+  <br>                   =
      +---2 -3-+-4--5--+<br>                         |   SF Forwarder |<br>=
                   -----1|      (SFF)     |6------<br>                     =
    +-------+--------+<br><br>As per the method specified in this draft MA =
will record &#39;timestamp&#39; when a packet ENTER and EXIT and this &#39;=
timestamp&#39;<br>will be notified to the controller. but if we consider th=
e above topology SFF has multiple entry and exit ports so <br>each time the=
se entries[timestamp] will be overwritten by the MA when the packet travers=
e and we will not get the correct delay<br>because of this.<br><br>I feel w=
e need to track each ENTRY and EXIT separately to track the delay correctly=
.<br> <br><br><br>3) <br>------------------------------draft section-------=
---------------------------------------------------------<br>3.8 MA Reporti=
ng the statistics to Collector<br><br>   Reporting timer will run on Each M=
A. Consistency of this timer should<br>   be ensured across the entire MA i=
n the SFP, ensuring the same is out<br>   of scope of this document. <br><b=
r>   On expiry of this timer following information needs to be sent to the<=
br>   Collector.<br><br>       - Service Index <br><br>       - PM Type Val=
ue<br><br>       - Value of all the collected Rx-Time[P][W], Rx-Sum-Time[P]=
[W],<br>         &amp; Rx-Sample-Count[P][W] parameters along with the <br>=
         corresponding PMF ID and Window Id <br><br>       - Value of all t=
he collected Tx-Time[P][W], Tx-Sum-Time[P][W], <br>         &amp; Tx-Sample=
-Count[P][W] parameters along with the <br>         corresponding PMF ID an=
d Window Id <br><br>   MA may delete the parameters after sending the same =
to collector.<br>----------------------------------------------------------=
-------------------------------------------------<br><br>If the MA is in SF=
F the what is the ID to track the device, Service index can be used for SF =
but not for SFF ?<br><br><br><br>4) <br>------------------------draft secti=
on------------------------------------------<br>   - If Value =3D 0x7, 0x8,=
 0x9, 0x10<br>          o No need to encode SI, since the type dictates the=
 involved<br>            participating MA <br>-----------------------------=
--------------------------------------------------<br><br>I think 0x10 shou=
ld be 0xA ?<br><br><br><br><br>5) <br>----------------------------draft sec=
tion---------------------------------------<br><br>3.7 Outgoing Packets Pro=
cessing at MA<br><br>      At outgoing port of MA following operations are =
carried out.<br><br>      Step 1: If Option 1 is used then go to Step 2a, i=
f Option 2 is <br>              used then go to Step 2b<br><br>      Step 2=
: If Option 1 is used then go to Step 2a, if Option 2 is <br>              =
used then go to Step 2b<br>------------------------------------------------=
--------------------------------<br><br>Steps 1 and 2 is same here.<br><br>=
<br>Regards<br>Nobin<br></pre></div>

--047d7b3a860a2a18710530ea3e71--


From nobody Wed Apr 20 07:18:06 2016
Return-Path: <asayeed@redhat.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 25AA712EF4F for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 07:18:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.621
X-Spam-Level: 
X-Spam-Status: No, score=-2.621 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J3bcl_HpLBGW for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 07:18:02 -0700 (PDT)
Received: from mail-qk0-f177.google.com (mail-qk0-f177.google.com [209.85.220.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4E4F112EF3F for <sfc@ietf.org>; Wed, 20 Apr 2016 07:18:02 -0700 (PDT)
Received: by mail-qk0-f177.google.com with SMTP id r184so14725333qkc.1 for <sfc@ietf.org>; Wed, 20 Apr 2016 07:18:02 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=7mwbcFlMWRy1+Kg3k513VjdBkgBbvN3Nn3czi9Xs9II=; b=Spw0dNYpUTwnFCaCaaFpPYXJ3Rlp/hsHTrxveBh+9GP/2/mtw3dMaTo/30iv2tSGXD hgvnmkudPv9zSOPCmD2e4iAQAXdVZnVijeBygjqCrhpE47GOC0HzKZqVkqQj5nnrAcdb QGgiuEFcLL75Zrkpq0+0GiBNyIcLrQKQ+B/iKTJkp+cbdPqavMvgvTgjdTPITXrQww5F YuweHVDM3hsvmEdiYvGHq86IWXoa8l/bDLGkRNrnerHeFiMsdONkA7fC5DEfQaNnTno6 KltDaUwmjaUqTKuQmgoixem419yTekt/29vMa4b6CoCC1zhCfVFoEl/Q58Fxe4uwgrdY uwFA==
X-Gm-Message-State: AOPr4FVJI2UsEJDbYvVw7OpQPLholCEM0ni0TolNl9Nt1riygPj3lShH/3HBulcJ0rcNVvfM
X-Received: by 10.55.80.131 with SMTP id e125mr11811060qkb.62.1461161881259; Wed, 20 Apr 2016 07:18:01 -0700 (PDT)
Received: from wlan-196-245.bos.redhat.com (nat-pool-bos-t.redhat.com. [66.187.233.206]) by smtp.gmail.com with ESMTPSA id 144sm1690553qhz.14.2016.04.20.07.17.59 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 20 Apr 2016 07:17:59 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Azhar Sayeed <asayeed@redhat.com>
In-Reply-To: <592C0220-7CE8-46A6-8181-2AA7EF1CA63D@cisco.com>
Date: Wed, 20 Apr 2016 10:18:44 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <CB7C5205-3734-4DC3-90CE-23B51381BA3F@redhat.com>
References: <57133AED.4080005@pi.nu> <33D1653F-230B-4877-AB8C-C1BAE6C26BD3@redhat.com> <592C0220-7CE8-46A6-8181-2AA7EF1CA63D@cisco.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/P80CqmpyWyt4yoi7nw9fKvBSRgA>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 14:18:05 -0000

Carlos,

We agree to disagree =E2=80=A6

My argument was fairly simple - if you call this a TLV then I gave you =
an option to align to a TLV structure without breaking the proposed =
structure too much=E2=80=A6you can call it what you want - call it an =
informational element, call it a metadata structure or call it some =
thing else - just don=E2=80=99t call it a TLV=E2=80=A6in which case we =
are squared

The difference between what I am stating and what you are arguing is not =
much=E2=80=A6I am not proposing to take away the class field or to take =
away the flags - (although I would argue why do you need a class field =
when you already have a type - if you make type 16 bits then it covers =
both class and type as proposed originally)

I can see Med=E2=80=99s point that we want the header to be compact in =
which case you can shrink the length or the type field or both=E2=80=A6If =
you move the flags around then the structure does conform to TLV - If =
you are not calling it a TLV but calling this a metadata spec then =
ignore my comments

Azhar


> On Apr 19, 2016, at 10:41 PM, Carlos Pignataro (cpignata) =
<cpignata@cisco.com> wrote:
>=20
> Azhar,
>=20
> -1 :-)
>=20
> Within the IETF-specified protocols, we can certainly find examples of =
most syntax and structures, from the simple to the too creative ones. =
Finding a protocol with a specific TLV structure does not mean that =
that=E2=80=99s the best for every protocol use.
>=20
> You say: "This should also be consistent=E2=80=9D.
>=20
> However, just to understand your point, what is the technical reason =
for NSH TLV structs having to match BFD structs and ISIS structs? And =
why not, say, RSVP=E2=80=99s or ICMP Multipart=E2=80=99s or L2TPv3=E2=80=99=
s (which, incidentally, use a Class/Type-length-value format)?
>=20
> When you say =E2=80=9C to align with all the other TLV=E2=80=99s =
structure=E2=80=9D =E2=80=94 I ask: why?
>=20
> If we think of the goal of flexibility (main goal of Type 2) in the =
context of most flexible allocation, a hierarchical scheme is a =
technical answer. Given the rich ecosystem of vendors and open source =
projects, the proposed structure, in my humble opinion, future proofs =
the design.
>=20
> =E2=80=94 Carlos.
>=20
>> On Apr 18, 2016, at 10:33 AM, Azhar Sayeed <asayeed@redhat.com> =
wrote:
>>=20
>> Loa,
>>=20
>> +1 Agree and not just LDP, but BFD TLV or any of the ISIS TLVs have =
the same structure - This should also be consistent..the question then =
is can the current TLV structure in draft-~nsh-04 be re-configured to =
align with all the other TLV=E2=80=99s structure?
>>=20
>> Azhar
>>=20
>>=20
>>> On Apr 17, 2016, at 3:27 AM, Loa Andersson <loa@pi.nu> wrote:
>>>=20
>>> Working Group, authors,
>>>=20
>>> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to =
read
>>> it before now) and have a question on how the TLV concept is =
understood
>>> in the draft.
>>>=20
>>> For example in LDP TLV were defined as Type, Length Value, e.g. =
(from
>>> RFC 5036 section 3.3):
>>>=20
>>> LDP uses a Type-Length-Value (TLV) encoding scheme to encode much of
>>> the information carried in LDP messages.
>>>=20
>>> An LDP TLV is encoded as a 2 octet field that uses 14 bits to =
specify
>>> a Type and 2 bits to specify behavior when an LSR doesn't recognize
>>> the Type, followed by a 2 octet Length field, followed by a variable
>>> length Value field.
>>>=20
>>>=20
>>>  0                   1                   2                   3
>>>  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>> |U|F|        Type               |            Length             |
>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>> |                                                               |
>>> |                             Value                             |
>>> ~                                                               ~
>>> |                                                               |
>>> |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>> |                               |
>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>=20
>>> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more =
complicated
>>> and I'm struggling a bit to understand if the "name" TLV should be =
used.
>>>=20
>>> =46rom draft-ietf-sfc-nsh-04
>>>=20
>>>      0                   1                   2                   3
>>>      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>     =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>     |          TLV Class            |C|    Type     |R|R|R|   Len   =
|
>>>     =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>     |                      Variable Metadata                        =
|
>>>     =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>=20
>>>=20
>>>=20
>>>                  Figure 6: Variable Context Headers
>>>=20
>>> The draft is not entirely clear in this respect, but I think this is =
what you call a TLV.
>>>=20
>>> Should I understand this way?
>>>=20
>>> Type =3D TLV Class + C + Type (24 bits)
>>> Length =3D len (5 bits)
>>> Value =3D Variable Metadata
>>>=20
>>> A convention we used in MPLS when we have variable length fields is
>>> to use a ~ instead of the |, like this:.
>>>=20
>>>      0                   1                   2                   3
>>>      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>     =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>     |          TLV Class            |C|    Type     |R|R|R|   Len   =
|
>>>     =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>     ~                      Variable Metadata                        =
~
>>>     =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>=20
>>> I suggest that this is a good practice that could be adopted here =
also.
>>>=20
>>> Two more questions:
>>>=20
>>> If the metadata does not align exactly with the 32 bit/4 byte =
structure,
>>> what is the rules for padding?
>>>=20
>>> A last, but a bit different question, do you need indicators like =
the U
>>> and F flags in an to indicate what should happen if the node does =
not
>>> recognize the (TLV Class, C, Type)-field?
>>>=20
>>> /Loa
>>>=20
>>>=20
>>> PS
>>>=20
>>> I will also have a few more editorial comments that will be sent to
>>> the authors within a day or two.
>>>=20
>>>=20
>>> --
>>>=20
>>>=20
>>> Loa Andersson                        email: loa@mail01.huawei.com
>>> Senior MPLS Expert                          loa@pi.nu
>>> Huawei Technologies (consultant)     phone: +46 739 81 21 64
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Apr 20 07:25:00 2016
Return-Path: <asayeed@redhat.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF6D312D843 for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 07:24:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level: 
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XMt_UM0L3v72 for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 07:24:57 -0700 (PDT)
Received: from mail-qk0-f171.google.com (mail-qk0-f171.google.com [209.85.220.171]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6431712D956 for <sfc@ietf.org>; Wed, 20 Apr 2016 07:24:55 -0700 (PDT)
Received: by mail-qk0-f171.google.com with SMTP id q76so5224548qke.2 for <sfc@ietf.org>; Wed, 20 Apr 2016 07:24:55 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=j2Row4TRfdIhVAPAvxeAYt6znC0L3RBlr5vmsosMRg4=; b=an4M7jrPEDKbHIzduQbg8kgTxehljFtTNOIAcC06D/XWd+A+N32ZNhZgs9216XC7gv gEQwtVnVJdWWwjjRM6kF2p8JcXnR26EDd4AqfijnoTYIUX3FuQlkpvnjTRZi565dA+nR D+Cr+M4Koh6ejCG6asmMxCmdeGvElEWlchxiyTyg3BGG+8vQ5WWRnEHpd+F4fxG48oN5 7fJv6+VTX3do6Q8C0uU9Skp2Rav9yNMyJkyAArPEhB/LHSdpD839ACu48XQIVHJcTatZ +ngTJTqsLBmqEm2J6YVu7H2VPjkkDi5dCT7CS+xcSYeT9+Whfi1Fabd5ncFWyZdIbPVv z/WQ==
X-Gm-Message-State: AOPr4FUWoN5Yqg/P09Xkx4Ljp8JJnlMS8h0KSlM9YfEWbnGO5kf8JTKjinw7SugSw4TrT4Ha
X-Received: by 10.55.203.131 with SMTP id u3mr11616227qkl.16.1461162294352; Wed, 20 Apr 2016 07:24:54 -0700 (PDT)
Received: from wlan-196-245.bos.redhat.com (nat-pool-bos-t.redhat.com. [66.187.233.206]) by smtp.gmail.com with ESMTPSA id a123sm6418444qkc.23.2016.04.20.07.24.52 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 20 Apr 2016 07:24:53 -0700 (PDT)
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Azhar Sayeed <asayeed@redhat.com>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D5CBB0@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Date: Wed, 20 Apr 2016 10:25:38 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <77E3E0A5-AA19-4E40-886E-A1739B1BEC45@redhat.com>
References: <57133AED.4080005@pi.nu> <787AE7BB302AE849A7480A190F8B933008D5C41E@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D72A4B70-0D86-41A3-8D6B-BBEE12C9AC73@redhat.com> <787AE7BB302AE849A7480A190F8B933008D5CBB0@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
To: mohamed.boucadair@orange.com
X-Mailer: Apple Mail (2.3124)
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/5MdLVftl8EAe1GX_6nPL68iSlhs>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 14:24:59 -0000

You have a point - perhaps shortening the length and type will =
help..however, here is my rationale for longer length field

8 bits I feel is too little for metadata - just about twice as many in a =
tweet :-)

Azhar

> On Apr 20, 2016, at 1:44 AM, mohamed.boucadair@orange.com wrote:
>=20
> Hi Azhar,=20
>=20
> Thank you for the feedback and the support for the originator ID.=20
>=20
> The re-arranging of the fields you propose is indeed another option, =
but it does not allow a compact header, e.g., 16 bits for the length is =
too much for the cases I'm aware of + it is not optimal if no originator =
ID is to be supplied for instance.=20
>=20
> Having the class, type, flags, and length in the first 32 bits would =
lead to a compact header.=20
>=20
> Cheers,
> Med
>=20
>> -----Message d'origine-----
>> De : Azhar Sayeed [mailto:asayeed@redhat.com]
>> Envoy=E9 : mardi 19 avril 2016 22:17
>> =C0 : BOUCADAIR Mohamed IMT/OLN
>> Cc : Loa Andersson; sfc@ietf.org; draft-ietf-sfc-nsh@ietf.org
>> Objet : Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - =
Questions
>> on TLVs in draft-ietf-sfc-nsh
>>=20
>> Hi Med,
>>=20
>> You can still encode this as a TLV by re-arranging the fields with =
Type
>> first, length and then value - In the value portions you can a =
mandatory
>> bytes that encode the flags, class, originator id and then variable
>> metadata
>>=20
>> So here is an option.
>>=20
>> Type - 16 bits
>> Length - 16 bits
>> Value:
>> Flags - 4 bits
>> Class - 4 bits
>> Originator Length - 8 bits
>> Originator ID - Variable
>> Data Variable
>>=20
>> +1 to the idea of originator id.
>>=20
>>=20
>> Azhar
>>=20
>>=20
>>=20
>>> On Apr 19, 2016, at 3:48 AM, mohamed.boucadair@orange.com wrote:
>>>=20
>>> Dear Loa, all,
>>>=20
>>> Thank you for raising this point about the encoding of the optional
>> context information.
>>>=20
>>> I agree that the use of TLV term is confusing. What about using =
another
>> term, e.g., "Information Elements", "Options", or "Context Element"?
>>>=20
>>> As an input to this discussion, below a proposal for an encoding =
that
>> achieves the following goals:
>>>=20
>>> * Shorten the encoding of the Class field.
>>> * Allow for more type code points.
>>> * Avoids requiring padding for the sake of compact headers.
>>> * Allows to include the ID of the entity that injected the context
>> information (OPTIONAL).
>>> * Inherit rich registries such as IPFIX.
>>>=20
>>> NOTE: This proposal does not include a dedicated flag bit to =
indicate
>> whether the context element is mandatory-to-process or =
optional-to-process
>> because further discussion/text specification is required: e.g.,
>>> * Wouldn't be sufficient to supply that information using the =
control
>> plane?
>>> * If that information is supplied in both the context element and
>> configured to a SFC-aware function, how conflicts are managed?
>>> * What is the behavior for processing mandatory-to-process elements
>> (particularly, when it is not supported)?
>>> * Is it required to recommend an ordering of supplying the =
mandatory-to-
>> process or optional-to-process elements?
>>> * Is it required to preserve the same ordering when forwarding a =
packet?
>>>=20
>>> =3D=3DPROPOSAL=3D=3D=3D=3D
>>>=20
>>> Base version
>>>       0                   1                   2                   3
>>>      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>     =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>     |Class  |            Type               | FLAGS |     Length    =
|
>>>     =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>     //                           Data (Variable)                    =
//
>>>     =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>> Version with Originator ID:
>>>       0                   1                   2                   3
>>>      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>     =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>     |Class  |            Type               | Flags |     Length    =
|
>>>     =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>     //Originator Len|     Originator ID (Variable)(Optional)       =
//
>>>     =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>     //                           Data (Variable)                    =
//
>>>     =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>=20
>>>     The description of the fields is as follows:
>>>=20
>>>     Class:  In order to foster service innovation, this field
>>>        allows to inherit from existing code point registries that =
are
>>>        likely to be useful in a SFC context.  The following values =
are
>>>        reserved by this specification:
>>>        0:  See IANA section.
>>>        1:  IPFIX [IPFIX].
>>>=20
>>>     Type:  Indicates the code point of the context element.  If
>>>        "Class" field is non-null, the interpretation of this field =
MUST
>>>        conform to the one defined for that specific class registry. =
See
>> IANA section.
>>>=20
>>>     Flags:  The Flags field comprises a set of 4 flags:
>>>=20
>>>            +-+-+-+-+
>>>            |S|r|r|r|
>>>            +-+-+-+-+
>>>=20
>>>            where "rrr" are reserved bits for future assignment as
>>>            additional flag bits. r bits MUST each be sent as zero =
and
>> MUST be
>>>            ignored on receipt.
>>>=20
>>>            When set, the S-flag indicates that an Originator ID =
field
>> is
>>>            present in the context element.  This flag is set by =
default
>> to 0, meaning
>>>            there is no Originator ID field present in the element.
>>>=20
>>>     Originator ID (Optional):  Conveys the identifier of the entity
>> that injected
>>>        this context element in the NSH header (e.g., a service
>>>        function identifier, a classifier, etc.).  This document does
>>>        not make any assumption about the structure of the =
information
>>>        carried in this field because this is deployment-specific.
>>>        This information is used by SFC-aware elements to enforce
>>>        policies such as: process a context information if and only =
if
>>>        it was supplied by a given entity.  This information can be
>>>        used as a safeguard against misbehaving nodes that inject
>>>        illegitimate data in the NSH header.
>>>=20
>>>        This field MUST be included only if S-bit is set.
>>>=20
>>>     Length:  Indicates, in octets, the length of the data carried in
>>>        the context element.
>>>=20
>>>     Data (Variable):  The semantics of this field depend on the
>>>        "Class" and "Type" fields.
>>> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>>>=20
>>> Opinions?
>>>=20
>>> Cheers,
>>> Med
>>>=20
>>>> -----Message d'origine-----
>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Loa Andersson
>>>> Envoy=E9 : dimanche 17 avril 2016 09:28
>>>> =C0 : sfc@ietf.org; draft-ietf-sfc-nsh@ietf.org
>>>> Objet : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - =
Questions on
>>>> TLVs in draft-ietf-sfc-nsh
>>>>=20
>>>> Working Group, authors,
>>>>=20
>>>> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to =
read
>>>> it before now) and have a question on how the TLV concept is =
understood
>>>> in the draft.
>>>>=20
>>>> For example in LDP TLV were defined as Type, Length Value, e.g. =
(from
>>>> RFC 5036 section 3.3):
>>>>=20
>>>>   LDP uses a Type-Length-Value (TLV) encoding scheme to encode much =
of
>>>>   the information carried in LDP messages.
>>>>=20
>>>>   An LDP TLV is encoded as a 2 octet field that uses 14 bits to
>> specify
>>>>   a Type and 2 bits to specify behavior when an LSR doesn't =
recognize
>>>>   the Type, followed by a 2 octet Length field, followed by a =
variable
>>>>   length Value field.
>>>>=20
>>>>=20
>>>>    0                   1                   2                   3
>>>>    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>>   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>   |U|F|        Type               |            Length             |
>>>>   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>   |                                                               |
>>>>   |                             Value                             |
>>>>   ~                                                               ~
>>>>   |                                                               |
>>>>   |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>   |                               |
>>>>   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>=20
>>>> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more =
complicated
>>>> and I'm struggling a bit to understand if the "name" TLV should be
>> used.
>>>>=20
>>>> =46rom draft-ietf-sfc-nsh-04
>>>>=20
>>>>        0                   1                   2                   =
3
>>>>        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 =
0 1
>>>>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +
>>>>       |          TLV Class            |C|    Type     |R|R|R|   Len
>> |
>>>>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +
>>>>       |                      Variable Metadata
>> |
>>>>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +
>>>>=20
>>>>=20
>>>>=20
>>>>                    Figure 6: Variable Context Headers
>>>>=20
>>>> The draft is not entirely clear in this respect, but I think this =
is
>>>> what you call a TLV.
>>>>=20
>>>> Should I understand this way?
>>>>=20
>>>> Type =3D TLV Class + C + Type (24 bits)
>>>> Length =3D len (5 bits)
>>>> Value =3D Variable Metadata
>>>>=20
>>>> A convention we used in MPLS when we have variable length fields is
>>>> to use a ~ instead of the |, like this:.
>>>>=20
>>>>        0                   1                   2                   =
3
>>>>        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 =
0 1
>>>>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +
>>>>       |          TLV Class            |C|    Type     |R|R|R|   Len
>> |
>>>>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +
>>>>       ~                      Variable Metadata
>> ~
>>>>       =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +
>>>>=20
>>>> I suggest that this is a good practice that could be adopted here =
also.
>>>>=20
>>>> Two more questions:
>>>>=20
>>>> If the metadata does not align exactly with the 32 bit/4 byte
>> structure,
>>>> what is the rules for padding?
>>>>=20
>>>> A last, but a bit different question, do you need indicators like =
the U
>>>> and F flags in an to indicate what should happen if the node does =
not
>>>> recognize the (TLV Class, C, Type)-field?
>>>>=20
>>>> /Loa
>>>>=20
>>>>=20
>>>> PS
>>>>=20
>>>> I will also have a few more editorial comments that will be sent to
>>>> the authors within a day or two.
>>>>=20
>>>>=20
>>>> --
>>>>=20
>>>>=20
>>>> Loa Andersson                        email: loa@mail01.huawei.com
>>>> Senior MPLS Expert                          loa@pi.nu
>>>> Huawei Technologies (consultant)     phone: +46 739 81 21 64
>>>>=20
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>=20


From nobody Wed Apr 20 07:33:38 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 11D2D12EF6F; Wed, 20 Apr 2016 07:33:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dR5P7zSF3WlI; Wed, 20 Apr 2016 07:33:35 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 52E3412EF5A; Wed, 20 Apr 2016 07:33:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9206; q=dns/txt; s=iport; t=1461162811; x=1462372411; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=KT9dGiB3yjx2QW6e88y6EypreWtJ+OmCkaX4iHDNcqA=; b=QyqkgPL+Hv6iVQ5CG97s/ielNSDD1rI6CtML54vZkWyigL0nYv07tf4D LVLGOMAtWMIQ3Ehaz+BpsIKuZ9Ncfdul8VLdPJYuerNUCo948FeC/ozfc uj0EEGIvJFSmQyQndZ18sEqVT8GnCgBBqmuVbcDbltXHHPTYv9jhsW4Ev I=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AmAwC0khdX/5JdJa1egzhTfQa5ZQ6Bc?= =?us-ascii?q?RcLghiDVAKBQDgUAQEBAQEBAWUcC4RBAQEBAwEBAQEaBkQEAwsFCQICAQgYJwM?= =?us-ascii?q?CAhsMCxQRAgQOBQ6IEwgOrRiQfgEBAQEBAQEBAQEBAQEBAQEBAQEBAQ0EBASGH?= =?us-ascii?q?YF1CIFMgQKEDxEBgx4rgisFjVOFS4RxAYMngWZtiBmBZod2hTSGI4kJAR4BQ4I?= =?us-ascii?q?zgTVsAYcSNn4BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,510,1454976000";  d="asc'?scan'208";a="93921288"
Received: from rcdn-core-10.cisco.com ([173.37.93.146]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 Apr 2016 14:33:29 +0000
Received: from XCH-RTP-016.cisco.com (xch-rtp-016.cisco.com [64.101.220.156]) by rcdn-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id u3KEXTOB015106 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 20 Apr 2016 14:33:29 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-016.cisco.com (64.101.220.156) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 20 Apr 2016 10:33:28 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Wed, 20 Apr 2016 10:33:28 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
Thread-Index: AQHRmHqvPG9+wCOo5UWLeYjmbm2Pnp+SbKQAgABBmACAAIcQgA==
Date: Wed, 20 Apr 2016 14:33:28 +0000
Message-ID: <555A080F-FA59-4305-8CEE-62C33BF18495@cisco.com>
References: <57133AED.4080005@pi.nu> <46AB5547-90B8-4F2D-B72B-644F3FDC3E70@cisco.com> <787AE7BB302AE849A7480A190F8B933008D5CC0B@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D5CC0B@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.253.120]
Content-Type: multipart/signed; boundary="Apple-Mail=_ABBFA2C0-D2DD-4B2D-ADCC-D23F6219DD0D"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/vg-lk6vsvBVfl1BsQzc_A3cusCY>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 14:33:37 -0000

--Apple-Mail=_ABBFA2C0-D2DD-4B2D-ADCC-D23F6219DD0D
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi, Med,

To clarify part of my comment, I cited some RFCs that came to mind that =
provide a hierarchical structure. It is not an exhaustive list, nor a =
sample to extrapolate too far on other fields. What we should look for =
is what=E2=80=99s most useful for this use.

Thanks!

=E2=80=94 Carlos.

> On Apr 20, 2016, at 2:30 AM, mohamed.boucadair@orange.com wrote:
>=20
> Hi all,
>=20
> I agree with Carlos that a hierarchical structure is more flexible, =
but I have the following comments:
>=20
> * Almost all the RFCs quoted by Carlos do not claim to use a TLV =
structure or the TLV term. It is reasonable to update the nsh spec to =
use a term that does not lead to confusion. I see that Carlos is using =
"information element". It is also in my favorite list (with a preference =
for context element).
> * Some of these RFCs use a bit that is similar to the C-bit, but they =
rightfully don't mix it with the ID of the attribute.
> * Some of these RFCs specify (e.g., Section 5.2 of RFC3931) in details =
the behavior when the "C-bit"-like is set.
>=20
> The NSH spec still need more work.
>=20
> Cheers,
> Med
>=20
>> -----Message d'origine-----
>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Carlos Pignataro
>> (cpignata)
>> Envoy=C3=A9 : mercredi 20 avril 2016 04:35
>> =C3=80 : Loa Andersson
>> Cc : draft-ietf-sfc-nsh@ietf.org; sfc@ietf.org
>> Objet : Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - =
Questions
>> on TLVs in draft-ietf-sfc-nsh
>>=20
>> Hi, Loa,
>>=20
>> Good analysis on the format of these information elements.
>>=20
>> My sense is that a hierarchical syntax (such as the =
Class/Type-Length-
>> Value) provides much more flexibility than a flat Type-Length-Value =
alone.
>>=20
>> We=E2=80=99ve built quite a number of protocols with this structure =
and allocation
>> scheme. For example, RSVP =
(https://tools.ietf.org/html/rfc3209#section-
>> 7.2), L2TPv3 (https://tools.ietf.org/html/rfc3931#section-5.1), ICMP
>> Multi-Part Extensions =
(https://tools.ietf.org/html/rfc4884#section-8).
>>=20
>> Regardless of what we call the fields (e.g., Class and Type, or Type =
and
>> Sub-Type, or =E2=80=A6), there are clear technical advantages to =
this, including
>> the ability to delegate allocation, vendor types, etc.
>>=20
>> In regards to the U/F bits in LDP, I think the C-bit in NSH TLVs =
achieves
>> what=E2=80=99s really needed for an SFC Encap.
>>=20
>> Lastly, you call out padding and 32-bit-word alignment. This is a =
great
>> point.
>>=20
>> The way things seems structured now, there=E2=80=99s a Len field =
measured in 32-
>> bit words. It=E2=80=99s not clear what happens when the Metadata =
(Value) itself is
>> not 32-bit-word-aligned. This needs fixing.
>>=20
>> Looking at the Length definition:
>>=20
>>   Length: Length of the variable metadata, in 4-byte words.  A value =
of
>>   0x0 or higher can be used.  A value of 0x0 denotes a TLV header
>>   without a Variable Metadata field.
>>=20
>> Comments:
>> * First, instead of =E2=80=9C4-byte=E2=80=9D words, this needs to be =
=E2=80=9C4-octet=E2=80=9D or =E2=80=9C32-bit=E2=80=9D
>> words. Byte is strictly machine dependent (7 bits, 8 bits, etc).
>> * Second, =E2=80=9Ca value of 0x0 or higher=E2=80=9D for an unsigned =
value does not say
>> much.
>>=20
>> Hope these help.
>>=20
>> Thanks,
>>=20
>> =E2=80=94 Carlos.
>>=20
>>> On Apr 17, 2016, at 3:27 AM, Loa Andersson <loa@pi.nu> wrote:
>>>=20
>>> Working Group, authors,
>>>=20
>>> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to =
read
>>> it before now) and have a question on how the TLV concept is =
understood
>>> in the draft.
>>>=20
>>> For example in LDP TLV were defined as Type, Length Value, e.g. =
(from
>>> RFC 5036 section 3.3):
>>>=20
>>>  LDP uses a Type-Length-Value (TLV) encoding scheme to encode much =
of
>>>  the information carried in LDP messages.
>>>=20
>>>  An LDP TLV is encoded as a 2 octet field that uses 14 bits to =
specify
>>>  a Type and 2 bits to specify behavior when an LSR doesn't recognize
>>>  the Type, followed by a 2 octet Length field, followed by a =
variable
>>>  length Value field.
>>>=20
>>>=20
>>>   0                   1                   2                   3
>>>   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>  |U|F|        Type               |            Length             |
>>>  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>  |                                                               |
>>>  |                             Value                             |
>>>  ~                                                               ~
>>>  |                                                               |
>>>  |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>  |                               |
>>>  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>=20
>>> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more =
complicated
>>> and I'm struggling a bit to understand if the "name" TLV should be =
used.
>>>=20
>>> =46rom draft-ietf-sfc-nsh-04
>>>=20
>>>       0                   1                   2                   3
>>>       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 =
1
>>>      =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>      |          TLV Class            |C|    Type     |R|R|R|   Len   =
|
>>>      =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>      |                      Variable Metadata                        =
|
>>>      =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>=20
>>>=20
>>>=20
>>>                   Figure 6: Variable Context Headers
>>>=20
>>> The draft is not entirely clear in this respect, but I think this is
>> what you call a TLV.
>>>=20
>>> Should I understand this way?
>>>=20
>>> Type =3D TLV Class + C + Type (24 bits)
>>> Length =3D len (5 bits)
>>> Value =3D Variable Metadata
>>>=20
>>> A convention we used in MPLS when we have variable length fields is
>>> to use a ~ instead of the |, like this:.
>>>=20
>>>       0                   1                   2                   3
>>>       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 =
1
>>>      =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>      |          TLV Class            |C|    Type     |R|R|R|   Len   =
|
>>>      =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>      ~                      Variable Metadata                        =
~
>>>      =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>=20
>>> I suggest that this is a good practice that could be adopted here =
also.
>>>=20
>>> Two more questions:
>>>=20
>>> If the metadata does not align exactly with the 32 bit/4 byte =
structure,
>>> what is the rules for padding?
>>>=20
>>> A last, but a bit different question, do you need indicators like =
the U
>>> and F flags in an to indicate what should happen if the node does =
not
>>> recognize the (TLV Class, C, Type)-field?
>>>=20
>>> /Loa
>>>=20
>>>=20
>>> PS
>>>=20
>>> I will also have a few more editorial comments that will be sent to
>>> the authors within a day or two.
>>>=20
>>>=20
>>> --
>>>=20
>>>=20
>>> Loa Andersson                        email: loa@mail01.huawei.com
>>> Senior MPLS Expert                          loa@pi.nu
>>> Huawei Technologies (consultant)     phone: +46 739 81 21 64
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>=20


--Apple-Mail=_ABBFA2C0-D2DD-4B2D-ADCC-D23F6219DD0D
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=yYXk
-----END PGP SIGNATURE-----

--Apple-Mail=_ABBFA2C0-D2DD-4B2D-ADCC-D23F6219DD0D--


From nobody Wed Apr 20 07:36:42 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7FABE12EF6F; Wed, 20 Apr 2016 07:36:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LRUUoiEHj4Vn; Wed, 20 Apr 2016 07:36:39 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1FB8E12EF71; Wed, 20 Apr 2016 07:36:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9548; q=dns/txt; s=iport; t=1461162999; x=1462372599; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=BBzNRNI2q02Tq5mM56N5kW3ltXf4gklmr0bt74hkfco=; b=NSxHapiCHF0SAV8HB+NEr061eDr1bfVyBBcKrc9HOglHjc/OAnxrReh1 eSk+Q+71yeY7xe+i3y3TXJET48cBIqoZxSvT4mjykwr5qEup9y9YFUPus xG4rGPQyw8deJ0mmmFXEcM91FBukmnMkxbAVFsgkOdeK58KPTRUzU/8NC w=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AlAwB0khdX/5hdJa1egzhTfQa5ZQ6Bc?= =?us-ascii?q?RcLghiDVAKBQDgUAQEBAQEBAWUnhEEBAQEDAQEBARoGRAQDCwUJAgIBBgIOCio?= =?us-ascii?q?CAhsMCyUCBA4FDogTCA6Pfp0XkH4BAQEBAQEBAQEBAQEBAQEBAQEBAQENBAQEh?= =?us-ascii?q?h2BdQiCToQPEQGDHiuCKwWHdoVdijwBgyeBZokGgWaHdoU0jywBHgFDggQaFYE?= =?us-ascii?q?1bIcTNn4BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,510,1454976000";  d="asc'?scan'208";a="263783882"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 Apr 2016 14:36:37 +0000
Received: from XCH-RTP-017.cisco.com (xch-rtp-017.cisco.com [64.101.220.157]) by rcdn-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id u3KEaaYj015361 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 20 Apr 2016 14:36:36 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-017.cisco.com (64.101.220.157) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 20 Apr 2016 10:36:35 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Wed, 20 Apr 2016 10:36:35 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Azhar Sayeed <asayeed@redhat.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
Thread-Index: AQHRmHqvPG9+wCOo5UWLeYjmbm2Pnp+QEKeAgAJd1QCAAMK0AIAABPsA
Date: Wed, 20 Apr 2016 14:36:35 +0000
Message-ID: <4674AF21-386A-4FC4-9714-9D6D003250BE@cisco.com>
References: <57133AED.4080005@pi.nu> <33D1653F-230B-4877-AB8C-C1BAE6C26BD3@redhat.com> <592C0220-7CE8-46A6-8181-2AA7EF1CA63D@cisco.com> <CB7C5205-3734-4DC3-90CE-23B51381BA3F@redhat.com>
In-Reply-To: <CB7C5205-3734-4DC3-90CE-23B51381BA3F@redhat.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.253.120]
Content-Type: multipart/signed; boundary="Apple-Mail=_1FA3AEED-0899-4694-A86C-56B614A647EF"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/WkFrCLCorgU4NSl0nURCtSfU9tw>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 14:36:41 -0000

--Apple-Mail=_1FA3AEED-0899-4694-A86C-56B614A647EF
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi, Azhar,

You wrote =E2=80=9Cthe question then is can the current TLV structure in =
draft-~nsh-04 be re-configured to align with all the other TLV=E2=80=99s =
structure=E2=80=9D, and I interpreted that, likely misinterpreted, as =
=E2=80=9Clet=E2=80=99s shuffle all bits-on-the-wire to have only a =
single flat Type, a length, and a value. If instead you meant =E2=80=9Cwe =
can rename things=E2=80=9D, that=E2=80=99s different. Note I said =
=E2=80=9Cinformation element=E2=80=9D to most generically refer to a =
protocol element which provides information.

Thanks,

=E2=80=94 Carlos.

> On Apr 20, 2016, at 10:18 AM, Azhar Sayeed <asayeed@redhat.com> wrote:
>=20
> Carlos,
>=20
> We agree to disagree =E2=80=A6
>=20
> My argument was fairly simple - if you call this a TLV then I gave you =
an option to align to a TLV structure without breaking the proposed =
structure too much=E2=80=A6you can call it what you want - call it an =
informational element, call it a metadata structure or call it some =
thing else - just don=E2=80=99t call it a TLV=E2=80=A6in which case we =
are squared
>=20
> The difference between what I am stating and what you are arguing is =
not much=E2=80=A6I am not proposing to take away the class field or to =
take away the flags - (although I would argue why do you need a class =
field when you already have a type - if you make type 16 bits then it =
covers both class and type as proposed originally)
>=20
> I can see Med=E2=80=99s point that we want the header to be compact in =
which case you can shrink the length or the type field or both=E2=80=A6If =
you move the flags around then the structure does conform to TLV - If =
you are not calling it a TLV but calling this a metadata spec then =
ignore my comments
>=20
> Azhar
>=20
>=20
>> On Apr 19, 2016, at 10:41 PM, Carlos Pignataro (cpignata) =
<cpignata@cisco.com> wrote:
>>=20
>> Azhar,
>>=20
>> -1 :-)
>>=20
>> Within the IETF-specified protocols, we can certainly find examples =
of most syntax and structures, from the simple to the too creative ones. =
Finding a protocol with a specific TLV structure does not mean that =
that=E2=80=99s the best for every protocol use.
>>=20
>> You say: "This should also be consistent=E2=80=9D.
>>=20
>> However, just to understand your point, what is the technical reason =
for NSH TLV structs having to match BFD structs and ISIS structs? And =
why not, say, RSVP=E2=80=99s or ICMP Multipart=E2=80=99s or L2TPv3=E2=80=99=
s (which, incidentally, use a Class/Type-length-value format)?
>>=20
>> When you say =E2=80=9C to align with all the other TLV=E2=80=99s =
structure=E2=80=9D =E2=80=94 I ask: why?
>>=20
>> If we think of the goal of flexibility (main goal of Type 2) in the =
context of most flexible allocation, a hierarchical scheme is a =
technical answer. Given the rich ecosystem of vendors and open source =
projects, the proposed structure, in my humble opinion, future proofs =
the design.
>>=20
>> =E2=80=94 Carlos.
>>=20
>>> On Apr 18, 2016, at 10:33 AM, Azhar Sayeed <asayeed@redhat.com> =
wrote:
>>>=20
>>> Loa,
>>>=20
>>> +1 Agree and not just LDP, but BFD TLV or any of the ISIS TLVs have =
the same structure - This should also be consistent..the question then =
is can the current TLV structure in draft-~nsh-04 be re-configured to =
align with all the other TLV=E2=80=99s structure?
>>>=20
>>> Azhar
>>>=20
>>>=20
>>>> On Apr 17, 2016, at 3:27 AM, Loa Andersson <loa@pi.nu> wrote:
>>>>=20
>>>> Working Group, authors,
>>>>=20
>>>> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to =
read
>>>> it before now) and have a question on how the TLV concept is =
understood
>>>> in the draft.
>>>>=20
>>>> For example in LDP TLV were defined as Type, Length Value, e.g. =
(from
>>>> RFC 5036 section 3.3):
>>>>=20
>>>> LDP uses a Type-Length-Value (TLV) encoding scheme to encode much =
of
>>>> the information carried in LDP messages.
>>>>=20
>>>> An LDP TLV is encoded as a 2 octet field that uses 14 bits to =
specify
>>>> a Type and 2 bits to specify behavior when an LSR doesn't recognize
>>>> the Type, followed by a 2 octet Length field, followed by a =
variable
>>>> length Value field.
>>>>=20
>>>>=20
>>>> 0                   1                   2                   3
>>>> 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>> |U|F|        Type               |            Length             |
>>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>> |                                                               |
>>>> |                             Value                             |
>>>> ~                                                               ~
>>>> |                                                               |
>>>> |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>> |                               |
>>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>=20
>>>> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more =
complicated
>>>> and I'm struggling a bit to understand if the "name" TLV should be =
used.
>>>>=20
>>>> =46rom draft-ietf-sfc-nsh-04
>>>>=20
>>>>     0                   1                   2                   3
>>>>     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>>    =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>    |          TLV Class            |C|    Type     |R|R|R|   Len   =
|
>>>>    =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>    |                      Variable Metadata                        =
|
>>>>    =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>=20
>>>>=20
>>>>=20
>>>>                 Figure 6: Variable Context Headers
>>>>=20
>>>> The draft is not entirely clear in this respect, but I think this =
is what you call a TLV.
>>>>=20
>>>> Should I understand this way?
>>>>=20
>>>> Type =3D TLV Class + C + Type (24 bits)
>>>> Length =3D len (5 bits)
>>>> Value =3D Variable Metadata
>>>>=20
>>>> A convention we used in MPLS when we have variable length fields is
>>>> to use a ~ instead of the |, like this:.
>>>>=20
>>>>     0                   1                   2                   3
>>>>     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>>    =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>    |          TLV Class            |C|    Type     |R|R|R|   Len   =
|
>>>>    =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>    ~                      Variable Metadata                        =
~
>>>>    =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>=20
>>>> I suggest that this is a good practice that could be adopted here =
also.
>>>>=20
>>>> Two more questions:
>>>>=20
>>>> If the metadata does not align exactly with the 32 bit/4 byte =
structure,
>>>> what is the rules for padding?
>>>>=20
>>>> A last, but a bit different question, do you need indicators like =
the U
>>>> and F flags in an to indicate what should happen if the node does =
not
>>>> recognize the (TLV Class, C, Type)-field?
>>>>=20
>>>> /Loa
>>>>=20
>>>>=20
>>>> PS
>>>>=20
>>>> I will also have a few more editorial comments that will be sent to
>>>> the authors within a day or two.
>>>>=20
>>>>=20
>>>> --
>>>>=20
>>>>=20
>>>> Loa Andersson                        email: loa@mail01.huawei.com
>>>> Senior MPLS Expert                          loa@pi.nu
>>>> Huawei Technologies (consultant)     phone: +46 739 81 21 64
>>>>=20
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>=20
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>=20
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>=20


--Apple-Mail=_1FA3AEED-0899-4694-A86C-56B614A647EF
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org

iQIcBAEBCAAGBQJXF5PyAAoJEIXgpQGOZny9obAP/jAO2j8lP6V+Fg4wgPaWcEPZ
0RpyuVhydL7MUxTpi6CyvkFV4RORsogsyEcpNgBYGPFe0nfwS/gl9hPIMoXm7rsF
FhfNK/yy30Ls0R+5430xgcTlhWxiS13rVZixxIUmn83Fivhe4UwESULXbRA9JHFG
V5bi6Z+GGluKwWUcE2e3iqlgZaC+eL2R3tTIO6xCS4Ky1D6gzpCuOEEi4EJxIGTH
cE5laHwKile5hrFgF3ifHZ4qGjNhbbDba7bvoeo6g4GZIyjCGOel83Qg3S7qhrie
ORkckkilYA1bLkqK1K4W6anSBZmuIYdIHvKhie90JRnrdkVJsrhOqX2kx9Ftfm+h
EBZdpSey6o4VeU7m7gSp11K4QZoW+uaQDYm1HOXR6poqxip+9LX4WaCJihs3gDfk
ZIZ/dlRLNUG3d6rMKXG8MbvK9sXVrcqh+eYzfz+eHJ56JRQY6rdXwibF1ULzLNJ/
AzJhJlw8Z2WfH06u1sL1qVmjhZczUo5PF+skes0TDKdyY8pgobbbKPE+R+EoYfzU
/yJDEigNbuOGwUvh5axTZ1ChJrs/edst1yXkCNr597Axb9t4gn+xK2gGh/nLvo2L
/aK/lygw6z3PNhFbyG+jbzdR7d1+DUb6g1Y6hPoBNM5DhImR8c4+FKjCuP2mhWQi
eZDAfCthlg9X/ARdXD6N
=xpuZ
-----END PGP SIGNATURE-----

--Apple-Mail=_1FA3AEED-0899-4694-A86C-56B614A647EF--


From nobody Wed Apr 20 07:46:29 2016
Return-Path: <loa@pi.nu>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3385612DD8D; Wed, 20 Apr 2016 07:46:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level: 
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KuCCDd-ud51H; Wed, 20 Apr 2016 07:46:26 -0700 (PDT)
Received: from pipi.pi.nu (pipi.pi.nu [83.168.239.141]) (using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B7C3A12DCF5; Wed, 20 Apr 2016 07:46:25 -0700 (PDT)
Received: from [192.168.1.2] (unknown [122.53.41.246]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: loa@pi.nu) by pipi.pi.nu (Postfix) with ESMTPSA id DCCD61802ACF; Wed, 20 Apr 2016 16:46:20 +0200 (CEST)
To: mohamed.boucadair@orange.com
References: <57133AED.4080005@pi.nu> <46AB5547-90B8-4F2D-B72B-644F3FDC3E70@cisco.com> <571734F7.4030804@pi.nu> <787AE7BB302AE849A7480A190F8B933008D5CCE1@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
From: Loa Andersson <loa@pi.nu>
Message-ID: <57179628.3090302@pi.nu>
Date: Wed, 20 Apr 2016 22:46:00 +0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D5CCE1@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/QF6LigxGoeR-n21KhDfLVnXf5fY>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 14:46:28 -0000

Med,

On 2016-04-20 16:09, mohamed.boucadair@orange.com wrote:
> Dear Loa,
>
> Thank you for drafting a NEW text that is better to the one in -04. Nevertheless, I still have issues with it but I will focus only on one item that it is related to this text:
>
> "This effectively allocates
>        TLV-Type values 0 to 127 for non-critical options and Type values
>        128 to 255 for critical options."
>
> Do you have an example of an optional context information that is "critical" in all deployments, all chains? Wouldn't this be left to the taste of the entity administrating an SFC-enabled domain?
>
No not really, I took that part of the content from the original draft,
but you have a point, I remember that I had a note while reading the
draft for wglc, whether it was like we have 127 types where the C-bit
could be set or net. The text however says that there will be 256 types,
and if the most significant bit is it is dritical.

Maybe worth asking the authors the question you asked me?

/Loa

> Thank you.
>
> Cheers,
> Med
>
>> -----Message d'origine-----
>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Loa Andersson
>> EnvoyÃ© : mercredi 20 avril 2016 09:51
>> Ã€ : Carlos Pignataro (cpignata)
>> Cc : draft-ietf-sfc-nsh@ietf.org; sfc@ietf.org
>> Objet : Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions
>> on TLVs in draft-ietf-sfc-nsh
>>
>> Carlos,
>>
>> Thanks for this, I don't think we are too far apart, and I have a
>> suggestion that I hope resolve this.
>>
>> On 2016-04-20 10:35, Carlos Pignataro (cpignata) wrote:
>>> Hi, Loa,
>>>
>>> Good analysis on the format of these information elements.
>>>
>>> My sense is that a hierarchical syntax (such as the Class/Type-Length-
>> Value) provides much more flexibility than a flat Type-Length-Value alone.
>>
>> I tend to agree with that, but that is an argument on if the flexibility
>> is needed. I think it is for the NSH.
>>
>> My point is that TLV is "named" for its structure, if an element does
>> notm have that structure it is simply not a TLV.
>>
>> On the highest level I do not have a problem with the layout of the
>> Variable Context Headers, but currently it is not clear why we call
>> it a TLV. It could be made clear though.
>>>
>>> Weâ€™ve built quite a number of protocols with this structure and
>> allocation scheme. For example, RSVP
>> (https://tools.ietf.org/html/rfc3209#section-7.2), L2TPv3
>> (https://tools.ietf.org/html/rfc3931#section-5.1), ICMP Multi-Part
>> Extensions (https://tools.ietf.org/html/rfc4884#section-8).
>>>
>> Indeed, but of the three documents you refer to only the L2TPv3
>> document mention TLV, and only on a very high level in the terminology
>> section.
>>
>>> Regardless of what we call the fields (e.g., Class and Type, or Type and
>> Sub-Type, or â€¦), there are clear technical advantages to this, including
>> the ability to delegate allocation, vendor types, etc.
>>>
>> My point was that what we call things matter.
>>
>>> In regards to the U/F bits in LDP, I think the C-bit in NSH TLVs
>> achieves whatâ€™s really needed for an SFC Encap.
>>>
>> This is the response I expected, though I'm still not entirely
>> comfortable, e.g. what do you do if you don't recognize the class
>> and the C bit is not set?
>>
>>> Lastly, you call out padding and 32-bit-word alignment. This is a great
>> point.
>>>
>>> The way things seems structured now, thereâ€™s a Len field measured in 32-
>> bit words. Itâ€™s not clear what happens when the Metadata (Value) itself is
>> not 32-bit-word-aligned. This needs fixing.
>>>
>>> Looking at the Length definition:
>>>
>>>      Length: Length of the variable metadata, in 4-byte words.  A value
>> of
>>>      0x0 or higher can be used.  A value of 0x0 denotes a TLV header
>>>      without a Variable Metadata field.
>>>
>>> Comments:
>>> * First, instead of â€œ4-byteâ€ words, this needs to be â€œ4-octetâ€ or â€œ32-
>> bitâ€ words. Byte is strictly machine dependent (7 bits, 8 bits, etc).
>>> * Second, â€œa value of 0x0 or higherâ€ for an unsigned value does not say
>> much.
>>
>> Agree to changing to "octet".
>>
>> Actually the Len field is 5 bits, gives us 32 variants, zero means
>> "none", while 31 means 31 x 4 = 124 octets.
>>
>> What I suggest that we add (we can continue to discuss sizes of the
>> differnt fields). I've not look closely where my text would fit
>> exactly.
>>
>> 3.5.1. Optional Variable Length Metadata
>>
>>     Optional variable length metadata are encoded as Variable Context
>>     Header TLVs The Variable Context Headers TLV has the same structure
>>     as TLVs defined in e.g. the LDP and BFD protocols, Type, Length and
>>     Value.
>>
>>     However in the Variable Context Header TLV the Type field have an
>>     internal structure TLV Class, C-bit and Type.
>>
>>      The format of the optional variable length context header TLVs, is as
>>      described below.
>>
>>           0                   1                   2                   3
>>           0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>          |          TLV Class            |C| TLV-Type    |R|R|R|   Len   |
>>          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>          |                      Variable Metadata                        |
>>          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>
>>
>>
>>                       Figure 6: Variable Context Headers
>>
>>      Type: The type field has three sub-fields, TLV Class, TLV Type and
>>      Len, the TLV-Type and Len fields have an internal structure.
>>
>>        TLV Class: The TLV Class field is 16 bits and describes the scope
>>        of the "Type" field.  In some cases, the TLV Class will identify a
>>        specific vendor, in others, the TLV Class will identify specific
>>        standards body allocated types.  A new IANA registry will be
>>        created for TLV Class type.
>>
>>        Type: The TLV-Type field is 8 bits and the specifies the type of
>>        information carried in the Variable Metadata field, within the
>>        scope of a given TLV Class.  Value allocation is the responsibility
>>        of the TLV Class owner.
>>
>>        The Critical bit (C-bit); 1 bit, encoding the criticality of the
>>        TLV-type. The C-bit is part of the TLV-Type field and is
>>        consistent with IPv6 option types. The C-bit (the most significant
>>        bit of the TLV-Type field) indicates whether the TLV is mandatory
>>        for the receiver to understand/process.  This effectively allocates
>>        TLV-Type values 0 to 127 for non-critical options and Type values
>>        128 to 255 for critical options.  Figure 7 below illustrates the
>>        placement of the Critical bit within the Type field.
>>
>>        +-+-+-+-+-+-+-+-+
>>        |C|     Type    |
>>        +-+-+-+-+-+-+-+-+
>>
>>
>>           Figure 7: Critical Bit Placement Within the TLV Type Field
>>
>>
>>        If a receiver receives an encapsulated packet containing a TLV with
>>        the Critical bit set to 0x1 in the Type field and it does not
>>        understand how to process the Type, it MUST drop the packet.
>>        Transit devices MUST NOT drop packets based on the setting of this
>>        bit.
>>
>>        Length: The length field is 8 bits are reserved, three most
>>        significant bits (R) are reserved for future use. The length field
>>        indicates the length of the variable metadata, in 4-octet words. A
>>        value of 0x0 or higher can be used. A value of 0x0 denotes a
>>        Variable Context Header TLV without a Variable Metadata field.
>>
>> Note: as always when I write English a grammar review is necessary!
>>
>> Hope I did not screw this up too badly.
>>
>> /Loa
>>
>>
>>
>>
>>>
>>> Hope these help.
>>>
>>> Thanks,
>>>
>>> â€” Carlos.
>>>
>>>> On Apr 17, 2016, at 3:27 AM, Loa Andersson <loa@pi.nu> wrote:
>>>>
>>>> Working Group, authors,
>>>>
>>>> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to read
>>>> it before now) and have a question on how the TLV concept is understood
>>>> in the draft.
>>>>
>>>> For example in LDP TLV were defined as Type, Length Value, e.g. (from
>>>> RFC 5036 section 3.3):
>>>>
>>>>     LDP uses a Type-Length-Value (TLV) encoding scheme to encode much of
>>>>     the information carried in LDP messages.
>>>>
>>>>     An LDP TLV is encoded as a 2 octet field that uses 14 bits to
>> specify
>>>>     a Type and 2 bits to specify behavior when an LSR doesn't recognize
>>>>     the Type, followed by a 2 octet Length field, followed by a variable
>>>>     length Value field.
>>>>
>>>>
>>>>      0                   1                   2                   3
>>>>      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>     |U|F|        Type               |            Length             |
>>>>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>     |                                                               |
>>>>     |                             Value                             |
>>>>     ~                                                               ~
>>>>     |                                                               |
>>>>     |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>     |                               |
>>>>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>
>>>> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more complicated
>>>> and I'm struggling a bit to understand if the "name" TLV should be
>> used.
>>>>
>>>>   From draft-ietf-sfc-nsh-04
>>>>
>>>>          0                   1                   2                   3
>>>>          0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>>         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +
>>>>         |          TLV Class            |C|    Type     |R|R|R|   Len
>> |
>>>>         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +
>>>>         |                      Variable Metadata
>> |
>>>>         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +
>>>>
>>>>
>>>>
>>>>                      Figure 6: Variable Context Headers
>>>>
>>>> The draft is not entirely clear in this respect, but I think this is
>> what you call a TLV.
>>>>
>>>> Should I understand this way?
>>>>
>>>> Type = TLV Class + C + Type (24 bits)
>>>> Length = len (5 bits)
>>>> Value = Variable Metadata
>>>>
>>>> A convention we used in MPLS when we have variable length fields is
>>>> to use a ~ instead of the |, like this:.
>>>>
>>>>          0                   1                   2                   3
>>>>          0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>>         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +
>>>>         |          TLV Class            |C|    Type     |R|R|R|   Len
>> |
>>>>         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +
>>>>         ~                      Variable Metadata
>> ~
>>>>         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +
>>>>
>>>> I suggest that this is a good practice that could be adopted here also.
>>>>
>>>> Two more questions:
>>>>
>>>> If the metadata does not align exactly with the 32 bit/4 byte
>> structure,
>>>> what is the rules for padding?
>>>>
>>>> A last, but a bit different question, do you need indicators like the U
>>>> and F flags in an to indicate what should happen if the node does not
>>>> recognize the (TLV Class, C, Type)-field?
>>>>
>>>> /Loa
>>>>
>>>>
>>>> PS
>>>>
>>>> I will also have a few more editorial comments that will be sent to
>>>> the authors within a day or two.
>>>>
>>>>
>>>> --
>>>>
>>>>
>>>> Loa Andersson                        email: loa@mail01.huawei.com
>>>> Senior MPLS Expert                          loa@pi.nu
>>>> Huawei Technologies (consultant)     phone: +46 739 81 21 64
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Wed Apr 20 08:26:14 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 068C312F065; Wed, 20 Apr 2016 08:26:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3VHgGaNISunT; Wed, 20 Apr 2016 08:26:12 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CB8BB12DB8D; Wed, 20 Apr 2016 08:17:59 -0700 (PDT)
Received: from omfedm08.si.francetelecom.fr (unknown [xx.xx.xx.4]) by omfedm10.si.francetelecom.fr (ESMTP service) with ESMTP id 350D426457E; Wed, 20 Apr 2016 17:17:58 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.32]) by omfedm08.si.francetelecom.fr (ESMTP service) with ESMTP id 0F48B23806E; Wed, 20 Apr 2016 17:17:58 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM32.corporate.adroot.infra.ftgroup ([fe80::8924:188:2124:a046%19]) with mapi id 14.03.0279.002; Wed, 20 Apr 2016 17:17:57 +0200
From: <mohamed.boucadair@orange.com>
To: Azhar Sayeed <asayeed@redhat.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
Thread-Index: AQHRmxBqPG9+wCOo5UWLeYjmbm2Pnp+S+CdQ
Date: Wed, 20 Apr 2016 15:17:57 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D5D0AE@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <57133AED.4080005@pi.nu> <787AE7BB302AE849A7480A190F8B933008D5C41E@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D72A4B70-0D86-41A3-8D6B-BBEE12C9AC73@redhat.com> <787AE7BB302AE849A7480A190F8B933008D5CBB0@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <77E3E0A5-AA19-4E40-886E-A1739B1BEC45@redhat.com>
In-Reply-To: <77E3E0A5-AA19-4E40-886E-A1739B1BEC45@redhat.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.20.142416
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/N25QhjWSnKsXpo1ln83u5PjUULk>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 15:26:14 -0000

Re-,

Ok, thank you.=20

256 bytes is by far sufficient for all the metadata types I'm aware of.=20

Cheers,
Med

> -----Message d'origine-----
> De=A0: Azhar Sayeed [mailto:asayeed@redhat.com]
> Envoy=E9=A0: mercredi 20 avril 2016 16:26
> =C0=A0: BOUCADAIR Mohamed IMT/OLN
> Cc=A0: Loa Andersson; sfc@ietf.org; draft-ietf-sfc-nsh@ietf.org
> Objet=A0: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Question=
s
> on TLVs in draft-ietf-sfc-nsh
>=20
> You have a point - perhaps shortening the length and type will
> help..however, here is my rationale for longer length field
>=20
> 8 bits I feel is too little for metadata - just about twice as many in a
> tweet :-)
>=20
> Azhar
>=20
> > On Apr 20, 2016, at 1:44 AM, mohamed.boucadair@orange.com wrote:
> >
> > Hi Azhar,
> >
> > Thank you for the feedback and the support for the originator ID.
> >
> > The re-arranging of the fields you propose is indeed another option, bu=
t
> it does not allow a compact header, e.g., 16 bits for the length is too
> much for the cases I'm aware of + it is not optimal if no originator ID i=
s
> to be supplied for instance.
> >
> > Having the class, type, flags, and length in the first 32 bits would
> lead to a compact header.
> >
> > Cheers,
> > Med
> >
> >> -----Message d'origine-----
> >> De : Azhar Sayeed [mailto:asayeed@redhat.com]
> >> Envoy=E9 : mardi 19 avril 2016 22:17
> >> =C0 : BOUCADAIR Mohamed IMT/OLN
> >> Cc : Loa Andersson; sfc@ietf.org; draft-ietf-sfc-nsh@ietf.org
> >> Objet : Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt -
> Questions
> >> on TLVs in draft-ietf-sfc-nsh
> >>
> >> Hi Med,
> >>
> >> You can still encode this as a TLV by re-arranging the fields with Typ=
e
> >> first, length and then value - In the value portions you can a
> mandatory
> >> bytes that encode the flags, class, originator id and then variable
> >> metadata
> >>
> >> So here is an option.
> >>
> >> Type - 16 bits
> >> Length - 16 bits
> >> Value:
> >> Flags - 4 bits
> >> Class - 4 bits
> >> Originator Length - 8 bits
> >> Originator ID - Variable
> >> Data Variable
> >>
> >> +1 to the idea of originator id.
> >>
> >>
> >> Azhar
> >>
> >>
> >>
> >>> On Apr 19, 2016, at 3:48 AM, mohamed.boucadair@orange.com wrote:
> >>>
> >>> Dear Loa, all,
> >>>
> >>> Thank you for raising this point about the encoding of the optional
> >> context information.
> >>>
> >>> I agree that the use of TLV term is confusing. What about using
> another
> >> term, e.g., "Information Elements", "Options", or "Context Element"?
> >>>
> >>> As an input to this discussion, below a proposal for an encoding that
> >> achieves the following goals:
> >>>
> >>> * Shorten the encoding of the Class field.
> >>> * Allow for more type code points.
> >>> * Avoids requiring padding for the sake of compact headers.
> >>> * Allows to include the ID of the entity that injected the context
> >> information (OPTIONAL).
> >>> * Inherit rich registries such as IPFIX.
> >>>
> >>> NOTE: This proposal does not include a dedicated flag bit to indicate
> >> whether the context element is mandatory-to-process or optional-to-
> process
> >> because further discussion/text specification is required: e.g.,
> >>> * Wouldn't be sufficient to supply that information using the control
> >> plane?
> >>> * If that information is supplied in both the context element and
> >> configured to a SFC-aware function, how conflicts are managed?
> >>> * What is the behavior for processing mandatory-to-process elements
> >> (particularly, when it is not supported)?
> >>> * Is it required to recommend an ordering of supplying the mandatory-
> to-
> >> process or optional-to-process elements?
> >>> * Is it required to preserve the same ordering when forwarding a
> packet?
> >>>
> >>> =3D=3DPROPOSAL=3D=3D=3D=3D
> >>>
> >>> Base version
> >>>       0                   1                   2                   3
> >>>      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
> >>>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>     |Class  |            Type               | FLAGS |     Length    |
> >>>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>     //                           Data (Variable)                    /=
/
> >>>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>> Version with Originator ID:
> >>>       0                   1                   2                   3
> >>>      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
> >>>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>     |Class  |            Type               | Flags |     Length    |
> >>>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>     //Originator Len|     Originator ID (Variable)(Optional)       //
> >>>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>     //                           Data (Variable)                    /=
/
> >>>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>
> >>>     The description of the fields is as follows:
> >>>
> >>>     Class:  In order to foster service innovation, this field
> >>>        allows to inherit from existing code point registries that are
> >>>        likely to be useful in a SFC context.  The following values ar=
e
> >>>        reserved by this specification:
> >>>        0:  See IANA section.
> >>>        1:  IPFIX [IPFIX].
> >>>
> >>>     Type:  Indicates the code point of the context element.  If
> >>>        "Class" field is non-null, the interpretation of this field
> MUST
> >>>        conform to the one defined for that specific class registry.
> See
> >> IANA section.
> >>>
> >>>     Flags:  The Flags field comprises a set of 4 flags:
> >>>
> >>>            +-+-+-+-+
> >>>            |S|r|r|r|
> >>>            +-+-+-+-+
> >>>
> >>>            where "rrr" are reserved bits for future assignment as
> >>>            additional flag bits. r bits MUST each be sent as zero and
> >> MUST be
> >>>            ignored on receipt.
> >>>
> >>>            When set, the S-flag indicates that an Originator ID field
> >> is
> >>>            present in the context element.  This flag is set by
> default
> >> to 0, meaning
> >>>            there is no Originator ID field present in the element.
> >>>
> >>>     Originator ID (Optional):  Conveys the identifier of the entity
> >> that injected
> >>>        this context element in the NSH header (e.g., a service
> >>>        function identifier, a classifier, etc.).  This document does
> >>>        not make any assumption about the structure of the information
> >>>        carried in this field because this is deployment-specific.
> >>>        This information is used by SFC-aware elements to enforce
> >>>        policies such as: process a context information if and only if
> >>>        it was supplied by a given entity.  This information can be
> >>>        used as a safeguard against misbehaving nodes that inject
> >>>        illegitimate data in the NSH header.
> >>>
> >>>        This field MUST be included only if S-bit is set.
> >>>
> >>>     Length:  Indicates, in octets, the length of the data carried in
> >>>        the context element.
> >>>
> >>>     Data (Variable):  The semantics of this field depend on the
> >>>        "Class" and "Type" fields.
> >>> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
> >>>
> >>> Opinions?
> >>>
> >>> Cheers,
> >>> Med
> >>>
> >>>> -----Message d'origine-----
> >>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Loa Andersson
> >>>> Envoy=E9 : dimanche 17 avril 2016 09:28
> >>>> =C0 : sfc@ietf.org; draft-ietf-sfc-nsh@ietf.org
> >>>> Objet : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions
> on
> >>>> TLVs in draft-ietf-sfc-nsh
> >>>>
> >>>> Working Group, authors,
> >>>>
> >>>> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to
> read
> >>>> it before now) and have a question on how the TLV concept is
> understood
> >>>> in the draft.
> >>>>
> >>>> For example in LDP TLV were defined as Type, Length Value, e.g. (fro=
m
> >>>> RFC 5036 section 3.3):
> >>>>
> >>>>   LDP uses a Type-Length-Value (TLV) encoding scheme to encode much
> of
> >>>>   the information carried in LDP messages.
> >>>>
> >>>>   An LDP TLV is encoded as a 2 octet field that uses 14 bits to
> >> specify
> >>>>   a Type and 2 bits to specify behavior when an LSR doesn't recogniz=
e
> >>>>   the Type, followed by a 2 octet Length field, followed by a
> variable
> >>>>   length Value field.
> >>>>
> >>>>
> >>>>    0                   1                   2                   3
> >>>>    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
> >>>>   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>>   |U|F|        Type               |            Length             |
> >>>>   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>>   |                                                               |
> >>>>   |                             Value                             |
> >>>>   ~                                                               ~
> >>>>   |                                                               |
> >>>>   |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>>   |                               |
> >>>>   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>>
> >>>> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more
> complicated
> >>>> and I'm struggling a bit to understand if the "name" TLV should be
> >> used.
> >>>>
> >>>> From draft-ietf-sfc-nsh-04
> >>>>
> >>>>        0                   1                   2                   3
> >>>>        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
> 1
> >>>>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
> +-
> >> +
> >>>>       |          TLV Class            |C|    Type     |R|R|R|   Len
> >> |
> >>>>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
> +-
> >> +
> >>>>       |                      Variable Metadata
> >> |
> >>>>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
> +-
> >> +
> >>>>
> >>>>
> >>>>
> >>>>                    Figure 6: Variable Context Headers
> >>>>
> >>>> The draft is not entirely clear in this respect, but I think this is
> >>>> what you call a TLV.
> >>>>
> >>>> Should I understand this way?
> >>>>
> >>>> Type =3D TLV Class + C + Type (24 bits)
> >>>> Length =3D len (5 bits)
> >>>> Value =3D Variable Metadata
> >>>>
> >>>> A convention we used in MPLS when we have variable length fields is
> >>>> to use a ~ instead of the |, like this:.
> >>>>
> >>>>        0                   1                   2                   3
> >>>>        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
> 1
> >>>>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
> +-
> >> +
> >>>>       |          TLV Class            |C|    Type     |R|R|R|   Len
> >> |
> >>>>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
> +-
> >> +
> >>>>       ~                      Variable Metadata
> >> ~
> >>>>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
> +-
> >> +
> >>>>
> >>>> I suggest that this is a good practice that could be adopted here
> also.
> >>>>
> >>>> Two more questions:
> >>>>
> >>>> If the metadata does not align exactly with the 32 bit/4 byte
> >> structure,
> >>>> what is the rules for padding?
> >>>>
> >>>> A last, but a bit different question, do you need indicators like th=
e
> U
> >>>> and F flags in an to indicate what should happen if the node does no=
t
> >>>> recognize the (TLV Class, C, Type)-field?
> >>>>
> >>>> /Loa
> >>>>
> >>>>
> >>>> PS
> >>>>
> >>>> I will also have a few more editorial comments that will be sent to
> >>>> the authors within a day or two.
> >>>>
> >>>>
> >>>> --
> >>>>
> >>>>
> >>>> Loa Andersson                        email: loa@mail01.huawei.com
> >>>> Senior MPLS Expert                          loa@pi.nu
> >>>> Huawei Technologies (consultant)     phone: +46 739 81 21 64
> >>>>
> >>>> _______________________________________________
> >>>> sfc mailing list
> >>>> sfc@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>
> >>> _______________________________________________
> >>> sfc mailing list
> >>> sfc@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/sfc
> >


From nobody Wed Apr 20 09:07:42 2016
Return-Path: <stewart.bryant@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E0B312D97E; Wed, 20 Apr 2016 09:07:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fLsp4J7emt10; Wed, 20 Apr 2016 09:07:34 -0700 (PDT)
Received: from mail-wm0-x22c.google.com (mail-wm0-x22c.google.com [IPv6:2a00:1450:400c:c09::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE4CB12DB32; Wed, 20 Apr 2016 09:07:33 -0700 (PDT)
Received: by mail-wm0-x22c.google.com with SMTP id e201so56390211wme.0; Wed, 20 Apr 2016 09:07:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=subject:to:references:cc:from:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding; bh=QX2RXF9SzvNn3Kv5dvhVj8wpun0A1OyizPWf3gYMlbk=; b=cPW6gMF51ZW0wibijaNFehwzFXxw2ozaNEZHCjRDN0REgRlF/QrAEi5UhStHOZMHDu SmM2qYCGBVBQfFVjsdSPjDT6PF8MASOoeA47LoNmt++g8eiBXJiX0sMpNjH/REFNDvYO VMtI0h5+lLlX2cVsGDBwpf9euv5OXY5O7dckD0m7vv3pZla7UD+v3WKJjBqiObBUp4q4 GY8jdNwvqqs7TkK0nJT4huT83ZKH6e20ALp2Ng+6aj1dEL1BIa0qogGXlNYZnUIpQ+L7 34RGx5QPF8eOx0CcEv2R6DriifbIQxbdzLGx45uuGx6S9g9QNQueelkpNryW6OyYuFeF W+Ew==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:subject:to:references:cc:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding; bh=QX2RXF9SzvNn3Kv5dvhVj8wpun0A1OyizPWf3gYMlbk=; b=a7LMsasNZ4uS+fc/jd1liVx9wkUC3pmI6bqmQPcyfIv3yR9EdrELImgYCzPu2MD1wN DJEP5nMdaMNZxImO8T6XHi5PVKd9NBIpkVZoxOwAZTdnW4llpkmgzTA+GAEnZbnOMo+c soTdvn0jvBab+TdhDvrP+2DFiRuXszBM583L7Tg14EubQQy03T/O4bgidquVYSzRBrd+ eVbtVeQ29CXbMOOQQFsTaxsyw9RCPbTcw94eDHR7u0P4EjXW1zKDHoVoXN2f9WuwHYA6 bcVexRu5t3UsM2qEnKy29R0IxxDHu3Oq7catGYmJ6WdAxSwJ1vpCJYmylFCnVWNNRR1X DJBQ==
X-Gm-Message-State: AOPr4FWxmS9bSTM0zL74OJw8P+OMuKX2rQtM/hfdvhSeFs48eq/JY9ly9+RO4HzqEtEmfA==
X-Received: by 10.194.60.134 with SMTP id h6mr9626020wjr.115.1461168451814; Wed, 20 Apr 2016 09:07:31 -0700 (PDT)
Received: from [192.168.2.126] (host213-123-124-182.in-addr.btopenworld.com. [213.123.124.182]) by smtp.gmail.com with ESMTPSA id i5sm6329353wjx.15.2016.04.20.09.07.30 (version=TLSv1/SSLv3 cipher=OTHER); Wed, 20 Apr 2016 09:07:30 -0700 (PDT)
To: mohamed.boucadair@orange.com, Azhar Sayeed <asayeed@redhat.com>
References: <57133AED.4080005@pi.nu> <787AE7BB302AE849A7480A190F8B933008D5C41E@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D72A4B70-0D86-41A3-8D6B-BBEE12C9AC73@redhat.com> <787AE7BB302AE849A7480A190F8B933008D5CBB0@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <77E3E0A5-AA19-4E40-886E-A1739B1BEC45@redhat.com> <787AE7BB302AE849A7480A190F8B933008D5D0AE@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
From: Stewart Bryant <stewart.bryant@gmail.com>
Message-ID: <5717A93F.1090800@gmail.com>
Date: Wed, 20 Apr 2016 17:07:27 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.0
MIME-Version: 1.0
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D5D0AE@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/t77_2fUk6XWe1JbPml29Ek7qrkg>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 16:07:41 -0000

In designing this, it is not matter so much what we can think of today, 
but whether we have made adequate provision for what others might 
reasonably wish to do at some point in the near future.

So, the question becomes, might you need to use more that 256 bytes in 
describing why you sent a packet somewhere, and I suspect that you 
might, for example if you needed to provide the  rule set for the 
selection of the packet.

Stewart


On 20/04/2016 16:17, mohamed.boucadair@orange.com wrote:
> Re-,
>
> Ok, thank you.
>
> 256 bytes is by far sufficient for all the metadata types I'm aware of.
>
> Cheers,
> Med
>
>> -----Message d'origine-----
>> De : Azhar Sayeed [mailto:asayeed@redhat.com]
>> Envoyé : mercredi 20 avril 2016 16:26
>> À : BOUCADAIR Mohamed IMT/OLN
>> Cc : Loa Andersson; sfc@ietf.org; draft-ietf-sfc-nsh@ietf.org
>> Objet : Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions
>> on TLVs in draft-ietf-sfc-nsh
>>
>> You have a point - perhaps shortening the length and type will
>> help..however, here is my rationale for longer length field
>>
>> 8 bits I feel is too little for metadata - just about twice as many in a
>> tweet :-)
>>
>> Azhar
>>
>>> On Apr 20, 2016, at 1:44 AM, mohamed.boucadair@orange.com wrote:
>>>
>>> Hi Azhar,
>>>
>>> Thank you for the feedback and the support for the originator ID.
>>>
>>> The re-arranging of the fields you propose is indeed another option, but
>> it does not allow a compact header, e.g., 16 bits for the length is too
>> much for the cases I'm aware of + it is not optimal if no originator ID is
>> to be supplied for instance.
>>> Having the class, type, flags, and length in the first 32 bits would
>> lead to a compact header.
>>> Cheers,
>>> Med
>>>
>>>> -----Message d'origine-----
>>>> De : Azhar Sayeed [mailto:asayeed@redhat.com]
>>>> Envoyé : mardi 19 avril 2016 22:17
>>>> À : BOUCADAIR Mohamed IMT/OLN
>>>> Cc : Loa Andersson; sfc@ietf.org; draft-ietf-sfc-nsh@ietf.org
>>>> Objet : Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt -
>> Questions
>>>> on TLVs in draft-ietf-sfc-nsh
>>>>
>>>> Hi Med,
>>>>
>>>> You can still encode this as a TLV by re-arranging the fields with Type
>>>> first, length and then value - In the value portions you can a
>> mandatory
>>>> bytes that encode the flags, class, originator id and then variable
>>>> metadata
>>>>
>>>> So here is an option.
>>>>
>>>> Type - 16 bits
>>>> Length - 16 bits
>>>> Value:
>>>> Flags - 4 bits
>>>> Class - 4 bits
>>>> Originator Length - 8 bits
>>>> Originator ID - Variable
>>>> Data Variable
>>>>
>>>> +1 to the idea of originator id.
>>>>
>>>>
>>>> Azhar
>>>>
>>>>
>>>>
>>>>> On Apr 19, 2016, at 3:48 AM, mohamed.boucadair@orange.com wrote:
>>>>>
>>>>> Dear Loa, all,
>>>>>
>>>>> Thank you for raising this point about the encoding of the optional
>>>> context information.
>>>>> I agree that the use of TLV term is confusing. What about using
>> another
>>>> term, e.g., "Information Elements", "Options", or "Context Element"?
>>>>> As an input to this discussion, below a proposal for an encoding that
>>>> achieves the following goals:
>>>>> * Shorten the encoding of the Class field.
>>>>> * Allow for more type code points.
>>>>> * Avoids requiring padding for the sake of compact headers.
>>>>> * Allows to include the ID of the entity that injected the context
>>>> information (OPTIONAL).
>>>>> * Inherit rich registries such as IPFIX.
>>>>>
>>>>> NOTE: This proposal does not include a dedicated flag bit to indicate
>>>> whether the context element is mandatory-to-process or optional-to-
>> process
>>>> because further discussion/text specification is required: e.g.,
>>>>> * Wouldn't be sufficient to supply that information using the control
>>>> plane?
>>>>> * If that information is supplied in both the context element and
>>>> configured to a SFC-aware function, how conflicts are managed?
>>>>> * What is the behavior for processing mandatory-to-process elements
>>>> (particularly, when it is not supported)?
>>>>> * Is it required to recommend an ordering of supplying the mandatory-
>> to-
>>>> process or optional-to-process elements?
>>>>> * Is it required to preserve the same ordering when forwarding a
>> packet?
>>>>> ==PROPOSAL====
>>>>>
>>>>> Base version
>>>>>        0                   1                   2                   3
>>>>>       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>>>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>      |Class  |            Type               | FLAGS |     Length    |
>>>>>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>      //                           Data (Variable)                    //
>>>>>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>> Version with Originator ID:
>>>>>        0                   1                   2                   3
>>>>>       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>>>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>      |Class  |            Type               | Flags |     Length    |
>>>>>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>      //Originator Len|     Originator ID (Variable)(Optional)       //
>>>>>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>      //                           Data (Variable)                    //
>>>>>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>
>>>>>      The description of the fields is as follows:
>>>>>
>>>>>      Class:  In order to foster service innovation, this field
>>>>>         allows to inherit from existing code point registries that are
>>>>>         likely to be useful in a SFC context.  The following values are
>>>>>         reserved by this specification:
>>>>>         0:  See IANA section.
>>>>>         1:  IPFIX [IPFIX].
>>>>>
>>>>>      Type:  Indicates the code point of the context element.  If
>>>>>         "Class" field is non-null, the interpretation of this field
>> MUST
>>>>>         conform to the one defined for that specific class registry.
>> See
>>>> IANA section.
>>>>>      Flags:  The Flags field comprises a set of 4 flags:
>>>>>
>>>>>             +-+-+-+-+
>>>>>             |S|r|r|r|
>>>>>             +-+-+-+-+
>>>>>
>>>>>             where "rrr" are reserved bits for future assignment as
>>>>>             additional flag bits. r bits MUST each be sent as zero and
>>>> MUST be
>>>>>             ignored on receipt.
>>>>>
>>>>>             When set, the S-flag indicates that an Originator ID field
>>>> is
>>>>>             present in the context element.  This flag is set by
>> default
>>>> to 0, meaning
>>>>>             there is no Originator ID field present in the element.
>>>>>
>>>>>      Originator ID (Optional):  Conveys the identifier of the entity
>>>> that injected
>>>>>         this context element in the NSH header (e.g., a service
>>>>>         function identifier, a classifier, etc.).  This document does
>>>>>         not make any assumption about the structure of the information
>>>>>         carried in this field because this is deployment-specific.
>>>>>         This information is used by SFC-aware elements to enforce
>>>>>         policies such as: process a context information if and only if
>>>>>         it was supplied by a given entity.  This information can be
>>>>>         used as a safeguard against misbehaving nodes that inject
>>>>>         illegitimate data in the NSH header.
>>>>>
>>>>>         This field MUST be included only if S-bit is set.
>>>>>
>>>>>      Length:  Indicates, in octets, the length of the data carried in
>>>>>         the context element.
>>>>>
>>>>>      Data (Variable):  The semantics of this field depend on the
>>>>>         "Class" and "Type" fields.
>>>>> ===============
>>>>>
>>>>> Opinions?
>>>>>
>>>>> Cheers,
>>>>> Med
>>>>>
>>>>>> -----Message d'origine-----
>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Loa Andersson
>>>>>> Envoyé : dimanche 17 avril 2016 09:28
>>>>>> À : sfc@ietf.org; draft-ietf-sfc-nsh@ietf.org
>>>>>> Objet : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions
>> on
>>>>>> TLVs in draft-ietf-sfc-nsh
>>>>>>
>>>>>> Working Group, authors,
>>>>>>
>>>>>> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to
>> read
>>>>>> it before now) and have a question on how the TLV concept is
>> understood
>>>>>> in the draft.
>>>>>>
>>>>>> For example in LDP TLV were defined as Type, Length Value, e.g. (from
>>>>>> RFC 5036 section 3.3):
>>>>>>
>>>>>>    LDP uses a Type-Length-Value (TLV) encoding scheme to encode much
>> of
>>>>>>    the information carried in LDP messages.
>>>>>>
>>>>>>    An LDP TLV is encoded as a 2 octet field that uses 14 bits to
>>>> specify
>>>>>>    a Type and 2 bits to specify behavior when an LSR doesn't recognize
>>>>>>    the Type, followed by a 2 octet Length field, followed by a
>> variable
>>>>>>    length Value field.
>>>>>>
>>>>>>
>>>>>>     0                   1                   2                   3
>>>>>>     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>>>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>>    |U|F|        Type               |            Length             |
>>>>>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>>    |                                                               |
>>>>>>    |                             Value                             |
>>>>>>    ~                                                               ~
>>>>>>    |                                                               |
>>>>>>    |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>>    |                               |
>>>>>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>>
>>>>>> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more
>> complicated
>>>>>> and I'm struggling a bit to understand if the "name" TLV should be
>>>> used.
>>>>>>  From draft-ietf-sfc-nsh-04
>>>>>>
>>>>>>         0                   1                   2                   3
>>>>>>         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
>> 1
>>>>>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +-
>>>> +
>>>>>>        |          TLV Class            |C|    Type     |R|R|R|   Len
>>>> |
>>>>>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +-
>>>> +
>>>>>>        |                      Variable Metadata
>>>> |
>>>>>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +-
>>>> +
>>>>>>
>>>>>>
>>>>>>                     Figure 6: Variable Context Headers
>>>>>>
>>>>>> The draft is not entirely clear in this respect, but I think this is
>>>>>> what you call a TLV.
>>>>>>
>>>>>> Should I understand this way?
>>>>>>
>>>>>> Type = TLV Class + C + Type (24 bits)
>>>>>> Length = len (5 bits)
>>>>>> Value = Variable Metadata
>>>>>>
>>>>>> A convention we used in MPLS when we have variable length fields is
>>>>>> to use a ~ instead of the |, like this:.
>>>>>>
>>>>>>         0                   1                   2                   3
>>>>>>         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
>> 1
>>>>>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +-
>>>> +
>>>>>>        |          TLV Class            |C|    Type     |R|R|R|   Len
>>>> |
>>>>>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +-
>>>> +
>>>>>>        ~                      Variable Metadata
>>>> ~
>>>>>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
>> +-
>>>> +
>>>>>> I suggest that this is a good practice that could be adopted here
>> also.
>>>>>> Two more questions:
>>>>>>
>>>>>> If the metadata does not align exactly with the 32 bit/4 byte
>>>> structure,
>>>>>> what is the rules for padding?
>>>>>>
>>>>>> A last, but a bit different question, do you need indicators like the
>> U
>>>>>> and F flags in an to indicate what should happen if the node does not
>>>>>> recognize the (TLV Class, C, Type)-field?
>>>>>>
>>>>>> /Loa
>>>>>>
>>>>>>
>>>>>> PS
>>>>>>
>>>>>> I will also have a few more editorial comments that will be sent to
>>>>>> the authors within a day or two.
>>>>>>
>>>>>>
>>>>>> --
>>>>>>
>>>>>>
>>>>>> Loa Andersson                        email: loa@mail01.huawei.com
>>>>>> Senior MPLS Expert                          loa@pi.nu
>>>>>> Huawei Technologies (consultant)     phone: +46 739 81 21 64
>>>>>>
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Apr 20 13:08:02 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F0A8012E503 for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 13:08:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.895
X-Spam-Level: 
X-Spam-Status: No, score=-2.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SI0GEicnGP_Z for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 13:07:59 -0700 (PDT)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id AB3DB12E4EB for <sfc@ietf.org>; Wed, 20 Apr 2016 13:07:58 -0700 (PDT)
Received: from BLR-EXCHP-2.sandvine.com (192.168.196.172) by WTL-EXCHP-3.sandvine.com (192.168.196.177) with Microsoft SMTP Server (TLS) id 14.3.195.1; Wed, 20 Apr 2016 16:07:57 -0400
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by blr-exchp-2.sandvine.com ([fe80::6c6d:7108:c63c:9055%14]) with mapi id 14.03.0181.006; Wed, 20 Apr 2016 16:07:57 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] TLV class of variable-length metadata should have a restricted range
Thread-Index: AQHRmWb0PGjqacyz9EidOrx7rW39tJ+P1pwAgAECt7CAAnQIcA==
Date: Wed, 20 Apr 2016 20:07:56 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F310EE@wtl-exchp-2.sandvine.com>
References: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008D5BB09@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <E8355113905631478EFF04F5AA706E9830F2A80B@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008D5C3B4@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D5C3B4@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830F310EEwtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/DqcRBW5zna18ZrU_bENQGDrtnp8>
Subject: Re: [sfc] TLV class of variable-length metadata should have a restricted range
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 20:08:01 -0000

--_000_E8355113905631478EFF04F5AA706E9830F310EEwtlexchp2sandvi_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Med,

That's a question for others. I don't know why so bits are allocated for cl=
ass. My sense is this is thought of as a vendor-ID field.

Comments anyone?

-Dave



From: mohamed.boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
Sent: Tuesday, April 19, 2016 2:43 AM
To: Dave Dolson; sfc@ietf.org
Subject: RE: [sfc] TLV class of variable-length metadata should have a rest=
ricted range

Hi Dave,

I'm puzzled here. Why do we need a large range of =AB TLV Class =BB?  Would=
n't few bits be sufficient (e.g., 3 or 4 bits)?

Thank you.

Cheers,
Med

De : Dave Dolson [mailto:ddolson@sandvine.com]
Envoy=E9 : lundi 18 avril 2016 17:21
=C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org<mailto:sfc@ietf.org>
Objet : RE: [sfc] TLV class of variable-length metadata should have a restr=
icted range

Med,
I was discussing the "TLV Class" field, which is 16 bits.

But thank you for finding the BCP for writing IANA considerations.



-Dave



From: mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> [ma=
ilto:mohamed.boucadair@orange.com]
Sent: Monday, April 18, 2016 7:39 AM
To: Dave Dolson; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: RE: [sfc] TLV class of variable-length metadata should have a rest=
ricted range

Hi Dave, all,

Thank you for raising this point.

IANA considerations should be sketched in reference to RFC5226 (see https:/=
/tools.ietf.org/html/rfc5226#section-4.1).

IMO, it is reasonable to define ranges:

=B7         assigned via Standards Action

=B7         assigned via Specification Required

=B7         reserved for Private Use

=B7         reserved for Experimental Use

Note that the ranges you are proposing are not aligned with the current TLV=
 encoding (Type is encoded in 7 bits).

Saying that, I still do see value in reusing existing rich registries such =
as IPFIX. Doing so allows to use immediately a code point while ensuring in=
teroperability. A dedicated field in the encoding of the TLV can be defined=
 (or adjust TLV Class?) to point to the registry in use.

BTW, the IANA section should include more details about "TLV Class".

Cheers,
Med

De : sfc [mailto:sfc-bounces@ietf.org] De la part de Dave Dolson
Envoy=E9 : jeudi 14 avril 2016 17:25
=C0 : sfc@ietf.org<mailto:sfc@ietf.org>
Objet : [sfc] TLV class of variable-length metadata should have a restricte=
d range

Regarding the TLV Class of variable-length metadata, https://tools.ietf.org=
/html/draft-ietf-sfc-nsh-04#section-3.5.1
It is common for such fields to reserve ranges, allowing for future growth =
into unanticipated uses.

E.g., off the top of my head,
classes 0 to 0x1ff --> types allocated by IETF
classes 0x200 to 0x7fff --> allocated by IANA
Classes 0x8000 to 0xbfff --> reserved, do not use
classes 0xc000 to 0xefff --> locally administered
classes 0xf000 to 0xffff --> experimental

Or similar? I'm not sure what the best practice for this is.

Generally, I'd want to try something experimentally before requesting IANA =
allocation for it (experimental),
or maybe types are too specific to warrant IANA allocation (locally adminis=
tered).

Can something like this be added to draft-ietf-sfc-nsh ?


David Dolson
Senior Software Architect, Sandvine Inc.


--_000_E8355113905631478EFF04F5AA706E9830F310EEwtlexchp2sandvi_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
p.Textedebulles, li.Textedebulles, div.Textedebulles
	{mso-style-name:"Texte de bulles";
	mso-style-link:"Texte de bulles Car";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.TextedebullesCar
	{mso-style-name:"Texte de bulles Car";
	mso-style-priority:99;
	mso-style-link:"Texte de bulles";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle27
	{mso-style-type:personal;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
p.PrformatHTML, li.PrformatHTML, div.PrformatHTML
	{mso-style-name:"Pr=E9format=E9 HTML";
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:"Courier New";}
span.EmailStyle30
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1235580489;
	mso-list-type:hybrid;
	mso-list-template-ids:527468770 -859409618 67895299 67895301 67895297 6789=
5299 67895301 67895297 67895299 67895301;}
@list l0:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Med, <o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">That&#8217;s a questio=
n for others. I don&#8217;t know why so bits are allocated for class. My se=
nse is this is thought of as a vendor-ID field.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Comments anyone?<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">-Dave<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> mohamed.=
boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
<br>
<b>Sent:</b> Tuesday, April 19, 2016 2:43 AM<br>
<b>To:</b> Dave Dolson; sfc@ietf.org<br>
<b>Subject:</b> RE: [sfc] TLV class of variable-length metadata should have=
 a restricted range<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black">Hi Dave,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">I&#8217;m puzzled here. Why do we need a large=
 range of =AB&nbsp;TLV Class&nbsp;=BB? &nbsp;Wouldn&#8217;t few bits be suf=
ficient (e.g., 3 or 4 bits)?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Thank you.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span=
 lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot=
;sans-serif&quot;"> Dave Dolson [<a href=3D"mailto:ddolson@sandvine.com">ma=
ilto:ddolson@sandvine.com</a>]
<br>
<b>Envoy=E9&nbsp;:</b> lundi 18 avril 2016 17:21<br>
<b>=C0&nbsp;:</b> BOUCADAIR Mohamed IMT/OLN; <a href=3D"mailto:sfc@ietf.org=
">sfc@ietf.org</a><br>
<b>Objet&nbsp;:</b> RE: [sfc] TLV class of variable-length metadata should =
have a restricted range<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"FR"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Med,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">I was discussing the &=
#8220;TLV Class&#8221; field, which is 16 bits.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">But thank you for find=
ing the BCP for writing IANA considerations.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">-Dave<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
<a href=3D"mailto:mohamed.boucadair@orange.com">mohamed.boucadair@orange.co=
m</a> [<a href=3D"mailto:mohamed.boucadair@orange.com">mailto:mohamed.bouca=
dair@orange.com</a>]
<br>
<b>Sent:</b> Monday, April 18, 2016 7:39 AM<br>
<b>To:</b> Dave Dolson; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br=
>
<b>Subject:</b> RE: [sfc] TLV class of variable-length metadata should have=
 a restricted range<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black">Hi Dave, all,
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Thank you for raising this point.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">IANA considerations should be sketched in refe=
rence to RFC5226 (see
<a href=3D"https://tools.ietf.org/html/rfc5226#section-4.1">https://tools.i=
etf.org/html/rfc5226#section-4.1</a>).
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">IMO, it is reasonable to define ranges:<o:p></=
o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol;color:black"><span style=3D"mso-list:Ignore">=B7<span style=3D"font:7.=
0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Courier New&quot;;color:black">assigned via Standards Action<o:p></o:=
p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol;color:black"><span style=3D"mso-list:Ignore">=B7<span style=3D"font:7.=
0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Courier New&quot;;color:black">assigned via Specification Required<o:=
p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol;color:black"><span style=3D"mso-list:Ignore">=B7<span style=3D"font:7.=
0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Courier New&quot;;color:black">reserved for Private Use<o:p></o:p></s=
pan></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:10.0pt;font-family:Sy=
mbol;color:black"><span style=3D"mso-list:Ignore">=B7<span style=3D"font:7.=
0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.0pt;font-family:=
&quot;Courier New&quot;;color:black">reserved for Experimental Use<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Note that the ranges you are proposing are not=
 aligned with the current TLV encoding (Type is encoded in 7 bits).
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Saying that, I still do see value in reusing e=
xisting rich registries such as IPFIX. Doing so allows to use immediately a=
 code point while ensuring interoperability. A
 dedicated field in the encoding of the TLV can be defined (or adjust TLV C=
lass?) to point to the registry in use.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">BTW, the IANA section should include more deta=
ils about &#8220;TLV Class&#8221;.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span=
 lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot=
;sans-serif&quot;"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto:sfc=
-bounces@ietf.org</a>]
<b>De la part de</b> Dave Dolson<br>
<b>Envoy=E9&nbsp;:</b> jeudi 14 avril 2016 17:25<br>
<b>=C0&nbsp;:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Objet&nbsp;:</b> [sfc] TLV class of variable-length metadata should have=
 a restricted range<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"FR"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal">Regarding the TLV Class of variable-length metadata,=
 <a href=3D"https://tools.ietf.org/html/draft-ietf-sfc-nsh-04#section-3.5.1=
">
https://tools.ietf.org/html/draft-ietf-sfc-nsh-04#section-3.5.1</a><o:p></o=
:p></p>
<p class=3D"MsoNormal">It is common for such fields to reserve ranges, allo=
wing for future growth into unanticipated uses.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">E.g., off the top of my head,<o:p></o:p></p>
<p class=3D"MsoNormal">classes 0 to 0x1ff --&gt; types allocated by IETF<o:=
p></o:p></p>
<p class=3D"MsoNormal">classes 0x200 to 0x7fff --&gt; allocated by IANA<o:p=
></o:p></p>
<p class=3D"MsoNormal">Classes 0x8000 to 0xbfff --&gt; reserved, do not use=
<o:p></o:p></p>
<p class=3D"MsoNormal">classes 0xc000 to 0xefff --&gt; locally administered=
<o:p></o:p></p>
<p class=3D"MsoNormal">classes 0xf000 to 0xffff --&gt; experimental<o:p></o=
:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Or similar? I&#8217;m not sure what the best practic=
e for this is.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Generally, I&#8217;d want to try something experimen=
tally before requesting IANA allocation for it (experimental),
<o:p></o:p></p>
<p class=3D"MsoNormal">or maybe types are too specific to warrant IANA allo=
cation (locally administered).<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Can something like this be added to draft-ietf-sfc-n=
sh ?<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">David Dolson<o:p></o:p></p>
<p class=3D"MsoNormal">Senior Software Architect, Sandvine Inc.<o:p></o:p><=
/p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</body>
</html>

--_000_E8355113905631478EFF04F5AA706E9830F310EEwtlexchp2sandvi_--


From nobody Wed Apr 20 16:49:26 2016
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DBAA12E2E9 for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 16:49:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NrTq6zOqy7YJ for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 16:49:24 -0700 (PDT)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5EECE12E14C for <sfc@ietf.org>; Wed, 20 Apr 2016 16:49:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4008; q=dns/txt; s=iport; t=1461196164; x=1462405764; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=TP878H7+DIrFy6dVMOQZkJzNHlwLEntp+lRuKjTfvCc=; b=T2xNSnTS+37+ru/4QMUdO1Ys97JMXtsbpultHKiR6GNDiJofQ5Aa+yie QyRs7LE01uDl5PJDkFYpOba2u/tHDWI7GCyTXjYgvUt9+IKM5jAi2eohS fSI1QwraN3OkiZziCUzbbBZUIz+gZhGLDIMYNP1HsTOGG8NU7ejYc4LCs k=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AQAgAMFRhX/49dJa1egmxNgVAGtHiEc?= =?us-ascii?q?gENgXKGDgIcgSk4FAEBAQEBAQFlJ4RCAQEEI1YQAgEIBAoxAwICAjAUEQIEDgW?= =?us-ascii?q?IKq1tkQ8BAQEBAQEBAQEBAQEBAQEBAQEBAQEVhiGBdYJWhz8rgisFmA8BjhOPE?= =?us-ascii?q?I8sAR4BAUKDaGyHSX4BAQE?=
X-IronPort-AV: E=Sophos; i="5.24,511,1454976000"; d="scan'208,217"; a="96050512"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 Apr 2016 23:49:23 +0000
Received: from XCH-RCD-009.cisco.com (xch-rcd-009.cisco.com [173.37.102.19]) by rcdn-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id u3KNnNq3008227 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 20 Apr 2016 23:49:23 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-009.cisco.com (173.37.102.19) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 20 Apr 2016 18:49:22 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Wed, 20 Apr 2016 18:49:22 -0500
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: Dave Dolson <ddolson@sandvine.com>
Thread-Topic: [sfc] TLV class of variable-length metadata should have a restricted range
Thread-Index: AQHRmWezvp42UAHAT0eEsyO9QBxWVJ+QLNUAgAEBmYCAAnM8AIAAPdwA
Date: Wed, 20 Apr 2016 23:49:22 +0000
Message-ID: <6E92E595-B0DD-4E35-96B0-795D75BE4C0B@cisco.com>
References: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008D5BB09@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <E8355113905631478EFF04F5AA706E9830F2A80B@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008D5C3B4@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <E8355113905631478EFF04F5AA706E9830F310EE@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F310EE@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.19.17.236]
Content-Type: multipart/alternative; boundary="_000_6E92E595B0DD4E3596B0795D75BE4C0Bciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/qqfCeHe41FKxtWP9bXX9-iSW68I>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] TLV class of variable-length metadata should have a restricted range
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 23:49:26 -0000

--_000_6E92E595B0DD4E3596B0795D75BE4C0Bciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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=

--_000_6E92E595B0DD4E3596B0795D75BE4C0Bciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <B8C21EC2B7C90B478A047611C44A4BF8@emea.cisco.com>
Content-Transfer-Encoding: base64

PGh0bWw+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIgY29udGVudD0i
dGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjwvaGVhZD4NCjxib2R5IHN0eWxlPSJ3b3JkLXdy
YXA6IGJyZWFrLXdvcmQ7IC13ZWJraXQtbmJzcC1tb2RlOiBzcGFjZTsgLXdlYmtpdC1saW5lLWJy
ZWFrOiBhZnRlci13aGl0ZS1zcGFjZTsiIGNsYXNzPSIiPg0KPGJyIGNsYXNzPSIiPg0KPGRpdj4N
CjxibG9ja3F1b3RlIHR5cGU9ImNpdGUiIGNsYXNzPSIiPg0KPGRpdiBjbGFzcz0iIj5PbiBBcHIg
MjAsIDIwMTYsIGF0IDQ6MDcgUE0sIERhdmUgRG9sc29uICZsdDs8YSBocmVmPSJtYWlsdG86ZGRv
bHNvbkBzYW5kdmluZS5jb20iIGNsYXNzPSIiPmRkb2xzb25Ac2FuZHZpbmUuY29tPC9hPiZndDsg
d3JvdGU6PC9kaXY+DQo8YnIgY2xhc3M9IkFwcGxlLWludGVyY2hhbmdlLW5ld2xpbmUiPg0KPGRp
diBjbGFzcz0iIj4NCjxkaXYgY2xhc3M9IldvcmRTZWN0aW9uMSIgc3R5bGU9InBhZ2U6IFdvcmRT
ZWN0aW9uMTsgZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBmb250LXN0
eWxlOiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0OiBub3Jt
YWw7IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IG9ycGhhbnM6IGF1dG87IHRleHQtYWxpZ246IHN0
YXJ0OyB0ZXh0LWluZGVudDogMHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6
IG5vcm1hbDsgd2lkb3dzOiBhdXRvOyB3b3JkLXNwYWNpbmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0
cm9rZS13aWR0aDogMHB4OyI+DQo8ZGl2IHN0eWxlPSJtYXJnaW46IDBpbiAwaW4gMC4wMDAxcHQ7
IGZvbnQtc2l6ZTogMTFwdDsgZm9udC1mYW1pbHk6IENhbGlicmksIHNhbnMtc2VyaWY7IiBjbGFz
cz0iIj4NCjxzcGFuIHN0eWxlPSJjb2xvcjogcmdiKDMxLCA3MywgMTI1KTsiIGNsYXNzPSIiPk1l
ZCw8c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PG86cCBj
bGFzcz0iIj48L286cD48L3NwYW4+PC9kaXY+DQo8ZGl2IHN0eWxlPSJtYXJnaW46IDBpbiAwaW4g
MC4wMDAxcHQ7IGZvbnQtc2l6ZTogMTFwdDsgZm9udC1mYW1pbHk6IENhbGlicmksIHNhbnMtc2Vy
aWY7IiBjbGFzcz0iIj4NCjxzcGFuIHN0eWxlPSJjb2xvcjogcmdiKDMxLCA3MywgMTI1KTsiIGNs
YXNzPSIiPjxvOnAgY2xhc3M9IiI+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvZGl2Pg0KPGRpdiBzdHls
ZT0ibWFyZ2luOiAwaW4gMGluIDAuMDAwMXB0OyBmb250LXNpemU6IDExcHQ7IGZvbnQtZmFtaWx5
OiBDYWxpYnJpLCBzYW5zLXNlcmlmOyIgY2xhc3M9IiI+DQo8c3BhbiBzdHlsZT0iY29sb3I6IHJn
YigzMSwgNzMsIDEyNSk7IiBjbGFzcz0iIj5UaGF04oCZcyBhIHF1ZXN0aW9uIGZvciBvdGhlcnMu
IEkgZG9u4oCZdCBrbm93IHdoeSBzbyBiaXRzIGFyZSBhbGxvY2F0ZWQgZm9yIGNsYXNzLiBNeSBz
ZW5zZSBpcyB0aGlzIGlzIHRob3VnaHQgb2YgYXMgYSB2ZW5kb3ItSUQgZmllbGQuPG86cCBjbGFz
cz0iIj48L286cD48L3NwYW4+PC9kaXY+DQo8ZGl2IHN0eWxlPSJtYXJnaW46IDBpbiAwaW4gMC4w
MDAxcHQ7IGZvbnQtc2l6ZTogMTFwdDsgZm9udC1mYW1pbHk6IENhbGlicmksIHNhbnMtc2VyaWY7
IiBjbGFzcz0iIj4NCjxzcGFuIHN0eWxlPSJjb2xvcjogcmdiKDMxLCA3MywgMTI1KTsiIGNsYXNz
PSIiPjwvc3Bhbj48L2Rpdj4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Jsb2NrcXVvdGU+DQo8ZGl2Pjxi
ciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdj5UaGF0J3MgY29ycmVjdDogaXQgc2NvcGVzIHRoZSBk
YXRhIHRvIGEgcGFydGljdWxhciAmcXVvdDtvd25lciZxdW90Oy4gJm5ic3A7VGhhdCBwcm9iYWJs
eSBpc24ndCBjbGVhciBpbiB0aGUgZHJhZnQgYW5kIHdpbGwgYmUgY2xhcmlmaWVkLiAmbmJzcDtU
aGUgaW50ZW50IGlzIHRvIHJlc2VydmUgYSByYW5nZSBmb3IgJnF1b3Q7c3RhbmRhcmRzJnF1b3Q7
IHVzZSwgYW5kIHRoZW4gYWxsb3cgdmVuZG9ycyAoZm9yIGV4YW1wbGUpIHRvIGhhdmUgdGhlaXIg
c2NvcGUgYXMgd2VsbC48L2Rpdj4NCjxkaXY+PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2PlBh
dWw8L2Rpdj4NCjwvZGl2Pg0KPC9ib2R5Pg0KPC9odG1sPg0K

--_000_6E92E595B0DD4E3596B0795D75BE4C0Bciscocom_--


From nobody Wed Apr 20 16:50:31 2016
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 06BC512E57F for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 16:50:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XOp6A3npxRR6 for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 16:50:28 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4DFB612E30F for <sfc@ietf.org>; Wed, 20 Apr 2016 16:50:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=12544; q=dns/txt; s=iport; t=1461196228; x=1462405828; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=YXvYBKgJMt9pRKFiioszBXCK6l1Zwc2u+8p68lpjQ1w=; b=WyeP9xahwDJP55gd8TxuRgDObIKpIwIAj31nnexKkZSFfKm35EI7zPTR 3IBD1HxE7B5olJt5au5p9dM86WA6xnPzPYkbk6cw6nGlWW7yye0vY+E0u 4qaaftxGmo92dQEdCTuqYep9wktYdLloXa+E42yMimpdod7dwzXLUkAoC M=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ATAgDMFBhX/5xdJa1egmxNU30GtHiEc?= =?us-ascii?q?gENgXIXAQqCPIMwAhyBKTgUAQEBAQEBAWUnhEIBAQQBAQEgBEcLEAIBCA4xAwI?= =?us-ascii?q?CAiULFBEBAQQOBYgqDq1fkQ8BAQEBAQEBAQEBAQEBAQEBAQEBAQERBIYhgXWCV?= =?us-ascii?q?oQPEQFLglMrgisFmA8BhXqIGY8QjywBHgEBQoNobAEBhxE2fgEBAQ?=
X-IronPort-AV: E=Sophos;i="5.24,511,1454976000";  d="scan'208,217";a="263926580"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 Apr 2016 23:50:27 +0000
Received: from XCH-ALN-009.cisco.com (xch-aln-009.cisco.com [173.36.7.19]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id u3KNoRiG019010 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 20 Apr 2016 23:50:27 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-009.cisco.com (173.36.7.19) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 20 Apr 2016 18:50:26 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Wed, 20 Apr 2016 18:50:26 -0500
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: Dave Dolson <ddolson@sandvine.com>
Thread-Topic: [sfc] TLV class of variable-length metadata should have a restricted range
Thread-Index: AdGWYcf4eX5Az/rjTQOEcq50WzDr6QFJ4l+A
Date: Wed, 20 Apr 2016 23:50:26 +0000
Message-ID: <A9E82077-CF9C-4BF8-BC11-A1C23C8B6760@cisco.com>
References: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.19.17.236]
Content-Type: multipart/alternative; boundary="_000_A9E82077CF9C4BF8BC11A1C23C8B6760ciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/29IM9rLA0aom0rvv8KY1yjFEWqI>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] TLV class of variable-length metadata should have a restricted range
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 23:50:31 -0000

--_000_A9E82077CF9C4BF8BC11A1C23C8B6760ciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_A9E82077CF9C4BF8BC11A1C23C8B6760ciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <9CF7FEEEEA63A0449023ACD5DD9E0333@emea.cisco.com>
Content-Transfer-Encoding: base64
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--_000_A9E82077CF9C4BF8BC11A1C23C8B6760ciscocom_--


From nobody Wed Apr 20 18:34:53 2016
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE28412E569 for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 18:34:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id grsSzSRU-6IL for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 18:34:49 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5265212DEE3 for <sfc@ietf.org>; Wed, 20 Apr 2016 18:34:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9415; q=dns/txt; s=iport; t=1461202489; x=1462412089; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=vp8qsak89psGrA5f2SVQKlLlVbJAjTseR5juJwcvmhA=; b=AeL7ibEu4ILcwtDPj+BOwvrLBuDbI8HSkcy+YthBr7kM2h98BzaHmis5 hLtNixmr5+WUhk3Y+rlhZbUywpv4Mtl8CaxPg40pzMgoLFnVGZdYhL4lv GUKasBCm3mPEx06nqNukOTP3SgnqWeHbO2LzUpS6YCD8jPYfgo/X4yDty E=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0A/AgC0LBhX/4cNJK1egzhTfblwAQ2Bc?= =?us-ascii?q?hcLghgBg08CAgKBRjgUAQEBAQEBAWUnhEEBAQEDAQEBARodLQcLBQcEAgEIEQQ?= =?us-ascii?q?BAQEeCQcnCxQJCAIEDgUUiA4IDr5tAQEBAQEBAQEBAQEBAQEBAQEBAQEBEQSGI?= =?us-ascii?q?YF1CIFMgQKEPYMtgisFmA8BhXqIGYFmhE2DKYU0hiOJCQEeAQFCggQagUpsiEc?= =?us-ascii?q?BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,512,1454976000"; d="scan'208";a="262247175"
Received: from alln-core-2.cisco.com ([173.36.13.135]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 21 Apr 2016 01:34:48 +0000
Received: from XCH-ALN-007.cisco.com (xch-aln-007.cisco.com [173.36.7.17]) by alln-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id u3L1Ym96001001 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 21 Apr 2016 01:34:48 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-007.cisco.com (173.36.7.17) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 20 Apr 2016 20:34:47 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Wed, 20 Apr 2016 20:34:47 -0500
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: Xuxiaohu <xuxiaohu@huawei.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfXkTLhKguvd0+JCgYhcxHwwp+HiRgAgAAA4gCAAAKWgIAACdAAgAAR84CAAZSqAIAKiQ0P
Date: Thu, 21 Apr 2016 01:34:47 +0000
Message-ID: <37D5FD1B-FDB7-4413-BF39-1881938CA954@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D53955F@NKGEML515-MBX.china.huawei.com> <570DA48A.9010507@joelhalpern.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539582@NKGEML515-MBX.china.huawei.com> <CAG4d1rfPVhNmcc9B7VkGYuaCUAzHZ6BpP2nWtu4JgZ-Epr2ENw@mail.gmail.com> <570DBDFF.4070305@joelhalpern.com>, <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539F32@NKGEML515-MBX.china.huawei.com>
In-Reply-To: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0D539F32@NKGEML515-MBX.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/fmnWCeWe58w3wNYDMJyDSyHqU7w>
Cc: Thomas Narten <narten@us.ibm.com>, Martin Stiemerling <mls.ietf@gmail.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>, Alia Atlas <akatlas@gmail.com>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Apr 2016 01:34:51 -0000

[individual contributor hat on ...]

>From a purely technical standpoint, the MPLS community has already addresse=
d the ECMP issue through RFC6790 Entropy Labels.

Jim

Sent from my iPhone

> On Apr 13, 2016, at 11:42 PM, Xuxiaohu <xuxiaohu@huawei.com> wrote:
>=20
>=20
>=20
>> -----Original Message-----
>> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
>> Sent: Wednesday, April 13, 2016 11:33 AM
>> To: Alia Atlas; Xuxiaohu; Martin Stiemerling; jguichar@cisco.com
>> Cc: Joel M. Halpern; Thomas Narten; sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>=20
>> With regard to MPLS encapsulation, I am not objecting to considering if =
we want
>> to rearrange things to make it simpler to carry NSH in MPLS.
>>=20
>> Given that the IETF has not ratified a standards track RFC stating that =
it is
>> required for MPLS carriage to avoid the values, I was objecting the Xu
>> overstating the situation.
>>=20
>> It is not actually hard to avoid the values.  If we feel it is imnportan=
t (and I am
>> tempted to agree that it is worth considering) we can rearrange some res=
erved
>> bits so that the first three bits are 0, the next two are the version, a=
nd the
>> remaining bits are flags.  Makes us a little starved for flags, but if w=
e agree that
>> MPLS has stolen three bits of header, so be it.
>=20
> It'd better to be determined by the IETF whether or not MPLS should conti=
nuously steal the first nibble of any emerging encapsulation header, IMHO.
>=20
> Best regards,
> Xiaohu
>=20
>> There are other answers.  We could, for example, agree that when NSH is
>> carried over MPLS, a dummy 0 label is inserted after the bottom of stack=
.  No
>> worse than many things MPLS has done.  (I could argue both sides of whic=
h
>> answer is right, and not persuade myself of either one.)
>>=20
>> On the next protocol IDs, the last time we looked we could not find an I=
D
>> registration that was reasonably small and covered the needed meanings. =
 I
>> note that even the section you point to concludes that there may well be=
 good
>> reasons for using a separate ID space.
>>=20
>> Yours,
>> Joel
>>=20
>>> On 4/12/16 10:29 PM, Alia Atlas wrote:
>>> Xiaohu, Joel, and SFC WG group,
>>>=20
>>> The first nibble question is quite relevant if it is expected that the
>>> NSH header might be directly under an MPLS label stack.  This issue
>>> arose rather unpleasantly for pseudo-wires a long time ago and the
>>> reasoning for it is much better documented, as Carlos pointed out in a
>>> different thread, in RFC 4928 Section 3.
>>>=20
>>> At the time that PWE3 was working on the control word and whether it
>>> was to be mandatory (RFC 4385), it was clear that there were devices
>>> that looked at the first nibble of a packet under the MPLS header as a
>>> way to determine if the packet was IPv4 or IPv6 and obtain
>>> flow-diversity from it.  The cost of also verifying the associated
>>> checksum if available wasn't deemed acceptable for several
>>> implementations.
>>> Given that determining as much entropy as possible is still really
>>> important and that it is non-trivial to negotiate/indicate the
>>> capability for including an Entropy Label in the MPLS stack, I have no
>>> reason to believe that this shortcut of looking at the first nibble
>>> is no longer used or deployed.   Feel free to contact me off-list if yo=
u
>>> believe this to be the case.
>>>=20
>>> It is clear from the NSH base header:
>>>=20
>>>  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>     |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next
>> Protocol |
>>>=20
>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>=20
>>> that this consideration has been completely ignored.  In fact, an NSH
>>> base header might have any value of 0b0000, 0b0001, 0b0010, 0b0010 and
>>> if a version 01 for NSH were ever defined, suddenly the traffic might
>>> be subject to startling reordering if an MPLS transport were to be
>>> considered.
>>>=20
>>> Given a claim of NSH being transport-agnostic and repeated emphasis
>>> that MPLS, as well as UDP, is a valid transport for NSH, I do think
>>> this is a significant oversight and needs, at a minimum, discussion
>>> and explanation, and  - quite likely -  correction.
>>>=20
>>> While I am on the topic of details of the NSH encapsulation, I would
>>> request that Section 8 of draft-ietf-rtgwg-dt-encap-01
>>> be read and considered!   I am not excited by having many different and
>>> unique Next Protocol fields defined.
>>> For instance, I note the definition of a nearly identical Next
>>> Protocol field in https://datatracker.ietf.org/doc/draft-ietf-nvo3-vxla=
n-gpe .
>>>=20
>>> While I am, of course, willing to reason to detailed and well-thought
>>> out explanations for why each and every new encapsulation needs its
>>> very own IANA-defined Next Protocol field, this seems to me to be
>>> highly likely to require consolidation so that the same Next Protocol
>>> field can be used between the various encapsulations.
>>>=20
>>> I will work on giving a through review of NSH as soon as practical.  I
>>> do realize that there are multiple implementations and while details
>>> of how the "Next Protocol" field are documented shouldn't have a
>>> significant impact there, the discussion about the first nibble is
>>> likely to.
>>>=20
>>> Regards,
>>> Alia
>>>=20
>>>=20
>>> On Tue, Apr 12, 2016 at 9:53 PM, Xuxiaohu <xuxiaohu@huawei.com
>>> <mailto:xuxiaohu@huawei.com>> wrote:
>>>=20
>>>   Joel,
>>>=20
>>>> -----Original Message-----
>>>> From: Joel M. Halpern [mailto:jmh@joelhalpern.com
>> <mailto:jmh@joelhalpern.com>]
>>>> Sent: Wednesday, April 13, 2016 9:45 AM
>>>> To: Xuxiaohu; Thomas Narten;sfc@ietf.org <mailto:sfc@ietf.org>
>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>=20
>>>> Xu,
>>>>     I do not believe that there is an MPLS specification that requires
>> that all
>>>> content other than IP must have a first nibble of 0 or 1.
>>>=20
>>>   When encapsulating NSH over MPLS directly, the first nibble of the
>>>   NSH must not be 4 or 6.
>>>=20
>>>> There are specifications where it is discussed as desirable.
>>>>=20
>>>> It is in fact pretty trivial for us to change the format so that the f=
irst
>> three bits are
>>>> 0, but it burns several valuable flag bits.  It is an SFC
>>> working group decision,
>>>=20
>>>   That's the reason why I raised the first nibble question.
>>>=20
>>>   Best regards,
>>>   Xiaohu
>>>=20
>>>> not, as far as I can tell, a violation of the MPLS specification.
>>>>=20
>>>> Yours,
>>>> Joel
>>>>=20
>>>>> On 4/12/16 9:41 PM, Xuxiaohu wrote:
>>>>> Hi Thomas,
>>>>>=20
>>>>> It said in the NSH draft:
>>>>>=20
>>>>>  "6.  Transport Agnostic: NSH is transport independent and is
>>>   carried
>>>>>       in an overlay, over existing underlays.  If an existing
>>>   overlay
>>>>>       topology provides the required service path
>>>   connectivity, that
>>>>>       existing overlay may be used."
>>>>>=20
>>>>> That means the NSH should be able to be transported over MPLS.
>>>   However,
>>>> according to the current NSH format definition, it's not safe to
>>>   carry the NSH
>>>> over MPLS due to the first nibble issue. Therefore, I believe
>>>   this issue needs to be
>>>> addressed before publication.
>>>>>=20
>>>>> Best regards,
>>>>> Xiaohu
>>>>>=20
>>>>>> -----Original Message-----
>>>>>> From: sfc [mailto:sfc-bounces@ietf.org
>>>   <mailto:sfc-bounces@ietf.org>] On Behalf Of Thomas Narten
>>>>>> Sent: Thursday, March 31, 2016 10:48 AM
>>>>>> To: sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>=20
>>>>>> Dear WG:
>>>>>>=20
>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>=20
>>>>>> The editors of the NSH document have indicated that they have
>>>>>> addressed all known comments and that there are no open issues
>>>   with
>>>>>> the current version of the document.
>>>>>>=20
>>>>>> Substantive comments to the list please, editorial comments can go
>>>>>> directly to the document editors.
>>>>>>=20
>>>>>> We'll also get a brief update from the editors at next week's
>>>>>> meeting. If there are any remaining issues with the document,
>>>   raising
>>>>>> them before the meeting would be especially helpful.
>>>>>>=20
>>>>>> For the chairs,
>>>>>> Thomas
>>>>>>=20
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>=20
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org <mailto:sfc@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>=20
>>>   _______________________________________________
>>>   sfc mailing list
>>>   sfc@ietf.org <mailto:sfc@ietf.org>
>>>   https://www.ietf.org/mailman/listinfo/sfc
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Apr 20 20:44:25 2016
Return-Path: <loa@pi.nu>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B53912D8D4; Wed, 20 Apr 2016 20:44:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level: 
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RFVEJCRzyQ-o; Wed, 20 Apr 2016 20:44:21 -0700 (PDT)
Received: from pipi.pi.nu (pipi.pi.nu [83.168.239.141]) (using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 73D7812DE52; Wed, 20 Apr 2016 20:44:21 -0700 (PDT)
Received: from [192.168.1.2] (unknown [122.53.41.246]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: loa@pi.nu) by pipi.pi.nu (Postfix) with ESMTPSA id B441A1801595; Thu, 21 Apr 2016 05:44:18 +0200 (CEST)
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, Azhar Sayeed <asayeed@redhat.com>
References: <57133AED.4080005@pi.nu> <33D1653F-230B-4877-AB8C-C1BAE6C26BD3@redhat.com> <592C0220-7CE8-46A6-8181-2AA7EF1CA63D@cisco.com> <CB7C5205-3734-4DC3-90CE-23B51381BA3F@redhat.com> <4674AF21-386A-4FC4-9714-9D6D003250BE@cisco.com>
From: Loa Andersson <loa@pi.nu>
Message-ID: <57184C83.4070501@pi.nu>
Date: Thu, 21 Apr 2016 11:44:03 +0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <4674AF21-386A-4FC4-9714-9D6D003250BE@cisco.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/6HnIpqORUyeDBhEwO50PyKJ2Ffw>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Apr 2016 03:44:24 -0000

Carlos,

On 2016-04-20 22:36, Carlos Pignataro (cpignata) wrote:
> Hi, Azhar,
>
> You wrote â€œthe question then is can the current TLV structure in draft-~nsh-04 be re-configured to align with all the other TLVâ€™s structureâ€, and I interpreted that, likely misinterpreted, as â€œletâ€™s shuffle all bits-on-the-wire to have only a single flat Type, a length, and a value. If instead you meant â€œwe can rename thingsâ€, thatâ€™s different. Note I said â€œinformation elementâ€ to most generically refer to a protocol element which provides information.
>
Whether you misunderstood/misinterpreted Azhar or not the text I
proposed does not "shuffle bits around", it is only the description
of the field(s) that changes.

If we don't want to do this type of change, we should not use the
TLV name.

/Loa

> Thanks,
>
> â€” Carlos.
>
>> On Apr 20, 2016, at 10:18 AM, Azhar Sayeed <asayeed@redhat.com> wrote:
>>
>> Carlos,
>>
>> We agree to disagree â€¦
>>
>> My argument was fairly simple - if you call this a TLV then I gave you an option to align to a TLV structure without breaking the proposed structure too muchâ€¦you can call it what you want - call it an informational element, call it a metadata structure or call it some thing else - just donâ€™t call it a TLVâ€¦in which case we are squared
>>
>> The difference between what I am stating and what you are arguing is not muchâ€¦I am not proposing to take away the class field or to take away the flags - (although I would argue why do you need a class field when you already have a type - if you make type 16 bits then it covers both class and type as proposed originally)
>>
>> I can see Medâ€™s point that we want the header to be compact in which case you can shrink the length or the type field or bothâ€¦If you move the flags around then the structure does conform to TLV - If you are not calling it a TLV but calling this a metadata spec then ignore my comments
>>
>> Azhar
>>
>>
>>> On Apr 19, 2016, at 10:41 PM, Carlos Pignataro (cpignata) <cpignata@cisco.com> wrote:
>>>
>>> Azhar,
>>>
>>> -1 :-)
>>>
>>> Within the IETF-specified protocols, we can certainly find examples of most syntax and structures, from the simple to the too creative ones. Finding a protocol with a specific TLV structure does not mean that thatâ€™s the best for every protocol use.
>>>
>>> You say: "This should also be consistentâ€.
>>>
>>> However, just to understand your point, what is the technical reason for NSH TLV structs having to match BFD structs and ISIS structs? And why not, say, RSVPâ€™s or ICMP Multipartâ€™s or L2TPv3â€™s (which, incidentally, use a Class/Type-length-value format)?
>>>
>>> When you say â€œ to align with all the other TLVâ€™s structureâ€ â€” I ask: why?
>>>
>>> If we think of the goal of flexibility (main goal of Type 2) in the context of most flexible allocation, a hierarchical scheme is a technical answer. Given the rich ecosystem of vendors and open source projects, the proposed structure, in my humble opinion, future proofs the design.
>>>
>>> â€” Carlos.
>>>
>>>> On Apr 18, 2016, at 10:33 AM, Azhar Sayeed <asayeed@redhat.com> wrote:
>>>>
>>>> Loa,
>>>>
>>>> +1 Agree and not just LDP, but BFD TLV or any of the ISIS TLVs have the same structure - This should also be consistent..the question then is can the current TLV structure in draft-~nsh-04 be re-configured to align with all the other TLVâ€™s structure?
>>>>
>>>> Azhar
>>>>
>>>>
>>>>> On Apr 17, 2016, at 3:27 AM, Loa Andersson <loa@pi.nu> wrote:
>>>>>
>>>>> Working Group, authors,
>>>>>
>>>>> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to read
>>>>> it before now) and have a question on how the TLV concept is understood
>>>>> in the draft.
>>>>>
>>>>> For example in LDP TLV were defined as Type, Length Value, e.g. (from
>>>>> RFC 5036 section 3.3):
>>>>>
>>>>> LDP uses a Type-Length-Value (TLV) encoding scheme to encode much of
>>>>> the information carried in LDP messages.
>>>>>
>>>>> An LDP TLV is encoded as a 2 octet field that uses 14 bits to specify
>>>>> a Type and 2 bits to specify behavior when an LSR doesn't recognize
>>>>> the Type, followed by a 2 octet Length field, followed by a variable
>>>>> length Value field.
>>>>>
>>>>>
>>>>> 0                   1                   2                   3
>>>>> 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>> |U|F|        Type               |            Length             |
>>>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>> |                                                               |
>>>>> |                             Value                             |
>>>>> ~                                                               ~
>>>>> |                                                               |
>>>>> |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>> |                               |
>>>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>
>>>>> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more complicated
>>>>> and I'm struggling a bit to understand if the "name" TLV should be used.
>>>>>
>>>>>  From draft-ietf-sfc-nsh-04
>>>>>
>>>>>      0                   1                   2                   3
>>>>>      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>>>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>     |          TLV Class            |C|    Type     |R|R|R|   Len   |
>>>>>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>     |                      Variable Metadata                        |
>>>>>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>
>>>>>
>>>>>
>>>>>                  Figure 6: Variable Context Headers
>>>>>
>>>>> The draft is not entirely clear in this respect, but I think this is what you call a TLV.
>>>>>
>>>>> Should I understand this way?
>>>>>
>>>>> Type = TLV Class + C + Type (24 bits)
>>>>> Length = len (5 bits)
>>>>> Value = Variable Metadata
>>>>>
>>>>> A convention we used in MPLS when we have variable length fields is
>>>>> to use a ~ instead of the |, like this:.
>>>>>
>>>>>      0                   1                   2                   3
>>>>>      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>>>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>     |          TLV Class            |C|    Type     |R|R|R|   Len   |
>>>>>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>     ~                      Variable Metadata                        ~
>>>>>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>
>>>>> I suggest that this is a good practice that could be adopted here also.
>>>>>
>>>>> Two more questions:
>>>>>
>>>>> If the metadata does not align exactly with the 32 bit/4 byte structure,
>>>>> what is the rules for padding?
>>>>>
>>>>> A last, but a bit different question, do you need indicators like the U
>>>>> and F flags in an to indicate what should happen if the node does not
>>>>> recognize the (TLV Class, C, Type)-field?
>>>>>
>>>>> /Loa
>>>>>
>>>>>
>>>>> PS
>>>>>
>>>>> I will also have a few more editorial comments that will be sent to
>>>>> the authors within a day or two.
>>>>>
>>>>>
>>>>> --
>>>>>
>>>>>
>>>>> Loa Andersson                        email: loa@mail01.huawei.com
>>>>> Senior MPLS Expert                          loa@pi.nu
>>>>> Huawei Technologies (consultant)     phone: +46 739 81 21 64
>>>>>
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>
>


From nobody Wed Apr 20 20:52:33 2016
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9376812E029; Wed, 20 Apr 2016 20:52:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6z1yqUyDHLC6; Wed, 20 Apr 2016 20:52:29 -0700 (PDT)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1296D12DFD2; Wed, 20 Apr 2016 20:46:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=10558; q=dns/txt; s=iport; t=1461210378; x=1462419978; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=DmkPPURIvi9yeJl7lBoIE/F7xQXGJgtmlfJsHgNM/G4=; b=UNwagMbb5OXh1rnVzJl/x4a5D1mszFLdiRrtpoK2Q6WNIo/jxe08gJJm O8fmf21S40AA8rRV+EheFEGFrhW/skiqSfY2puU556TZpH4ImtYKer/EI F2hgcCGuKz3Hp3H2D2eNwBIjdEpTrLRGYxmhjMKkVPCQZCXMxgmJDWZ6i M=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DqAgDTTBhX/4YNJK1egzhTfQa5bA6Bc?= =?us-ascii?q?hcLghiDVAKBPDgUAQEBAQEBAWUnhEEBAQEDAQEBARoGRAQDCwUJAgIBBgIYKgI?= =?us-ascii?q?CGwwLJQIEDgUOiBQIDpBCnReRDwEBAQEBAQEBAQEBAQEBAQEBAQEBAQ0EBASGH?= =?us-ascii?q?YF1glaEDxEBgx4rgisFh3aFXYo8AYMngWaJBoFmh3aFNI8sAR4BQ4IEGhWBNWy?= =?us-ascii?q?HEzZ+AQEB?=
X-IronPort-AV: E=Sophos;i="5.24,512,1454976000";  d="asc'?scan'208";a="264228635"
Received: from alln-core-12.cisco.com ([173.36.13.134]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 21 Apr 2016 03:46:17 +0000
Received: from XCH-RTP-020.cisco.com (xch-rtp-020.cisco.com [64.101.220.160]) by alln-core-12.cisco.com (8.14.5/8.14.5) with ESMTP id u3L3kGcd007207 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 21 Apr 2016 03:46:16 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-020.cisco.com (64.101.220.160) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 20 Apr 2016 23:46:15 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1104.009; Wed, 20 Apr 2016 23:46:15 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Loa Andersson <loa@pi.nu>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
Thread-Index: AQHRmHqvPG9+wCOo5UWLeYjmbm2Pnp+QEKeAgAJd1QCAAMK0AIAABPsAgADcBYCAAACegA==
Date: Thu, 21 Apr 2016 03:46:15 +0000
Message-ID: <498C9023-F0A4-4EB5-B4D1-1397F02EA1D9@cisco.com>
References: <57133AED.4080005@pi.nu> <33D1653F-230B-4877-AB8C-C1BAE6C26BD3@redhat.com> <592C0220-7CE8-46A6-8181-2AA7EF1CA63D@cisco.com> <CB7C5205-3734-4DC3-90CE-23B51381BA3F@redhat.com> <4674AF21-386A-4FC4-9714-9D6D003250BE@cisco.com> <57184C83.4070501@pi.nu>
In-Reply-To: <57184C83.4070501@pi.nu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.253.120]
Content-Type: multipart/signed; boundary="Apple-Mail=_D5ECCECF-8DF9-47B4-8792-94CE61629C4B"; protocol="application/pgp-signature"; micalg=pgp-sha256
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/QlIld9nkyIXy4a-bZlA5ei4LUXk>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, Azhar Sayeed <asayeed@redhat.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Apr 2016 03:52:31 -0000

--Apple-Mail=_D5ECCECF-8DF9-47B4-8792-94CE61629C4B
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi, Loa,

I very much agree with renaming the fields, and in particular I really =
like your naming proposal! Subsequently, the field descriptions need to =
be updated as well.

Thanks,

=E2=80=94 Carlos.

> On Apr 20, 2016, at 11:44 PM, Loa Andersson <loa@pi.nu> wrote:
>=20
> Carlos,
>=20
> On 2016-04-20 22:36, Carlos Pignataro (cpignata) wrote:
>> Hi, Azhar,
>>=20
>> You wrote =E2=80=9Cthe question then is can the current TLV structure =
in draft-~nsh-04 be re-configured to align with all the other TLV=E2=80=99=
s structure=E2=80=9D, and I interpreted that, likely misinterpreted, as =
=E2=80=9Clet=E2=80=99s shuffle all bits-on-the-wire to have only a =
single flat Type, a length, and a value. If instead you meant =E2=80=9Cwe =
can rename things=E2=80=9D, that=E2=80=99s different. Note I said =
=E2=80=9Cinformation element=E2=80=9D to most generically refer to a =
protocol element which provides information.
>>=20
> Whether you misunderstood/misinterpreted Azhar or not the text I
> proposed does not "shuffle bits around", it is only the description
> of the field(s) that changes.
>=20
> If we don't want to do this type of change, we should not use the
> TLV name.
>=20
> /Loa
>=20
>> Thanks,
>>=20
>> =E2=80=94 Carlos.
>>=20
>>> On Apr 20, 2016, at 10:18 AM, Azhar Sayeed <asayeed@redhat.com> =
wrote:
>>>=20
>>> Carlos,
>>>=20
>>> We agree to disagree =E2=80=A6
>>>=20
>>> My argument was fairly simple - if you call this a TLV then I gave =
you an option to align to a TLV structure without breaking the proposed =
structure too much=E2=80=A6you can call it what you want - call it an =
informational element, call it a metadata structure or call it some =
thing else - just don=E2=80=99t call it a TLV=E2=80=A6in which case we =
are squared
>>>=20
>>> The difference between what I am stating and what you are arguing is =
not much=E2=80=A6I am not proposing to take away the class field or to =
take away the flags - (although I would argue why do you need a class =
field when you already have a type - if you make type 16 bits then it =
covers both class and type as proposed originally)
>>>=20
>>> I can see Med=E2=80=99s point that we want the header to be compact =
in which case you can shrink the length or the type field or both=E2=80=A6=
If you move the flags around then the structure does conform to TLV - If =
you are not calling it a TLV but calling this a metadata spec then =
ignore my comments
>>>=20
>>> Azhar
>>>=20
>>>=20
>>>> On Apr 19, 2016, at 10:41 PM, Carlos Pignataro (cpignata) =
<cpignata@cisco.com> wrote:
>>>>=20
>>>> Azhar,
>>>>=20
>>>> -1 :-)
>>>>=20
>>>> Within the IETF-specified protocols, we can certainly find examples =
of most syntax and structures, from the simple to the too creative ones. =
Finding a protocol with a specific TLV structure does not mean that =
that=E2=80=99s the best for every protocol use.
>>>>=20
>>>> You say: "This should also be consistent=E2=80=9D.
>>>>=20
>>>> However, just to understand your point, what is the technical =
reason for NSH TLV structs having to match BFD structs and ISIS structs? =
And why not, say, RSVP=E2=80=99s or ICMP Multipart=E2=80=99s or =
L2TPv3=E2=80=99s (which, incidentally, use a Class/Type-length-value =
format)?
>>>>=20
>>>> When you say =E2=80=9C to align with all the other TLV=E2=80=99s =
structure=E2=80=9D =E2=80=94 I ask: why?
>>>>=20
>>>> If we think of the goal of flexibility (main goal of Type 2) in the =
context of most flexible allocation, a hierarchical scheme is a =
technical answer. Given the rich ecosystem of vendors and open source =
projects, the proposed structure, in my humble opinion, future proofs =
the design.
>>>>=20
>>>> =E2=80=94 Carlos.
>>>>=20
>>>>> On Apr 18, 2016, at 10:33 AM, Azhar Sayeed <asayeed@redhat.com> =
wrote:
>>>>>=20
>>>>> Loa,
>>>>>=20
>>>>> +1 Agree and not just LDP, but BFD TLV or any of the ISIS TLVs =
have the same structure - This should also be consistent..the question =
then is can the current TLV structure in draft-~nsh-04 be re-configured =
to align with all the other TLV=E2=80=99s structure?
>>>>>=20
>>>>> Azhar
>>>>>=20
>>>>>=20
>>>>>> On Apr 17, 2016, at 3:27 AM, Loa Andersson <loa@pi.nu> wrote:
>>>>>>=20
>>>>>> Working Group, authors,
>>>>>>=20
>>>>>> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to =
read
>>>>>> it before now) and have a question on how the TLV concept is =
understood
>>>>>> in the draft.
>>>>>>=20
>>>>>> For example in LDP TLV were defined as Type, Length Value, e.g. =
(from
>>>>>> RFC 5036 section 3.3):
>>>>>>=20
>>>>>> LDP uses a Type-Length-Value (TLV) encoding scheme to encode much =
of
>>>>>> the information carried in LDP messages.
>>>>>>=20
>>>>>> An LDP TLV is encoded as a 2 octet field that uses 14 bits to =
specify
>>>>>> a Type and 2 bits to specify behavior when an LSR doesn't =
recognize
>>>>>> the Type, followed by a 2 octet Length field, followed by a =
variable
>>>>>> length Value field.
>>>>>>=20
>>>>>>=20
>>>>>> 0                   1                   2                   3
>>>>>> 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>>>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>> |U|F|        Type               |            Length             |
>>>>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>> |                                                               |
>>>>>> |                             Value                             |
>>>>>> ~                                                               ~
>>>>>> |                                                               |
>>>>>> |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>> |                               |
>>>>>> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>>=20
>>>>>> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more =
complicated
>>>>>> and I'm struggling a bit to understand if the "name" TLV should =
be used.
>>>>>>=20
>>>>>> =46rom draft-ietf-sfc-nsh-04
>>>>>>=20
>>>>>>     0                   1                   2                   3
>>>>>>     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 =
1
>>>>>>    =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>>    |          TLV Class            |C|    Type     |R|R|R|   Len  =
 |
>>>>>>    =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>>    |                      Variable Metadata                       =
 |
>>>>>>    =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>>=20
>>>>>>=20
>>>>>>=20
>>>>>>                 Figure 6: Variable Context Headers
>>>>>>=20
>>>>>> The draft is not entirely clear in this respect, but I think this =
is what you call a TLV.
>>>>>>=20
>>>>>> Should I understand this way?
>>>>>>=20
>>>>>> Type =3D TLV Class + C + Type (24 bits)
>>>>>> Length =3D len (5 bits)
>>>>>> Value =3D Variable Metadata
>>>>>>=20
>>>>>> A convention we used in MPLS when we have variable length fields =
is
>>>>>> to use a ~ instead of the |, like this:.
>>>>>>=20
>>>>>>     0                   1                   2                   3
>>>>>>     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 =
1
>>>>>>    =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>>    |          TLV Class            |C|    Type     |R|R|R|   Len  =
 |
>>>>>>    =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>>    ~                      Variable Metadata                       =
 ~
>>>>>>    =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>>>>>=20
>>>>>> I suggest that this is a good practice that could be adopted here =
also.
>>>>>>=20
>>>>>> Two more questions:
>>>>>>=20
>>>>>> If the metadata does not align exactly with the 32 bit/4 byte =
structure,
>>>>>> what is the rules for padding?
>>>>>>=20
>>>>>> A last, but a bit different question, do you need indicators like =
the U
>>>>>> and F flags in an to indicate what should happen if the node does =
not
>>>>>> recognize the (TLV Class, C, Type)-field?
>>>>>>=20
>>>>>> /Loa
>>>>>>=20
>>>>>>=20
>>>>>> PS
>>>>>>=20
>>>>>> I will also have a few more editorial comments that will be sent =
to
>>>>>> the authors within a day or two.
>>>>>>=20
>>>>>>=20
>>>>>> --
>>>>>>=20
>>>>>>=20
>>>>>> Loa Andersson                        email: loa@mail01.huawei.com
>>>>>> Senior MPLS Expert                          loa@pi.nu
>>>>>> Huawei Technologies (consultant)     phone: +46 739 81 21 64
>>>>>>=20
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>=20
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>=20
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>=20
>>=20


--Apple-Mail=_D5ECCECF-8DF9-47B4-8792-94CE61629C4B
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org

iQIcBAEBCAAGBQJXGE0HAAoJEIXgpQGOZny92ZkP/0n2Y2XbhbteLFnJUf2Q6HVg
ju+e/01Xacw15h42yH6Z5b102RWtObn3ycqE5UfCMXVaB+G0EXGL2eueaA5ekHhR
ZYe942TNbrWQJKiZWzz1CR560d0A9p50dL2d8Xq6ZsXHrqN88k7NuJNZ8fD1k5Dp
PiDWAJrGmLuvitYpjQDO16lJg2rICvevlWTH2xZeDwaTJ5z5CtneoglomOIoTUAI
huKB8Aodb0GUXoRzCnDXQOB+F1RpcJ2lGgp3+l4C5zvN9d1tC2ExIeioO601bOkk
JUVDmltMXSVbsBQVTcBq06MDGW+KmsLHPwDDBTWTLnLjv/JCCnPWFLhtPfRlFiey
NODB7l771tZbF6YxSgkd6q2Gct9Wt1GRec6P5t7vqHflmV+fufAMapI6WyatQ5Zt
P47/MWk3mFo+RmIJbcinqFTgFP3OIfveKJ3N6KLNPuXAfbSiaWEGKoY5XsJKFlTm
MEkb7b/IX2nXy5aeNdYBYxVnT5HQEk+nefzy1lGyRHFFIKEJhQXdtbLndMn+Hvq9
w892nygSDcaYltbovc6vsa+38UIzmM/7qtTJpM2WUe2NBg7ya/69H1+/8YSohjJ8
jF2hC+YMda3moZCjAfGCHNZFf5g3xTfJ2RWVQfuwu315BPEVV7oco8kwjttt9ATu
/g1U12wY/5RG20HB5f7l
=GZk3
-----END PGP SIGNATURE-----

--Apple-Mail=_D5ECCECF-8DF9-47B4-8792-94CE61629C4B--


From nobody Wed Apr 20 21:29:06 2016
Return-Path: <loa@pi.nu>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF4F412D710 for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 21:29:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level: 
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZueaRSQRfvpQ for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 21:29:03 -0700 (PDT)
Received: from pipi.pi.nu (pipi.pi.nu [83.168.239.141]) (using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 571BB12B05B for <sfc@ietf.org>; Wed, 20 Apr 2016 21:29:03 -0700 (PDT)
Received: from [192.168.1.2] (unknown [122.53.41.246]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: loa@pi.nu) by pipi.pi.nu (Postfix) with ESMTPSA id 4FF4A1802ADC; Thu, 21 Apr 2016 06:29:01 +0200 (CEST)
To: Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com>
From: Loa Andersson <loa@pi.nu>
Message-ID: <571856FE.5010901@pi.nu>
Date: Thu, 21 Apr 2016 12:28:46 +0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/kmbuDXs5c64yV5uDXBU2bJPflWw>
Subject: Re: [sfc] TLV class of variable-length metadata should have a restricted range
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Apr 2016 04:29:05 -0000

Dave,

A few comments and questions, though in general I agree with your approach.

On 2016-04-14 23:24, Dave Dolson wrote:
> Regarding the TLV Class of variable-length metadata,
> https://tools.ietf.org/html/draft-ietf-sfc-nsh-04#section-3.5.1
>
> It is common for such fields to reserve ranges, allowing for future
> growth into unanticipated uses.
>
> E.g., off the top of my head,
>
> classes 0 to 0x1ff --> types allocated by IETF
>
> classes 0x200 to 0x7fff --> allocated by IANA

What is the difference between "alloacated by IETF"
and "allocated by IANA"? I think we should say.

classes 0 to 0x1ff --> types allocated by IETF consensus
classes 0x200 to 0x7fff --> RFC needed

>
> Classes 0x8000 to 0xbfff --> reserved, do not use

I don't understand why we need the reerved block of 16k classes
reserved?
>
> classes 0xc000 to 0xefff --> locally administered

what is this??
>
> classes 0xf000 to 0xffff --> experimental

this block is way to big , 4 or 8 values would be enough, e.g.

classes 0xfff6 to 0xfffe --> experimental

I'd also do

class 0xffff reserved - this is set aside for future use and will
require a standard track RFC to change.

/Loa


>
> Or similar? I’m not sure what the best practice for this is.
>
> Generally, I’d want to try something experimentally before requesting
> IANA allocation for it (experimental),
>
> or maybe types are too specific to warrant IANA allocation (locally
> administered).
>
> Can something like this be added to draft-ietf-sfc-nsh ?
>
> David Dolson
>
> Senior Software Architect, Sandvine Inc.
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Wed Apr 20 22:46:33 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A2A1F12E985 for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 22:46:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.618
X-Spam-Level: 
X-Spam-Status: No, score=-2.618 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qBlIdmta4y3Z for <sfc@ietfa.amsl.com>; Wed, 20 Apr 2016 22:46:30 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2AABA12E97C for <sfc@ietf.org>; Wed, 20 Apr 2016 22:46:26 -0700 (PDT)
Received: from omfedm05.si.francetelecom.fr (unknown [xx.xx.xx.1]) by omfedm13.si.francetelecom.fr (ESMTP service) with ESMTP id 3D46D324508; Thu, 21 Apr 2016 07:46:24 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.41]) by omfedm05.si.francetelecom.fr (ESMTP service) with ESMTP id 1759835C048; Thu, 21 Apr 2016 07:46:24 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM31.corporate.adroot.infra.ftgroup ([fe80::2cc9:4bac:7b7d:229d%19]) with mapi id 14.03.0279.002; Thu, 21 Apr 2016 07:46:24 +0200
From: <mohamed.boucadair@orange.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>, Dave Dolson <ddolson@sandvine.com>
Thread-Topic: [sfc] TLV class of variable-length metadata should have a restricted range
Thread-Index: AQHRm19IgqXVSRMWkUuCA205d0ScwJ+T6lgw
Date: Thu, 21 Apr 2016 05:46:22 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D5D52D@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008D5BB09@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <E8355113905631478EFF04F5AA706E9830F2A80B@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008D5C3B4@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <E8355113905631478EFF04F5AA706E9830F310EE@wtl-exchp-2.sandvine.com> <6E92E595-B0DD-4E35-96B0-795D75BE4C0B@cisco.com>
In-Reply-To: <6E92E595-B0DD-4E35-96B0-795D75BE4C0B@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B933008D5D52DOPEXCLILMA3corp_"
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.21.52716
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/MjE-xE5Jg7lh_6Dq2JFXYtQGl_Q>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] TLV class of variable-length metadata should have a restricted range
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Apr 2016 05:46:31 -0000

--_000_787AE7BB302AE849A7480A190F8B933008D5D52DOPEXCLILMA3corp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

SGkgUGF1bCwNCg0KVGhhbmsgeW91IGZvciB0aGUgY2xhcmlmaWNhdGlvbi4gVGhpcyBpcyBhbGln
bmVkIHdpdGggdGhlIGludGVycHJldGF0aW9uIEkgaGFkIGZvciB0aGlzIGZpZWxkLiBJdCBjYW4g
cG9pbnQgdG8gYW5vdGhlciByZWdpc3Rlciwgb3duZXIsIGV0Yy4gYnV0IHN0aWxsIEkgZG9u4oCZ
dCB1bmRlcnN0YW5kIHdoeSB3ZSBuZWVkIHRvIGhhdmUgMl5eMTYgdmFsdWVzIGZvciB0aGlzLg0K
DQpJIHdvbuKAmXQgcmVwZWF0IG15IHByb3Bvc2FsIHRvIGluY2x1ZGUgSVBGSVggcmVnaXN0cnkg
aGVyZSBhcyBpdCBpcyBhbHJlYWR5IHJhaXNlZCBpbiBvdGhlciB0aHJlYWRzLg0KDQpDaGVlcnMs
DQpNZWQNCg0KRGUgOiBzZmMgW21haWx0bzpzZmMtYm91bmNlc0BpZXRmLm9yZ10gRGUgbGEgcGFy
dCBkZSBQYXVsIFF1aW5uIChwYXVscSkNCkVudm95w6kgOiBqZXVkaSAyMSBhdnJpbCAyMDE2IDAx
OjQ5DQrDgCA6IERhdmUgRG9sc29uDQpDYyA6IHNmY0BpZXRmLm9yZw0KT2JqZXQgOiBSZTogW3Nm
Y10gVExWIGNsYXNzIG9mIHZhcmlhYmxlLWxlbmd0aCBtZXRhZGF0YSBzaG91bGQgaGF2ZSBhIHJl
c3RyaWN0ZWQgcmFuZ2UNCg0KDQpPbiBBcHIgMjAsIDIwMTYsIGF0IDQ6MDcgUE0sIERhdmUgRG9s
c29uIDxkZG9sc29uQHNhbmR2aW5lLmNvbTxtYWlsdG86ZGRvbHNvbkBzYW5kdmluZS5jb20+PiB3
cm90ZToNCg0KTWVkLA0KDQpUaGF04oCZcyBhIHF1ZXN0aW9uIGZvciBvdGhlcnMuIEkgZG9u4oCZ
dCBrbm93IHdoeSBzbyBiaXRzIGFyZSBhbGxvY2F0ZWQgZm9yIGNsYXNzLiBNeSBzZW5zZSBpcyB0
aGlzIGlzIHRob3VnaHQgb2YgYXMgYSB2ZW5kb3ItSUQgZmllbGQuDQoNClRoYXQncyBjb3JyZWN0
OiBpdCBzY29wZXMgdGhlIGRhdGEgdG8gYSBwYXJ0aWN1bGFyICJvd25lciIuICBUaGF0IHByb2Jh
Ymx5IGlzbid0IGNsZWFyIGluIHRoZSBkcmFmdCBhbmQgd2lsbCBiZSBjbGFyaWZpZWQuICBUaGUg
aW50ZW50IGlzIHRvIHJlc2VydmUgYSByYW5nZSBmb3IgInN0YW5kYXJkcyIgdXNlLCBhbmQgdGhl
biBhbGxvdyB2ZW5kb3JzIChmb3IgZXhhbXBsZSkgdG8gaGF2ZSB0aGVpciBzY29wZSBhcyB3ZWxs
Lg0KDQpQYXVsDQo=

--_000_787AE7BB302AE849A7480A190F8B933008D5D52DOPEXCLILMA3corp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_787AE7BB302AE849A7480A190F8B933008D5D52DOPEXCLILMA3corp_--


From nobody Thu Apr 21 00:11:35 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6987E12D9B4; Thu, 21 Apr 2016 00:11:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.915
X-Spam-Level: 
X-Spam-Status: No, score=-2.915 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gbZsFtPyAtHz; Thu, 21 Apr 2016 00:11:29 -0700 (PDT)
Received: from relais-inet.orange.com (relais-nor35.orange.com [80.12.70.35]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6CDD212D9D7; Thu, 21 Apr 2016 00:11:29 -0700 (PDT)
Received: from opfednr07.francetelecom.fr (unknown [xx.xx.xx.71]) by opfednr25.francetelecom.fr (ESMTP service) with ESMTP id 3D5BB1804BB; Thu, 21 Apr 2016 09:11:28 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.27]) by opfednr07.francetelecom.fr (ESMTP service) with ESMTP id 0B6861C0067; Thu, 21 Apr 2016 09:11:28 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7C.corporate.adroot.infra.ftgroup ([fe80::8007:17b:c3b4:d68b%19]) with mapi id 14.03.0279.002; Thu, 21 Apr 2016 09:11:27 +0200
From: <mohamed.boucadair@orange.com>
To: Stewart Bryant <stewart.bryant@gmail.com>, Azhar Sayeed <asayeed@redhat.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
Thread-Index: AQHRmx67PG9+wCOo5UWLeYjmbm2Pnp+T7HaQ
Date: Thu, 21 Apr 2016 07:11:26 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D5D58E@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <57133AED.4080005@pi.nu> <787AE7BB302AE849A7480A190F8B933008D5C41E@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D72A4B70-0D86-41A3-8D6B-BBEE12C9AC73@redhat.com> <787AE7BB302AE849A7480A190F8B933008D5CBB0@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <77E3E0A5-AA19-4E40-886E-A1739B1BEC45@redhat.com> <787AE7BB302AE849A7480A190F8B933008D5D0AE@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <5717A93F.1090800@gmail.com>
In-Reply-To: <5717A93F.1090800@gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/v5U6UObqeo1vqpc9btiLTfyyP7g>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Loa Andersson <loa@pi.nu>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Apr 2016 07:11:33 -0000

Hi Stewart, all,

This is a very good point.

(Please note that the proposal to have 256 bytes is doubling what is curren=
tly in the NSH spec: 4*2^5=3D128 bytes)

I think the base context information won't exceed the 256 bytes, but the ex=
ample you mentioned is an emblematic one.

If there is really a need to define large context elements, I may suggest a=
n idea that is close to the TCP scaling window: use one of the reserved bit=
s to shift the length by a number that the WG will agrees on (scale factor =
bit).

Your point touched on aspects that lead to discuss the following technical =
points:=20

* What is the trade-off between provisioning information directly to SFC-aw=
are nodes (e.g., selection rules) vs. convey them in-band?=20
* What is the trade-off between provisioning information directly together =
with an ID to SFC-aware nodes (e.g., selection rules) + convey an ID in-ban=
d?
* What is the trade-off between computing and installing a path (e.g., usin=
g PCEP) + convey an ID using NSH?
* How context information can be communicated in-band without EXACERBATING =
fragmentation, and therefore ensure a COMPACT header?
* What is the maximum RECOMMENDED size of a context information that can be=
 supplied while processing it does not ALTER (by a %, drastically) the perf=
ormance of intermediate SFC-aware nodes, does not degrade the overall one-w=
ay transfer delay when crossing an SFC-enabled domain, does not exhaust SFF=
/SF resources, etc.?=20
* Shouldn't the specification include some sort of RECOMMENDATIONS for spec=
ifying a context information vs. associate a meaning with a reserved flag (=
see an example below for including a source router)?

=3D=3D=3D=3D=3D=3D=3DExample to illustrate the usage of an NSH flag:
=3D=3D=3D=3D=3D=3D=3DInclude an RSP

3.1.  RSP

   If the E-flag is set, a "Explicit Source Routed SFP" field MUST be prese=
nt in
   the NSH Header.  This field MUST be positioned right after
   the "Service Index" field. =20

        0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      //                 (Optional) Locators[1..n] (Variable)        //
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                                 Figure xxx

   The optional "Source Routed SFP" field is structured as a vector of
   SFF/SF locators (whereas a SFF/SF locator could be an IP address, a MAC
   address or a FQDN, for example).

   A SFP Source Route is said to be "strict" when the exact set of all
   the SFF/SF instances that need to be invoked along the SFP is explicitly
   and exhaustively mentioned in the field.  Each locator in the list is
   encoded as follows:

      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      | Locator Len |           Locator (Variable)                   //
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                                 Figure xx

   A SFP Source Route is said to be "loose" when only a subset of the SF/SF=
F
   instances, that need to be invoked in the context of a given service
   function chain, is mentioned in the field.  The other SFFs/SFs that need
   to be invoked will be set to "ANY" in the field, meaning that SFF are
   free to forward the packet towards the next SF instance that needs to
   be invoked as per the SFC instructions and according to SFC next hop
   resolution procedure or a result of load-balancing scheme.  "ANY"
   corresponds to "Locator Len" set to "0" and no "Locator" field.

   A locator in the list set to 'ANY' is an indication that the
   selection of the exact SF instance to invoke is left to the SFF or to
   some kind of SF load-balancing mechanism.

   The Source Routed SFP field of the NSH header MUST NOT include a list of
   locators that are all set to "ANY".
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D
=20
Thank you.

Cheers,
Med

> -----Message d'origine-----
> De=A0: Stewart Bryant [mailto:stewart.bryant@gmail.com]
> Envoy=E9=A0: mercredi 20 avril 2016 18:07
> =C0=A0: BOUCADAIR Mohamed IMT/OLN; Azhar Sayeed
> Cc=A0: draft-ietf-sfc-nsh@ietf.org; sfc@ietf.org; Loa Andersson
> Objet=A0: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Question=
s
> on TLVs in draft-ietf-sfc-nsh
>=20
>=20
> In designing this, it is not matter so much what we can think of today,
> but whether we have made adequate provision for what others might
> reasonably wish to do at some point in the near future.
>=20
> So, the question becomes, might you need to use more that 256 bytes in
> describing why you sent a packet somewhere, and I suspect that you
> might, for example if you needed to provide the  rule set for the
> selection of the packet.
>=20
> Stewart
>=20
>=20
> On 20/04/2016 16:17, mohamed.boucadair@orange.com wrote:
> > Re-,
> >
> > Ok, thank you.
> >
> > 256 bytes is by far sufficient for all the metadata types I'm aware of.
> >
> > Cheers,
> > Med
> >
> >> -----Message d'origine-----
> >> De : Azhar Sayeed [mailto:asayeed@redhat.com]
> >> Envoy=E9 : mercredi 20 avril 2016 16:26
> >> =C0 : BOUCADAIR Mohamed IMT/OLN
> >> Cc : Loa Andersson; sfc@ietf.org; draft-ietf-sfc-nsh@ietf.org
> >> Objet : Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt -
> Questions
> >> on TLVs in draft-ietf-sfc-nsh
> >>
> >> You have a point - perhaps shortening the length and type will
> >> help..however, here is my rationale for longer length field
> >>
> >> 8 bits I feel is too little for metadata - just about twice as many in
> a
> >> tweet :-)
> >>
> >> Azhar
> >>
> >>> On Apr 20, 2016, at 1:44 AM, mohamed.boucadair@orange.com wrote:
> >>>
> >>> Hi Azhar,
> >>>
> >>> Thank you for the feedback and the support for the originator ID.
> >>>
> >>> The re-arranging of the fields you propose is indeed another option,
> but
> >> it does not allow a compact header, e.g., 16 bits for the length is to=
o
> >> much for the cases I'm aware of + it is not optimal if no originator I=
D
> is
> >> to be supplied for instance.
> >>> Having the class, type, flags, and length in the first 32 bits would
> >> lead to a compact header.
> >>> Cheers,
> >>> Med
> >>>
> >>>> -----Message d'origine-----
> >>>> De : Azhar Sayeed [mailto:asayeed@redhat.com]
> >>>> Envoy=E9 : mardi 19 avril 2016 22:17
> >>>> =C0 : BOUCADAIR Mohamed IMT/OLN
> >>>> Cc : Loa Andersson; sfc@ietf.org; draft-ietf-sfc-nsh@ietf.org
> >>>> Objet : Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt -
> >> Questions
> >>>> on TLVs in draft-ietf-sfc-nsh
> >>>>
> >>>> Hi Med,
> >>>>
> >>>> You can still encode this as a TLV by re-arranging the fields with
> Type
> >>>> first, length and then value - In the value portions you can a
> >> mandatory
> >>>> bytes that encode the flags, class, originator id and then variable
> >>>> metadata
> >>>>
> >>>> So here is an option.
> >>>>
> >>>> Type - 16 bits
> >>>> Length - 16 bits
> >>>> Value:
> >>>> Flags - 4 bits
> >>>> Class - 4 bits
> >>>> Originator Length - 8 bits
> >>>> Originator ID - Variable
> >>>> Data Variable
> >>>>
> >>>> +1 to the idea of originator id.
> >>>>
> >>>>
> >>>> Azhar
> >>>>
> >>>>
> >>>>
> >>>>> On Apr 19, 2016, at 3:48 AM, mohamed.boucadair@orange.com wrote:
> >>>>>
> >>>>> Dear Loa, all,
> >>>>>
> >>>>> Thank you for raising this point about the encoding of the optional
> >>>> context information.
> >>>>> I agree that the use of TLV term is confusing. What about using
> >> another
> >>>> term, e.g., "Information Elements", "Options", or "Context Element"?
> >>>>> As an input to this discussion, below a proposal for an encoding
> that
> >>>> achieves the following goals:
> >>>>> * Shorten the encoding of the Class field.
> >>>>> * Allow for more type code points.
> >>>>> * Avoids requiring padding for the sake of compact headers.
> >>>>> * Allows to include the ID of the entity that injected the context
> >>>> information (OPTIONAL).
> >>>>> * Inherit rich registries such as IPFIX.
> >>>>>
> >>>>> NOTE: This proposal does not include a dedicated flag bit to
> indicate
> >>>> whether the context element is mandatory-to-process or optional-to-
> >> process
> >>>> because further discussion/text specification is required: e.g.,
> >>>>> * Wouldn't be sufficient to supply that information using the
> control
> >>>> plane?
> >>>>> * If that information is supplied in both the context element and
> >>>> configured to a SFC-aware function, how conflicts are managed?
> >>>>> * What is the behavior for processing mandatory-to-process elements
> >>>> (particularly, when it is not supported)?
> >>>>> * Is it required to recommend an ordering of supplying the
> mandatory-
> >> to-
> >>>> process or optional-to-process elements?
> >>>>> * Is it required to preserve the same ordering when forwarding a
> >> packet?
> >>>>> =3D=3DPROPOSAL=3D=3D=3D=3D
> >>>>>
> >>>>> Base version
> >>>>>        0                   1                   2                   =
3
> >>>>>       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
> 1
> >>>>>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
> +-+
> >>>>>      |Class  |            Type               | FLAGS |     Length
> |
> >>>>>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
> +-+
> >>>>>      //                           Data (Variable)
> //
> >>>>>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
> +-+
> >>>>> Version with Originator ID:
> >>>>>        0                   1                   2                   =
3
> >>>>>       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
> 1
> >>>>>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
> +-+
> >>>>>      |Class  |            Type               | Flags |     Length
> |
> >>>>>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
> +-+
> >>>>>      //Originator Len|     Originator ID (Variable)(Optional)
> //
> >>>>>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
> +-+
> >>>>>      //                           Data (Variable)
> //
> >>>>>      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
> +-+
> >>>>>
> >>>>>      The description of the fields is as follows:
> >>>>>
> >>>>>      Class:  In order to foster service innovation, this field
> >>>>>         allows to inherit from existing code point registries that
> are
> >>>>>         likely to be useful in a SFC context.  The following values
> are
> >>>>>         reserved by this specification:
> >>>>>         0:  See IANA section.
> >>>>>         1:  IPFIX [IPFIX].
> >>>>>
> >>>>>      Type:  Indicates the code point of the context element.  If
> >>>>>         "Class" field is non-null, the interpretation of this field
> >> MUST
> >>>>>         conform to the one defined for that specific class registry=
.
> >> See
> >>>> IANA section.
> >>>>>      Flags:  The Flags field comprises a set of 4 flags:
> >>>>>
> >>>>>             +-+-+-+-+
> >>>>>             |S|r|r|r|
> >>>>>             +-+-+-+-+
> >>>>>
> >>>>>             where "rrr" are reserved bits for future assignment as
> >>>>>             additional flag bits. r bits MUST each be sent as zero
> and
> >>>> MUST be
> >>>>>             ignored on receipt.
> >>>>>
> >>>>>             When set, the S-flag indicates that an Originator ID
> field
> >>>> is
> >>>>>             present in the context element.  This flag is set by
> >> default
> >>>> to 0, meaning
> >>>>>             there is no Originator ID field present in the element.
> >>>>>
> >>>>>      Originator ID (Optional):  Conveys the identifier of the entit=
y
> >>>> that injected
> >>>>>         this context element in the NSH header (e.g., a service
> >>>>>         function identifier, a classifier, etc.).  This document
> does
> >>>>>         not make any assumption about the structure of the
> information
> >>>>>         carried in this field because this is deployment-specific.
> >>>>>         This information is used by SFC-aware elements to enforce
> >>>>>         policies such as: process a context information if and only
> if
> >>>>>         it was supplied by a given entity.  This information can be
> >>>>>         used as a safeguard against misbehaving nodes that inject
> >>>>>         illegitimate data in the NSH header.
> >>>>>
> >>>>>         This field MUST be included only if S-bit is set.
> >>>>>
> >>>>>      Length:  Indicates, in octets, the length of the data carried
> in
> >>>>>         the context element.
> >>>>>
> >>>>>      Data (Variable):  The semantics of this field depend on the
> >>>>>         "Class" and "Type" fields.
> >>>>> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
> >>>>>
> >>>>> Opinions?
> >>>>>
> >>>>> Cheers,
> >>>>> Med
> >>>>>
> >>>>>> -----Message d'origine-----
> >>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Loa Andersson
> >>>>>> Envoy=E9 : dimanche 17 avril 2016 09:28
> >>>>>> =C0 : sfc@ietf.org; draft-ietf-sfc-nsh@ietf.org
> >>>>>> Objet : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt -
> Questions
> >> on
> >>>>>> TLVs in draft-ietf-sfc-nsh
> >>>>>>
> >>>>>> Working Group, authors,
> >>>>>>
> >>>>>> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to
> >> read
> >>>>>> it before now) and have a question on how the TLV concept is
> >> understood
> >>>>>> in the draft.
> >>>>>>
> >>>>>> For example in LDP TLV were defined as Type, Length Value, e.g.
> (from
> >>>>>> RFC 5036 section 3.3):
> >>>>>>
> >>>>>>    LDP uses a Type-Length-Value (TLV) encoding scheme to encode
> much
> >> of
> >>>>>>    the information carried in LDP messages.
> >>>>>>
> >>>>>>    An LDP TLV is encoded as a 2 octet field that uses 14 bits to
> >>>> specify
> >>>>>>    a Type and 2 bits to specify behavior when an LSR doesn't
> recognize
> >>>>>>    the Type, followed by a 2 octet Length field, followed by a
> >> variable
> >>>>>>    length Value field.
> >>>>>>
> >>>>>>
> >>>>>>     0                   1                   2                   3
> >>>>>>     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 =
1
> >>>>>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-
> +
> >>>>>>    |U|F|        Type               |            Length
> |
> >>>>>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-
> +
> >>>>>>    |
> |
> >>>>>>    |                             Value
> |
> >>>>>>    ~
> ~
> >>>>>>    |
> |
> >>>>>>    |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-
> +
> >>>>>>    |                               |
> >>>>>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >>>>>>
> >>>>>> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more
> >> complicated
> >>>>>> and I'm struggling a bit to understand if the "name" TLV should be
> >>>> used.
> >>>>>>  From draft-ietf-sfc-nsh-04
> >>>>>>
> >>>>>>         0                   1                   2
> 3
> >>>>>>         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 =
9
> 0
> >> 1
> >>>>>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-
> +-
> >> +-
> >>>> +
> >>>>>>        |          TLV Class            |C|    Type     |R|R|R|
> Len
> >>>> |
> >>>>>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-
> +-
> >> +-
> >>>> +
> >>>>>>        |                      Variable Metadata
> >>>> |
> >>>>>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-
> +-
> >> +-
> >>>> +
> >>>>>>
> >>>>>>
> >>>>>>                     Figure 6: Variable Context Headers
> >>>>>>
> >>>>>> The draft is not entirely clear in this respect, but I think this
> is
> >>>>>> what you call a TLV.
> >>>>>>
> >>>>>> Should I understand this way?
> >>>>>>
> >>>>>> Type =3D TLV Class + C + Type (24 bits)
> >>>>>> Length =3D len (5 bits)
> >>>>>> Value =3D Variable Metadata
> >>>>>>
> >>>>>> A convention we used in MPLS when we have variable length fields i=
s
> >>>>>> to use a ~ instead of the |, like this:.
> >>>>>>
> >>>>>>         0                   1                   2
> 3
> >>>>>>         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 =
9
> 0
> >> 1
> >>>>>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-
> +-
> >> +-
> >>>> +
> >>>>>>        |          TLV Class            |C|    Type     |R|R|R|
> Len
> >>>> |
> >>>>>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-
> +-
> >> +-
> >>>> +
> >>>>>>        ~                      Variable Metadata
> >>>> ~
> >>>>>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-
> +-
> >> +-
> >>>> +
> >>>>>> I suggest that this is a good practice that could be adopted here
> >> also.
> >>>>>> Two more questions:
> >>>>>>
> >>>>>> If the metadata does not align exactly with the 32 bit/4 byte
> >>>> structure,
> >>>>>> what is the rules for padding?
> >>>>>>
> >>>>>> A last, but a bit different question, do you need indicators like
> the
> >> U
> >>>>>> and F flags in an to indicate what should happen if the node does
> not
> >>>>>> recognize the (TLV Class, C, Type)-field?
> >>>>>>
> >>>>>> /Loa
> >>>>>>
> >>>>>>
> >>>>>> PS
> >>>>>>
> >>>>>> I will also have a few more editorial comments that will be sent t=
o
> >>>>>> the authors within a day or two.
> >>>>>>
> >>>>>>
> >>>>>> --
> >>>>>>
> >>>>>>
> >>>>>> Loa Andersson                        email: loa@mail01.huawei.com
> >>>>>> Senior MPLS Expert                          loa@pi.nu
> >>>>>> Huawei Technologies (consultant)     phone: +46 739 81 21 64
> >>>>>>
> >>>>>> _______________________________________________
> >>>>>> sfc mailing list
> >>>>>> sfc@ietf.org
> >>>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>> _______________________________________________
> >>>>> sfc mailing list
> >>>>> sfc@ietf.org
> >>>>> https://www.ietf.org/mailman/listinfo/sfc
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Apr 21 00:34:06 2016
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D01E12B05E; Thu, 21 Apr 2016 00:34:05 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.19.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20160421073405.19602.53635.idtracker@ietfa.amsl.com>
Date: Thu, 21 Apr 2016 00:34:05 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/AZqRCcAbEHcumOX3nj38COu2NNY>
Cc: sfc@ietf.org
Subject: [sfc] I-D Action: draft-ietf-sfc-control-plane-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Apr 2016 07:34:05 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Service Function Chaining of the IETF.

        Title           : Service Function Chaining (SFC) Control Plane Components & Requirements
        Author          : Mohamed Boucadair
	Filename        : draft-ietf-sfc-control-plane-04.txt
	Pages           : 27
	Date            : 2016-04-21

Abstract:
   This document describes requirements for conveying information
   between Service Function Chaining (SFC) control elements and SFC
   functional elements.  Also, this document identifies a set of control
   interfaces to interact with SFC-aware elements to establish, maintain
   or recover service function chains.  This document does not specify
   protocols nor extensions to existing protocols.

   This document exclusively focuses on SFC deployments that are under
   the responsibility of a single administrative entity.  Inter-domain
   considerations are out of scope.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sfc-control-plane/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-sfc-control-plane-04

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-control-plane-04


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu Apr 21 09:09:16 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E96812D76D for <sfc@ietfa.amsl.com>; Thu, 21 Apr 2016 09:09:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level: 
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1TnB6TdSwM9Q for <sfc@ietfa.amsl.com>; Thu, 21 Apr 2016 09:09:13 -0700 (PDT)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) by ietfa.amsl.com (Postfix) with ESMTP id CFB2B12DDEA for <sfc@ietf.org>; Thu, 21 Apr 2016 09:09:07 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by wtl-exchp-1.sandvine.com ([::1]) with mapi id 14.03.0195.001; Thu, 21 Apr 2016 12:09:06 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: Loa Andersson <loa@pi.nu>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] TLV class of variable-length metadata should have a restricted range
Thread-Index: AdGWYcf4eX5Az/rjTQOEcq50WzDr6QFRgpMAAA9UC8A=
Date: Thu, 21 Apr 2016 16:09:05 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F32DEB@wtl-exchp-2.sandvine.com>
References: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com> <571856FE.5010901@pi.nu>
In-Reply-To: <571856FE.5010901@pi.nu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/yjCcexfsRTtaQTx8oGO3i9HTYTI>
Subject: Re: [sfc] TLV class of variable-length metadata should have a restricted range
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Apr 2016 16:09:15 -0000

Please also see Med's BCP-conforming suggestions:
https://mailarchive.ietf.org/arch/msg/sfc/1qWGtW1QVxXdG-OHy2T-bhh-C38


As for my "reserved" block, I realize that the "assigned by Standards Actio=
n"=20
would suit my intended purpose of being reserved.



-----Original Message-----
From: Loa Andersson [mailto:loa@pi.nu]=20
Sent: Thursday, April 21, 2016 12:29 AM
To: Dave Dolson; sfc@ietf.org
Subject: Re: [sfc] TLV class of variable-length metadata should have a rest=
ricted range

Dave,

A few comments and questions, though in general I agree with your approach.

On 2016-04-14 23:24, Dave Dolson wrote:
> Regarding the TLV Class of variable-length metadata,
> https://tools.ietf.org/html/draft-ietf-sfc-nsh-04#section-3.5.1
>
> It is common for such fields to reserve ranges, allowing for future
> growth into unanticipated uses.
>
> E.g., off the top of my head,
>
> classes 0 to 0x1ff --> types allocated by IETF
>
> classes 0x200 to 0x7fff --> allocated by IANA

What is the difference between "alloacated by IETF"
and "allocated by IANA"? I think we should say.

classes 0 to 0x1ff --> types allocated by IETF consensus
classes 0x200 to 0x7fff --> RFC needed

>
> Classes 0x8000 to 0xbfff --> reserved, do not use

I don't understand why we need the reerved block of 16k classes
reserved?
>
> classes 0xc000 to 0xefff --> locally administered

what is this??
>
> classes 0xf000 to 0xffff --> experimental

this block is way to big , 4 or 8 values would be enough, e.g.

classes 0xfff6 to 0xfffe --> experimental

I'd also do

class 0xffff reserved - this is set aside for future use and will
require a standard track RFC to change.

/Loa


>
> Or similar? I'm not sure what the best practice for this is.
>
> Generally, I'd want to try something experimentally before requesting
> IANA allocation for it (experimental),
>
> or maybe types are too specific to warrant IANA allocation (locally
> administered).
>
> Can something like this be added to draft-ietf-sfc-nsh ?
>
> David Dolson
>
> Senior Software Architect, Sandvine Inc.
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Thu Apr 21 11:30:57 2016
Return-Path: <prvs=9127ea76a=sunilvk@f5.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9BECF12E39A for <sfc@ietfa.amsl.com>; Thu, 21 Apr 2016 11:30:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.017
X-Spam-Level: 
X-Spam-Status: No, score=-8.017 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=f5.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id appPdemHxBkE for <sfc@ietfa.amsl.com>; Thu, 21 Apr 2016 11:30:53 -0700 (PDT)
Received: from mail.f5.com (mail.f5.com [208.85.209.139]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3812D12DE9E for <sfc@ietf.org>; Thu, 21 Apr 2016 11:30:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=f5.com; i=@f5.com; q=dns/txt; s=seattle; t=1461263450; x=1492799450; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=CKldN9JXLqDrnWaALYY6tjARdOjTakfpX+JF4lAV+hk=; b=Y3/Dax55W/X1z3L65sUP5prtwEWTk08M7dvZORlq4dKx0OPpmskidNps DqpgGTOIFScOkoFYZbIT53JSFbiQZzPU81ZXt/UXxVwSE19kfUKWWIQu+ CI+NRFrLL+OplaRlHG3im+fiFgB8tM7dzf905M5h15XcPqY657752Rjyd o=;
X-IronPort-AV: E=Sophos;i="5.24,513,1454976000"; d="scan'208";a="214200252"
Received: from oracle-apps.f5net.com (HELO exchmail.f5net.com) ([192.168.10.235]) by mail.f5.com with ESMTP; 21 Apr 2016 18:30:49 +0000
Received: from SEAEXCHMBX06.olympus.F5Net.com (192.168.15.49) by SEAEXCHMBX04.olympus.F5Net.com (192.168.15.226) with Microsoft SMTP Server (TLS) id 15.0.1156.6; Thu, 21 Apr 2016 11:30:34 -0700
Received: from SEAEXCHMBX06.olympus.F5Net.com ([fe80::b921:c8e9:b9b2:3e8a]) by SEAEXCHMBX06.olympus.F5Net.com ([fe80::b921:c8e9:b9b2:3e8a%12]) with mapi id 15.00.1156.000; Thu, 21 Apr 2016 11:30:34 -0700
From: Sunil Vallamkonda <sunilvk@f5.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] A request for Metadata allocation schemes
Thread-Index: AdGQDZcInpioWvGORw+Jt9cutzS71wA06k3BABaJqpAABVdClwAR/VYAAAgzRwABZ3a4AAAIWBNgASB/GFA=
Date: Thu, 21 Apr 2016 18:30:34 +0000
Message-ID: <f64d98220bfa471b900e6557ff27b506@SEAEXCHMBX06.olympus.F5Net.com>
References: <E8355113905631478EFF04F5AA706E9830F0AC6D@wtl-exchp-2.sandvine.com> <1460042865963.25707@F5.com>, <E8355113905631478EFF04F5AA706E9830F11EA7@wtl-exchp-2.sandvine.com>, <1460091126273.230@F5.com> <1D15709113D6B34BAE5E128F392059CA01268568BE@blr-exch-1.sandvine.com>, <TU4PR84MB01596CB74B2CC2D7395C545BFE910@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <1460738575691.54747@F5.com> <E8355113905631478EFF04F5AA706E9830F2432E@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F2432E@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.168.15.239]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/IjEPlNeCJ3X5ZaXVrm6_vNnGzMg>
Subject: Re: [sfc] A request for Metadata allocation schemes
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Apr 2016 18:30:55 -0000
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From nobody Thu Apr 21 11:45:03 2016
Return-Path: <prvs=9127ea76a=sunilvk@f5.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3914412DD77 for <sfc@ietfa.amsl.com>; Thu, 21 Apr 2016 11:45:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.017
X-Spam-Level: 
X-Spam-Status: No, score=-8.017 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=f5.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LcFmE4IswrvI for <sfc@ietfa.amsl.com>; Thu, 21 Apr 2016 11:45:00 -0700 (PDT)
Received: from mail.f5.com (mail.f5.com [208.85.209.139]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 16E2012DC64 for <sfc@ietf.org>; Thu, 21 Apr 2016 11:45:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=f5.com; i=@f5.com; q=dns/txt; s=seattle; t=1461264301; x=1492800301; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=yw209tQV22wGG0JWs4ds4WHLyV9dCwib8/esN9sC02o=; b=Bl8RbnoQX/2X9RNAUi66IqvYwJAD+GJ58TIIQMD8C9MJBg6Rpo2eKZJR qU4iQCaHF9NqkW4zlQT4AwquUTAC0MONkP1wmdynbIlXVGnyRdjV2U7fg b0k2xqNNRlY30/RFx8LyxqUxtYQf5ahzAjJoVePLDU2wA72EXraiGCh2n s=;
X-IronPort-AV: E=Sophos;i="5.24,513,1454976000"; d="scan'208";a="215017457"
Received: from oracle-apps.f5net.com (HELO exchmail.f5net.com) ([192.168.10.235]) by mail.f5.com with ESMTP/TLS/AES256-SHA; 21 Apr 2016 18:45:01 +0000
Received: from SEAEXCHMBX06.olympus.F5Net.com (192.168.15.49) by SEAEXCHMBX08.olympus.F5Net.com (192.168.15.227) with Microsoft SMTP Server (TLS) id 15.0.1156.6; Thu, 21 Apr 2016 11:44:59 -0700
Received: from SEAEXCHMBX06.olympus.F5Net.com ([fe80::b921:c8e9:b9b2:3e8a]) by SEAEXCHMBX06.olympus.F5Net.com ([fe80::b921:c8e9:b9b2:3e8a%12]) with mapi id 15.00.1156.000; Thu, 21 Apr 2016 11:44:59 -0700
From: Sunil Vallamkonda <sunilvk@f5.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>, Dave Dolson <ddolson@sandvine.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfiCTJ8b8qeo0249+QoeHMadZ+HQqWAgAADV4CAAFnsgIAAy/AAgAGYJgCAADqXAIAKpR0w
Date: Thu, 21 Apr 2016 18:44:59 +0000
Message-ID: <0bc0c81e19f24f16a4bacb0e896d291f@SEAEXCHMBX06.olympus.F5Net.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <E8355113905631478EFF04F5AA706E9830F1BBAC@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D77F0B6@MBX021-W3-CA-2.exch021.domain.local> <14F8542B-9EE1-40DF-8DA2-E6E5048A16A3@cisco.com> <E8355113905631478EFF04F5AA706E9830F1D4A7@wtl-exchp-2.sandvine.com> <E8355113905631478EFF04F5AA706E9830F20863@wtl-exchp-2.sandvine.com> <0B2F4CF8-B94B-461F-92B2-ACC214D3E907@cisco.com>
In-Reply-To: <0B2F4CF8-B94B-461F-92B2-ACC214D3E907@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.168.15.239]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/knYOn81rvrw3DFjbEOMFNXNLNE8>
Cc: "uri.elzur@intel.com" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Apr 2016 18:45:02 -0000

Hi Paul,

Does MDType 1 need to be a MUST ?
If so, can Context header be customizable per implementation ?
Futher re: Sec.3.4, is there way for "Context Headers to carry no metadata =
MUST be set to zero", is it possible have a bit in header to indicate to ig=
nore Context header for recipient to skip reading them ?=20

Thanks,
Sunil.

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Paul Quinn (paulq)
Sent: Thursday, April 14, 2016 10:04 AM
To: Dave Dolson <ddolson@sandvine.com>
Cc: uri.elzur@intel.com; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Hi Dave,

Sorry, I was traveling yesterday.  In principal I don't have any issues wit=
h the text since it doesn't impose requirements but rather clarifies a poss=
ible behavior.

I do wonder about how common this will be: a control of sorts is needed for=
 semantic meaning -- in type 1 or type 2 cases.

Paul

> On Apr 14, 2016, at 9:33 AM, Dave Dolson <ddolson@sandvine.com> wrote:
>=20
> Paul and Uri, can you please comment as to whether you agree or disagree =
with this wording?
>=20
> I feel that it allows the actual content to be opaque while giving=20
> guidance for service functions that create or replay packets in the chain=
.
>=20
> From my point of view, this is how such devices will work anyhow.
>=20
> -Dave
>=20
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
> Sent: Wednesday, April 13, 2016 9:13 AM
> To: Paul Quinn (paulq); Ron Parker
> Cc: Thomas Narten; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Paul,
> Are you unhappy with the metadata constraints I suggested below?
> Perhaps qualified by "In the absence of out-of-band configuration..." ?
>=20
> I believe that the schemes proposed in these drafts satisfy the constrain=
ts:
> - draft-sfc-nsh-dc-allocation-4,
> - draft-napper-sfc-nsh-broadband-allocation-00
>=20
> (I thought there were more allocation schemes, but I guess they=20
> expired.)
>=20
> I'll update it here:
>=20
>   In the absence of out-of-band configuration to indicate otherwise,
>   metadata used in NSH headers must meet the condition that
>   a transport-layer-stateful Service Function can save away
>   metadata values that it has witnessed.  An injected packet can
>   therefore be assigned a clone of metadata taken from an earlier
>   packet going in the same direction.  For example, a Service Function
>   can send a TCP packet using metadata cloned from another TCP packet
>   of the same connection and direction.
>=20
>   Note that the Service Function need not know the meaning of the
>   metadata; it just needs to know it is safe to clone in this manner.
>=20
>=20
> -Dave
>=20
>=20

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Fri Apr 22 07:18:20 2016
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6363C12DB55 for <sfc@ietfa.amsl.com>; Fri, 22 Apr 2016 07:18:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qgM3i6zTMl65 for <sfc@ietfa.amsl.com>; Fri, 22 Apr 2016 07:18:16 -0700 (PDT)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 97D6612DB09 for <sfc@ietf.org>; Fri, 22 Apr 2016 07:18:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=13668; q=dns/txt; s=iport; t=1461334696; x=1462544296; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=u6//1YQQ992DdND4cIyAfnLBkO1MVqWLb+nu+0nqHsY=; b=jwQcT/mjx2kustkpMi1UO8seslrKcfKjvtjeRgOVo/bXtK3zK/BBNIqc dqnPn9DkhBtQ4z/1qSKzjIOzks6ziSEUid7GhxewkP7nGew93Au0KExVY suuaZ+fXvu+RK84KPQDEA4PPbLuqZ22YqH8cqTLRt4/EtK3CGhMgxcWKJ A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0A9AgCAMRpX/40NJK1egmxMgVAGtQ2Ec?= =?us-ascii?q?wENgXOGDgIcgQo4FAEBAQEBAQFlHAuEQgEBBCNWEAIBCD8DAgICMBQRAgQOBR+?= =?us-ascii?q?IC64TkS0BAQEBAQEBAQEBAQEBAQEBAQEBAQEVhiGBdQiCToR1gkorgisFmA8Bj?= =?us-ascii?q?hOPEI8uAR4BAUKDa2yHeH8BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,517,1454976000";  d="scan'208,217";a="263300570"
Received: from alln-core-8.cisco.com ([173.36.13.141]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 22 Apr 2016 14:18:15 +0000
Received: from XCH-ALN-009.cisco.com (xch-aln-009.cisco.com [173.36.7.19]) by alln-core-8.cisco.com (8.14.5/8.14.5) with ESMTP id u3MEIFag007859 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 22 Apr 2016 14:18:15 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-009.cisco.com (173.36.7.19) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 22 Apr 2016 09:18:15 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Fri, 22 Apr 2016 09:18:15 -0500
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
Thread-Topic: [sfc] TLV class of variable-length metadata should have a restricted range
Thread-Index: AQHRmWezvp42UAHAT0eEsyO9QBxWVJ+QLNUAgAEBmYCAAnM8AIAAPdwAgABjwQCAAiFYAA==
Date: Fri, 22 Apr 2016 14:18:15 +0000
Message-ID: <825ECEA4-2762-44C1-84E7-86F332DD8550@cisco.com>
References: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008D5BB09@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <E8355113905631478EFF04F5AA706E9830F2A80B@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008D5C3B4@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <E8355113905631478EFF04F5AA706E9830F310EE@wtl-exchp-2.sandvine.com> <6E92E595-B0DD-4E35-96B0-795D75BE4C0B@cisco.com> <787AE7BB302AE849A7480A190F8B933008D5D52D@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D5D52D@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.19.17.236]
Content-Type: multipart/alternative; boundary="_000_825ECEA4276244C184E786F332DD8550ciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/oHgFI2Nr-EvQAAj55qHdX3_WWSk>
Cc: "sfc@ietf.org" <sfc@ietf.org>, Dave Dolson <ddolson@sandvine.com>
Subject: Re: [sfc] TLV class of variable-length metadata should have a restricted range
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Apr 2016 14:18:18 -0000

--_000_825ECEA4276244C184E786F332DD8550ciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_825ECEA4276244C184E786F332DD8550ciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <46D94A2E6CF7144E8EC89B396471240A@emea.cisco.com>
Content-Transfer-Encoding: base64
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--_000_825ECEA4276244C184E786F332DD8550ciscocom_--


From nobody Fri Apr 22 11:59:56 2016
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C62A512D554; Fri, 22 Apr 2016 11:59:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SvxO-cnwp847; Fri, 22 Apr 2016 11:59:53 -0700 (PDT)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6089D12D552; Fri, 22 Apr 2016 11:59:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4457; q=dns/txt; s=iport; t=1461351593; x=1462561193; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=2Lm6Rxl1iOmkdEyXXZdiXIW9FND/8E8h3SjdnQEgoe0=; b=RHSXz0BDpwYv0jCRj/RGn9qDkVx+Fad4vlSiTUI5khtAnLtK5v6AZLIC Q0h8UTIUXvGZgIiSQW4scYqxfJPOYr77KBXB/sK3e7bdaWflo/1n63wqc EepGcsDYdBZMK2q2k5JcdmWCc0cDLJPNxfBcSJMPGf7hC8kD+dZjP5Yfm A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AJAgCZcxpX/4oNJK1egziBUAa6AQENg?= =?us-ascii?q?XOCOoNUAoEsOBQBAQEBAQEBZSeEQQEBAQMBHR0tEgULAgEIGB4QMiUCBA4FiCI?= =?us-ascii?q?Iv38BAQEBAQEBAQEBAQEBAQEBAQEBAQEVhiGBdYJWhD2DLYIrBY1TijwBjhOBZ?= =?us-ascii?q?od2hTSPLgEeAQFCgjaBNWyHfH8BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,518,1454976000"; d="scan'208";a="100386648"
Received: from alln-core-5.cisco.com ([173.36.13.138]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 22 Apr 2016 18:59:52 +0000
Received: from XCH-RCD-006.cisco.com (xch-rcd-006.cisco.com [173.37.102.16]) by alln-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id u3MIxqDW031801 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 22 Apr 2016 18:59:52 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-006.cisco.com (173.37.102.16) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 22 Apr 2016 13:59:51 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Fri, 22 Apr 2016 13:59:51 -0500
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: Loa Andersson <loa@pi.nu>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
Thread-Index: AQHRmHqq/yKia8M5e0m4Vl0c3PI8M5+WtScA
Date: Fri, 22 Apr 2016 18:59:51 +0000
Message-ID: <A6584A1B-9FF0-456A-BB9C-150619EA4D2E@cisco.com>
References: <57133AED.4080005@pi.nu>
In-Reply-To: <57133AED.4080005@pi.nu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.19.17.236]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <AC1F85C13C31DD47A20FB0790FE11E2E@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/yTw6-MnMtmtpzz5ss-EihAYrWaQ>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Apr 2016 18:59:55 -0000

Hello Loa,

Loa,


You raise an interesting point wrt naming.  In fact, this isn't a true TLV,=
 rather, a structure for variable length metadata.  Perhaps, it would be cl=
earer to simply label it as such.  The structure can remain the same but it=
 would help readers understand that there are "extra" non T, L or V fields =
present.  Some further comments below.

Thanks
Paul

> On Apr 17, 2016, at 3:27 AM, Loa Andersson <loa@pi.nu> wrote:
>=20
> Working Group, authors,
>=20
> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to read
> it before now) and have a question on how the TLV concept is understood
> in the draft.
>=20
> For example in LDP TLV were defined as Type, Length Value, e.g. (from
> RFC 5036 section 3.3):
>=20
>   LDP uses a Type-Length-Value (TLV) encoding scheme to encode much of
>   the information carried in LDP messages.
>=20
>   An LDP TLV is encoded as a 2 octet field that uses 14 bits to specify
>   a Type and 2 bits to specify behavior when an LSR doesn't recognize
>   the Type, followed by a 2 octet Length field, followed by a variable
>   length Value field.
>=20
>=20
>    0                   1                   2                   3
>    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>   |U|F|        Type               |            Length             |
>   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>   |                                                               |
>   |                             Value                             |
>   ~                                                               ~
>   |                                                               |
>   |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>   |                               |
>   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>=20
> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more complicated
> and I'm struggling a bit to understand if the "name" TLV should be used.
>=20
> From draft-ietf-sfc-nsh-04
>=20
>        0                   1                   2                   3
>        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>       |          TLV Class            |C|    Type     |R|R|R|   Len   |
>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>       |                      Variable Metadata                        |
>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>=20
>=20
>=20
>                    Figure 6: Variable Context Headers
>=20
> The draft is not entirely clear in this respect, but I think this is what=
 you call a TLV.
>=20
> Should I understand this way?
>=20
> Type =3D TLV Class + C + Type (24 bits)

PQ>  In some ways, but as you point out this might be confusing and leads t=
o an implied overload.  In reality, the class "scopes" the type.=20


> Length =3D len (5 bits)
> Value =3D Variable Metadata
>=20
> A convention we used in MPLS when we have variable length fields is
> to use a ~ instead of the |, like this:.
>=20
>        0                   1                   2                   3
>        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>       |          TLV Class            |C|    Type     |R|R|R|   Len   |
>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>       ~                      Variable Metadata                        ~
>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>=20
> I suggest that this is a good practice that could be adopted here also.

PQ>  I'm happy to, assuming everyone else is as well.


>=20
> Two more questions:
>=20
> If the metadata does not align exactly with the 32 bit/4 byte structure,
> what is the rules for padding?

PQ>  We can provide explicit pad with zero guidance.

>=20
> A last, but a bit different question, do you need indicators like the U
> and F flags in an to indicate what should happen if the node does not
> recognize the (TLV Class, C, Type)-field?

PQ>  In general, we've implied that if a node doesn't understand the TLV it=
 simply ignores it.

Thanks again!
Paul=


From nobody Sat Apr 23 02:03:08 2016
Return-Path: <loa@pi.nu>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4917D12D9F3; Sat, 23 Apr 2016 02:03:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level: 
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I5Dhi28sIdwl; Sat, 23 Apr 2016 02:03:05 -0700 (PDT)
Received: from pipi.pi.nu (pipi.pi.nu [83.168.239.141]) (using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7EFB212D718; Sat, 23 Apr 2016 02:03:05 -0700 (PDT)
Received: from [192.168.1.2] (unknown [122.53.41.246]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: loa@pi.nu) by pipi.pi.nu (Postfix) with ESMTPSA id B4AF718013E4; Sat, 23 Apr 2016 11:03:02 +0200 (CEST)
To: "Paul Quinn (paulq)" <paulq@cisco.com>
References: <57133AED.4080005@pi.nu> <A6584A1B-9FF0-456A-BB9C-150619EA4D2E@cisco.com>
From: Loa Andersson <loa@pi.nu>
Message-ID: <571B3A33.6010005@pi.nu>
Date: Sat, 23 Apr 2016 17:02:43 +0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <A6584A1B-9FF0-456A-BB9C-150619EA4D2E@cisco.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/XCypl-n9lbDewdEL6ALWeJz3jds>
Cc: "draft-ietf-sfc-nsh@ietf.org" <draft-ietf-sfc-nsh@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt - Questions on TLVs in draft-ietf-sfc-nsh
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 23 Apr 2016 09:03:07 -0000

Paul,

Thanks for response, I think we are converging. I have 
suggestions/questions below in
- naming
- on dropping packets when the variable length metadata is not
   recognized.
- padding
- and (a new one) on section 14.2.3.

On 2016-04-23 02:59, Paul Quinn (paulq) wrote:
> Hello Loa,
>
> Loa,
>
>
> You raise an interesting point wrt naming.  In fact, this isn't a true TLV, rather, a structure for variable length metadata.  Perhaps, it would be clearer to simply label it as such.  The structure can remain the same but it would help readers understand that there are "extra" non T, L or V fields present.  Some further comments below.
>

OK - I like naming thing "Variable Length Metadata (VLM)" would work
for me, you need to put that into the definition (and maybe terminology)
and replace all occurrences of TLV.

> Thanks
> Paul
>
>> On Apr 17, 2016, at 3:27 AM, Loa Andersson <loa@pi.nu> wrote:
>>
>> Working Group, authors,
>>
>> I'm reading draft-ietf-sfc-nsh-04 (sorry to not have been able to read
>> it before now) and have a question on how the TLV concept is understood
>> in the draft.
>>
>> For example in LDP TLV were defined as Type, Length Value, e.g. (from
>> RFC 5036 section 3.3):
>>
>>    LDP uses a Type-Length-Value (TLV) encoding scheme to encode much of
>>    the information carried in LDP messages.
>>
>>    An LDP TLV is encoded as a 2 octet field that uses 14 bits to specify
>>    a Type and 2 bits to specify behavior when an LSR doesn't recognize
>>    the Type, followed by a 2 octet Length field, followed by a variable
>>    length Value field.
>>
>>
>>     0                   1                   2                   3
>>     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>    |U|F|        Type               |            Length             |
>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>    |                                                               |
>>    |                             Value                             |
>>    ~                                                               ~
>>    |                                                               |
>>    |                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>    |                               |
>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>
>> In draft-ietf-sfc-nsh-04 the TLV structure seems a bit more complicated
>> and I'm struggling a bit to understand if the "name" TLV should be used.
>>
>>  From draft-ietf-sfc-nsh-04
>>
>>         0                   1                   2                   3
>>         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>        |          TLV Class            |C|    Type     |R|R|R|   Len   |
>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>        |                      Variable Metadata                        |
>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>
>>
>>
>>                     Figure 6: Variable Context Headers
>>
>> The draft is not entirely clear in this respect, but I think this is what you call a TLV.
>>
>> Should I understand this way?
>>
>> Type = TLV Class + C + Type (24 bits)
>
> PQ>  In some ways, but as you point out this might be confusing and leads to an implied overload.  In reality, the class "scopes" the type.
>
>
>> Length = len (5 bits)
>> Value = Variable Metadata
>>
>> A convention we used in MPLS when we have variable length fields is
>> to use a ~ instead of the |, like this:.
>>
>>         0                   1                   2                   3
>>         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>        |          TLV Class            |C|    Type     |R|R|R|   Len   |
>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>        ~                      Variable Metadata                        ~
>>        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>
>> I suggest that this is a good practice that could be adopted here also.
>
> PQ>  I'm happy to, assuming everyone else is as well.
>
>
>>
>> Two more questions:
>>
>> If the metadata does not align exactly with the 32 bit/4 byte structure,
>> what is the rules for padding?
>
> PQ>  We can provide explicit pad with zero guidance.

Thanks, that would be great. Are we sure that the metadata does not 
start and stop with zero?

Let us say that one metadata has the format:

     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |0 0 1 1 0 1 0 1 0 1 0 1 1 0 0 1 1 1 1 0 0 0 1 0 0              |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

and another one the format
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |0 0 1 1 0 1 0 1 0 1 0 1 1 0 0 1 1 1 1 0 0 0 1 0 0 0 0          |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

post padding would make them come out the same.

Similar


If one metadata has the format:

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                0 1 1 0 1 0 1 0 1 0 1 1 0 0 1 1 1 1 0 0 0 1 0 0|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

and another one the format
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              0 0 1 1 0 1 0 1 0 1 0 1 1 0 0 1 1 1 1 0 0 0 1 0 0|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Pre-padding will make them come out the same.


>
>>
>> A last, but a bit different question, do you need indicators like the U
>> and F flags in an to indicate what should happen if the node does not
>> recognize the (TLV Class, C, Type)-field?
>
> PQ>  In general, we've implied that if a node doesn't understand the TLV it simply ignores it.

As far as I can see you only talk about it the type is not recognized,
you probably need to make a statement about Class also.

In the IANA section there is a Section 14.2.3 that says

14.2.3.  TLV Class Registry

    IANA is requested to set up a registry of "TLV Types".  These are 16-
    bit values.  Registry entries are assigned by using the "IETF Review"
    policy defined in RFC 5226 [RFC5226].

Apart from changing TLV to VLM, it is odd to name this registry "VLM
Types it should be "VLM Classes", right? We are talking about a registry
for the Classes that goes in the 16 bit field.

Then I think you need a registry for the type field (8 bits) also, at
least for the types defined by IETF, this registry should indicate
whether the C bit is set or not.

/Loa

/Loa

/Loa
>
> Thanks again!
> Paul
>


From nobody Sun Apr 24 08:36:25 2016
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20DBD12B028 for <sfc@ietfa.amsl.com>; Sun, 24 Apr 2016 08:36:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.917
X-Spam-Level: 
X-Spam-Status: No, score=-7.917 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XbWY5iFznsok for <sfc@ietfa.amsl.com>; Sun, 24 Apr 2016 08:36:21 -0700 (PDT)
Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by ietfa.amsl.com (Postfix) with ESMTP id 1ACEE12B02A for <sfc@ietf.org>; Sun, 24 Apr 2016 08:36:21 -0700 (PDT)
Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga103.jf.intel.com with ESMTP; 24 Apr 2016 08:36:21 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.24,528,1455004800"; d="scan'208";a="939153391"
Received: from orsmsx108.amr.corp.intel.com ([10.22.240.6]) by orsmga001.jf.intel.com with ESMTP; 24 Apr 2016 08:36:20 -0700
Received: from orsmsx112.amr.corp.intel.com (10.22.240.13) by ORSMSX108.amr.corp.intel.com (10.22.240.6) with Microsoft SMTP Server (TLS) id 14.3.248.2; Sun, 24 Apr 2016 08:36:20 -0700
Received: from orsmsx114.amr.corp.intel.com ([169.254.8.253]) by ORSMSX112.amr.corp.intel.com ([169.254.3.229]) with mapi id 14.03.0248.002; Sun, 24 Apr 2016 08:36:20 -0700
From: "Elzur, Uri" <uri.elzur@intel.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Thomas Narten" <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfPQCYv/wVVMUagOUO32rRCGp+Er+AwgARg/TCAEFX48A==
Date: Sun, 24 Apr 2016 15:36:20 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiYjM4MWQ1ZmUtNDk0Ni00ODVlLThiN2YtODBkM2Y4NmRlMWZjIiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX0lDIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE1LjkuNi42IiwiVHJ1c3RlZExhYmVsSGFzaCI6Ilp5bDlIUDVmUzJ5Vk1JOXlnOU9nM2w4S3BBVTZyU2NkWElINHRcL01OY2kwPSJ9
x-ctpclassification: CTP_IC
x-originating-ip: [10.22.254.138]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/6EJdqzF-um-TpNnuvPTSv0z9DUM>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 24 Apr 2016 15:36:23 -0000

Hi Med

I see no need to specify the exact behavior as NSH is transport independent=
 i.e. like NSH interaction with any other Transport eh issue of Fragmentati=
on is to be dealt in a way that matches the mechanisms supported by the Tra=
nsport used and do not belong in the NSH draft

Thx

Uri ("Oo-Ree")
C: 949-378-7568


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of mohamed.boucadair@oran=
ge.com
Sent: Thursday, April 14, 2016 12:43 AM
To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

R-,

In addition to other pending issues raised for this draft, I would like to =
raise this additional one about Section 6.=20

=3D=3D
6.  Fragmentation Considerations

   NSH and the associated transport header are "added" to the
   encapsulated packet/frame.  This additional information increases the
   size of the packet.  In order the ensure proper forwarding of NSH
   data, several options for handling fragmentation and re-assembly
   exist:

   1.  Jumbo Frames, when supported, enable the transport of NSH and
       associated transport packets without requiring fragmentation.

   2.  Path MTU Discovery [RFC1191]"describes a technique for
       dynamically discovering the maximum transmission unit (MTU) of an
       arbitrary internet path" and can be utilized to ensure the the
       required packet size is used.

   3.  [RFC6830] describes two schemes for fragmentation and re-assembly
       in section 5.4.
=3D=3D

* The text is weak for a Standard track document that is intended to solve =
the problem in https://tools.ietf.org/html/rfc7498#section-2.12. There shou=
ld be a clear behavior to be followed by an implementation. Further, I woul=
d avoid the use of words such as "can".

* The text covers only fragmentation when it is induced by SFC operations, =
it does not discuss the treatment of a fragment when received in an SFC dom=
ain. IMHO, the draft should also specify the behavior of the Classifier wit=
h regards to fragments for the sake of proper SFC operation. Applying class=
ification policies may require the full packet, not only a fragment. In par=
ticular, dedicated resources should dedicated for handling out of order fra=
gments. Of course, it is out of scope of this document to describe how SFs =
handle fragments.=20

* If an SFC header is prepended for all fragments, I'm not sure there is an=
y particular issue at the SFF level...except if stripping/adding context TL=
Vs depends on the full packet (not just fragment). It is warranted to consi=
der a little bit this point before declaring there is no issue.=20

* The text states "several options". This may be interpreted as if implemen=
ting one of them is sufficient...which is not true. The first two points co=
ntribute to minimize the fragmentation risk, but fragmentation may still be=
 experienced (e.g., other shims are prepended by other nodes for some other=
 purposes, nested nsh, etc.)

* The first two points have nothing to do with reassembly.

* The support of jumbo frames by a router/device does not mean that it can =
make use of it. Appropriate MTU configuration should be undertaken in a con=
sistent manner within an SFC domain. The text should be updated to make it =
is about (consistent) MTU configuration.=20

* BTW, shouldn't the text be reworded to recommended to increase the MTU of=
 **all nodes** of an SFC-enabled domain by at least the length of SFC heade=
r + transport header? =20

* Bullet 2, how PMTU discovery is actually used in this context? Do you ass=
ume that all SFC-aware nodes will issue such messages towards other SFC-awa=
re node, arbitrary destination, else?=20

* Bullet 2, I would drop "describes a technique for dynamically discovering=
 the maximum transmission unit (MTU) of an arbitrary internet path". =20

* Bullet 2, s/ the the/the.

* The reference to the LISP specification raises two concerns and one comme=
nt:

(1) I don't think it is a good approach that fragments induced by the netwo=
rk are passed to their ultimate destinations as such (stateless). IMO, reas=
sembly should be done within the SFC domain (responsible for fragmentation)=
 not passed away.
(2) Does the stateful mode require all SFC data plane elements maintain a f=
ull list of MTU for the any SFF/SF instance of the SFC domain?=20
=20
The current text suggests that [RFC6830] should be listed as normative refe=
rence (not an informative one). I would personally favor removing the refer=
ence to LISP (as it is an Experimental RFC).=20

* The security section of the draft may be augmented with informational fra=
gmentation-related pointers to: e.g., RFC1858 (Security Considerations for =
IP Fragment Filtering), RFC3128 (Protection Against a Variant of the Tiny F=
ragment Attack), and RFC 4963 (IPv4 Reassembly Errors at High Data Rates).=
=20

Cheers,
Med

> -----Message d'origine-----
> De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de=20
> mohamed.boucadair@orange.com Envoy=E9=A0: lundi 11 avril 2016 13:14 =C0=
=A0:=20
> Thomas Narten; sfc@ietf.org Objet=A0: Re: [sfc] WG last call for=20
> draft-ietf-sfc-nsh-04.txt
>=20
> Dear Thomas, all,
>=20
> As I mentioned during the meeting, there are several issues that are=20
> not covered in the last version of the draft. I already provided=20
> examples of the issues offline as requested by Martin.
>=20
> Cheers,
> Med
>=20
> > -----Message d'origine-----
> > De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten=20
> > Envoy=E9=A0: jeudi 31 mars 2016 04:48 =C0=A0: sfc@ietf.org Objet=A0: [s=
fc] WG=20
> > last call for draft-ietf-sfc-nsh-04.txt
> >
> > Dear WG:
> >
> > This note begins a WG last call on draft-ietf-sfc-nsh-04.txt=20
> > (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> >
> > The editors of the NSH document have indicated that they have=20
> > addressed all known comments and that there are no open issues with=20
> > the current version of the document.
> >
> > Substantive comments to the list please, editorial comments can go=20
> > directly to the document editors.
> >
> > We'll also get a brief update from the editors at next week's=20
> > meeting. If there are any remaining issues with the document,=20
> > raising them before the meeting would be especially helpful.
> >
> > For the chairs,
> > Thomas
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Sun Apr 24 22:31:49 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2E10112D0F5 for <sfc@ietfa.amsl.com>; Sun, 24 Apr 2016 22:31:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.915
X-Spam-Level: 
X-Spam-Status: No, score=-2.915 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EhBum8WIspuY for <sfc@ietfa.amsl.com>; Sun, 24 Apr 2016 22:31:45 -0700 (PDT)
Received: from relais-inet.orange.com (relais-nor36.orange.com [80.12.70.36]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5613C12D0E1 for <sfc@ietf.org>; Sun, 24 Apr 2016 22:31:45 -0700 (PDT)
Received: from opfednr06.francetelecom.fr (unknown [xx.xx.xx.70]) by opfednr23.francetelecom.fr (ESMTP service) with ESMTP id 6E8F7C0156; Mon, 25 Apr 2016 07:31:43 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.2]) by opfednr06.francetelecom.fr (ESMTP service) with ESMTP id 3B7161A0051; Mon, 25 Apr 2016 07:31:43 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM21.corporate.adroot.infra.ftgroup ([fe80::e92a:c932:907e:8f06%19]) with mapi id 14.03.0279.002; Mon, 25 Apr 2016 07:31:43 +0200
From: <mohamed.boucadair@orange.com>
To: "Elzur, Uri" <uri.elzur@intel.com>, Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfPCTJ8b8qeo0249+QoeHMadZ+Er+AwgARg/TCAEFX48IAA6IrA
Date: Mon, 25 Apr 2016 05:31:42 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com>
In-Reply-To: <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/aIW3nQi78GDXV-vc5fvGrkuaPwE>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Apr 2016 05:31:48 -0000

Hi Uri,

That's another option that needs to be discussed/investigated. I'm afraid t=
his is not the rationale adopted in -04 since it includes some text that is=
 far to be sufficient to ensure interoperable implementations.

BTW, saying that nsh does not need to deal with fragmentation because it is=
 transport-independent is not IMHO a good strategy to adopt here because it=
 opens the door for interoperable issues, it may lead to sub-optimal implem=
entations if the sfc information is present only in one fragments, etc.  =20

My comments are related to the current text in the -04. This text needs to =
be fixed somehow.

Cheers,
Med

> -----Message d'origine-----
> De=A0: Elzur, Uri [mailto:uri.elzur@intel.com]
> Envoy=E9=A0: dimanche 24 avril 2016 17:36
> =C0=A0: BOUCADAIR Mohamed IMT/OLN; Thomas Narten; sfc@ietf.org
> Objet=A0: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Hi Med
>=20
> I see no need to specify the exact behavior as NSH is transport
> independent i.e. like NSH interaction with any other Transport eh issue o=
f
> Fragmentation is to be dealt in a way that matches the mechanisms
> supported by the Transport used and do not belong in the NSH draft
>=20
> Thx
>=20
> Uri ("Oo-Ree")
> C: 949-378-7568
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
> mohamed.boucadair@orange.com
> Sent: Thursday, April 14, 2016 12:43 AM
> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> R-,
>=20
> In addition to other pending issues raised for this draft, I would like t=
o
> raise this additional one about Section 6.
>=20
> =3D=3D
> 6.  Fragmentation Considerations
>=20
>    NSH and the associated transport header are "added" to the
>    encapsulated packet/frame.  This additional information increases the
>    size of the packet.  In order the ensure proper forwarding of NSH
>    data, several options for handling fragmentation and re-assembly
>    exist:
>=20
>    1.  Jumbo Frames, when supported, enable the transport of NSH and
>        associated transport packets without requiring fragmentation.
>=20
>    2.  Path MTU Discovery [RFC1191]"describes a technique for
>        dynamically discovering the maximum transmission unit (MTU) of an
>        arbitrary internet path" and can be utilized to ensure the the
>        required packet size is used.
>=20
>    3.  [RFC6830] describes two schemes for fragmentation and re-assembly
>        in section 5.4.
> =3D=3D
>=20
> * The text is weak for a Standard track document that is intended to solv=
e
> the problem in https://tools.ietf.org/html/rfc7498#section-2.12. There
> should be a clear behavior to be followed by an implementation. Further, =
I
> would avoid the use of words such as "can".
>=20
> * The text covers only fragmentation when it is induced by SFC operations=
,
> it does not discuss the treatment of a fragment when received in an SFC
> domain. IMHO, the draft should also specify the behavior of the Classifie=
r
> with regards to fragments for the sake of proper SFC operation. Applying
> classification policies may require the full packet, not only a fragment.
> In particular, dedicated resources should dedicated for handling out of
> order fragments. Of course, it is out of scope of this document to
> describe how SFs handle fragments.
>=20
> * If an SFC header is prepended for all fragments, I'm not sure there is
> any particular issue at the SFF level...except if stripping/adding contex=
t
> TLVs depends on the full packet (not just fragment). It is warranted to
> consider a little bit this point before declaring there is no issue.
>=20
> * The text states "several options". This may be interpreted as if
> implementing one of them is sufficient...which is not true. The first two
> points contribute to minimize the fragmentation risk, but fragmentation
> may still be experienced (e.g., other shims are prepended by other nodes
> for some other purposes, nested nsh, etc.)
>=20
> * The first two points have nothing to do with reassembly.
>=20
> * The support of jumbo frames by a router/device does not mean that it ca=
n
> make use of it. Appropriate MTU configuration should be undertaken in a
> consistent manner within an SFC domain. The text should be updated to mak=
e
> it is about (consistent) MTU configuration.
>=20
> * BTW, shouldn't the text be reworded to recommended to increase the MTU
> of **all nodes** of an SFC-enabled domain by at least the length of SFC
> header + transport header?
>=20
> * Bullet 2, how PMTU discovery is actually used in this context? Do you
> assume that all SFC-aware nodes will issue such messages towards other
> SFC-aware node, arbitrary destination, else?
>=20
> * Bullet 2, I would drop "describes a technique for dynamically
> discovering the maximum transmission unit (MTU) of an arbitrary internet
> path".
>=20
> * Bullet 2, s/ the the/the.
>=20
> * The reference to the LISP specification raises two concerns and one
> comment:
>=20
> (1) I don't think it is a good approach that fragments induced by the
> network are passed to their ultimate destinations as such (stateless).
> IMO, reassembly should be done within the SFC domain (responsible for
> fragmentation) not passed away.
> (2) Does the stateful mode require all SFC data plane elements maintain a
> full list of MTU for the any SFF/SF instance of the SFC domain?
>=20
> The current text suggests that [RFC6830] should be listed as normative
> reference (not an informative one). I would personally favor removing the
> reference to LISP (as it is an Experimental RFC).
>=20
> * The security section of the draft may be augmented with informational
> fragmentation-related pointers to: e.g., RFC1858 (Security Considerations
> for IP Fragment Filtering), RFC3128 (Protection Against a Variant of the
> Tiny Fragment Attack), and RFC 4963 (IPv4 Reassembly Errors at High Data
> Rates).
>=20
> Cheers,
> Med
>=20
> > -----Message d'origine-----
> > De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de
> > mohamed.boucadair@orange.com Envoy=E9=A0: lundi 11 avril 2016 13:14 =C0=
=A0:
> > Thomas Narten; sfc@ietf.org Objet=A0: Re: [sfc] WG last call for
> > draft-ietf-sfc-nsh-04.txt
> >
> > Dear Thomas, all,
> >
> > As I mentioned during the meeting, there are several issues that are
> > not covered in the last version of the draft. I already provided
> > examples of the issues offline as requested by Martin.
> >
> > Cheers,
> > Med
> >
> > > -----Message d'origine-----
> > > De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten
> > > Envoy=E9=A0: jeudi 31 mars 2016 04:48 =C0=A0: sfc@ietf.org Objet=A0: =
[sfc] WG
> > > last call for draft-ietf-sfc-nsh-04.txt
> > >
> > > Dear WG:
> > >
> > > This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> > > (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> > >
> > > The editors of the NSH document have indicated that they have
> > > addressed all known comments and that there are no open issues with
> > > the current version of the document.
> > >
> > > Substantive comments to the list please, editorial comments can go
> > > directly to the document editors.
> > >
> > > We'll also get a brief update from the editors at next week's
> > > meeting. If there are any remaining issues with the document,
> > > raising them before the meeting would be especially helpful.
> > >
> > > For the chairs,
> > > Thomas
> > >
> > > _______________________________________________
> > > sfc mailing list
> > > sfc@ietf.org
> > > https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Sun Apr 24 22:48:41 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB2A412B005 for <sfc@ietfa.amsl.com>; Sun, 24 Apr 2016 22:48:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.618
X-Spam-Level: 
X-Spam-Status: No, score=-2.618 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y2ARPfQ7qPt0 for <sfc@ietfa.amsl.com>; Sun, 24 Apr 2016 22:48:36 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0618E12B025 for <sfc@ietf.org>; Sun, 24 Apr 2016 22:48:36 -0700 (PDT)
Received: from omfedm07.si.francetelecom.fr (unknown [xx.xx.xx.3]) by omfedm09.si.francetelecom.fr (ESMTP service) with ESMTP id 419122DC230; Mon, 25 Apr 2016 07:48:34 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.32]) by omfedm07.si.francetelecom.fr (ESMTP service) with ESMTP id 1D2114C048; Mon, 25 Apr 2016 07:48:34 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM32.corporate.adroot.infra.ftgroup ([fe80::8924:188:2124:a046%19]) with mapi id 14.03.0279.002; Mon, 25 Apr 2016 07:48:33 +0200
From: <mohamed.boucadair@orange.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>
Thread-Topic: [sfc] TLV class of variable-length metadata should have a restricted range
Thread-Index: AQHRmWezeX5Az/rjTQOEcq50WzDr6Z+QLNUAgAEBmYCAAnM8AIAAPdwAgABjwQCAAiFYAIAD0Bwg
Date: Mon, 25 Apr 2016 05:48:33 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D5EEE5@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <E8355113905631478EFF04F5AA706E9830F20CDA@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008D5BB09@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <E8355113905631478EFF04F5AA706E9830F2A80B@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008D5C3B4@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <E8355113905631478EFF04F5AA706E9830F310EE@wtl-exchp-2.sandvine.com> <6E92E595-B0DD-4E35-96B0-795D75BE4C0B@cisco.com> <787AE7BB302AE849A7480A190F8B933008D5D52D@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <825ECEA4-2762-44C1-84E7-86F332DD8550@cisco.com>
In-Reply-To: <825ECEA4-2762-44C1-84E7-86F332DD8550@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B933008D5EEE5OPEXCLILMA3corp_"
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.25.52415
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/YQKm68_3MPYR5bT9lzcgYDnCG60>
Cc: "sfc@ietf.org" <sfc@ietf.org>, Dave Dolson <ddolson@sandvine.com>
Subject: Re: [sfc] TLV class of variable-length metadata should have a restricted range
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Apr 2016 05:48:39 -0000

--_000_787AE7BB302AE849A7480A190F8B933008D5EEE5OPEXCLILMA3corp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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=

--_000_787AE7BB302AE849A7480A190F8B933008D5EEE5OPEXCLILMA3corp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_787AE7BB302AE849A7480A190F8B933008D5EEE5OPEXCLILMA3corp_--


From nobody Sun Apr 24 23:30:00 2016
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4FB8412D0F5 for <sfc@ietfa.amsl.com>; Sun, 24 Apr 2016 23:29:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.917
X-Spam-Level: 
X-Spam-Status: No, score=-7.917 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YRcK01M5K91H for <sfc@ietfa.amsl.com>; Sun, 24 Apr 2016 23:29:57 -0700 (PDT)
Received: from mga02.intel.com (mga02.intel.com [134.134.136.20]) by ietfa.amsl.com (Postfix) with ESMTP id CFD8112D0C5 for <sfc@ietf.org>; Sun, 24 Apr 2016 23:29:57 -0700 (PDT)
Received: from orsmga003.jf.intel.com ([10.7.209.27]) by orsmga101.jf.intel.com with ESMTP; 24 Apr 2016 23:29:48 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.24,531,1455004800"; d="scan'208";a="791684933"
Received: from orsmsx101.amr.corp.intel.com ([10.22.225.128]) by orsmga003.jf.intel.com with ESMTP; 24 Apr 2016 23:29:48 -0700
Received: from orsmsx113.amr.corp.intel.com (10.22.240.9) by ORSMSX101.amr.corp.intel.com (10.22.225.128) with Microsoft SMTP Server (TLS) id 14.3.248.2; Sun, 24 Apr 2016 23:29:46 -0700
Received: from orsmsx114.amr.corp.intel.com ([169.254.8.253]) by ORSMSX113.amr.corp.intel.com ([169.254.9.9]) with mapi id 14.03.0248.002; Sun, 24 Apr 2016 23:29:46 -0700
From: "Elzur, Uri" <uri.elzur@intel.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Thomas Narten" <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfPQCYv/wVVMUagOUO32rRCGp+Er+AwgARg/TCAEFX48IABYBMA//+ZdQA=
Date: Mon, 25 Apr 2016 06:29:46 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiZGQ2Y2ZiYTMtODQ0Zi00YmU5LTllZWQtOWM1M2E2MzIzODFmIiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX0lDIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE1LjkuNi42IiwiVHJ1c3RlZExhYmVsSGFzaCI6IkRDRW41bzErR016NnZwd1wvZGNZUm1xNE1LbGt3QVF6cWlsR0VpNnJEYytnPSJ9
x-ctpclassification: CTP_IC
x-originating-ip: [10.22.254.140]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/3ulYFgoQoLuF6Jsf3ENXEciVFMM>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Apr 2016 06:29:59 -0000

Hi Med

My point is that Fragmentation is yet another transport related issue that =
is beyond the scope of NSH and beyond the charter of the WG, so it doesn't =
really belong in the draft. We are providing an advice as extending the siz=
e of the packet may lead to fragmentation, but as you check RFC 7348 VxLAN,=
 which my create the same issue, you'll find it doesn't even relate to it.

Thx

Uri ("Oo-Ree")
C: 949-378-7568


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of mohamed.boucadair@oran=
ge.com
Sent: Sunday, April 24, 2016 10:32 PM
To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten <narten@us.ibm.com>; sf=
c@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Hi Uri,

That's another option that needs to be discussed/investigated. I'm afraid t=
his is not the rationale adopted in -04 since it includes some text that is=
 far to be sufficient to ensure interoperable implementations.

BTW, saying that nsh does not need to deal with fragmentation because it is=
 transport-independent is not IMHO a good strategy to adopt here because it=
 opens the door for interoperable issues, it may lead to sub-optimal implem=
entations if the sfc information is present only in one fragments, etc.  =20

My comments are related to the current text in the -04. This text needs to =
be fixed somehow.

Cheers,
Med

> -----Message d'origine-----
> De=A0: Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9=A0: dimanche 24=20
> avril 2016 17:36 =C0=A0: BOUCADAIR Mohamed IMT/OLN; Thomas Narten;=20
> sfc@ietf.org Objet=A0: RE: [sfc] WG last call for=20
> draft-ietf-sfc-nsh-04.txt
>=20
> Hi Med
>=20
> I see no need to specify the exact behavior as NSH is transport=20
> independent i.e. like NSH interaction with any other Transport eh=20
> issue of Fragmentation is to be dealt in a way that matches the=20
> mechanisms supported by the Transport used and do not belong in the=20
> NSH draft
>=20
> Thx
>=20
> Uri ("Oo-Ree")
> C: 949-378-7568
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
> mohamed.boucadair@orange.com
> Sent: Thursday, April 14, 2016 12:43 AM
> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> R-,
>=20
> In addition to other pending issues raised for this draft, I would=20
> like to raise this additional one about Section 6.
>=20
> =3D=3D
> 6.  Fragmentation Considerations
>=20
>    NSH and the associated transport header are "added" to the
>    encapsulated packet/frame.  This additional information increases the
>    size of the packet.  In order the ensure proper forwarding of NSH
>    data, several options for handling fragmentation and re-assembly
>    exist:
>=20
>    1.  Jumbo Frames, when supported, enable the transport of NSH and
>        associated transport packets without requiring fragmentation.
>=20
>    2.  Path MTU Discovery [RFC1191]"describes a technique for
>        dynamically discovering the maximum transmission unit (MTU) of an
>        arbitrary internet path" and can be utilized to ensure the the
>        required packet size is used.
>=20
>    3.  [RFC6830] describes two schemes for fragmentation and re-assembly
>        in section 5.4.
> =3D=3D
>=20
> * The text is weak for a Standard track document that is intended to=20
> solve the problem in https://tools.ietf.org/html/rfc7498#section-2.12.=20
> There should be a clear behavior to be followed by an implementation.=20
> Further, I would avoid the use of words such as "can".
>=20
> * The text covers only fragmentation when it is induced by SFC=20
> operations, it does not discuss the treatment of a fragment when=20
> received in an SFC domain. IMHO, the draft should also specify the=20
> behavior of the Classifier with regards to fragments for the sake of=20
> proper SFC operation. Applying classification policies may require the fu=
ll packet, not only a fragment.
> In particular, dedicated resources should dedicated for handling out=20
> of order fragments. Of course, it is out of scope of this document to=20
> describe how SFs handle fragments.
>=20
> * If an SFC header is prepended for all fragments, I'm not sure there=20
> is any particular issue at the SFF level...except if stripping/adding=20
> context TLVs depends on the full packet (not just fragment). It is=20
> warranted to consider a little bit this point before declaring there is n=
o issue.
>=20
> * The text states "several options". This may be interpreted as if=20
> implementing one of them is sufficient...which is not true. The first=20
> two points contribute to minimize the fragmentation risk, but=20
> fragmentation may still be experienced (e.g., other shims are=20
> prepended by other nodes for some other purposes, nested nsh, etc.)
>=20
> * The first two points have nothing to do with reassembly.
>=20
> * The support of jumbo frames by a router/device does not mean that it=20
> can make use of it. Appropriate MTU configuration should be undertaken=20
> in a consistent manner within an SFC domain. The text should be=20
> updated to make it is about (consistent) MTU configuration.
>=20
> * BTW, shouldn't the text be reworded to recommended to increase the=20
> MTU of **all nodes** of an SFC-enabled domain by at least the length=20
> of SFC header + transport header?
>=20
> * Bullet 2, how PMTU discovery is actually used in this context? Do=20
> you assume that all SFC-aware nodes will issue such messages towards=20
> other SFC-aware node, arbitrary destination, else?
>=20
> * Bullet 2, I would drop "describes a technique for dynamically=20
> discovering the maximum transmission unit (MTU) of an arbitrary=20
> internet path".
>=20
> * Bullet 2, s/ the the/the.
>=20
> * The reference to the LISP specification raises two concerns and one
> comment:
>=20
> (1) I don't think it is a good approach that fragments induced by the=20
> network are passed to their ultimate destinations as such (stateless).
> IMO, reassembly should be done within the SFC domain (responsible for
> fragmentation) not passed away.
> (2) Does the stateful mode require all SFC data plane elements=20
> maintain a full list of MTU for the any SFF/SF instance of the SFC domain=
?
>=20
> The current text suggests that [RFC6830] should be listed as normative=20
> reference (not an informative one). I would personally favor removing=20
> the reference to LISP (as it is an Experimental RFC).
>=20
> * The security section of the draft may be augmented with=20
> informational fragmentation-related pointers to: e.g., RFC1858=20
> (Security Considerations for IP Fragment Filtering), RFC3128=20
> (Protection Against a Variant of the Tiny Fragment Attack), and RFC=20
> 4963 (IPv4 Reassembly Errors at High Data Rates).
>=20
> Cheers,
> Med
>=20
> > -----Message d'origine-----
> > De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de=20
> > mohamed.boucadair@orange.com Envoy=E9=A0: lundi 11 avril 2016 13:14 =C0=
=A0:
> > Thomas Narten; sfc@ietf.org Objet=A0: Re: [sfc] WG last call for=20
> > draft-ietf-sfc-nsh-04.txt
> >
> > Dear Thomas, all,
> >
> > As I mentioned during the meeting, there are several issues that are=20
> > not covered in the last version of the draft. I already provided=20
> > examples of the issues offline as requested by Martin.
> >
> > Cheers,
> > Med
> >
> > > -----Message d'origine-----
> > > De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten=
=20
> > > Envoy=E9=A0: jeudi 31 mars 2016 04:48 =C0=A0: sfc@ietf.org Objet=A0: =
[sfc]=20
> > > WG last call for draft-ietf-sfc-nsh-04.txt
> > >
> > > Dear WG:
> > >
> > > This note begins a WG last call on draft-ietf-sfc-nsh-04.txt=20
> > > (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> > >
> > > The editors of the NSH document have indicated that they have=20
> > > addressed all known comments and that there are no open issues=20
> > > with the current version of the document.
> > >
> > > Substantive comments to the list please, editorial comments can go=20
> > > directly to the document editors.
> > >
> > > We'll also get a brief update from the editors at next week's=20
> > > meeting. If there are any remaining issues with the document,=20
> > > raising them before the meeting would be especially helpful.
> > >
> > > For the chairs,
> > > Thomas
> > >
> > > _______________________________________________
> > > sfc mailing list
> > > sfc@ietf.org
> > > https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Mon Apr 25 00:00:24 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4209012D120 for <sfc@ietfa.amsl.com>; Mon, 25 Apr 2016 00:00:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XJUsfeNinxM6 for <sfc@ietfa.amsl.com>; Mon, 25 Apr 2016 00:00:21 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9F60412B03C for <sfc@ietf.org>; Mon, 25 Apr 2016 00:00:20 -0700 (PDT)
Received: from omfedm05.si.francetelecom.fr (unknown [xx.xx.xx.1]) by omfedm13.si.francetelecom.fr (ESMTP service) with ESMTP id CA84B324433; Mon, 25 Apr 2016 09:00:18 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.24]) by omfedm05.si.francetelecom.fr (ESMTP service) with ESMTP id A834635C068; Mon, 25 Apr 2016 09:00:18 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7D.corporate.adroot.infra.ftgroup ([fe80::9044:c5ee:4dd2:4f16%19]) with mapi id 14.03.0279.002; Mon, 25 Apr 2016 09:00:18 +0200
From: <mohamed.boucadair@orange.com>
To: "Elzur, Uri" <uri.elzur@intel.com>, Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfPQCYv/wVVMUagOUO32rRCGp+Er+AwgARg/TCAEFX48IABYBMA//+ZdQCAAAWQcA==
Date: Mon, 25 Apr 2016 07:00:18 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com>
In-Reply-To: <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.3.14.165416
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Mn2-aM3jX3xGTLImHw0V9R-jg5I>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Apr 2016 07:00:23 -0000

Re-,

I hear you, but my comment is that we need, as a WG, to decide what to put =
in the draft. FWIW, I'm discussing two fragmentation issues:=20

(1) Fragmentation that is caused by prepending an SFC header.
(2) Handling fragments at the ingress of an SFC-enabled domain.=20

Increasing the MTU is for sure a recommendation is to be explicitly called =
out in the text (see my first message).

There are other issues that need to be discussed, e.g., how to deal with fr=
agments in SFFs/Classifiers?=20

It is also "prudent" to check that no issues will be experienced in SFF to =
handle fragments. If an SFC header is prepended for all fragments, I'm not =
sure there
is any particular issue at the SFF level, except if stripping/adding contex=
t TLVs depends on the full packet (not just fragment). It is warranted to c=
onsider a little bit this point before declaring there is no issue.

For point (1), declaring fragmentation out of scope would be meant that an =
implementation must be prepared to receive fragments with or without NSH he=
ader as this is a decision that is left to the transport encapsulation. Thi=
s is a requirement per se!

I won't reiterate all the comments I have about the current wording of this=
 section.=20

Cheers,
Med

> -----Message d'origine-----
> De=A0: Elzur, Uri [mailto:uri.elzur@intel.com]
> Envoy=E9=A0: lundi 25 avril 2016 08:30
> =C0=A0: BOUCADAIR Mohamed IMT/OLN; Thomas Narten; sfc@ietf.org
> Objet=A0: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Hi Med
>=20
> My point is that Fragmentation is yet another transport related issue tha=
t
> is beyond the scope of NSH and beyond the charter of the WG, so it doesn'=
t
> really belong in the draft. We are providing an advice as extending the
> size of the packet may lead to fragmentation, but as you check RFC 7348
> VxLAN, which my create the same issue, you'll find it doesn't even relate
> to it.
>=20
> Thx
>=20
> Uri ("Oo-Ree")
> C: 949-378-7568
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
> mohamed.boucadair@orange.com
> Sent: Sunday, April 24, 2016 10:32 PM
> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten <narten@us.ibm.com>;
> sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Hi Uri,
>=20
> That's another option that needs to be discussed/investigated. I'm afraid
> this is not the rationale adopted in -04 since it includes some text that
> is far to be sufficient to ensure interoperable implementations.
>=20
> BTW, saying that nsh does not need to deal with fragmentation because it
> is transport-independent is not IMHO a good strategy to adopt here becaus=
e
> it opens the door for interoperable issues, it may lead to sub-optimal
> implementations if the sfc information is present only in one fragments,
> etc.
>=20
> My comments are related to the current text in the -04. This text needs t=
o
> be fixed somehow.
>=20
> Cheers,
> Med
>=20
> > -----Message d'origine-----
> > De=A0: Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9=A0: dimanche 24
> > avril 2016 17:36 =C0=A0: BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
> > sfc@ietf.org Objet=A0: RE: [sfc] WG last call for
> > draft-ietf-sfc-nsh-04.txt
> >
> > Hi Med
> >
> > I see no need to specify the exact behavior as NSH is transport
> > independent i.e. like NSH interaction with any other Transport eh
> > issue of Fragmentation is to be dealt in a way that matches the
> > mechanisms supported by the Transport used and do not belong in the
> > NSH draft
> >
> > Thx
> >
> > Uri ("Oo-Ree")
> > C: 949-378-7568
> >
> >
> > -----Original Message-----
> > From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
> > mohamed.boucadair@orange.com
> > Sent: Thursday, April 14, 2016 12:43 AM
> > To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
> > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >
> > R-,
> >
> > In addition to other pending issues raised for this draft, I would
> > like to raise this additional one about Section 6.
> >
> > =3D=3D
> > 6.  Fragmentation Considerations
> >
> >    NSH and the associated transport header are "added" to the
> >    encapsulated packet/frame.  This additional information increases th=
e
> >    size of the packet.  In order the ensure proper forwarding of NSH
> >    data, several options for handling fragmentation and re-assembly
> >    exist:
> >
> >    1.  Jumbo Frames, when supported, enable the transport of NSH and
> >        associated transport packets without requiring fragmentation.
> >
> >    2.  Path MTU Discovery [RFC1191]"describes a technique for
> >        dynamically discovering the maximum transmission unit (MTU) of a=
n
> >        arbitrary internet path" and can be utilized to ensure the the
> >        required packet size is used.
> >
> >    3.  [RFC6830] describes two schemes for fragmentation and re-assembl=
y
> >        in section 5.4.
> > =3D=3D
> >
> > * The text is weak for a Standard track document that is intended to
> > solve the problem in https://tools.ietf.org/html/rfc7498#section-2.12.
> > There should be a clear behavior to be followed by an implementation.
> > Further, I would avoid the use of words such as "can".
> >
> > * The text covers only fragmentation when it is induced by SFC
> > operations, it does not discuss the treatment of a fragment when
> > received in an SFC domain. IMHO, the draft should also specify the
> > behavior of the Classifier with regards to fragments for the sake of
> > proper SFC operation. Applying classification policies may require the
> full packet, not only a fragment.
> > In particular, dedicated resources should dedicated for handling out
> > of order fragments. Of course, it is out of scope of this document to
> > describe how SFs handle fragments.
> >
> > * If an SFC header is prepended for all fragments, I'm not sure there
> > is any particular issue at the SFF level...except if stripping/adding
> > context TLVs depends on the full packet (not just fragment). It is
> > warranted to consider a little bit this point before declaring there is
> no issue.
> >
> > * The text states "several options". This may be interpreted as if
> > implementing one of them is sufficient...which is not true. The first
> > two points contribute to minimize the fragmentation risk, but
> > fragmentation may still be experienced (e.g., other shims are
> > prepended by other nodes for some other purposes, nested nsh, etc.)
> >
> > * The first two points have nothing to do with reassembly.
> >
> > * The support of jumbo frames by a router/device does not mean that it
> > can make use of it. Appropriate MTU configuration should be undertaken
> > in a consistent manner within an SFC domain. The text should be
> > updated to make it is about (consistent) MTU configuration.
> >
> > * BTW, shouldn't the text be reworded to recommended to increase the
> > MTU of **all nodes** of an SFC-enabled domain by at least the length
> > of SFC header + transport header?
> >
> > * Bullet 2, how PMTU discovery is actually used in this context? Do
> > you assume that all SFC-aware nodes will issue such messages towards
> > other SFC-aware node, arbitrary destination, else?
> >
> > * Bullet 2, I would drop "describes a technique for dynamically
> > discovering the maximum transmission unit (MTU) of an arbitrary
> > internet path".
> >
> > * Bullet 2, s/ the the/the.
> >
> > * The reference to the LISP specification raises two concerns and one
> > comment:
> >
> > (1) I don't think it is a good approach that fragments induced by the
> > network are passed to their ultimate destinations as such (stateless).
> > IMO, reassembly should be done within the SFC domain (responsible for
> > fragmentation) not passed away.
> > (2) Does the stateful mode require all SFC data plane elements
> > maintain a full list of MTU for the any SFF/SF instance of the SFC
> domain?
> >
> > The current text suggests that [RFC6830] should be listed as normative
> > reference (not an informative one). I would personally favor removing
> > the reference to LISP (as it is an Experimental RFC).
> >
> > * The security section of the draft may be augmented with
> > informational fragmentation-related pointers to: e.g., RFC1858
> > (Security Considerations for IP Fragment Filtering), RFC3128
> > (Protection Against a Variant of the Tiny Fragment Attack), and RFC
> > 4963 (IPv4 Reassembly Errors at High Data Rates).
> >
> > Cheers,
> > Med
> >
> > > -----Message d'origine-----
> > > De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de
> > > mohamed.boucadair@orange.com Envoy=E9=A0: lundi 11 avril 2016 13:14 =
=C0=A0:
> > > Thomas Narten; sfc@ietf.org Objet=A0: Re: [sfc] WG last call for
> > > draft-ietf-sfc-nsh-04.txt
> > >
> > > Dear Thomas, all,
> > >
> > > As I mentioned during the meeting, there are several issues that are
> > > not covered in the last version of the draft. I already provided
> > > examples of the issues offline as requested by Martin.
> > >
> > > Cheers,
> > > Med
> > >
> > > > -----Message d'origine-----
> > > > De=A0: sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas Narte=
n
> > > > Envoy=E9=A0: jeudi 31 mars 2016 04:48 =C0=A0: sfc@ietf.org Objet=A0=
: [sfc]
> > > > WG last call for draft-ietf-sfc-nsh-04.txt
> > > >
> > > > Dear WG:
> > > >
> > > > This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> > > > (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> > > >
> > > > The editors of the NSH document have indicated that they have
> > > > addressed all known comments and that there are no open issues
> > > > with the current version of the document.
> > > >
> > > > Substantive comments to the list please, editorial comments can go
> > > > directly to the document editors.
> > > >
> > > > We'll also get a brief update from the editors at next week's
> > > > meeting. If there are any remaining issues with the document,
> > > > raising them before the meeting would be especially helpful.
> > > >
> > > > For the chairs,
> > > > Thomas
> > > >
> > > > _______________________________________________
> > > > sfc mailing list
> > > > sfc@ietf.org
> > > > https://www.ietf.org/mailman/listinfo/sfc
> > >
> > > _______________________________________________
> > > sfc mailing list
> > > sfc@ietf.org
> > > https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Mon Apr 25 06:47:53 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 948A312D0B0 for <sfc@ietfa.amsl.com>; Mon, 25 Apr 2016 06:47:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ox0WftGMwJey for <sfc@ietfa.amsl.com>; Mon, 25 Apr 2016 06:47:50 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C4A4312B014 for <sfc@ietf.org>; Mon, 25 Apr 2016 06:47:50 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 85EF62638DA; Mon, 25 Apr 2016 06:47:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461592070; bh=iaOVASiZFVGzWD40Vzw1tll9cMs+FmJ79fw/jrJSooI=; h=Subject:To:References:From:Date:In-Reply-To:From; b=J7Q+SKMI/M9g1YQ4ywCfrVYvlep008YdMr74xdRtSO7iTxWPZ2d/Mn2VYuTAYPS6v T/O+agxcxr05a17vYkvPgreK20ozU1ulIy67ODuyhT6DLphH0uE5bFrULEOrFi34Ap 8JPa+SimSgy1YGl40WsCJcfu5iaLgNuk/SXbXziY=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id DD5C5250978; Mon, 25 Apr 2016 06:47:49 -0700 (PDT)
To: mohamed.boucadair@orange.com, "sfc@ietf.org" <sfc@ietf.org>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com>
Date: Mon, 25 Apr 2016 09:47:43 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Zfe89R4gmG0M3NMZuXyB3Y6SHGg>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Apr 2016 13:47:52 -0000

If I am understanding you correctly Med, you are asking that the NSH 
draft specify how service chaining should cope with packets that have 
been fragmented?

NSH, and the SFF functionality, does not care.  It just does its job.
Ingress and intermediate classifiers may cope with fragments in any 
number of ways.  Specifying such is clearly out of scope for this draft. 
  I suppose one could write an informational draft on possible ways of 
coping.  The IETF has not usually published such.
Service functions have to cope with fragmented packets just as they had 
to before the advent of NSH, so describing that is clearly not needed here.

Yours,
Joel

On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
> Re-,
>
> I hear you, but my comment is that we need, as a WG, to decide what to put in the draft. FWIW, I'm discussing two fragmentation issues:
>
> (1) Fragmentation that is caused by prepending an SFC header.
> (2) Handling fragments at the ingress of an SFC-enabled domain.
>
> Increasing the MTU is for sure a recommendation is to be explicitly called out in the text (see my first message).
>
> There are other issues that need to be discussed, e.g., how to deal with fragments in SFFs/Classifiers?
>
> It is also "prudent" to check that no issues will be experienced in SFF to handle fragments. If an SFC header is prepended for all fragments, I'm not sure there
> is any particular issue at the SFF level, except if stripping/adding context TLVs depends on the full packet (not just fragment). It is warranted to consider a little bit this point before declaring there is no issue.
>
> For point (1), declaring fragmentation out of scope would be meant that an implementation must be prepared to receive fragments with or without NSH header as this is a decision that is left to the transport encapsulation. This is a requirement per se!
>
> I won't reiterate all the comments I have about the current wording of this section.
>
> Cheers,
> Med
>
>> -----Message d'origine-----
>> De : Elzur, Uri [mailto:uri.elzur@intel.com]
>> Envoyé : lundi 25 avril 2016 08:30
>> À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten; sfc@ietf.org
>> Objet : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Hi Med
>>
>> My point is that Fragmentation is yet another transport related issue that
>> is beyond the scope of NSH and beyond the charter of the WG, so it doesn't
>> really belong in the draft. We are providing an advice as extending the
>> size of the packet may lead to fragmentation, but as you check RFC 7348
>> VxLAN, which my create the same issue, you'll find it doesn't even relate
>> to it.
>>
>> Thx
>>
>> Uri ("Oo-Ree")
>> C: 949-378-7568
>>
>>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>> mohamed.boucadair@orange.com
>> Sent: Sunday, April 24, 2016 10:32 PM
>> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten <narten@us.ibm.com>;
>> sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Hi Uri,
>>
>> That's another option that needs to be discussed/investigated. I'm afraid
>> this is not the rationale adopted in -04 since it includes some text that
>> is far to be sufficient to ensure interoperable implementations.
>>
>> BTW, saying that nsh does not need to deal with fragmentation because it
>> is transport-independent is not IMHO a good strategy to adopt here because
>> it opens the door for interoperable issues, it may lead to sub-optimal
>> implementations if the sfc information is present only in one fragments,
>> etc.
>>
>> My comments are related to the current text in the -04. This text needs to
>> be fixed somehow.
>>
>> Cheers,
>> Med
>>
>>> -----Message d'origine-----
>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoyé : dimanche 24
>>> avril 2016 17:36 À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>> draft-ietf-sfc-nsh-04.txt
>>>
>>> Hi Med
>>>
>>> I see no need to specify the exact behavior as NSH is transport
>>> independent i.e. like NSH interaction with any other Transport eh
>>> issue of Fragmentation is to be dealt in a way that matches the
>>> mechanisms supported by the Transport used and do not belong in the
>>> NSH draft
>>>
>>> Thx
>>>
>>> Uri ("Oo-Ree")
>>> C: 949-378-7568
>>>
>>>
>>> -----Original Message-----
>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>> mohamed.boucadair@orange.com
>>> Sent: Thursday, April 14, 2016 12:43 AM
>>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> R-,
>>>
>>> In addition to other pending issues raised for this draft, I would
>>> like to raise this additional one about Section 6.
>>>
>>> ==
>>> 6.  Fragmentation Considerations
>>>
>>>    NSH and the associated transport header are "added" to the
>>>    encapsulated packet/frame.  This additional information increases the
>>>    size of the packet.  In order the ensure proper forwarding of NSH
>>>    data, several options for handling fragmentation and re-assembly
>>>    exist:
>>>
>>>    1.  Jumbo Frames, when supported, enable the transport of NSH and
>>>        associated transport packets without requiring fragmentation.
>>>
>>>    2.  Path MTU Discovery [RFC1191]"describes a technique for
>>>        dynamically discovering the maximum transmission unit (MTU) of an
>>>        arbitrary internet path" and can be utilized to ensure the the
>>>        required packet size is used.
>>>
>>>    3.  [RFC6830] describes two schemes for fragmentation and re-assembly
>>>        in section 5.4.
>>> ==
>>>
>>> * The text is weak for a Standard track document that is intended to
>>> solve the problem in https://tools.ietf.org/html/rfc7498#section-2.12.
>>> There should be a clear behavior to be followed by an implementation.
>>> Further, I would avoid the use of words such as "can".
>>>
>>> * The text covers only fragmentation when it is induced by SFC
>>> operations, it does not discuss the treatment of a fragment when
>>> received in an SFC domain. IMHO, the draft should also specify the
>>> behavior of the Classifier with regards to fragments for the sake of
>>> proper SFC operation. Applying classification policies may require the
>> full packet, not only a fragment.
>>> In particular, dedicated resources should dedicated for handling out
>>> of order fragments. Of course, it is out of scope of this document to
>>> describe how SFs handle fragments.
>>>
>>> * If an SFC header is prepended for all fragments, I'm not sure there
>>> is any particular issue at the SFF level...except if stripping/adding
>>> context TLVs depends on the full packet (not just fragment). It is
>>> warranted to consider a little bit this point before declaring there is
>> no issue.
>>>
>>> * The text states "several options". This may be interpreted as if
>>> implementing one of them is sufficient...which is not true. The first
>>> two points contribute to minimize the fragmentation risk, but
>>> fragmentation may still be experienced (e.g., other shims are
>>> prepended by other nodes for some other purposes, nested nsh, etc.)
>>>
>>> * The first two points have nothing to do with reassembly.
>>>
>>> * The support of jumbo frames by a router/device does not mean that it
>>> can make use of it. Appropriate MTU configuration should be undertaken
>>> in a consistent manner within an SFC domain. The text should be
>>> updated to make it is about (consistent) MTU configuration.
>>>
>>> * BTW, shouldn't the text be reworded to recommended to increase the
>>> MTU of **all nodes** of an SFC-enabled domain by at least the length
>>> of SFC header + transport header?
>>>
>>> * Bullet 2, how PMTU discovery is actually used in this context? Do
>>> you assume that all SFC-aware nodes will issue such messages towards
>>> other SFC-aware node, arbitrary destination, else?
>>>
>>> * Bullet 2, I would drop "describes a technique for dynamically
>>> discovering the maximum transmission unit (MTU) of an arbitrary
>>> internet path".
>>>
>>> * Bullet 2, s/ the the/the.
>>>
>>> * The reference to the LISP specification raises two concerns and one
>>> comment:
>>>
>>> (1) I don't think it is a good approach that fragments induced by the
>>> network are passed to their ultimate destinations as such (stateless).
>>> IMO, reassembly should be done within the SFC domain (responsible for
>>> fragmentation) not passed away.
>>> (2) Does the stateful mode require all SFC data plane elements
>>> maintain a full list of MTU for the any SFF/SF instance of the SFC
>> domain?
>>>
>>> The current text suggests that [RFC6830] should be listed as normative
>>> reference (not an informative one). I would personally favor removing
>>> the reference to LISP (as it is an Experimental RFC).
>>>
>>> * The security section of the draft may be augmented with
>>> informational fragmentation-related pointers to: e.g., RFC1858
>>> (Security Considerations for IP Fragment Filtering), RFC3128
>>> (Protection Against a Variant of the Tiny Fragment Attack), and RFC
>>> 4963 (IPv4 Reassembly Errors at High Data Rates).
>>>
>>> Cheers,
>>> Med
>>>
>>>> -----Message d'origine-----
>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de
>>>> mohamed.boucadair@orange.com Envoyé : lundi 11 avril 2016 13:14 À :
>>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG last call for
>>>> draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Dear Thomas, all,
>>>>
>>>> As I mentioned during the meeting, there are several issues that are
>>>> not covered in the last version of the draft. I already provided
>>>> examples of the issues offline as requested by Martin.
>>>>
>>>> Cheers,
>>>> Med
>>>>
>>>>> -----Message d'origine-----
>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten
>>>>> Envoyé : jeudi 31 mars 2016 04:48 À : sfc@ietf.org Objet : [sfc]
>>>>> WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Dear WG:
>>>>>
>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>
>>>>> The editors of the NSH document have indicated that they have
>>>>> addressed all known comments and that there are no open issues
>>>>> with the current version of the document.
>>>>>
>>>>> Substantive comments to the list please, editorial comments can go
>>>>> directly to the document editors.
>>>>>
>>>>> We'll also get a brief update from the editors at next week's
>>>>> meeting. If there are any remaining issues with the document,
>>>>> raising them before the meeting would be especially helpful.
>>>>>
>>>>> For the chairs,
>>>>> Thomas
>>>>>
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Mon Apr 25 07:18:19 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3CD9412B014 for <sfc@ietfa.amsl.com>; Mon, 25 Apr 2016 07:18:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ov8kZ4g5CT5I for <sfc@ietfa.amsl.com>; Mon, 25 Apr 2016 07:18:15 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F171612B040 for <sfc@ietf.org>; Mon, 25 Apr 2016 07:18:14 -0700 (PDT)
Received: from omfedm06.si.francetelecom.fr (unknown [xx.xx.xx.2]) by omfedm13.si.francetelecom.fr (ESMTP service) with ESMTP id 708593245D0; Mon, 25 Apr 2016 16:18:13 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.24]) by omfedm06.si.francetelecom.fr (ESMTP service) with ESMTP id 4ED8627C066; Mon, 25 Apr 2016 16:18:13 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7D.corporate.adroot.infra.ftgroup ([fe80::9044:c5ee:4dd2:4f16%19]) with mapi id 14.03.0279.002; Mon, 25 Apr 2016 16:18:13 +0200
From: <mohamed.boucadair@orange.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRnvkRmtJKuSm9sUC/43QpriLc9Z+atLPw
Date: Mon, 25 Apr 2016 14:18:12 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com>
In-Reply-To: <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.25.91516
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/5D5qeg0-_4ENq8dwqK-Ug3YNbH8>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Apr 2016 14:18:18 -0000

Hi Joel,=20

Please see inline.

Cheers,
Med

> -----Message d'origine-----
> De=A0: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Envoy=E9=A0: lundi 25 avril 2016 15:48
> =C0=A0: BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org
> Objet=A0: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> If I am understanding you correctly Med, you are asking that the NSH
> draft specify how service chaining should cope with packets that have
> been fragmented?
>=20

[Med] To be accurate, I'm asking to assess whether there are implications. =
If there are, then the draft should be updated accordingly.

> NSH, and the SFF functionality, does not care.

[Med] I'm not that sure. Some typical implications are listed below:

* SFF: If the NSH header is present only in the a fragment but SFF didn't m=
aintained a state, subsequent fragments won't be appropriately processed.=20
* SFC-aware function: if prepending a context information depends on the fu=
ll packet, not only a fragment.=20

  It just does its job.

[Med] which may be disturbed in some situations as listed in the examples a=
bove.

> Ingress and intermediate classifiers may cope with fragments in any
> number of ways.
  Specifying such is clearly out of scope for this draft.

[Med] The purpose is not to specify the internal implementation details but=
 the external behavior of the classifier function when it comes to handle f=
ragments. That behavior may have an incidence on SFF, in particular. The pu=
rpose is not to recommend the maximum resources to be dedicated to out of o=
rder fragments nor the timeout to cache those; these considerations are of =
course out of scope. Nevertheless, an implementation should offer a configu=
rable parameter so that an operator tweak those according to its context. =
=20

>   I suppose one could write an informational draft on possible ways of
> coping.  The IETF has not usually published such.
> Service functions have to cope with fragmented packets just as they had
> to before the advent of NSH, so describing that is clearly not needed
> here.

[Med] The advent of NSH has the following implications:
* it exacerbates fragmentation. Handing over this issue to the transport la=
yer may lead to interoperability issues.=20
* the chaining may not be efficient if fragments are inappropriately handle=
d.=20

Introducing NSH should not degrade the overall service compared to legacy s=
ervice deployment schemes.

>=20
> Yours,
> Joel
>=20
> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
> > Re-,
> >
> > I hear you, but my comment is that we need, as a WG, to decide what to
> put in the draft. FWIW, I'm discussing two fragmentation issues:
> >
> > (1) Fragmentation that is caused by prepending an SFC header.
> > (2) Handling fragments at the ingress of an SFC-enabled domain.
> >
> > Increasing the MTU is for sure a recommendation is to be explicitly
> called out in the text (see my first message).
> >
> > There are other issues that need to be discussed, e.g., how to deal wit=
h
> fragments in SFFs/Classifiers?
> >
> > It is also "prudent" to check that no issues will be experienced in SFF
> to handle fragments. If an SFC header is prepended for all fragments, I'm
> not sure there
> > is any particular issue at the SFF level, except if stripping/adding
> context TLVs depends on the full packet (not just fragment). It is
> warranted to consider a little bit this point before declaring there is n=
o
> issue.
> >
> > For point (1), declaring fragmentation out of scope would be meant that
> an implementation must be prepared to receive fragments with or without
> NSH header as this is a decision that is left to the transport
> encapsulation. This is a requirement per se!
> >
> > I won't reiterate all the comments I have about the current wording of
> this section.
> >
> > Cheers,
> > Med
> >
> >> -----Message d'origine-----
> >> De : Elzur, Uri [mailto:uri.elzur@intel.com]
> >> Envoy=E9 : lundi 25 avril 2016 08:30
> >> =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten; sfc@ietf.org
> >> Objet : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>
> >> Hi Med
> >>
> >> My point is that Fragmentation is yet another transport related issue
> that
> >> is beyond the scope of NSH and beyond the charter of the WG, so it
> doesn't
> >> really belong in the draft. We are providing an advice as extending th=
e
> >> size of the packet may lead to fragmentation, but as you check RFC 734=
8
> >> VxLAN, which my create the same issue, you'll find it doesn't even
> relate
> >> to it.
> >>
> >> Thx
> >>
> >> Uri ("Oo-Ree")
> >> C: 949-378-7568
> >>
> >>
> >> -----Original Message-----
> >> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
> >> mohamed.boucadair@orange.com
> >> Sent: Sunday, April 24, 2016 10:32 PM
> >> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
> <narten@us.ibm.com>;
> >> sfc@ietf.org
> >> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>
> >> Hi Uri,
> >>
> >> That's another option that needs to be discussed/investigated. I'm
> afraid
> >> this is not the rationale adopted in -04 since it includes some text
> that
> >> is far to be sufficient to ensure interoperable implementations.
> >>
> >> BTW, saying that nsh does not need to deal with fragmentation because
> it
> >> is transport-independent is not IMHO a good strategy to adopt here
> because
> >> it opens the door for interoperable issues, it may lead to sub-optimal
> >> implementations if the sfc information is present only in one
> fragments,
> >> etc.
> >>
> >> My comments are related to the current text in the -04. This text need=
s
> to
> >> be fixed somehow.
> >>
> >> Cheers,
> >> Med
> >>
> >>> -----Message d'origine-----
> >>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche 24
> >>> avril 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
> >>> sfc@ietf.org Objet : RE: [sfc] WG last call for
> >>> draft-ietf-sfc-nsh-04.txt
> >>>
> >>> Hi Med
> >>>
> >>> I see no need to specify the exact behavior as NSH is transport
> >>> independent i.e. like NSH interaction with any other Transport eh
> >>> issue of Fragmentation is to be dealt in a way that matches the
> >>> mechanisms supported by the Transport used and do not belong in the
> >>> NSH draft
> >>>
> >>> Thx
> >>>
> >>> Uri ("Oo-Ree")
> >>> C: 949-378-7568
> >>>
> >>>
> >>> -----Original Message-----
> >>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
> >>> mohamed.boucadair@orange.com
> >>> Sent: Thursday, April 14, 2016 12:43 AM
> >>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
> >>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>
> >>> R-,
> >>>
> >>> In addition to other pending issues raised for this draft, I would
> >>> like to raise this additional one about Section 6.
> >>>
> >>> =3D=3D
> >>> 6.  Fragmentation Considerations
> >>>
> >>>    NSH and the associated transport header are "added" to the
> >>>    encapsulated packet/frame.  This additional information increases
> the
> >>>    size of the packet.  In order the ensure proper forwarding of NSH
> >>>    data, several options for handling fragmentation and re-assembly
> >>>    exist:
> >>>
> >>>    1.  Jumbo Frames, when supported, enable the transport of NSH and
> >>>        associated transport packets without requiring fragmentation.
> >>>
> >>>    2.  Path MTU Discovery [RFC1191]"describes a technique for
> >>>        dynamically discovering the maximum transmission unit (MTU) of
> an
> >>>        arbitrary internet path" and can be utilized to ensure the the
> >>>        required packet size is used.
> >>>
> >>>    3.  [RFC6830] describes two schemes for fragmentation and re-
> assembly
> >>>        in section 5.4.
> >>> =3D=3D
> >>>
> >>> * The text is weak for a Standard track document that is intended to
> >>> solve the problem in https://tools.ietf.org/html/rfc7498#section-2.12=
.
> >>> There should be a clear behavior to be followed by an implementation.
> >>> Further, I would avoid the use of words such as "can".
> >>>
> >>> * The text covers only fragmentation when it is induced by SFC
> >>> operations, it does not discuss the treatment of a fragment when
> >>> received in an SFC domain. IMHO, the draft should also specify the
> >>> behavior of the Classifier with regards to fragments for the sake of
> >>> proper SFC operation. Applying classification policies may require th=
e
> >> full packet, not only a fragment.
> >>> In particular, dedicated resources should dedicated for handling out
> >>> of order fragments. Of course, it is out of scope of this document to
> >>> describe how SFs handle fragments.
> >>>
> >>> * If an SFC header is prepended for all fragments, I'm not sure there
> >>> is any particular issue at the SFF level...except if stripping/adding
> >>> context TLVs depends on the full packet (not just fragment). It is
> >>> warranted to consider a little bit this point before declaring there
> is
> >> no issue.
> >>>
> >>> * The text states "several options". This may be interpreted as if
> >>> implementing one of them is sufficient...which is not true. The first
> >>> two points contribute to minimize the fragmentation risk, but
> >>> fragmentation may still be experienced (e.g., other shims are
> >>> prepended by other nodes for some other purposes, nested nsh, etc.)
> >>>
> >>> * The first two points have nothing to do with reassembly.
> >>>
> >>> * The support of jumbo frames by a router/device does not mean that i=
t
> >>> can make use of it. Appropriate MTU configuration should be undertake=
n
> >>> in a consistent manner within an SFC domain. The text should be
> >>> updated to make it is about (consistent) MTU configuration.
> >>>
> >>> * BTW, shouldn't the text be reworded to recommended to increase the
> >>> MTU of **all nodes** of an SFC-enabled domain by at least the length
> >>> of SFC header + transport header?
> >>>
> >>> * Bullet 2, how PMTU discovery is actually used in this context? Do
> >>> you assume that all SFC-aware nodes will issue such messages towards
> >>> other SFC-aware node, arbitrary destination, else?
> >>>
> >>> * Bullet 2, I would drop "describes a technique for dynamically
> >>> discovering the maximum transmission unit (MTU) of an arbitrary
> >>> internet path".
> >>>
> >>> * Bullet 2, s/ the the/the.
> >>>
> >>> * The reference to the LISP specification raises two concerns and one
> >>> comment:
> >>>
> >>> (1) I don't think it is a good approach that fragments induced by the
> >>> network are passed to their ultimate destinations as such (stateless)=
.
> >>> IMO, reassembly should be done within the SFC domain (responsible for
> >>> fragmentation) not passed away.
> >>> (2) Does the stateful mode require all SFC data plane elements
> >>> maintain a full list of MTU for the any SFF/SF instance of the SFC
> >> domain?
> >>>
> >>> The current text suggests that [RFC6830] should be listed as normativ=
e
> >>> reference (not an informative one). I would personally favor removing
> >>> the reference to LISP (as it is an Experimental RFC).
> >>>
> >>> * The security section of the draft may be augmented with
> >>> informational fragmentation-related pointers to: e.g., RFC1858
> >>> (Security Considerations for IP Fragment Filtering), RFC3128
> >>> (Protection Against a Variant of the Tiny Fragment Attack), and RFC
> >>> 4963 (IPv4 Reassembly Errors at High Data Rates).
> >>>
> >>> Cheers,
> >>> Med
> >>>
> >>>> -----Message d'origine-----
> >>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de
> >>>> mohamed.boucadair@orange.com Envoy=E9 : lundi 11 avril 2016 13:14 =
=C0 :
> >>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG last call for
> >>>> draft-ietf-sfc-nsh-04.txt
> >>>>
> >>>> Dear Thomas, all,
> >>>>
> >>>> As I mentioned during the meeting, there are several issues that are
> >>>> not covered in the last version of the draft. I already provided
> >>>> examples of the issues offline as requested by Martin.
> >>>>
> >>>> Cheers,
> >>>> Med
> >>>>
> >>>>> -----Message d'origine-----
> >>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten
> >>>>> Envoy=E9 : jeudi 31 mars 2016 04:48 =C0 : sfc@ietf.org Objet : [sfc=
]
> >>>>> WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>>
> >>>>> Dear WG:
> >>>>>
> >>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> >>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> >>>>>
> >>>>> The editors of the NSH document have indicated that they have
> >>>>> addressed all known comments and that there are no open issues
> >>>>> with the current version of the document.
> >>>>>
> >>>>> Substantive comments to the list please, editorial comments can go
> >>>>> directly to the document editors.
> >>>>>
> >>>>> We'll also get a brief update from the editors at next week's
> >>>>> meeting. If there are any remaining issues with the document,
> >>>>> raising them before the meeting would be especially helpful.
> >>>>>
> >>>>> For the chairs,
> >>>>> Thomas
> >>>>>
> >>>>> _______________________________________________
> >>>>> sfc mailing list
> >>>>> sfc@ietf.org
> >>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>
> >>>> _______________________________________________
> >>>> sfc mailing list
> >>>> sfc@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>
> >>> _______________________________________________
> >>> sfc mailing list
> >>> sfc@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/sfc
> >>
> >> _______________________________________________
> >> sfc mailing list
> >> sfc@ietf.org
> >> https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
> >


From nobody Mon Apr 25 07:25:29 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 884C612D5DC for <sfc@ietfa.amsl.com>; Mon, 25 Apr 2016 07:25:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H4TaPjbPays9 for <sfc@ietfa.amsl.com>; Mon, 25 Apr 2016 07:25:26 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 34C7612D5D3 for <sfc@ietf.org>; Mon, 25 Apr 2016 07:25:26 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id EA65924E0D1; Mon, 25 Apr 2016 07:25:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461594325; bh=AmsahL/I70ypyyMBGkrOLc6/H1nX2TzETJktZpqpI50=; h=Subject:To:References:From:Date:In-Reply-To:From; b=Vt1lZaXez91GjoEFsNJ4UeHi9BoymQKsfoT8/6Hz9/Euf6mLMmju3DcAzOtlaeEk/ b/RiJ+mG/Rqx+O8FYHyiDEzg87bvrnMuf/edTObBbcpCfBA/t4PVC2v4auQuSQT0ib m+QN/VH0G6j4Enw34T/H/x5nBFiH93wK2X9kd9Co=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 3586C240E0F; Mon, 25 Apr 2016 07:25:24 -0700 (PDT)
To: mohamed.boucadair@orange.com, "sfc@ietf.org" <sfc@ietf.org>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <4e4601b5-1315-9869-5437-71816be627df@joelhalpern.com>
Date: Mon, 25 Apr 2016 10:25:18 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/bq4-DU6lRDKD6W62fIWO2T6Cg14>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Apr 2016 14:25:28 -0000

There are two different issues.
There is the question of what happens if adding the NSH header causes 
fragmentation.  I believe that is dealt with sufficiently.  It is in 
scope for the document.

The other issue is what happens if a packet is fragmented before it 
arrives at SFC.  the classifier can play any games it likes, but all of 
the packets it emits will end up getting NSH encapsulated.  The 
mechanism for doing that depends upon how the classifier works, and how 
the implementation couples the classifier to the encapsulator (which is 
internal and not subject ot standardization.)

So I do not see the disturbances you refer to.

Yours,
Joel

On 4/25/16 10:18 AM, mohamed.boucadair@orange.com wrote:
> Hi Joel,
>
> Please see inline.
>
> Cheers,
> Med
>
>> -----Message d'origine-----
>> De : Joel M. Halpern [mailto:jmh@joelhalpern.com]
>> Envoyé : lundi 25 avril 2016 15:48
>> À : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org
>> Objet : Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> If I am understanding you correctly Med, you are asking that the NSH
>> draft specify how service chaining should cope with packets that have
>> been fragmented?
>>
>
> [Med] To be accurate, I'm asking to assess whether there are implications. If there are, then the draft should be updated accordingly.
>
>> NSH, and the SFF functionality, does not care.
>
> [Med] I'm not that sure. Some typical implications are listed below:
>
> * SFF: If the NSH header is present only in the a fragment but SFF didn't maintained a state, subsequent fragments won't be appropriately processed.
> * SFC-aware function: if prepending a context information depends on the full packet, not only a fragment.
>
>   It just does its job.
>
> [Med] which may be disturbed in some situations as listed in the examples above.
>
>> Ingress and intermediate classifiers may cope with fragments in any
>> number of ways.
>   Specifying such is clearly out of scope for this draft.
>
> [Med] The purpose is not to specify the internal implementation details but the external behavior of the classifier function when it comes to handle fragments. That behavior may have an incidence on SFF, in particular. The purpose is not to recommend the maximum resources to be dedicated to out of order fragments nor the timeout to cache those; these considerations are of course out of scope. Nevertheless, an implementation should offer a configurable parameter so that an operator tweak those according to its context.
>
>>   I suppose one could write an informational draft on possible ways of
>> coping.  The IETF has not usually published such.
>> Service functions have to cope with fragmented packets just as they had
>> to before the advent of NSH, so describing that is clearly not needed
>> here.
>
> [Med] The advent of NSH has the following implications:
> * it exacerbates fragmentation. Handing over this issue to the transport layer may lead to interoperability issues.
> * the chaining may not be efficient if fragments are inappropriately handled.
>
> Introducing NSH should not degrade the overall service compared to legacy service deployment schemes.
>
>>
>> Yours,
>> Joel
>>
>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
>>> Re-,
>>>
>>> I hear you, but my comment is that we need, as a WG, to decide what to
>> put in the draft. FWIW, I'm discussing two fragmentation issues:
>>>
>>> (1) Fragmentation that is caused by prepending an SFC header.
>>> (2) Handling fragments at the ingress of an SFC-enabled domain.
>>>
>>> Increasing the MTU is for sure a recommendation is to be explicitly
>> called out in the text (see my first message).
>>>
>>> There are other issues that need to be discussed, e.g., how to deal with
>> fragments in SFFs/Classifiers?
>>>
>>> It is also "prudent" to check that no issues will be experienced in SFF
>> to handle fragments. If an SFC header is prepended for all fragments, I'm
>> not sure there
>>> is any particular issue at the SFF level, except if stripping/adding
>> context TLVs depends on the full packet (not just fragment). It is
>> warranted to consider a little bit this point before declaring there is no
>> issue.
>>>
>>> For point (1), declaring fragmentation out of scope would be meant that
>> an implementation must be prepared to receive fragments with or without
>> NSH header as this is a decision that is left to the transport
>> encapsulation. This is a requirement per se!
>>>
>>> I won't reiterate all the comments I have about the current wording of
>> this section.
>>>
>>> Cheers,
>>> Med
>>>
>>>> -----Message d'origine-----
>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com]
>>>> Envoyé : lundi 25 avril 2016 08:30
>>>> À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten; sfc@ietf.org
>>>> Objet : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Hi Med
>>>>
>>>> My point is that Fragmentation is yet another transport related issue
>> that
>>>> is beyond the scope of NSH and beyond the charter of the WG, so it
>> doesn't
>>>> really belong in the draft. We are providing an advice as extending the
>>>> size of the packet may lead to fragmentation, but as you check RFC 7348
>>>> VxLAN, which my create the same issue, you'll find it doesn't even
>> relate
>>>> to it.
>>>>
>>>> Thx
>>>>
>>>> Uri ("Oo-Ree")
>>>> C: 949-378-7568
>>>>
>>>>
>>>> -----Original Message-----
>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>> mohamed.boucadair@orange.com
>>>> Sent: Sunday, April 24, 2016 10:32 PM
>>>> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
>> <narten@us.ibm.com>;
>>>> sfc@ietf.org
>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Hi Uri,
>>>>
>>>> That's another option that needs to be discussed/investigated. I'm
>> afraid
>>>> this is not the rationale adopted in -04 since it includes some text
>> that
>>>> is far to be sufficient to ensure interoperable implementations.
>>>>
>>>> BTW, saying that nsh does not need to deal with fragmentation because
>> it
>>>> is transport-independent is not IMHO a good strategy to adopt here
>> because
>>>> it opens the door for interoperable issues, it may lead to sub-optimal
>>>> implementations if the sfc information is present only in one
>> fragments,
>>>> etc.
>>>>
>>>> My comments are related to the current text in the -04. This text needs
>> to
>>>> be fixed somehow.
>>>>
>>>> Cheers,
>>>> Med
>>>>
>>>>> -----Message d'origine-----
>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoyé : dimanche 24
>>>>> avril 2016 17:36 À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Med
>>>>>
>>>>> I see no need to specify the exact behavior as NSH is transport
>>>>> independent i.e. like NSH interaction with any other Transport eh
>>>>> issue of Fragmentation is to be dealt in a way that matches the
>>>>> mechanisms supported by the Transport used and do not belong in the
>>>>> NSH draft
>>>>>
>>>>> Thx
>>>>>
>>>>> Uri ("Oo-Ree")
>>>>> C: 949-378-7568
>>>>>
>>>>>
>>>>> -----Original Message-----
>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>> mohamed.boucadair@orange.com
>>>>> Sent: Thursday, April 14, 2016 12:43 AM
>>>>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> R-,
>>>>>
>>>>> In addition to other pending issues raised for this draft, I would
>>>>> like to raise this additional one about Section 6.
>>>>>
>>>>> ==
>>>>> 6.  Fragmentation Considerations
>>>>>
>>>>>    NSH and the associated transport header are "added" to the
>>>>>    encapsulated packet/frame.  This additional information increases
>> the
>>>>>    size of the packet.  In order the ensure proper forwarding of NSH
>>>>>    data, several options for handling fragmentation and re-assembly
>>>>>    exist:
>>>>>
>>>>>    1.  Jumbo Frames, when supported, enable the transport of NSH and
>>>>>        associated transport packets without requiring fragmentation.
>>>>>
>>>>>    2.  Path MTU Discovery [RFC1191]"describes a technique for
>>>>>        dynamically discovering the maximum transmission unit (MTU) of
>> an
>>>>>        arbitrary internet path" and can be utilized to ensure the the
>>>>>        required packet size is used.
>>>>>
>>>>>    3.  [RFC6830] describes two schemes for fragmentation and re-
>> assembly
>>>>>        in section 5.4.
>>>>> ==
>>>>>
>>>>> * The text is weak for a Standard track document that is intended to
>>>>> solve the problem in https://tools.ietf.org/html/rfc7498#section-2.12.
>>>>> There should be a clear behavior to be followed by an implementation.
>>>>> Further, I would avoid the use of words such as "can".
>>>>>
>>>>> * The text covers only fragmentation when it is induced by SFC
>>>>> operations, it does not discuss the treatment of a fragment when
>>>>> received in an SFC domain. IMHO, the draft should also specify the
>>>>> behavior of the Classifier with regards to fragments for the sake of
>>>>> proper SFC operation. Applying classification policies may require the
>>>> full packet, not only a fragment.
>>>>> In particular, dedicated resources should dedicated for handling out
>>>>> of order fragments. Of course, it is out of scope of this document to
>>>>> describe how SFs handle fragments.
>>>>>
>>>>> * If an SFC header is prepended for all fragments, I'm not sure there
>>>>> is any particular issue at the SFF level...except if stripping/adding
>>>>> context TLVs depends on the full packet (not just fragment). It is
>>>>> warranted to consider a little bit this point before declaring there
>> is
>>>> no issue.
>>>>>
>>>>> * The text states "several options". This may be interpreted as if
>>>>> implementing one of them is sufficient...which is not true. The first
>>>>> two points contribute to minimize the fragmentation risk, but
>>>>> fragmentation may still be experienced (e.g., other shims are
>>>>> prepended by other nodes for some other purposes, nested nsh, etc.)
>>>>>
>>>>> * The first two points have nothing to do with reassembly.
>>>>>
>>>>> * The support of jumbo frames by a router/device does not mean that it
>>>>> can make use of it. Appropriate MTU configuration should be undertaken
>>>>> in a consistent manner within an SFC domain. The text should be
>>>>> updated to make it is about (consistent) MTU configuration.
>>>>>
>>>>> * BTW, shouldn't the text be reworded to recommended to increase the
>>>>> MTU of **all nodes** of an SFC-enabled domain by at least the length
>>>>> of SFC header + transport header?
>>>>>
>>>>> * Bullet 2, how PMTU discovery is actually used in this context? Do
>>>>> you assume that all SFC-aware nodes will issue such messages towards
>>>>> other SFC-aware node, arbitrary destination, else?
>>>>>
>>>>> * Bullet 2, I would drop "describes a technique for dynamically
>>>>> discovering the maximum transmission unit (MTU) of an arbitrary
>>>>> internet path".
>>>>>
>>>>> * Bullet 2, s/ the the/the.
>>>>>
>>>>> * The reference to the LISP specification raises two concerns and one
>>>>> comment:
>>>>>
>>>>> (1) I don't think it is a good approach that fragments induced by the
>>>>> network are passed to their ultimate destinations as such (stateless).
>>>>> IMO, reassembly should be done within the SFC domain (responsible for
>>>>> fragmentation) not passed away.
>>>>> (2) Does the stateful mode require all SFC data plane elements
>>>>> maintain a full list of MTU for the any SFF/SF instance of the SFC
>>>> domain?
>>>>>
>>>>> The current text suggests that [RFC6830] should be listed as normative
>>>>> reference (not an informative one). I would personally favor removing
>>>>> the reference to LISP (as it is an Experimental RFC).
>>>>>
>>>>> * The security section of the draft may be augmented with
>>>>> informational fragmentation-related pointers to: e.g., RFC1858
>>>>> (Security Considerations for IP Fragment Filtering), RFC3128
>>>>> (Protection Against a Variant of the Tiny Fragment Attack), and RFC
>>>>> 4963 (IPv4 Reassembly Errors at High Data Rates).
>>>>>
>>>>> Cheers,
>>>>> Med
>>>>>
>>>>>> -----Message d'origine-----
>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de
>>>>>> mohamed.boucadair@orange.com Envoyé : lundi 11 avril 2016 13:14 À :
>>>>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG last call for
>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Dear Thomas, all,
>>>>>>
>>>>>> As I mentioned during the meeting, there are several issues that are
>>>>>> not covered in the last version of the draft. I already provided
>>>>>> examples of the issues offline as requested by Martin.
>>>>>>
>>>>>> Cheers,
>>>>>> Med
>>>>>>
>>>>>>> -----Message d'origine-----
>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten
>>>>>>> Envoyé : jeudi 31 mars 2016 04:48 À : sfc@ietf.org Objet : [sfc]
>>>>>>> WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Dear WG:
>>>>>>>
>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>
>>>>>>> The editors of the NSH document have indicated that they have
>>>>>>> addressed all known comments and that there are no open issues
>>>>>>> with the current version of the document.
>>>>>>>
>>>>>>> Substantive comments to the list please, editorial comments can go
>>>>>>> directly to the document editors.
>>>>>>>
>>>>>>> We'll also get a brief update from the editors at next week's
>>>>>>> meeting. If there are any remaining issues with the document,
>>>>>>> raising them before the meeting would be especially helpful.
>>>>>>>
>>>>>>> For the chairs,
>>>>>>> Thomas
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> sfc mailing list
>>>>>>> sfc@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>


From nobody Mon Apr 25 07:27:01 2016
Return-Path: <uri.elzur@intel.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 67F6812D607 for <sfc@ietfa.amsl.com>; Mon, 25 Apr 2016 07:27:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.897
X-Spam-Level: 
X-Spam-Status: No, score=-2.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FmVgoAgO6kau for <sfc@ietfa.amsl.com>; Mon, 25 Apr 2016 07:26:47 -0700 (PDT)
Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) by ietfa.amsl.com (Postfix) with ESMTP id 994D012D600 for <sfc@ietf.org>; Mon, 25 Apr 2016 07:26:47 -0700 (PDT)
Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga104.fm.intel.com with ESMTP; 25 Apr 2016 07:26:16 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.24,533,1455004800"; d="scan'208";a="962266805"
Received: from orsmsx103.amr.corp.intel.com ([10.22.225.130]) by orsmga002.jf.intel.com with ESMTP; 25 Apr 2016 07:26:16 -0700
Received: from orsmsx114.amr.corp.intel.com ([169.254.8.253]) by ORSMSX103.amr.corp.intel.com ([169.254.5.227]) with mapi id 14.03.0248.002; Mon, 25 Apr 2016 07:26:15 -0700
From: "Elzur, Uri" <uri.elzur@intel.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfPQCYv/wVVMUagOUO32rRCGp+Er+AwgARg/TCAEFX48IABYBMA//+ZdQCAAHv92oAAfagA//+MZ0A=
Date: Mon, 25 Apr 2016 14:26:15 +0000
Message-ID: <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiNTExOTU3Y2YtMWQ1ZS00MzYxLTk3YzctMWJjNThiZTdjMjA5IiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX0lDIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE1LjkuNi42IiwiVHJ1c3RlZExhYmVsSGFzaCI6IlBOYlo0elJuRjdmTjBVdEh6TytJNHEwZ1Jja2tQNFRpRWkyNXBSNmdyNmc9In0=
x-ctpclassification: CTP_IC
x-originating-ip: [10.22.254.138]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/EQGjVzB7-qAZoQDivce7bYYmGsk>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Apr 2016 14:27:00 -0000

Hi Med

Not to repeat my position, but I'll do it anyhow :-)
As NSH is *NOT* a transport, dealing with fragmentation is left to the Tran=
sport used.

The model I use for NSH, is basically similar to VXLAN . It is an overly.=20

Thx

Uri ("Oo-Ree")
C: 949-378-7568


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of mohamed.boucadair@oran=
ge.com
Sent: Monday, April 25, 2016 7:18 AM
To: Joel M. Halpern <jmh@joelhalpern.com>; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Hi Joel,=20

Please see inline.

Cheers,
Med

> -----Message d'origine-----
> De=A0: Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoy=E9=A0: lundi 25=
=20
> avril 2016 15:48 =C0=A0: BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet=A0=
:=20
> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> If I am understanding you correctly Med, you are asking that the NSH=20
> draft specify how service chaining should cope with packets that have=20
> been fragmented?
>=20

[Med] To be accurate, I'm asking to assess whether there are implications. =
If there are, then the draft should be updated accordingly.

> NSH, and the SFF functionality, does not care.

[Med] I'm not that sure. Some typical implications are listed below:

* SFF: If the NSH header is present only in the a fragment but SFF didn't m=
aintained a state, subsequent fragments won't be appropriately processed.=20
* SFC-aware function: if prepending a context information depends on the fu=
ll packet, not only a fragment.=20

  It just does its job.

[Med] which may be disturbed in some situations as listed in the examples a=
bove.

> Ingress and intermediate classifiers may cope with fragments in any=20
> number of ways.
  Specifying such is clearly out of scope for this draft.

[Med] The purpose is not to specify the internal implementation details but=
 the external behavior of the classifier function when it comes to handle f=
ragments. That behavior may have an incidence on SFF, in particular. The pu=
rpose is not to recommend the maximum resources to be dedicated to out of o=
rder fragments nor the timeout to cache those; these considerations are of =
course out of scope. Nevertheless, an implementation should offer a configu=
rable parameter so that an operator tweak those according to its context. =
=20

>   I suppose one could write an informational draft on possible ways of=20
> coping.  The IETF has not usually published such.
> Service functions have to cope with fragmented packets just as they=20
> had to before the advent of NSH, so describing that is clearly not=20
> needed here.

[Med] The advent of NSH has the following implications:
* it exacerbates fragmentation. Handing over this issue to the transport la=
yer may lead to interoperability issues.=20
* the chaining may not be efficient if fragments are inappropriately handle=
d.=20

Introducing NSH should not degrade the overall service compared to legacy s=
ervice deployment schemes.

>=20
> Yours,
> Joel
>=20
> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
> > Re-,
> >
> > I hear you, but my comment is that we need, as a WG, to decide what=20
> > to
> put in the draft. FWIW, I'm discussing two fragmentation issues:
> >
> > (1) Fragmentation that is caused by prepending an SFC header.
> > (2) Handling fragments at the ingress of an SFC-enabled domain.
> >
> > Increasing the MTU is for sure a recommendation is to be explicitly
> called out in the text (see my first message).
> >
> > There are other issues that need to be discussed, e.g., how to deal=20
> > with
> fragments in SFFs/Classifiers?
> >
> > It is also "prudent" to check that no issues will be experienced in=20
> > SFF
> to handle fragments. If an SFC header is prepended for all fragments,=20
> I'm not sure there
> > is any particular issue at the SFF level, except if stripping/adding
> context TLVs depends on the full packet (not just fragment). It is=20
> warranted to consider a little bit this point before declaring there=20
> is no issue.
> >
> > For point (1), declaring fragmentation out of scope would be meant=20
> > that
> an implementation must be prepared to receive fragments with or=20
> without NSH header as this is a decision that is left to the transport=20
> encapsulation. This is a requirement per se!
> >
> > I won't reiterate all the comments I have about the current wording=20
> > of
> this section.
> >
> > Cheers,
> > Med
> >
> >> -----Message d'origine-----
> >> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25=20
> >> avril 2016 08:30 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;=20
> >> sfc@ietf.org Objet : RE: [sfc] WG last call for=20
> >> draft-ietf-sfc-nsh-04.txt
> >>
> >> Hi Med
> >>
> >> My point is that Fragmentation is yet another transport related=20
> >> issue
> that
> >> is beyond the scope of NSH and beyond the charter of the WG, so it
> doesn't
> >> really belong in the draft. We are providing an advice as extending=20
> >> the size of the packet may lead to fragmentation, but as you check=20
> >> RFC 7348 VxLAN, which my create the same issue, you'll find it=20
> >> doesn't even
> relate
> >> to it.
> >>
> >> Thx
> >>
> >> Uri ("Oo-Ree")
> >> C: 949-378-7568
> >>
> >>
> >> -----Original Message-----
> >> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
> >> mohamed.boucadair@orange.com
> >> Sent: Sunday, April 24, 2016 10:32 PM
> >> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
> <narten@us.ibm.com>;
> >> sfc@ietf.org
> >> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>
> >> Hi Uri,
> >>
> >> That's another option that needs to be discussed/investigated. I'm
> afraid
> >> this is not the rationale adopted in -04 since it includes some=20
> >> text
> that
> >> is far to be sufficient to ensure interoperable implementations.
> >>
> >> BTW, saying that nsh does not need to deal with fragmentation=20
> >> because
> it
> >> is transport-independent is not IMHO a good strategy to adopt here
> because
> >> it opens the door for interoperable issues, it may lead to=20
> >> sub-optimal implementations if the sfc information is present only=20
> >> in one
> fragments,
> >> etc.
> >>
> >> My comments are related to the current text in the -04. This text=20
> >> needs
> to
> >> be fixed somehow.
> >>
> >> Cheers,
> >> Med
> >>
> >>> -----Message d'origine-----
> >>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche 24=20
> >>> avril 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;=20
> >>> sfc@ietf.org Objet : RE: [sfc] WG last call for=20
> >>> draft-ietf-sfc-nsh-04.txt
> >>>
> >>> Hi Med
> >>>
> >>> I see no need to specify the exact behavior as NSH is transport=20
> >>> independent i.e. like NSH interaction with any other Transport eh=20
> >>> issue of Fragmentation is to be dealt in a way that matches the=20
> >>> mechanisms supported by the Transport used and do not belong in=20
> >>> the NSH draft
> >>>
> >>> Thx
> >>>
> >>> Uri ("Oo-Ree")
> >>> C: 949-378-7568
> >>>
> >>>
> >>> -----Original Message-----
> >>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
> >>> mohamed.boucadair@orange.com
> >>> Sent: Thursday, April 14, 2016 12:43 AM
> >>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
> >>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>
> >>> R-,
> >>>
> >>> In addition to other pending issues raised for this draft, I would=20
> >>> like to raise this additional one about Section 6.
> >>>
> >>> =3D=3D
> >>> 6.  Fragmentation Considerations
> >>>
> >>>    NSH and the associated transport header are "added" to the
> >>>    encapsulated packet/frame.  This additional information=20
> >>> increases
> the
> >>>    size of the packet.  In order the ensure proper forwarding of NSH
> >>>    data, several options for handling fragmentation and re-assembly
> >>>    exist:
> >>>
> >>>    1.  Jumbo Frames, when supported, enable the transport of NSH and
> >>>        associated transport packets without requiring fragmentation.
> >>>
> >>>    2.  Path MTU Discovery [RFC1191]"describes a technique for
> >>>        dynamically discovering the maximum transmission unit (MTU)=20
> >>> of
> an
> >>>        arbitrary internet path" and can be utilized to ensure the the
> >>>        required packet size is used.
> >>>
> >>>    3.  [RFC6830] describes two schemes for fragmentation and re-
> assembly
> >>>        in section 5.4.
> >>> =3D=3D
> >>>
> >>> * The text is weak for a Standard track document that is intended=20
> >>> to solve the problem in https://tools.ietf.org/html/rfc7498#section-2=
.12.
> >>> There should be a clear behavior to be followed by an implementation.
> >>> Further, I would avoid the use of words such as "can".
> >>>
> >>> * The text covers only fragmentation when it is induced by SFC=20
> >>> operations, it does not discuss the treatment of a fragment when=20
> >>> received in an SFC domain. IMHO, the draft should also specify the=20
> >>> behavior of the Classifier with regards to fragments for the sake=20
> >>> of proper SFC operation. Applying classification policies may=20
> >>> require the
> >> full packet, not only a fragment.
> >>> In particular, dedicated resources should dedicated for handling=20
> >>> out of order fragments. Of course, it is out of scope of this=20
> >>> document to describe how SFs handle fragments.
> >>>
> >>> * If an SFC header is prepended for all fragments, I'm not sure=20
> >>> there is any particular issue at the SFF level...except if=20
> >>> stripping/adding context TLVs depends on the full packet (not just=20
> >>> fragment). It is warranted to consider a little bit this point=20
> >>> before declaring there
> is
> >> no issue.
> >>>
> >>> * The text states "several options". This may be interpreted as if=20
> >>> implementing one of them is sufficient...which is not true. The=20
> >>> first two points contribute to minimize the fragmentation risk,=20
> >>> but fragmentation may still be experienced (e.g., other shims are=20
> >>> prepended by other nodes for some other purposes, nested nsh,=20
> >>> etc.)
> >>>
> >>> * The first two points have nothing to do with reassembly.
> >>>
> >>> * The support of jumbo frames by a router/device does not mean=20
> >>> that it can make use of it. Appropriate MTU configuration should=20
> >>> be undertaken in a consistent manner within an SFC domain. The=20
> >>> text should be updated to make it is about (consistent) MTU configura=
tion.
> >>>
> >>> * BTW, shouldn't the text be reworded to recommended to increase=20
> >>> the MTU of **all nodes** of an SFC-enabled domain by at least the=20
> >>> length of SFC header + transport header?
> >>>
> >>> * Bullet 2, how PMTU discovery is actually used in this context?=20
> >>> Do you assume that all SFC-aware nodes will issue such messages=20
> >>> towards other SFC-aware node, arbitrary destination, else?
> >>>
> >>> * Bullet 2, I would drop "describes a technique for dynamically=20
> >>> discovering the maximum transmission unit (MTU) of an arbitrary=20
> >>> internet path".
> >>>
> >>> * Bullet 2, s/ the the/the.
> >>>
> >>> * The reference to the LISP specification raises two concerns and=20
> >>> one
> >>> comment:
> >>>
> >>> (1) I don't think it is a good approach that fragments induced by=20
> >>> the network are passed to their ultimate destinations as such (statel=
ess).
> >>> IMO, reassembly should be done within the SFC domain (responsible=20
> >>> for
> >>> fragmentation) not passed away.
> >>> (2) Does the stateful mode require all SFC data plane elements=20
> >>> maintain a full list of MTU for the any SFF/SF instance of the SFC
> >> domain?
> >>>
> >>> The current text suggests that [RFC6830] should be listed as=20
> >>> normative reference (not an informative one). I would personally=20
> >>> favor removing the reference to LISP (as it is an Experimental RFC).
> >>>
> >>> * The security section of the draft may be augmented with=20
> >>> informational fragmentation-related pointers to: e.g., RFC1858=20
> >>> (Security Considerations for IP Fragment Filtering), RFC3128=20
> >>> (Protection Against a Variant of the Tiny Fragment Attack), and=20
> >>> RFC
> >>> 4963 (IPv4 Reassembly Errors at High Data Rates).
> >>>
> >>> Cheers,
> >>> Med
> >>>
> >>>> -----Message d'origine-----
> >>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de=20
> >>>> mohamed.boucadair@orange.com Envoy=E9 : lundi 11 avril 2016 13:14 =
=C0 :
> >>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG last call for=20
> >>>> draft-ietf-sfc-nsh-04.txt
> >>>>
> >>>> Dear Thomas, all,
> >>>>
> >>>> As I mentioned during the meeting, there are several issues that=20
> >>>> are not covered in the last version of the draft. I already=20
> >>>> provided examples of the issues offline as requested by Martin.
> >>>>
> >>>> Cheers,
> >>>> Med
> >>>>
> >>>>> -----Message d'origine-----
> >>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas=20
> >>>>> Narten Envoy=E9 : jeudi 31 mars 2016 04:48 =C0 : sfc@ietf.org Objet=
=20
> >>>>> : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>>
> >>>>> Dear WG:
> >>>>>
> >>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt=20
> >>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> >>>>>
> >>>>> The editors of the NSH document have indicated that they have=20
> >>>>> addressed all known comments and that there are no open issues=20
> >>>>> with the current version of the document.
> >>>>>
> >>>>> Substantive comments to the list please, editorial comments can=20
> >>>>> go directly to the document editors.
> >>>>>
> >>>>> We'll also get a brief update from the editors at next week's=20
> >>>>> meeting. If there are any remaining issues with the document,=20
> >>>>> raising them before the meeting would be especially helpful.
> >>>>>
> >>>>> For the chairs,
> >>>>> Thomas
> >>>>>
> >>>>> _______________________________________________
> >>>>> sfc mailing list
> >>>>> sfc@ietf.org
> >>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>
> >>>> _______________________________________________
> >>>> sfc mailing list
> >>>> sfc@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>
> >>> _______________________________________________
> >>> sfc mailing list
> >>> sfc@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/sfc
> >>
> >> _______________________________________________
> >> sfc mailing list
> >> sfc@ietf.org
> >> https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
> >

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Mon Apr 25 07:40:34 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 40B4A12D600 for <sfc@ietfa.amsl.com>; Mon, 25 Apr 2016 07:40:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AH-nEgjn-ROu for <sfc@ietfa.amsl.com>; Mon, 25 Apr 2016 07:40:30 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9459112D156 for <sfc@ietf.org>; Mon, 25 Apr 2016 07:40:29 -0700 (PDT)
Received: from omfedm06.si.francetelecom.fr (unknown [xx.xx.xx.2]) by omfedm09.si.francetelecom.fr (ESMTP service) with ESMTP id 396872DC2EE; Mon, 25 Apr 2016 16:40:27 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.17]) by omfedm06.si.francetelecom.fr (ESMTP service) with ESMTP id BF62F27C066; Mon, 25 Apr 2016 16:40:27 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM24.corporate.adroot.infra.ftgroup ([fe80::a1e6:3e6a:1f68:5f7e%19]) with mapi id 14.03.0279.002; Mon, 25 Apr 2016 16:40:27 +0200
From: <mohamed.boucadair@orange.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRnv5RcgW3qL7FtUSw06t+AZg8jp+awCng
Date: Mon, 25 Apr 2016 14:40:26 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D5F58B@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4e4601b5-1315-9869-5437-71816be627df@joelhalpern.com>
In-Reply-To: <4e4601b5-1315-9869-5437-71816be627df@joelhalpern.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.25.91516
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/erBbaZ_8-jbQxa4Ia17Es7M0M28>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Apr 2016 14:40:33 -0000

Re-,

Please see inline.

Cheers,
Med

> -----Message d'origine-----
> De=A0: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Envoy=E9=A0: lundi 25 avril 2016 16:25
> =C0=A0: BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org
> Objet=A0: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> There are two different issues.
> There is the question of what happens if adding the NSH header causes
> fragmentation.  I believe that is dealt with sufficiently.  It is in
> scope for the document.

[Med] Glad to see that we both agree that this is in scope. Unlike you, the=
 current text needs more work IMHO (please refer to may detailed comments o=
n this part).

>=20
> The other issue is what happens if a packet is fragmented before it
> arrives at SFC.  the classifier can play any games it likes, but all of
> the packets it emits will end up getting NSH encapsulated.

[Med] We fully agree here. This is a what I called "the external behavior o=
f the classifier function when it comes to handle fragments" in my reply to=
 you. This should be cited as such in the specification.=20

  The
> mechanism for doing that depends upon how the classifier works, and how
> the implementation couples the classifier to the encapsulator (which is
> internal and not subject ot standardization.)

[Med] We are fully inline. That's why I said in my answer "The purpose is n=
ot to specify the internal implementation details". =20

>=20
> So I do not see the disturbances you refer to.

[Med] If you don't have NSH encapsulation for all fragments, then disturban=
ces will be experienced.

>=20
> Yours,
> Joel
>=20
> On 4/25/16 10:18 AM, mohamed.boucadair@orange.com wrote:
> > Hi Joel,
> >
> > Please see inline.
> >
> > Cheers,
> > Med
> >
> >> -----Message d'origine-----
> >> De : Joel M. Halpern [mailto:jmh@joelhalpern.com]
> >> Envoy=E9 : lundi 25 avril 2016 15:48
> >> =C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org
> >> Objet : Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>
> >> If I am understanding you correctly Med, you are asking that the NSH
> >> draft specify how service chaining should cope with packets that have
> >> been fragmented?
> >>
> >
> > [Med] To be accurate, I'm asking to assess whether there are
> implications. If there are, then the draft should be updated accordingly.
> >
> >> NSH, and the SFF functionality, does not care.
> >
> > [Med] I'm not that sure. Some typical implications are listed below:
> >
> > * SFF: If the NSH header is present only in the a fragment but SFF
> didn't maintained a state, subsequent fragments won't be appropriately
> processed.
> > * SFC-aware function: if prepending a context information depends on th=
e
> full packet, not only a fragment.
> >
> >   It just does its job.
> >
> > [Med] which may be disturbed in some situations as listed in the
> examples above.
> >
> >> Ingress and intermediate classifiers may cope with fragments in any
> >> number of ways.
> >   Specifying such is clearly out of scope for this draft.
> >
> > [Med] The purpose is not to specify the internal implementation details
> but the external behavior of the classifier function when it comes to
> handle fragments. That behavior may have an incidence on SFF, in
> particular. The purpose is not to recommend the maximum resources to be
> dedicated to out of order fragments nor the timeout to cache those; these
> considerations are of course out of scope. Nevertheless, an implementatio=
n
> should offer a configurable parameter so that an operator tweak those
> according to its context.
> >
> >>   I suppose one could write an informational draft on possible ways of
> >> coping.  The IETF has not usually published such.
> >> Service functions have to cope with fragmented packets just as they ha=
d
> >> to before the advent of NSH, so describing that is clearly not needed
> >> here.
> >
> > [Med] The advent of NSH has the following implications:
> > * it exacerbates fragmentation. Handing over this issue to the transpor=
t
> layer may lead to interoperability issues.
> > * the chaining may not be efficient if fragments are inappropriately
> handled.
> >
> > Introducing NSH should not degrade the overall service compared to
> legacy service deployment schemes.
> >
> >>
> >> Yours,
> >> Joel
> >>
> >> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
> >>> Re-,
> >>>
> >>> I hear you, but my comment is that we need, as a WG, to decide what t=
o
> >> put in the draft. FWIW, I'm discussing two fragmentation issues:
> >>>
> >>> (1) Fragmentation that is caused by prepending an SFC header.
> >>> (2) Handling fragments at the ingress of an SFC-enabled domain.
> >>>
> >>> Increasing the MTU is for sure a recommendation is to be explicitly
> >> called out in the text (see my first message).
> >>>
> >>> There are other issues that need to be discussed, e.g., how to deal
> with
> >> fragments in SFFs/Classifiers?
> >>>
> >>> It is also "prudent" to check that no issues will be experienced in
> SFF
> >> to handle fragments. If an SFC header is prepended for all fragments,
> I'm
> >> not sure there
> >>> is any particular issue at the SFF level, except if stripping/adding
> >> context TLVs depends on the full packet (not just fragment). It is
> >> warranted to consider a little bit this point before declaring there i=
s
> no
> >> issue.
> >>>
> >>> For point (1), declaring fragmentation out of scope would be meant
> that
> >> an implementation must be prepared to receive fragments with or withou=
t
> >> NSH header as this is a decision that is left to the transport
> >> encapsulation. This is a requirement per se!
> >>>
> >>> I won't reiterate all the comments I have about the current wording o=
f
> >> this section.
> >>>
> >>> Cheers,
> >>> Med
> >>>
> >>>> -----Message d'origine-----
> >>>> De : Elzur, Uri [mailto:uri.elzur@intel.com]
> >>>> Envoy=E9 : lundi 25 avril 2016 08:30
> >>>> =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten; sfc@ietf.org
> >>>> Objet : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>
> >>>> Hi Med
> >>>>
> >>>> My point is that Fragmentation is yet another transport related issu=
e
> >> that
> >>>> is beyond the scope of NSH and beyond the charter of the WG, so it
> >> doesn't
> >>>> really belong in the draft. We are providing an advice as extending
> the
> >>>> size of the packet may lead to fragmentation, but as you check RFC
> 7348
> >>>> VxLAN, which my create the same issue, you'll find it doesn't even
> >> relate
> >>>> to it.
> >>>>
> >>>> Thx
> >>>>
> >>>> Uri ("Oo-Ree")
> >>>> C: 949-378-7568
> >>>>
> >>>>
> >>>> -----Original Message-----
> >>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
> >>>> mohamed.boucadair@orange.com
> >>>> Sent: Sunday, April 24, 2016 10:32 PM
> >>>> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
> >> <narten@us.ibm.com>;
> >>>> sfc@ietf.org
> >>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>
> >>>> Hi Uri,
> >>>>
> >>>> That's another option that needs to be discussed/investigated. I'm
> >> afraid
> >>>> this is not the rationale adopted in -04 since it includes some text
> >> that
> >>>> is far to be sufficient to ensure interoperable implementations.
> >>>>
> >>>> BTW, saying that nsh does not need to deal with fragmentation becaus=
e
> >> it
> >>>> is transport-independent is not IMHO a good strategy to adopt here
> >> because
> >>>> it opens the door for interoperable issues, it may lead to sub-
> optimal
> >>>> implementations if the sfc information is present only in one
> >> fragments,
> >>>> etc.
> >>>>
> >>>> My comments are related to the current text in the -04. This text
> needs
> >> to
> >>>> be fixed somehow.
> >>>>
> >>>> Cheers,
> >>>> Med
> >>>>
> >>>>> -----Message d'origine-----
> >>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche 24
> >>>>> avril 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
> >>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
> >>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>
> >>>>> Hi Med
> >>>>>
> >>>>> I see no need to specify the exact behavior as NSH is transport
> >>>>> independent i.e. like NSH interaction with any other Transport eh
> >>>>> issue of Fragmentation is to be dealt in a way that matches the
> >>>>> mechanisms supported by the Transport used and do not belong in the
> >>>>> NSH draft
> >>>>>
> >>>>> Thx
> >>>>>
> >>>>> Uri ("Oo-Ree")
> >>>>> C: 949-378-7568
> >>>>>
> >>>>>
> >>>>> -----Original Message-----
> >>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
> >>>>> mohamed.boucadair@orange.com
> >>>>> Sent: Thursday, April 14, 2016 12:43 AM
> >>>>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
> >>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>>
> >>>>> R-,
> >>>>>
> >>>>> In addition to other pending issues raised for this draft, I would
> >>>>> like to raise this additional one about Section 6.
> >>>>>
> >>>>> =3D=3D
> >>>>> 6.  Fragmentation Considerations
> >>>>>
> >>>>>    NSH and the associated transport header are "added" to the
> >>>>>    encapsulated packet/frame.  This additional information increase=
s
> >> the
> >>>>>    size of the packet.  In order the ensure proper forwarding of NS=
H
> >>>>>    data, several options for handling fragmentation and re-assembly
> >>>>>    exist:
> >>>>>
> >>>>>    1.  Jumbo Frames, when supported, enable the transport of NSH an=
d
> >>>>>        associated transport packets without requiring fragmentation=
.
> >>>>>
> >>>>>    2.  Path MTU Discovery [RFC1191]"describes a technique for
> >>>>>        dynamically discovering the maximum transmission unit (MTU)
> of
> >> an
> >>>>>        arbitrary internet path" and can be utilized to ensure the
> the
> >>>>>        required packet size is used.
> >>>>>
> >>>>>    3.  [RFC6830] describes two schemes for fragmentation and re-
> >> assembly
> >>>>>        in section 5.4.
> >>>>> =3D=3D
> >>>>>
> >>>>> * The text is weak for a Standard track document that is intended t=
o
> >>>>> solve the problem in https://tools.ietf.org/html/rfc7498#section-
> 2.12.
> >>>>> There should be a clear behavior to be followed by an
> implementation.
> >>>>> Further, I would avoid the use of words such as "can".
> >>>>>
> >>>>> * The text covers only fragmentation when it is induced by SFC
> >>>>> operations, it does not discuss the treatment of a fragment when
> >>>>> received in an SFC domain. IMHO, the draft should also specify the
> >>>>> behavior of the Classifier with regards to fragments for the sake o=
f
> >>>>> proper SFC operation. Applying classification policies may require
> the
> >>>> full packet, not only a fragment.
> >>>>> In particular, dedicated resources should dedicated for handling ou=
t
> >>>>> of order fragments. Of course, it is out of scope of this document
> to
> >>>>> describe how SFs handle fragments.
> >>>>>
> >>>>> * If an SFC header is prepended for all fragments, I'm not sure
> there
> >>>>> is any particular issue at the SFF level...except if
> stripping/adding
> >>>>> context TLVs depends on the full packet (not just fragment). It is
> >>>>> warranted to consider a little bit this point before declaring ther=
e
> >> is
> >>>> no issue.
> >>>>>
> >>>>> * The text states "several options". This may be interpreted as if
> >>>>> implementing one of them is sufficient...which is not true. The
> first
> >>>>> two points contribute to minimize the fragmentation risk, but
> >>>>> fragmentation may still be experienced (e.g., other shims are
> >>>>> prepended by other nodes for some other purposes, nested nsh, etc.)
> >>>>>
> >>>>> * The first two points have nothing to do with reassembly.
> >>>>>
> >>>>> * The support of jumbo frames by a router/device does not mean that
> it
> >>>>> can make use of it. Appropriate MTU configuration should be
> undertaken
> >>>>> in a consistent manner within an SFC domain. The text should be
> >>>>> updated to make it is about (consistent) MTU configuration.
> >>>>>
> >>>>> * BTW, shouldn't the text be reworded to recommended to increase th=
e
> >>>>> MTU of **all nodes** of an SFC-enabled domain by at least the lengt=
h
> >>>>> of SFC header + transport header?
> >>>>>
> >>>>> * Bullet 2, how PMTU discovery is actually used in this context? Do
> >>>>> you assume that all SFC-aware nodes will issue such messages toward=
s
> >>>>> other SFC-aware node, arbitrary destination, else?
> >>>>>
> >>>>> * Bullet 2, I would drop "describes a technique for dynamically
> >>>>> discovering the maximum transmission unit (MTU) of an arbitrary
> >>>>> internet path".
> >>>>>
> >>>>> * Bullet 2, s/ the the/the.
> >>>>>
> >>>>> * The reference to the LISP specification raises two concerns and
> one
> >>>>> comment:
> >>>>>
> >>>>> (1) I don't think it is a good approach that fragments induced by
> the
> >>>>> network are passed to their ultimate destinations as such
> (stateless).
> >>>>> IMO, reassembly should be done within the SFC domain (responsible
> for
> >>>>> fragmentation) not passed away.
> >>>>> (2) Does the stateful mode require all SFC data plane elements
> >>>>> maintain a full list of MTU for the any SFF/SF instance of the SFC
> >>>> domain?
> >>>>>
> >>>>> The current text suggests that [RFC6830] should be listed as
> normative
> >>>>> reference (not an informative one). I would personally favor
> removing
> >>>>> the reference to LISP (as it is an Experimental RFC).
> >>>>>
> >>>>> * The security section of the draft may be augmented with
> >>>>> informational fragmentation-related pointers to: e.g., RFC1858
> >>>>> (Security Considerations for IP Fragment Filtering), RFC3128
> >>>>> (Protection Against a Variant of the Tiny Fragment Attack), and RFC
> >>>>> 4963 (IPv4 Reassembly Errors at High Data Rates).
> >>>>>
> >>>>> Cheers,
> >>>>> Med
> >>>>>
> >>>>>> -----Message d'origine-----
> >>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de
> >>>>>> mohamed.boucadair@orange.com Envoy=E9 : lundi 11 avril 2016 13:14 =
=C0 :
> >>>>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG last call for
> >>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>
> >>>>>> Dear Thomas, all,
> >>>>>>
> >>>>>> As I mentioned during the meeting, there are several issues that
> are
> >>>>>> not covered in the last version of the draft. I already provided
> >>>>>> examples of the issues offline as requested by Martin.
> >>>>>>
> >>>>>> Cheers,
> >>>>>> Med
> >>>>>>
> >>>>>>> -----Message d'origine-----
> >>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas Narte=
n
> >>>>>>> Envoy=E9 : jeudi 31 mars 2016 04:48 =C0 : sfc@ietf.org Objet : [s=
fc]
> >>>>>>> WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>>>>
> >>>>>>> Dear WG:
> >>>>>>>
> >>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> >>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> >>>>>>>
> >>>>>>> The editors of the NSH document have indicated that they have
> >>>>>>> addressed all known comments and that there are no open issues
> >>>>>>> with the current version of the document.
> >>>>>>>
> >>>>>>> Substantive comments to the list please, editorial comments can g=
o
> >>>>>>> directly to the document editors.
> >>>>>>>
> >>>>>>> We'll also get a brief update from the editors at next week's
> >>>>>>> meeting. If there are any remaining issues with the document,
> >>>>>>> raising them before the meeting would be especially helpful.
> >>>>>>>
> >>>>>>> For the chairs,
> >>>>>>> Thomas
> >>>>>>>
> >>>>>>> _______________________________________________
> >>>>>>> sfc mailing list
> >>>>>>> sfc@ietf.org
> >>>>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>>>
> >>>>>> _______________________________________________
> >>>>>> sfc mailing list
> >>>>>> sfc@ietf.org
> >>>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>>
> >>>>> _______________________________________________
> >>>>> sfc mailing list
> >>>>> sfc@ietf.org
> >>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>
> >>>> _______________________________________________
> >>>> sfc mailing list
> >>>> sfc@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>
> >>> _______________________________________________
> >>> sfc mailing list
> >>> sfc@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/sfc
> >>>
> >


From nobody Mon Apr 25 07:42:01 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8952612D156 for <sfc@ietfa.amsl.com>; Mon, 25 Apr 2016 07:41:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.915
X-Spam-Level: 
X-Spam-Status: No, score=-2.915 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kfqUIxDLcrPW for <sfc@ietfa.amsl.com>; Mon, 25 Apr 2016 07:41:57 -0700 (PDT)
Received: from relais-inet.orange.com (relais-nor34.orange.com [80.12.70.34]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7D77812D60D for <sfc@ietf.org>; Mon, 25 Apr 2016 07:41:56 -0700 (PDT)
Received: from opfednr01.francetelecom.fr (unknown [xx.xx.xx.65]) by opfednr23.francetelecom.fr (ESMTP service) with ESMTP id 29DDCC0130; Mon, 25 Apr 2016 16:41:55 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.32]) by opfednr01.francetelecom.fr (ESMTP service) with ESMTP id F1BFB1A0073; Mon, 25 Apr 2016 16:41:54 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM32.corporate.adroot.infra.ftgroup ([fe80::8924:188:2124:a046%19]) with mapi id 14.03.0279.002; Mon, 25 Apr 2016 16:41:54 +0200
From: <mohamed.boucadair@orange.com>
To: "Elzur, Uri" <uri.elzur@intel.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfPQCYv/wVVMUagOUO32rRCGp+Er+AwgARg/TCAEFX48IABYBMA//+ZdQCAAHv92oAAfagA//+MZ0CAAASSoA==
Date: Mon, 25 Apr 2016 14:41:54 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com>
In-Reply-To: <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/VJOLc8AHeRTFgtsQSRR40nP1jPI>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Apr 2016 14:41:59 -0000

Re-,

How do you instruct the transport layer to ALWAYS prepend an NSH header eve=
n for fragments? Or you don't care about that?

Thank you.

Cheers,
Med

> -----Message d'origine-----
> De=A0: Elzur, Uri [mailto:uri.elzur@intel.com]
> Envoy=E9=A0: lundi 25 avril 2016 16:26
> =C0=A0: BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; sfc@ietf.org
> Objet=A0: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Hi Med
>=20
> Not to repeat my position, but I'll do it anyhow :-)
> As NSH is *NOT* a transport, dealing with fragmentation is left to the
> Transport used.
>=20
> The model I use for NSH, is basically similar to VXLAN . It is an overly.
>=20
> Thx
>=20
> Uri ("Oo-Ree")
> C: 949-378-7568
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
> mohamed.boucadair@orange.com
> Sent: Monday, April 25, 2016 7:18 AM
> To: Joel M. Halpern <jmh@joelhalpern.com>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Hi Joel,
>=20
> Please see inline.
>=20
> Cheers,
> Med
>=20
> > -----Message d'origine-----
> > De=A0: Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoy=E9=A0: lundi =
25
> > avril 2016 15:48 =C0=A0: BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet=
=A0:
> > Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >
> > If I am understanding you correctly Med, you are asking that the NSH
> > draft specify how service chaining should cope with packets that have
> > been fragmented?
> >
>=20
> [Med] To be accurate, I'm asking to assess whether there are implications=
.
> If there are, then the draft should be updated accordingly.
>=20
> > NSH, and the SFF functionality, does not care.
>=20
> [Med] I'm not that sure. Some typical implications are listed below:
>=20
> * SFF: If the NSH header is present only in the a fragment but SFF didn't
> maintained a state, subsequent fragments won't be appropriately processed=
.
> * SFC-aware function: if prepending a context information depends on the
> full packet, not only a fragment.
>=20
>   It just does its job.
>=20
> [Med] which may be disturbed in some situations as listed in the examples
> above.
>=20
> > Ingress and intermediate classifiers may cope with fragments in any
> > number of ways.
>   Specifying such is clearly out of scope for this draft.
>=20
> [Med] The purpose is not to specify the internal implementation details
> but the external behavior of the classifier function when it comes to
> handle fragments. That behavior may have an incidence on SFF, in
> particular. The purpose is not to recommend the maximum resources to be
> dedicated to out of order fragments nor the timeout to cache those; these
> considerations are of course out of scope. Nevertheless, an implementatio=
n
> should offer a configurable parameter so that an operator tweak those
> according to its context.
>=20
> >   I suppose one could write an informational draft on possible ways of
> > coping.  The IETF has not usually published such.
> > Service functions have to cope with fragmented packets just as they
> > had to before the advent of NSH, so describing that is clearly not
> > needed here.
>=20
> [Med] The advent of NSH has the following implications:
> * it exacerbates fragmentation. Handing over this issue to the transport
> layer may lead to interoperability issues.
> * the chaining may not be efficient if fragments are inappropriately
> handled.
>=20
> Introducing NSH should not degrade the overall service compared to legacy
> service deployment schemes.
>=20
> >
> > Yours,
> > Joel
> >
> > On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
> > > Re-,
> > >
> > > I hear you, but my comment is that we need, as a WG, to decide what
> > > to
> > put in the draft. FWIW, I'm discussing two fragmentation issues:
> > >
> > > (1) Fragmentation that is caused by prepending an SFC header.
> > > (2) Handling fragments at the ingress of an SFC-enabled domain.
> > >
> > > Increasing the MTU is for sure a recommendation is to be explicitly
> > called out in the text (see my first message).
> > >
> > > There are other issues that need to be discussed, e.g., how to deal
> > > with
> > fragments in SFFs/Classifiers?
> > >
> > > It is also "prudent" to check that no issues will be experienced in
> > > SFF
> > to handle fragments. If an SFC header is prepended for all fragments,
> > I'm not sure there
> > > is any particular issue at the SFF level, except if stripping/adding
> > context TLVs depends on the full packet (not just fragment). It is
> > warranted to consider a little bit this point before declaring there
> > is no issue.
> > >
> > > For point (1), declaring fragmentation out of scope would be meant
> > > that
> > an implementation must be prepared to receive fragments with or
> > without NSH header as this is a decision that is left to the transport
> > encapsulation. This is a requirement per se!
> > >
> > > I won't reiterate all the comments I have about the current wording
> > > of
> > this section.
> > >
> > > Cheers,
> > > Med
> > >
> > >> -----Message d'origine-----
> > >> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25
> > >> avril 2016 08:30 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
> > >> sfc@ietf.org Objet : RE: [sfc] WG last call for
> > >> draft-ietf-sfc-nsh-04.txt
> > >>
> > >> Hi Med
> > >>
> > >> My point is that Fragmentation is yet another transport related
> > >> issue
> > that
> > >> is beyond the scope of NSH and beyond the charter of the WG, so it
> > doesn't
> > >> really belong in the draft. We are providing an advice as extending
> > >> the size of the packet may lead to fragmentation, but as you check
> > >> RFC 7348 VxLAN, which my create the same issue, you'll find it
> > >> doesn't even
> > relate
> > >> to it.
> > >>
> > >> Thx
> > >>
> > >> Uri ("Oo-Ree")
> > >> C: 949-378-7568
> > >>
> > >>
> > >> -----Original Message-----
> > >> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
> > >> mohamed.boucadair@orange.com
> > >> Sent: Sunday, April 24, 2016 10:32 PM
> > >> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
> > <narten@us.ibm.com>;
> > >> sfc@ietf.org
> > >> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> > >>
> > >> Hi Uri,
> > >>
> > >> That's another option that needs to be discussed/investigated. I'm
> > afraid
> > >> this is not the rationale adopted in -04 since it includes some
> > >> text
> > that
> > >> is far to be sufficient to ensure interoperable implementations.
> > >>
> > >> BTW, saying that nsh does not need to deal with fragmentation
> > >> because
> > it
> > >> is transport-independent is not IMHO a good strategy to adopt here
> > because
> > >> it opens the door for interoperable issues, it may lead to
> > >> sub-optimal implementations if the sfc information is present only
> > >> in one
> > fragments,
> > >> etc.
> > >>
> > >> My comments are related to the current text in the -04. This text
> > >> needs
> > to
> > >> be fixed somehow.
> > >>
> > >> Cheers,
> > >> Med
> > >>
> > >>> -----Message d'origine-----
> > >>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche 24
> > >>> avril 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
> > >>> sfc@ietf.org Objet : RE: [sfc] WG last call for
> > >>> draft-ietf-sfc-nsh-04.txt
> > >>>
> > >>> Hi Med
> > >>>
> > >>> I see no need to specify the exact behavior as NSH is transport
> > >>> independent i.e. like NSH interaction with any other Transport eh
> > >>> issue of Fragmentation is to be dealt in a way that matches the
> > >>> mechanisms supported by the Transport used and do not belong in
> > >>> the NSH draft
> > >>>
> > >>> Thx
> > >>>
> > >>> Uri ("Oo-Ree")
> > >>> C: 949-378-7568
> > >>>
> > >>>
> > >>> -----Original Message-----
> > >>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
> > >>> mohamed.boucadair@orange.com
> > >>> Sent: Thursday, April 14, 2016 12:43 AM
> > >>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
> > >>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> > >>>
> > >>> R-,
> > >>>
> > >>> In addition to other pending issues raised for this draft, I would
> > >>> like to raise this additional one about Section 6.
> > >>>
> > >>> =3D=3D
> > >>> 6.  Fragmentation Considerations
> > >>>
> > >>>    NSH and the associated transport header are "added" to the
> > >>>    encapsulated packet/frame.  This additional information
> > >>> increases
> > the
> > >>>    size of the packet.  In order the ensure proper forwarding of NS=
H
> > >>>    data, several options for handling fragmentation and re-assembly
> > >>>    exist:
> > >>>
> > >>>    1.  Jumbo Frames, when supported, enable the transport of NSH an=
d
> > >>>        associated transport packets without requiring fragmentation=
.
> > >>>
> > >>>    2.  Path MTU Discovery [RFC1191]"describes a technique for
> > >>>        dynamically discovering the maximum transmission unit (MTU)
> > >>> of
> > an
> > >>>        arbitrary internet path" and can be utilized to ensure the
> the
> > >>>        required packet size is used.
> > >>>
> > >>>    3.  [RFC6830] describes two schemes for fragmentation and re-
> > assembly
> > >>>        in section 5.4.
> > >>> =3D=3D
> > >>>
> > >>> * The text is weak for a Standard track document that is intended
> > >>> to solve the problem in https://tools.ietf.org/html/rfc7498#section=
-
> 2.12.
> > >>> There should be a clear behavior to be followed by an
> implementation.
> > >>> Further, I would avoid the use of words such as "can".
> > >>>
> > >>> * The text covers only fragmentation when it is induced by SFC
> > >>> operations, it does not discuss the treatment of a fragment when
> > >>> received in an SFC domain. IMHO, the draft should also specify the
> > >>> behavior of the Classifier with regards to fragments for the sake
> > >>> of proper SFC operation. Applying classification policies may
> > >>> require the
> > >> full packet, not only a fragment.
> > >>> In particular, dedicated resources should dedicated for handling
> > >>> out of order fragments. Of course, it is out of scope of this
> > >>> document to describe how SFs handle fragments.
> > >>>
> > >>> * If an SFC header is prepended for all fragments, I'm not sure
> > >>> there is any particular issue at the SFF level...except if
> > >>> stripping/adding context TLVs depends on the full packet (not just
> > >>> fragment). It is warranted to consider a little bit this point
> > >>> before declaring there
> > is
> > >> no issue.
> > >>>
> > >>> * The text states "several options". This may be interpreted as if
> > >>> implementing one of them is sufficient...which is not true. The
> > >>> first two points contribute to minimize the fragmentation risk,
> > >>> but fragmentation may still be experienced (e.g., other shims are
> > >>> prepended by other nodes for some other purposes, nested nsh,
> > >>> etc.)
> > >>>
> > >>> * The first two points have nothing to do with reassembly.
> > >>>
> > >>> * The support of jumbo frames by a router/device does not mean
> > >>> that it can make use of it. Appropriate MTU configuration should
> > >>> be undertaken in a consistent manner within an SFC domain. The
> > >>> text should be updated to make it is about (consistent) MTU
> configuration.
> > >>>
> > >>> * BTW, shouldn't the text be reworded to recommended to increase
> > >>> the MTU of **all nodes** of an SFC-enabled domain by at least the
> > >>> length of SFC header + transport header?
> > >>>
> > >>> * Bullet 2, how PMTU discovery is actually used in this context?
> > >>> Do you assume that all SFC-aware nodes will issue such messages
> > >>> towards other SFC-aware node, arbitrary destination, else?
> > >>>
> > >>> * Bullet 2, I would drop "describes a technique for dynamically
> > >>> discovering the maximum transmission unit (MTU) of an arbitrary
> > >>> internet path".
> > >>>
> > >>> * Bullet 2, s/ the the/the.
> > >>>
> > >>> * The reference to the LISP specification raises two concerns and
> > >>> one
> > >>> comment:
> > >>>
> > >>> (1) I don't think it is a good approach that fragments induced by
> > >>> the network are passed to their ultimate destinations as such
> (stateless).
> > >>> IMO, reassembly should be done within the SFC domain (responsible
> > >>> for
> > >>> fragmentation) not passed away.
> > >>> (2) Does the stateful mode require all SFC data plane elements
> > >>> maintain a full list of MTU for the any SFF/SF instance of the SFC
> > >> domain?
> > >>>
> > >>> The current text suggests that [RFC6830] should be listed as
> > >>> normative reference (not an informative one). I would personally
> > >>> favor removing the reference to LISP (as it is an Experimental RFC)=
.
> > >>>
> > >>> * The security section of the draft may be augmented with
> > >>> informational fragmentation-related pointers to: e.g., RFC1858
> > >>> (Security Considerations for IP Fragment Filtering), RFC3128
> > >>> (Protection Against a Variant of the Tiny Fragment Attack), and
> > >>> RFC
> > >>> 4963 (IPv4 Reassembly Errors at High Data Rates).
> > >>>
> > >>> Cheers,
> > >>> Med
> > >>>
> > >>>> -----Message d'origine-----
> > >>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de
> > >>>> mohamed.boucadair@orange.com Envoy=E9 : lundi 11 avril 2016 13:14 =
=C0 :
> > >>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG last call for
> > >>>> draft-ietf-sfc-nsh-04.txt
> > >>>>
> > >>>> Dear Thomas, all,
> > >>>>
> > >>>> As I mentioned during the meeting, there are several issues that
> > >>>> are not covered in the last version of the draft. I already
> > >>>> provided examples of the issues offline as requested by Martin.
> > >>>>
> > >>>> Cheers,
> > >>>> Med
> > >>>>
> > >>>>> -----Message d'origine-----
> > >>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas
> > >>>>> Narten Envoy=E9 : jeudi 31 mars 2016 04:48 =C0 : sfc@ietf.org Obj=
et
> > >>>>> : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> > >>>>>
> > >>>>> Dear WG:
> > >>>>>
> > >>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> > >>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> > >>>>>
> > >>>>> The editors of the NSH document have indicated that they have
> > >>>>> addressed all known comments and that there are no open issues
> > >>>>> with the current version of the document.
> > >>>>>
> > >>>>> Substantive comments to the list please, editorial comments can
> > >>>>> go directly to the document editors.
> > >>>>>
> > >>>>> We'll also get a brief update from the editors at next week's
> > >>>>> meeting. If there are any remaining issues with the document,
> > >>>>> raising them before the meeting would be especially helpful.
> > >>>>>
> > >>>>> For the chairs,
> > >>>>> Thomas
> > >>>>>
> > >>>>> _______________________________________________
> > >>>>> sfc mailing list
> > >>>>> sfc@ietf.org
> > >>>>> https://www.ietf.org/mailman/listinfo/sfc
> > >>>>
> > >>>> _______________________________________________
> > >>>> sfc mailing list
> > >>>> sfc@ietf.org
> > >>>> https://www.ietf.org/mailman/listinfo/sfc
> > >>>
> > >>> _______________________________________________
> > >>> sfc mailing list
> > >>> sfc@ietf.org
> > >>> https://www.ietf.org/mailman/listinfo/sfc
> > >>
> > >> _______________________________________________
> > >> sfc mailing list
> > >> sfc@ietf.org
> > >> https://www.ietf.org/mailman/listinfo/sfc
> > >
> > > _______________________________________________
> > > sfc mailing list
> > > sfc@ietf.org
> > > https://www.ietf.org/mailman/listinfo/sfc
> > >
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Apr 26 08:10:16 2016
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48CBB12D1E7 for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 08:10:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.217
X-Spam-Level: 
X-Spam-Status: No, score=-5.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kB3KPx38MMVU for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 08:10:11 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1981B12D1E6 for <sfc@ietf.org>; Tue, 26 Apr 2016 08:10:09 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml705-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CIN58586; Tue, 26 Apr 2016 15:10:07 +0000 (GMT)
Received: from DFWEML703-CAH.china.huawei.com (10.193.5.177) by lhreml705-cah.china.huawei.com (10.201.5.168) with Microsoft SMTP Server (TLS) id 14.3.235.1; Tue, 26 Apr 2016 16:10:05 +0100
Received: from DFWEML501-MBB.china.huawei.com ([10.193.5.179]) by DFWEML703-CAH.china.huawei.com ([10.193.5.177]) with mapi id 14.03.0235.001; Tue, 26 Apr 2016 08:10:02 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Elzur, Uri" <uri.elzur@intel.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfPQIp3nrjaS0+VjDL7mlh8GJ+Er+AwgARg/TCAEFX48IABYBMAgAAQOQCAAAiIAIAAcdWAgAAIhACAAAJAgIAABF8AgAEik2A=
Date: Tue, 26 Apr 2016 15:10:02 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.182]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020201.571F84D0.001E, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: f00e12aefba01234b913f67e0c7526fe
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/yAande9MZSd_T5KRvZCNm30ZikY>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 15:10:15 -0000

Agree with Med. =20

Even if each fragment piece of a packet with NSH header carries the NSH hea=
der, the intermediate SFF nodes still need to put together all the fragment=
s together before passing the whole data frame to the SF.

Linda

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of mohamed.boucadair@oran=
ge.com
Sent: Monday, April 25, 2016 9:42 AM
To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Re-,

How do you instruct the transport layer to ALWAYS prepend an NSH header eve=
n for fragments? Or you don't care about that?

Thank you.

Cheers,
Med

> -----Message d'origine-----
> De=A0: Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9=A0: lundi 25 avri=
l=20
> 2016 16:26 =C0=A0: BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;=20
> sfc@ietf.org Objet=A0: RE: [sfc] WG last call for=20
> draft-ietf-sfc-nsh-04.txt
>=20
> Hi Med
>=20
> Not to repeat my position, but I'll do it anyhow :-) As NSH is *NOT* a=20
> transport, dealing with fragmentation is left to the Transport used.
>=20
> The model I use for NSH, is basically similar to VXLAN . It is an overly.
>=20
> Thx
>=20
> Uri ("Oo-Ree")
> C: 949-378-7568
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
> mohamed.boucadair@orange.com
> Sent: Monday, April 25, 2016 7:18 AM
> To: Joel M. Halpern <jmh@joelhalpern.com>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Hi Joel,
>=20
> Please see inline.
>=20
> Cheers,
> Med
>=20
> > -----Message d'origine-----
> > De=A0: Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoy=E9=A0: lundi =
25=20
> > avril 2016 15:48 =C0=A0: BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet=
=A0:
> > Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >
> > If I am understanding you correctly Med, you are asking that the NSH=20
> > draft specify how service chaining should cope with packets that=20
> > have been fragmented?
> >
>=20
> [Med] To be accurate, I'm asking to assess whether there are implications=
.
> If there are, then the draft should be updated accordingly.
>=20
> > NSH, and the SFF functionality, does not care.
>=20
> [Med] I'm not that sure. Some typical implications are listed below:
>=20
> * SFF: If the NSH header is present only in the a fragment but SFF=20
> didn't maintained a state, subsequent fragments won't be appropriately pr=
ocessed.
> * SFC-aware function: if prepending a context information depends on=20
> the full packet, not only a fragment.
>=20
>   It just does its job.
>=20
> [Med] which may be disturbed in some situations as listed in the=20
> examples above.
>=20
> > Ingress and intermediate classifiers may cope with fragments in any=20
> > number of ways.
>   Specifying such is clearly out of scope for this draft.
>=20
> [Med] The purpose is not to specify the internal implementation=20
> details but the external behavior of the classifier function when it=20
> comes to handle fragments. That behavior may have an incidence on SFF,=20
> in particular. The purpose is not to recommend the maximum resources=20
> to be dedicated to out of order fragments nor the timeout to cache=20
> those; these considerations are of course out of scope. Nevertheless,=20
> an implementation should offer a configurable parameter so that an=20
> operator tweak those according to its context.
>=20
> >   I suppose one could write an informational draft on possible ways=20
> > of coping.  The IETF has not usually published such.
> > Service functions have to cope with fragmented packets just as they=20
> > had to before the advent of NSH, so describing that is clearly not=20
> > needed here.
>=20
> [Med] The advent of NSH has the following implications:
> * it exacerbates fragmentation. Handing over this issue to the=20
> transport layer may lead to interoperability issues.
> * the chaining may not be efficient if fragments are inappropriately=20
> handled.
>=20
> Introducing NSH should not degrade the overall service compared to=20
> legacy service deployment schemes.
>=20
> >
> > Yours,
> > Joel
> >
> > On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
> > > Re-,
> > >
> > > I hear you, but my comment is that we need, as a WG, to decide=20
> > > what to
> > put in the draft. FWIW, I'm discussing two fragmentation issues:
> > >
> > > (1) Fragmentation that is caused by prepending an SFC header.
> > > (2) Handling fragments at the ingress of an SFC-enabled domain.
> > >
> > > Increasing the MTU is for sure a recommendation is to be=20
> > > explicitly
> > called out in the text (see my first message).
> > >
> > > There are other issues that need to be discussed, e.g., how to=20
> > > deal with
> > fragments in SFFs/Classifiers?
> > >
> > > It is also "prudent" to check that no issues will be experienced=20
> > > in SFF
> > to handle fragments. If an SFC header is prepended for all=20
> > fragments, I'm not sure there
> > > is any particular issue at the SFF level, except if=20
> > > stripping/adding
> > context TLVs depends on the full packet (not just fragment). It is=20
> > warranted to consider a little bit this point before declaring there=20
> > is no issue.
> > >
> > > For point (1), declaring fragmentation out of scope would be meant=20
> > > that
> > an implementation must be prepared to receive fragments with or=20
> > without NSH header as this is a decision that is left to the=20
> > transport encapsulation. This is a requirement per se!
> > >
> > > I won't reiterate all the comments I have about the current=20
> > > wording of
> > this section.
> > >
> > > Cheers,
> > > Med
> > >
> > >> -----Message d'origine-----
> > >> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25=20
> > >> avril 2016 08:30 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;=20
> > >> sfc@ietf.org Objet : RE: [sfc] WG last call for=20
> > >> draft-ietf-sfc-nsh-04.txt
> > >>
> > >> Hi Med
> > >>
> > >> My point is that Fragmentation is yet another transport related=20
> > >> issue
> > that
> > >> is beyond the scope of NSH and beyond the charter of the WG, so=20
> > >> it
> > doesn't
> > >> really belong in the draft. We are providing an advice as=20
> > >> extending the size of the packet may lead to fragmentation, but=20
> > >> as you check RFC 7348 VxLAN, which my create the same issue,=20
> > >> you'll find it doesn't even
> > relate
> > >> to it.
> > >>
> > >> Thx
> > >>
> > >> Uri ("Oo-Ree")
> > >> C: 949-378-7568
> > >>
> > >>
> > >> -----Original Message-----
> > >> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
> > >> mohamed.boucadair@orange.com
> > >> Sent: Sunday, April 24, 2016 10:32 PM
> > >> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
> > <narten@us.ibm.com>;
> > >> sfc@ietf.org
> > >> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> > >>
> > >> Hi Uri,
> > >>
> > >> That's another option that needs to be discussed/investigated.=20
> > >> I'm
> > afraid
> > >> this is not the rationale adopted in -04 since it includes some=20
> > >> text
> > that
> > >> is far to be sufficient to ensure interoperable implementations.
> > >>
> > >> BTW, saying that nsh does not need to deal with fragmentation=20
> > >> because
> > it
> > >> is transport-independent is not IMHO a good strategy to adopt=20
> > >> here
> > because
> > >> it opens the door for interoperable issues, it may lead to=20
> > >> sub-optimal implementations if the sfc information is present=20
> > >> only in one
> > fragments,
> > >> etc.
> > >>
> > >> My comments are related to the current text in the -04. This text=20
> > >> needs
> > to
> > >> be fixed somehow.
> > >>
> > >> Cheers,
> > >> Med
> > >>
> > >>> -----Message d'origine-----
> > >>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche=20
> > >>> 24 avril 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas=20
> > >>> Narten; sfc@ietf.org Objet : RE: [sfc] WG last call for=20
> > >>> draft-ietf-sfc-nsh-04.txt
> > >>>
> > >>> Hi Med
> > >>>
> > >>> I see no need to specify the exact behavior as NSH is transport=20
> > >>> independent i.e. like NSH interaction with any other Transport=20
> > >>> eh issue of Fragmentation is to be dealt in a way that matches=20
> > >>> the mechanisms supported by the Transport used and do not belong=20
> > >>> in the NSH draft
> > >>>
> > >>> Thx
> > >>>
> > >>> Uri ("Oo-Ree")
> > >>> C: 949-378-7568
> > >>>
> > >>>
> > >>> -----Original Message-----
> > >>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
> > >>> mohamed.boucadair@orange.com
> > >>> Sent: Thursday, April 14, 2016 12:43 AM
> > >>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
> > >>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> > >>>
> > >>> R-,
> > >>>
> > >>> In addition to other pending issues raised for this draft, I=20
> > >>> would like to raise this additional one about Section 6.
> > >>>
> > >>> =3D=3D
> > >>> 6.  Fragmentation Considerations
> > >>>
> > >>>    NSH and the associated transport header are "added" to the
> > >>>    encapsulated packet/frame.  This additional information=20
> > >>> increases
> > the
> > >>>    size of the packet.  In order the ensure proper forwarding of NS=
H
> > >>>    data, several options for handling fragmentation and re-assembly
> > >>>    exist:
> > >>>
> > >>>    1.  Jumbo Frames, when supported, enable the transport of NSH an=
d
> > >>>        associated transport packets without requiring fragmentation=
.
> > >>>
> > >>>    2.  Path MTU Discovery [RFC1191]"describes a technique for
> > >>>        dynamically discovering the maximum transmission unit=20
> > >>> (MTU) of
> > an
> > >>>        arbitrary internet path" and can be utilized to ensure=20
> > >>> the
> the
> > >>>        required packet size is used.
> > >>>
> > >>>    3.  [RFC6830] describes two schemes for fragmentation and re-
> > assembly
> > >>>        in section 5.4.
> > >>> =3D=3D
> > >>>
> > >>> * The text is weak for a Standard track document that is=20
> > >>> intended to solve the problem in=20
> > >>> https://tools.ietf.org/html/rfc7498#section-
> 2.12.
> > >>> There should be a clear behavior to be followed by an
> implementation.
> > >>> Further, I would avoid the use of words such as "can".
> > >>>
> > >>> * The text covers only fragmentation when it is induced by SFC=20
> > >>> operations, it does not discuss the treatment of a fragment when=20
> > >>> received in an SFC domain. IMHO, the draft should also specify=20
> > >>> the behavior of the Classifier with regards to fragments for the=20
> > >>> sake of proper SFC operation. Applying classification policies=20
> > >>> may require the
> > >> full packet, not only a fragment.
> > >>> In particular, dedicated resources should dedicated for handling=20
> > >>> out of order fragments. Of course, it is out of scope of this=20
> > >>> document to describe how SFs handle fragments.
> > >>>
> > >>> * If an SFC header is prepended for all fragments, I'm not sure=20
> > >>> there is any particular issue at the SFF level...except if=20
> > >>> stripping/adding context TLVs depends on the full packet (not=20
> > >>> just fragment). It is warranted to consider a little bit this=20
> > >>> point before declaring there
> > is
> > >> no issue.
> > >>>
> > >>> * The text states "several options". This may be interpreted as=20
> > >>> if implementing one of them is sufficient...which is not true.=20
> > >>> The first two points contribute to minimize the fragmentation=20
> > >>> risk, but fragmentation may still be experienced (e.g., other=20
> > >>> shims are prepended by other nodes for some other purposes,=20
> > >>> nested nsh,
> > >>> etc.)
> > >>>
> > >>> * The first two points have nothing to do with reassembly.
> > >>>
> > >>> * The support of jumbo frames by a router/device does not mean=20
> > >>> that it can make use of it. Appropriate MTU configuration should=20
> > >>> be undertaken in a consistent manner within an SFC domain. The=20
> > >>> text should be updated to make it is about (consistent) MTU
> configuration.
> > >>>
> > >>> * BTW, shouldn't the text be reworded to recommended to increase=20
> > >>> the MTU of **all nodes** of an SFC-enabled domain by at least=20
> > >>> the length of SFC header + transport header?
> > >>>
> > >>> * Bullet 2, how PMTU discovery is actually used in this context?
> > >>> Do you assume that all SFC-aware nodes will issue such messages=20
> > >>> towards other SFC-aware node, arbitrary destination, else?
> > >>>
> > >>> * Bullet 2, I would drop "describes a technique for dynamically=20
> > >>> discovering the maximum transmission unit (MTU) of an arbitrary=20
> > >>> internet path".
> > >>>
> > >>> * Bullet 2, s/ the the/the.
> > >>>
> > >>> * The reference to the LISP specification raises two concerns=20
> > >>> and one
> > >>> comment:
> > >>>
> > >>> (1) I don't think it is a good approach that fragments induced=20
> > >>> by the network are passed to their ultimate destinations as such
> (stateless).
> > >>> IMO, reassembly should be done within the SFC domain=20
> > >>> (responsible for
> > >>> fragmentation) not passed away.
> > >>> (2) Does the stateful mode require all SFC data plane elements=20
> > >>> maintain a full list of MTU for the any SFF/SF instance of the=20
> > >>> SFC
> > >> domain?
> > >>>
> > >>> The current text suggests that [RFC6830] should be listed as=20
> > >>> normative reference (not an informative one). I would personally=20
> > >>> favor removing the reference to LISP (as it is an Experimental RFC)=
.
> > >>>
> > >>> * The security section of the draft may be augmented with=20
> > >>> informational fragmentation-related pointers to: e.g., RFC1858=20
> > >>> (Security Considerations for IP Fragment Filtering), RFC3128=20
> > >>> (Protection Against a Variant of the Tiny Fragment Attack), and=20
> > >>> RFC
> > >>> 4963 (IPv4 Reassembly Errors at High Data Rates).
> > >>>
> > >>> Cheers,
> > >>> Med
> > >>>
> > >>>> -----Message d'origine-----
> > >>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de=20
> > >>>> mohamed.boucadair@orange.com Envoy=E9 : lundi 11 avril 2016 13:14 =
=C0 :
> > >>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG last call for=20
> > >>>> draft-ietf-sfc-nsh-04.txt
> > >>>>
> > >>>> Dear Thomas, all,
> > >>>>
> > >>>> As I mentioned during the meeting, there are several issues=20
> > >>>> that are not covered in the last version of the draft. I=20
> > >>>> already provided examples of the issues offline as requested by Ma=
rtin.
> > >>>>
> > >>>> Cheers,
> > >>>> Med
> > >>>>
> > >>>>> -----Message d'origine-----
> > >>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas=20
> > >>>>> Narten Envoy=E9 : jeudi 31 mars 2016 04:48 =C0 : sfc@ietf.org=20
> > >>>>> Objet
> > >>>>> : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> > >>>>>
> > >>>>> Dear WG:
> > >>>>>
> > >>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt=20
> > >>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> > >>>>>
> > >>>>> The editors of the NSH document have indicated that they have=20
> > >>>>> addressed all known comments and that there are no open issues=20
> > >>>>> with the current version of the document.
> > >>>>>
> > >>>>> Substantive comments to the list please, editorial comments=20
> > >>>>> can go directly to the document editors.
> > >>>>>
> > >>>>> We'll also get a brief update from the editors at next week's=20
> > >>>>> meeting. If there are any remaining issues with the document,=20
> > >>>>> raising them before the meeting would be especially helpful.
> > >>>>>
> > >>>>> For the chairs,
> > >>>>> Thomas
> > >>>>>
> > >>>>> _______________________________________________
> > >>>>> sfc mailing list
> > >>>>> sfc@ietf.org
> > >>>>> https://www.ietf.org/mailman/listinfo/sfc
> > >>>>
> > >>>> _______________________________________________
> > >>>> sfc mailing list
> > >>>> sfc@ietf.org
> > >>>> https://www.ietf.org/mailman/listinfo/sfc
> > >>>
> > >>> _______________________________________________
> > >>> sfc mailing list
> > >>> sfc@ietf.org
> > >>> https://www.ietf.org/mailman/listinfo/sfc
> > >>
> > >> _______________________________________________
> > >> sfc mailing list
> > >> sfc@ietf.org
> > >> https://www.ietf.org/mailman/listinfo/sfc
> > >
> > > _______________________________________________
> > > sfc mailing list
> > > sfc@ietf.org
> > > https://www.ietf.org/mailman/listinfo/sfc
> > >
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Apr 26 08:19:24 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 41FD012D1DE for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 08:19:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R2nROEGJzAYl for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 08:19:20 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 177C712D1E9 for <sfc@ietf.org>; Tue, 26 Apr 2016 08:19:20 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id C547F24EB23; Tue, 26 Apr 2016 08:19:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461683959; bh=/WaTGY9EUt15JiWjWa7VkL+tPacQsxeBDzZVB7z0O8c=; h=Subject:To:References:From:Date:In-Reply-To:From; b=LzP/TMPhXckvGbSAbotpLz+y8qBfLfH7gX96AkJcYGPaL5GuWI5zRYLLI4ly2v2wC cGU9eivH3GZD0BTgWv03kP6949mNS/BEKN35uGU450Zi/EZoF40PhtQM5DnA5O1w7H LyfcC4qwb/Z6bmftmIhdcTK/QA9lss7BTq8KOSJw=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id E5D7E24E0BB; Tue, 26 Apr 2016 08:19:18 -0700 (PDT)
To: Linda Dunbar <linda.dunbar@huawei.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <354f9b2f-2adf-c22c-c1b8-8b0ef9d11db0@joelhalpern.com>
Date: Tue, 26 Apr 2016 11:19:10 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/XtiShaNaG-Bkaxl5pmh7SpTexPY>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 15:19:22 -0000

Linda, on what basis do you reach that conclusion?  Service functions 
have to be able to deal with fragmented IP packets.  I don't see any 
reason why we would expect SFF to reassemble packets, even in the rare 
case where service chaining forces the fragmentation.  (Note that such a 
case is generally actually indistinguishable from the origin fragmenting 
the packet, and it would be very odd for SFF to reassemble packets that 
the origin had fragmented.)

Yours,
Joel

On 4/26/16 11:10 AM, Linda Dunbar wrote:
> Agree with Med.
>
> Even if each fragment piece of a packet with NSH header carries the NSH header, the intermediate SFF nodes still need to put together all the fragments together before passing the whole data frame to the SF.
>
> Linda
>
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of mohamed.boucadair@orange.com
> Sent: Monday, April 25, 2016 9:42 AM
> To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> Re-,
>
> How do you instruct the transport layer to ALWAYS prepend an NSH header even for fragments? Or you don't care about that?
>
> Thank you.
>
> Cheers,
> Med
>
>> -----Message d'origine-----
>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoyé : lundi 25 avril
>> 2016 16:26 À : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;
>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>> draft-ietf-sfc-nsh-04.txt
>>
>> Hi Med
>>
>> Not to repeat my position, but I'll do it anyhow :-) As NSH is *NOT* a
>> transport, dealing with fragmentation is left to the Transport used.
>>
>> The model I use for NSH, is basically similar to VXLAN . It is an overly.
>>
>> Thx
>>
>> Uri ("Oo-Ree")
>> C: 949-378-7568
>>
>>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>> mohamed.boucadair@orange.com
>> Sent: Monday, April 25, 2016 7:18 AM
>> To: Joel M. Halpern <jmh@joelhalpern.com>; sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Hi Joel,
>>
>> Please see inline.
>>
>> Cheers,
>> Med
>>
>>> -----Message d'origine-----
>>> De : Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoyé : lundi 25
>>> avril 2016 15:48 À : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet :
>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> If I am understanding you correctly Med, you are asking that the NSH
>>> draft specify how service chaining should cope with packets that
>>> have been fragmented?
>>>
>>
>> [Med] To be accurate, I'm asking to assess whether there are implications.
>> If there are, then the draft should be updated accordingly.
>>
>>> NSH, and the SFF functionality, does not care.
>>
>> [Med] I'm not that sure. Some typical implications are listed below:
>>
>> * SFF: If the NSH header is present only in the a fragment but SFF
>> didn't maintained a state, subsequent fragments won't be appropriately processed.
>> * SFC-aware function: if prepending a context information depends on
>> the full packet, not only a fragment.
>>
>>   It just does its job.
>>
>> [Med] which may be disturbed in some situations as listed in the
>> examples above.
>>
>>> Ingress and intermediate classifiers may cope with fragments in any
>>> number of ways.
>>   Specifying such is clearly out of scope for this draft.
>>
>> [Med] The purpose is not to specify the internal implementation
>> details but the external behavior of the classifier function when it
>> comes to handle fragments. That behavior may have an incidence on SFF,
>> in particular. The purpose is not to recommend the maximum resources
>> to be dedicated to out of order fragments nor the timeout to cache
>> those; these considerations are of course out of scope. Nevertheless,
>> an implementation should offer a configurable parameter so that an
>> operator tweak those according to its context.
>>
>>>   I suppose one could write an informational draft on possible ways
>>> of coping.  The IETF has not usually published such.
>>> Service functions have to cope with fragmented packets just as they
>>> had to before the advent of NSH, so describing that is clearly not
>>> needed here.
>>
>> [Med] The advent of NSH has the following implications:
>> * it exacerbates fragmentation. Handing over this issue to the
>> transport layer may lead to interoperability issues.
>> * the chaining may not be efficient if fragments are inappropriately
>> handled.
>>
>> Introducing NSH should not degrade the overall service compared to
>> legacy service deployment schemes.
>>
>>>
>>> Yours,
>>> Joel
>>>
>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
>>>> Re-,
>>>>
>>>> I hear you, but my comment is that we need, as a WG, to decide
>>>> what to
>>> put in the draft. FWIW, I'm discussing two fragmentation issues:
>>>>
>>>> (1) Fragmentation that is caused by prepending an SFC header.
>>>> (2) Handling fragments at the ingress of an SFC-enabled domain.
>>>>
>>>> Increasing the MTU is for sure a recommendation is to be
>>>> explicitly
>>> called out in the text (see my first message).
>>>>
>>>> There are other issues that need to be discussed, e.g., how to
>>>> deal with
>>> fragments in SFFs/Classifiers?
>>>>
>>>> It is also "prudent" to check that no issues will be experienced
>>>> in SFF
>>> to handle fragments. If an SFC header is prepended for all
>>> fragments, I'm not sure there
>>>> is any particular issue at the SFF level, except if
>>>> stripping/adding
>>> context TLVs depends on the full packet (not just fragment). It is
>>> warranted to consider a little bit this point before declaring there
>>> is no issue.
>>>>
>>>> For point (1), declaring fragmentation out of scope would be meant
>>>> that
>>> an implementation must be prepared to receive fragments with or
>>> without NSH header as this is a decision that is left to the
>>> transport encapsulation. This is a requirement per se!
>>>>
>>>> I won't reiterate all the comments I have about the current
>>>> wording of
>>> this section.
>>>>
>>>> Cheers,
>>>> Med
>>>>
>>>>> -----Message d'origine-----
>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoyé : lundi 25
>>>>> avril 2016 08:30 À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Med
>>>>>
>>>>> My point is that Fragmentation is yet another transport related
>>>>> issue
>>> that
>>>>> is beyond the scope of NSH and beyond the charter of the WG, so
>>>>> it
>>> doesn't
>>>>> really belong in the draft. We are providing an advice as
>>>>> extending the size of the packet may lead to fragmentation, but
>>>>> as you check RFC 7348 VxLAN, which my create the same issue,
>>>>> you'll find it doesn't even
>>> relate
>>>>> to it.
>>>>>
>>>>> Thx
>>>>>
>>>>> Uri ("Oo-Ree")
>>>>> C: 949-378-7568
>>>>>
>>>>>
>>>>> -----Original Message-----
>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>> mohamed.boucadair@orange.com
>>>>> Sent: Sunday, April 24, 2016 10:32 PM
>>>>> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
>>> <narten@us.ibm.com>;
>>>>> sfc@ietf.org
>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Uri,
>>>>>
>>>>> That's another option that needs to be discussed/investigated.
>>>>> I'm
>>> afraid
>>>>> this is not the rationale adopted in -04 since it includes some
>>>>> text
>>> that
>>>>> is far to be sufficient to ensure interoperable implementations.
>>>>>
>>>>> BTW, saying that nsh does not need to deal with fragmentation
>>>>> because
>>> it
>>>>> is transport-independent is not IMHO a good strategy to adopt
>>>>> here
>>> because
>>>>> it opens the door for interoperable issues, it may lead to
>>>>> sub-optimal implementations if the sfc information is present
>>>>> only in one
>>> fragments,
>>>>> etc.
>>>>>
>>>>> My comments are related to the current text in the -04. This text
>>>>> needs
>>> to
>>>>> be fixed somehow.
>>>>>
>>>>> Cheers,
>>>>> Med
>>>>>
>>>>>> -----Message d'origine-----
>>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoyé : dimanche
>>>>>> 24 avril 2016 17:36 À : BOUCADAIR Mohamed IMT/OLN; Thomas
>>>>>> Narten; sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Hi Med
>>>>>>
>>>>>> I see no need to specify the exact behavior as NSH is transport
>>>>>> independent i.e. like NSH interaction with any other Transport
>>>>>> eh issue of Fragmentation is to be dealt in a way that matches
>>>>>> the mechanisms supported by the Transport used and do not belong
>>>>>> in the NSH draft
>>>>>>
>>>>>> Thx
>>>>>>
>>>>>> Uri ("Oo-Ree")
>>>>>> C: 949-378-7568
>>>>>>
>>>>>>
>>>>>> -----Original Message-----
>>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>> mohamed.boucadair@orange.com
>>>>>> Sent: Thursday, April 14, 2016 12:43 AM
>>>>>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> R-,
>>>>>>
>>>>>> In addition to other pending issues raised for this draft, I
>>>>>> would like to raise this additional one about Section 6.
>>>>>>
>>>>>> ==
>>>>>> 6.  Fragmentation Considerations
>>>>>>
>>>>>>    NSH and the associated transport header are "added" to the
>>>>>>    encapsulated packet/frame.  This additional information
>>>>>> increases
>>> the
>>>>>>    size of the packet.  In order the ensure proper forwarding of NSH
>>>>>>    data, several options for handling fragmentation and re-assembly
>>>>>>    exist:
>>>>>>
>>>>>>    1.  Jumbo Frames, when supported, enable the transport of NSH and
>>>>>>        associated transport packets without requiring fragmentation.
>>>>>>
>>>>>>    2.  Path MTU Discovery [RFC1191]"describes a technique for
>>>>>>        dynamically discovering the maximum transmission unit
>>>>>> (MTU) of
>>> an
>>>>>>        arbitrary internet path" and can be utilized to ensure
>>>>>> the
>> the
>>>>>>        required packet size is used.
>>>>>>
>>>>>>    3.  [RFC6830] describes two schemes for fragmentation and re-
>>> assembly
>>>>>>        in section 5.4.
>>>>>> ==
>>>>>>
>>>>>> * The text is weak for a Standard track document that is
>>>>>> intended to solve the problem in
>>>>>> https://tools.ietf.org/html/rfc7498#section-
>> 2.12.
>>>>>> There should be a clear behavior to be followed by an
>> implementation.
>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>
>>>>>> * The text covers only fragmentation when it is induced by SFC
>>>>>> operations, it does not discuss the treatment of a fragment when
>>>>>> received in an SFC domain. IMHO, the draft should also specify
>>>>>> the behavior of the Classifier with regards to fragments for the
>>>>>> sake of proper SFC operation. Applying classification policies
>>>>>> may require the
>>>>> full packet, not only a fragment.
>>>>>> In particular, dedicated resources should dedicated for handling
>>>>>> out of order fragments. Of course, it is out of scope of this
>>>>>> document to describe how SFs handle fragments.
>>>>>>
>>>>>> * If an SFC header is prepended for all fragments, I'm not sure
>>>>>> there is any particular issue at the SFF level...except if
>>>>>> stripping/adding context TLVs depends on the full packet (not
>>>>>> just fragment). It is warranted to consider a little bit this
>>>>>> point before declaring there
>>> is
>>>>> no issue.
>>>>>>
>>>>>> * The text states "several options". This may be interpreted as
>>>>>> if implementing one of them is sufficient...which is not true.
>>>>>> The first two points contribute to minimize the fragmentation
>>>>>> risk, but fragmentation may still be experienced (e.g., other
>>>>>> shims are prepended by other nodes for some other purposes,
>>>>>> nested nsh,
>>>>>> etc.)
>>>>>>
>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>
>>>>>> * The support of jumbo frames by a router/device does not mean
>>>>>> that it can make use of it. Appropriate MTU configuration should
>>>>>> be undertaken in a consistent manner within an SFC domain. The
>>>>>> text should be updated to make it is about (consistent) MTU
>> configuration.
>>>>>>
>>>>>> * BTW, shouldn't the text be reworded to recommended to increase
>>>>>> the MTU of **all nodes** of an SFC-enabled domain by at least
>>>>>> the length of SFC header + transport header?
>>>>>>
>>>>>> * Bullet 2, how PMTU discovery is actually used in this context?
>>>>>> Do you assume that all SFC-aware nodes will issue such messages
>>>>>> towards other SFC-aware node, arbitrary destination, else?
>>>>>>
>>>>>> * Bullet 2, I would drop "describes a technique for dynamically
>>>>>> discovering the maximum transmission unit (MTU) of an arbitrary
>>>>>> internet path".
>>>>>>
>>>>>> * Bullet 2, s/ the the/the.
>>>>>>
>>>>>> * The reference to the LISP specification raises two concerns
>>>>>> and one
>>>>>> comment:
>>>>>>
>>>>>> (1) I don't think it is a good approach that fragments induced
>>>>>> by the network are passed to their ultimate destinations as such
>> (stateless).
>>>>>> IMO, reassembly should be done within the SFC domain
>>>>>> (responsible for
>>>>>> fragmentation) not passed away.
>>>>>> (2) Does the stateful mode require all SFC data plane elements
>>>>>> maintain a full list of MTU for the any SFF/SF instance of the
>>>>>> SFC
>>>>> domain?
>>>>>>
>>>>>> The current text suggests that [RFC6830] should be listed as
>>>>>> normative reference (not an informative one). I would personally
>>>>>> favor removing the reference to LISP (as it is an Experimental RFC).
>>>>>>
>>>>>> * The security section of the draft may be augmented with
>>>>>> informational fragmentation-related pointers to: e.g., RFC1858
>>>>>> (Security Considerations for IP Fragment Filtering), RFC3128
>>>>>> (Protection Against a Variant of the Tiny Fragment Attack), and
>>>>>> RFC
>>>>>> 4963 (IPv4 Reassembly Errors at High Data Rates).
>>>>>>
>>>>>> Cheers,
>>>>>> Med
>>>>>>
>>>>>>> -----Message d'origine-----
>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de
>>>>>>> mohamed.boucadair@orange.com Envoyé : lundi 11 avril 2016 13:14 À :
>>>>>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG last call for
>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Dear Thomas, all,
>>>>>>>
>>>>>>> As I mentioned during the meeting, there are several issues
>>>>>>> that are not covered in the last version of the draft. I
>>>>>>> already provided examples of the issues offline as requested by Martin.
>>>>>>>
>>>>>>> Cheers,
>>>>>>> Med
>>>>>>>
>>>>>>>> -----Message d'origine-----
>>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas
>>>>>>>> Narten Envoyé : jeudi 31 mars 2016 04:48 À : sfc@ietf.org
>>>>>>>> Objet
>>>>>>>> : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Dear WG:
>>>>>>>>
>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>
>>>>>>>> The editors of the NSH document have indicated that they have
>>>>>>>> addressed all known comments and that there are no open issues
>>>>>>>> with the current version of the document.
>>>>>>>>
>>>>>>>> Substantive comments to the list please, editorial comments
>>>>>>>> can go directly to the document editors.
>>>>>>>>
>>>>>>>> We'll also get a brief update from the editors at next week's
>>>>>>>> meeting. If there are any remaining issues with the document,
>>>>>>>> raising them before the meeting would be especially helpful.
>>>>>>>>
>>>>>>>> For the chairs,
>>>>>>>> Thomas
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> sfc mailing list
>>>>>>>> sfc@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> sfc mailing list
>>>>>>> sfc@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Tue Apr 26 08:33:12 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9803412D1E2 for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 08:33:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CEEjF_p2oq39 for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 08:33:03 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8FCFA12D1E7 for <sfc@ietf.org>; Tue, 26 Apr 2016 08:33:03 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 6417224EB23; Tue, 26 Apr 2016 08:33:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461684783; bh=GW8HqGphw+mygus2SpSD7VD76XiJd7bmlULjL+T98a4=; h=Subject:To:References:From:Date:In-Reply-To:From; b=SYg6V1tKcMR2AlPxvKV92TxmGn0A/PswGlFqwrBzub+dF0N6wny/yGFkTB+PqcKIg GGx+Xx5kR9GCTgR/l8jztwZnUA8SvDs95Zb0ClPCgdlBiHEdGVOli7ERCw9LKl+pJG wbSLzAQ34bgIkzuZDqqIRqlwWH0fh2LNRYoiAHgE=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 8A972264842; Tue, 26 Apr 2016 08:33:02 -0700 (PDT)
To: Linda Dunbar <linda.dunbar@huawei.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com>
Date: Tue, 26 Apr 2016 11:32:53 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/EEtmG3URW4979MtwauOknp9uZRU>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 15:33:10 -0000

Re-reading your note, it is possible that you are referring only to the 
case of transport generated fragmentation of the outer packet.  I had 
assumed you were not talking about that, since the resulting fragments 
will not all have NSH headers.  As with any tunnel technology, if the 
tunnel chooses to fragment at its layer, then the tunnel is responsible 
for reassembly.  That would be invisible to the SFF.

Yours,
Joel

On 4/26/16 11:10 AM, Linda Dunbar wrote:
> Agree with Med.
>
> Even if each fragment piece of a packet with NSH header carries the NSH header, the intermediate SFF nodes still need to put together all the fragments together before passing the whole data frame to the SF.
>
> Linda
>
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of mohamed.boucadair@orange.com
> Sent: Monday, April 25, 2016 9:42 AM
> To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> Re-,
>
> How do you instruct the transport layer to ALWAYS prepend an NSH header even for fragments? Or you don't care about that?
>
> Thank you.
>
> Cheers,
> Med
>
>> -----Message d'origine-----
>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoyé : lundi 25 avril
>> 2016 16:26 À : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;
>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>> draft-ietf-sfc-nsh-04.txt
>>
>> Hi Med
>>
>> Not to repeat my position, but I'll do it anyhow :-) As NSH is *NOT* a
>> transport, dealing with fragmentation is left to the Transport used.
>>
>> The model I use for NSH, is basically similar to VXLAN . It is an overly.
>>
>> Thx
>>
>> Uri ("Oo-Ree")
>> C: 949-378-7568
>>
>>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>> mohamed.boucadair@orange.com
>> Sent: Monday, April 25, 2016 7:18 AM
>> To: Joel M. Halpern <jmh@joelhalpern.com>; sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Hi Joel,
>>
>> Please see inline.
>>
>> Cheers,
>> Med
>>
>>> -----Message d'origine-----
>>> De : Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoyé : lundi 25
>>> avril 2016 15:48 À : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet :
>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> If I am understanding you correctly Med, you are asking that the NSH
>>> draft specify how service chaining should cope with packets that
>>> have been fragmented?
>>>
>>
>> [Med] To be accurate, I'm asking to assess whether there are implications.
>> If there are, then the draft should be updated accordingly.
>>
>>> NSH, and the SFF functionality, does not care.
>>
>> [Med] I'm not that sure. Some typical implications are listed below:
>>
>> * SFF: If the NSH header is present only in the a fragment but SFF
>> didn't maintained a state, subsequent fragments won't be appropriately processed.
>> * SFC-aware function: if prepending a context information depends on
>> the full packet, not only a fragment.
>>
>>   It just does its job.
>>
>> [Med] which may be disturbed in some situations as listed in the
>> examples above.
>>
>>> Ingress and intermediate classifiers may cope with fragments in any
>>> number of ways.
>>   Specifying such is clearly out of scope for this draft.
>>
>> [Med] The purpose is not to specify the internal implementation
>> details but the external behavior of the classifier function when it
>> comes to handle fragments. That behavior may have an incidence on SFF,
>> in particular. The purpose is not to recommend the maximum resources
>> to be dedicated to out of order fragments nor the timeout to cache
>> those; these considerations are of course out of scope. Nevertheless,
>> an implementation should offer a configurable parameter so that an
>> operator tweak those according to its context.
>>
>>>   I suppose one could write an informational draft on possible ways
>>> of coping.  The IETF has not usually published such.
>>> Service functions have to cope with fragmented packets just as they
>>> had to before the advent of NSH, so describing that is clearly not
>>> needed here.
>>
>> [Med] The advent of NSH has the following implications:
>> * it exacerbates fragmentation. Handing over this issue to the
>> transport layer may lead to interoperability issues.
>> * the chaining may not be efficient if fragments are inappropriately
>> handled.
>>
>> Introducing NSH should not degrade the overall service compared to
>> legacy service deployment schemes.
>>
>>>
>>> Yours,
>>> Joel
>>>
>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
>>>> Re-,
>>>>
>>>> I hear you, but my comment is that we need, as a WG, to decide
>>>> what to
>>> put in the draft. FWIW, I'm discussing two fragmentation issues:
>>>>
>>>> (1) Fragmentation that is caused by prepending an SFC header.
>>>> (2) Handling fragments at the ingress of an SFC-enabled domain.
>>>>
>>>> Increasing the MTU is for sure a recommendation is to be
>>>> explicitly
>>> called out in the text (see my first message).
>>>>
>>>> There are other issues that need to be discussed, e.g., how to
>>>> deal with
>>> fragments in SFFs/Classifiers?
>>>>
>>>> It is also "prudent" to check that no issues will be experienced
>>>> in SFF
>>> to handle fragments. If an SFC header is prepended for all
>>> fragments, I'm not sure there
>>>> is any particular issue at the SFF level, except if
>>>> stripping/adding
>>> context TLVs depends on the full packet (not just fragment). It is
>>> warranted to consider a little bit this point before declaring there
>>> is no issue.
>>>>
>>>> For point (1), declaring fragmentation out of scope would be meant
>>>> that
>>> an implementation must be prepared to receive fragments with or
>>> without NSH header as this is a decision that is left to the
>>> transport encapsulation. This is a requirement per se!
>>>>
>>>> I won't reiterate all the comments I have about the current
>>>> wording of
>>> this section.
>>>>
>>>> Cheers,
>>>> Med
>>>>
>>>>> -----Message d'origine-----
>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoyé : lundi 25
>>>>> avril 2016 08:30 À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Med
>>>>>
>>>>> My point is that Fragmentation is yet another transport related
>>>>> issue
>>> that
>>>>> is beyond the scope of NSH and beyond the charter of the WG, so
>>>>> it
>>> doesn't
>>>>> really belong in the draft. We are providing an advice as
>>>>> extending the size of the packet may lead to fragmentation, but
>>>>> as you check RFC 7348 VxLAN, which my create the same issue,
>>>>> you'll find it doesn't even
>>> relate
>>>>> to it.
>>>>>
>>>>> Thx
>>>>>
>>>>> Uri ("Oo-Ree")
>>>>> C: 949-378-7568
>>>>>
>>>>>
>>>>> -----Original Message-----
>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>> mohamed.boucadair@orange.com
>>>>> Sent: Sunday, April 24, 2016 10:32 PM
>>>>> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
>>> <narten@us.ibm.com>;
>>>>> sfc@ietf.org
>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Uri,
>>>>>
>>>>> That's another option that needs to be discussed/investigated.
>>>>> I'm
>>> afraid
>>>>> this is not the rationale adopted in -04 since it includes some
>>>>> text
>>> that
>>>>> is far to be sufficient to ensure interoperable implementations.
>>>>>
>>>>> BTW, saying that nsh does not need to deal with fragmentation
>>>>> because
>>> it
>>>>> is transport-independent is not IMHO a good strategy to adopt
>>>>> here
>>> because
>>>>> it opens the door for interoperable issues, it may lead to
>>>>> sub-optimal implementations if the sfc information is present
>>>>> only in one
>>> fragments,
>>>>> etc.
>>>>>
>>>>> My comments are related to the current text in the -04. This text
>>>>> needs
>>> to
>>>>> be fixed somehow.
>>>>>
>>>>> Cheers,
>>>>> Med
>>>>>
>>>>>> -----Message d'origine-----
>>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoyé : dimanche
>>>>>> 24 avril 2016 17:36 À : BOUCADAIR Mohamed IMT/OLN; Thomas
>>>>>> Narten; sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Hi Med
>>>>>>
>>>>>> I see no need to specify the exact behavior as NSH is transport
>>>>>> independent i.e. like NSH interaction with any other Transport
>>>>>> eh issue of Fragmentation is to be dealt in a way that matches
>>>>>> the mechanisms supported by the Transport used and do not belong
>>>>>> in the NSH draft
>>>>>>
>>>>>> Thx
>>>>>>
>>>>>> Uri ("Oo-Ree")
>>>>>> C: 949-378-7568
>>>>>>
>>>>>>
>>>>>> -----Original Message-----
>>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>> mohamed.boucadair@orange.com
>>>>>> Sent: Thursday, April 14, 2016 12:43 AM
>>>>>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> R-,
>>>>>>
>>>>>> In addition to other pending issues raised for this draft, I
>>>>>> would like to raise this additional one about Section 6.
>>>>>>
>>>>>> ==
>>>>>> 6.  Fragmentation Considerations
>>>>>>
>>>>>>    NSH and the associated transport header are "added" to the
>>>>>>    encapsulated packet/frame.  This additional information
>>>>>> increases
>>> the
>>>>>>    size of the packet.  In order the ensure proper forwarding of NSH
>>>>>>    data, several options for handling fragmentation and re-assembly
>>>>>>    exist:
>>>>>>
>>>>>>    1.  Jumbo Frames, when supported, enable the transport of NSH and
>>>>>>        associated transport packets without requiring fragmentation.
>>>>>>
>>>>>>    2.  Path MTU Discovery [RFC1191]"describes a technique for
>>>>>>        dynamically discovering the maximum transmission unit
>>>>>> (MTU) of
>>> an
>>>>>>        arbitrary internet path" and can be utilized to ensure
>>>>>> the
>> the
>>>>>>        required packet size is used.
>>>>>>
>>>>>>    3.  [RFC6830] describes two schemes for fragmentation and re-
>>> assembly
>>>>>>        in section 5.4.
>>>>>> ==
>>>>>>
>>>>>> * The text is weak for a Standard track document that is
>>>>>> intended to solve the problem in
>>>>>> https://tools.ietf.org/html/rfc7498#section-
>> 2.12.
>>>>>> There should be a clear behavior to be followed by an
>> implementation.
>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>
>>>>>> * The text covers only fragmentation when it is induced by SFC
>>>>>> operations, it does not discuss the treatment of a fragment when
>>>>>> received in an SFC domain. IMHO, the draft should also specify
>>>>>> the behavior of the Classifier with regards to fragments for the
>>>>>> sake of proper SFC operation. Applying classification policies
>>>>>> may require the
>>>>> full packet, not only a fragment.
>>>>>> In particular, dedicated resources should dedicated for handling
>>>>>> out of order fragments. Of course, it is out of scope of this
>>>>>> document to describe how SFs handle fragments.
>>>>>>
>>>>>> * If an SFC header is prepended for all fragments, I'm not sure
>>>>>> there is any particular issue at the SFF level...except if
>>>>>> stripping/adding context TLVs depends on the full packet (not
>>>>>> just fragment). It is warranted to consider a little bit this
>>>>>> point before declaring there
>>> is
>>>>> no issue.
>>>>>>
>>>>>> * The text states "several options". This may be interpreted as
>>>>>> if implementing one of them is sufficient...which is not true.
>>>>>> The first two points contribute to minimize the fragmentation
>>>>>> risk, but fragmentation may still be experienced (e.g., other
>>>>>> shims are prepended by other nodes for some other purposes,
>>>>>> nested nsh,
>>>>>> etc.)
>>>>>>
>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>
>>>>>> * The support of jumbo frames by a router/device does not mean
>>>>>> that it can make use of it. Appropriate MTU configuration should
>>>>>> be undertaken in a consistent manner within an SFC domain. The
>>>>>> text should be updated to make it is about (consistent) MTU
>> configuration.
>>>>>>
>>>>>> * BTW, shouldn't the text be reworded to recommended to increase
>>>>>> the MTU of **all nodes** of an SFC-enabled domain by at least
>>>>>> the length of SFC header + transport header?
>>>>>>
>>>>>> * Bullet 2, how PMTU discovery is actually used in this context?
>>>>>> Do you assume that all SFC-aware nodes will issue such messages
>>>>>> towards other SFC-aware node, arbitrary destination, else?
>>>>>>
>>>>>> * Bullet 2, I would drop "describes a technique for dynamically
>>>>>> discovering the maximum transmission unit (MTU) of an arbitrary
>>>>>> internet path".
>>>>>>
>>>>>> * Bullet 2, s/ the the/the.
>>>>>>
>>>>>> * The reference to the LISP specification raises two concerns
>>>>>> and one
>>>>>> comment:
>>>>>>
>>>>>> (1) I don't think it is a good approach that fragments induced
>>>>>> by the network are passed to their ultimate destinations as such
>> (stateless).
>>>>>> IMO, reassembly should be done within the SFC domain
>>>>>> (responsible for
>>>>>> fragmentation) not passed away.
>>>>>> (2) Does the stateful mode require all SFC data plane elements
>>>>>> maintain a full list of MTU for the any SFF/SF instance of the
>>>>>> SFC
>>>>> domain?
>>>>>>
>>>>>> The current text suggests that [RFC6830] should be listed as
>>>>>> normative reference (not an informative one). I would personally
>>>>>> favor removing the reference to LISP (as it is an Experimental RFC).
>>>>>>
>>>>>> * The security section of the draft may be augmented with
>>>>>> informational fragmentation-related pointers to: e.g., RFC1858
>>>>>> (Security Considerations for IP Fragment Filtering), RFC3128
>>>>>> (Protection Against a Variant of the Tiny Fragment Attack), and
>>>>>> RFC
>>>>>> 4963 (IPv4 Reassembly Errors at High Data Rates).
>>>>>>
>>>>>> Cheers,
>>>>>> Med
>>>>>>
>>>>>>> -----Message d'origine-----
>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de
>>>>>>> mohamed.boucadair@orange.com Envoyé : lundi 11 avril 2016 13:14 À :
>>>>>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG last call for
>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Dear Thomas, all,
>>>>>>>
>>>>>>> As I mentioned during the meeting, there are several issues
>>>>>>> that are not covered in the last version of the draft. I
>>>>>>> already provided examples of the issues offline as requested by Martin.
>>>>>>>
>>>>>>> Cheers,
>>>>>>> Med
>>>>>>>
>>>>>>>> -----Message d'origine-----
>>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas
>>>>>>>> Narten Envoyé : jeudi 31 mars 2016 04:48 À : sfc@ietf.org
>>>>>>>> Objet
>>>>>>>> : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Dear WG:
>>>>>>>>
>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>
>>>>>>>> The editors of the NSH document have indicated that they have
>>>>>>>> addressed all known comments and that there are no open issues
>>>>>>>> with the current version of the document.
>>>>>>>>
>>>>>>>> Substantive comments to the list please, editorial comments
>>>>>>>> can go directly to the document editors.
>>>>>>>>
>>>>>>>> We'll also get a brief update from the editors at next week's
>>>>>>>> meeting. If there are any remaining issues with the document,
>>>>>>>> raising them before the meeting would be especially helpful.
>>>>>>>>
>>>>>>>> For the chairs,
>>>>>>>> Thomas
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> sfc mailing list
>>>>>>>> sfc@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> sfc mailing list
>>>>>>> sfc@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Tue Apr 26 08:48:16 2016
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1404F12D511 for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 08:48:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.217
X-Spam-Level: 
X-Spam-Status: No, score=-5.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9vfPD5drhlDs for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 08:48:11 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ABC5712D13F for <sfc@ietf.org>; Tue, 26 Apr 2016 08:48:10 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml701-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CIN65215; Tue, 26 Apr 2016 15:48:06 +0000 (GMT)
Received: from DFWEML703-CAH.china.huawei.com (10.193.5.177) by lhreml701-cah.china.huawei.com (10.201.5.93) with Microsoft SMTP Server (TLS) id 14.3.235.1; Tue, 26 Apr 2016 16:48:05 +0100
Received: from DFWEML501-MBB.china.huawei.com ([10.193.5.179]) by DFWEML703-CAH.china.huawei.com ([10.193.5.177]) with mapi id 14.03.0235.001; Tue, 26 Apr 2016 08:47:57 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfPQIp3nrjaS0+VjDL7mlh8GJ+Er+AwgARg/TCAEFX48IABYBMAgAAQOQCAAAiIAIAAcdWAgAAIhACAAAJAgIAABF8AgAEik2CAAH4AgP//ixXg
Date: Tue, 26 Apr 2016 15:47:56 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com>
In-Reply-To: <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.182]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090201.571F8DB7.0070, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: f00e12aefba01234b913f67e0c7526fe
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/rL5-tAkOCQCJrsZJsZsudge9P6Q>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 15:48:14 -0000

Joel,=20

I think the document should add the description on the following two fragme=
ntation scenarios:

- Transport tunnel generated fragmentation:=20
  When a packet fragmentation is caused by transport tunnel (i.e. various e=
ncapsulations), the termination point of the transport tunnel is responsibl=
e for re-assembling the fragmented pieces of the packet. Since there won't =
be any SFF nodes in between the Transport Tunnel, the tunnel generated frag=
mentation does not require any actions by SFF nodes or SF nodes.=20


- Source node generated fragmentation (after adding on the NSH header):
   When fragmentation has to be performed for a packet being encapsulated w=
ith the NSH header, either the intermediate SFF nodes or the SF nodes have =
to be able to reassemble the fragmented pieces.=20



Cheers,=20


Linda

-----Original Message-----
From: Joel M. Halpern [mailto:jmh@joelhalpern.com]=20
Sent: Tuesday, April 26, 2016 10:33 AM
To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Re-reading your note, it is possible that you are referring only to the cas=
e of transport generated fragmentation of the outer packet.  I had assumed =
you were not talking about that, since the resulting fragments will not all=
 have NSH headers.  As with any tunnel technology, if the tunnel chooses to=
 fragment at its layer, then the tunnel is responsible for reassembly.  Tha=
t would be invisible to the SFF.

Yours,
Joel

On 4/26/16 11:10 AM, Linda Dunbar wrote:
> Agree with Med.
>
> Even if each fragment piece of a packet with NSH header carries the NSH h=
eader, the intermediate SFF nodes still need to put together all the fragme=
nts together before passing the whole data frame to the SF.
>
> Linda
>
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
> mohamed.boucadair@orange.com
> Sent: Monday, April 25, 2016 9:42 AM
> To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> Re-,
>
> How do you instruct the transport layer to ALWAYS prepend an NSH header e=
ven for fragments? Or you don't care about that?
>
> Thank you.
>
> Cheers,
> Med
>
>> -----Message d'origine-----
>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril
>> 2016 16:26 =C0 : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;=20
>> sfc@ietf.org Objet : RE: [sfc] WG last call for=20
>> draft-ietf-sfc-nsh-04.txt
>>
>> Hi Med
>>
>> Not to repeat my position, but I'll do it anyhow :-) As NSH is *NOT*=20
>> a transport, dealing with fragmentation is left to the Transport used.
>>
>> The model I use for NSH, is basically similar to VXLAN . It is an overly=
.
>>
>> Thx
>>
>> Uri ("Oo-Ree")
>> C: 949-378-7568
>>
>>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
>> mohamed.boucadair@orange.com
>> Sent: Monday, April 25, 2016 7:18 AM
>> To: Joel M. Halpern <jmh@joelhalpern.com>; sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Hi Joel,
>>
>> Please see inline.
>>
>> Cheers,
>> Med
>>
>>> -----Message d'origine-----
>>> De : Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoy=E9 : lundi 25=20
>>> avril 2016 15:48 =C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet :
>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> If I am understanding you correctly Med, you are asking that the NSH=20
>>> draft specify how service chaining should cope with packets that=20
>>> have been fragmented?
>>>
>>
>> [Med] To be accurate, I'm asking to assess whether there are implication=
s.
>> If there are, then the draft should be updated accordingly.
>>
>>> NSH, and the SFF functionality, does not care.
>>
>> [Med] I'm not that sure. Some typical implications are listed below:
>>
>> * SFF: If the NSH header is present only in the a fragment but SFF=20
>> didn't maintained a state, subsequent fragments won't be appropriately p=
rocessed.
>> * SFC-aware function: if prepending a context information depends on=20
>> the full packet, not only a fragment.
>>
>>   It just does its job.
>>
>> [Med] which may be disturbed in some situations as listed in the=20
>> examples above.
>>
>>> Ingress and intermediate classifiers may cope with fragments in any=20
>>> number of ways.
>>   Specifying such is clearly out of scope for this draft.
>>
>> [Med] The purpose is not to specify the internal implementation=20
>> details but the external behavior of the classifier function when it=20
>> comes to handle fragments. That behavior may have an incidence on=20
>> SFF, in particular. The purpose is not to recommend the maximum=20
>> resources to be dedicated to out of order fragments nor the timeout=20
>> to cache those; these considerations are of course out of scope.=20
>> Nevertheless, an implementation should offer a configurable parameter=20
>> so that an operator tweak those according to its context.
>>
>>>   I suppose one could write an informational draft on possible ways=20
>>> of coping.  The IETF has not usually published such.
>>> Service functions have to cope with fragmented packets just as they=20
>>> had to before the advent of NSH, so describing that is clearly not=20
>>> needed here.
>>
>> [Med] The advent of NSH has the following implications:
>> * it exacerbates fragmentation. Handing over this issue to the=20
>> transport layer may lead to interoperability issues.
>> * the chaining may not be efficient if fragments are inappropriately=20
>> handled.
>>
>> Introducing NSH should not degrade the overall service compared to=20
>> legacy service deployment schemes.
>>
>>>
>>> Yours,
>>> Joel
>>>
>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
>>>> Re-,
>>>>
>>>> I hear you, but my comment is that we need, as a WG, to decide what=20
>>>> to
>>> put in the draft. FWIW, I'm discussing two fragmentation issues:
>>>>
>>>> (1) Fragmentation that is caused by prepending an SFC header.
>>>> (2) Handling fragments at the ingress of an SFC-enabled domain.
>>>>
>>>> Increasing the MTU is for sure a recommendation is to be explicitly
>>> called out in the text (see my first message).
>>>>
>>>> There are other issues that need to be discussed, e.g., how to
>>>> deal with
>>> fragments in SFFs/Classifiers?
>>>>
>>>> It is also "prudent" to check that no issues will be experienced
>>>> in SFF
>>> to handle fragments. If an SFC header is prepended for all
>>> fragments, I'm not sure there
>>>> is any particular issue at the SFF level, except if
>>>> stripping/adding
>>> context TLVs depends on the full packet (not just fragment). It is
>>> warranted to consider a little bit this point before declaring there
>>> is no issue.
>>>>
>>>> For point (1), declaring fragmentation out of scope would be meant
>>>> that
>>> an implementation must be prepared to receive fragments with or
>>> without NSH header as this is a decision that is left to the
>>> transport encapsulation. This is a requirement per se!
>>>>
>>>> I won't reiterate all the comments I have about the current
>>>> wording of
>>> this section.
>>>>
>>>> Cheers,
>>>> Med
>>>>
>>>>> -----Message d'origine-----
>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25
>>>>> avril 2016 08:30 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Med
>>>>>
>>>>> My point is that Fragmentation is yet another transport related
>>>>> issue
>>> that
>>>>> is beyond the scope of NSH and beyond the charter of the WG, so
>>>>> it
>>> doesn't
>>>>> really belong in the draft. We are providing an advice as
>>>>> extending the size of the packet may lead to fragmentation, but
>>>>> as you check RFC 7348 VxLAN, which my create the same issue,
>>>>> you'll find it doesn't even
>>> relate
>>>>> to it.
>>>>>
>>>>> Thx
>>>>>
>>>>> Uri ("Oo-Ree")
>>>>> C: 949-378-7568
>>>>>
>>>>>
>>>>> -----Original Message-----
>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>> mohamed.boucadair@orange.com
>>>>> Sent: Sunday, April 24, 2016 10:32 PM
>>>>> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
>>> <narten@us.ibm.com>;
>>>>> sfc@ietf.org
>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Uri,
>>>>>
>>>>> That's another option that needs to be discussed/investigated.
>>>>> I'm
>>> afraid
>>>>> this is not the rationale adopted in -04 since it includes some
>>>>> text
>>> that
>>>>> is far to be sufficient to ensure interoperable implementations.
>>>>>
>>>>> BTW, saying that nsh does not need to deal with fragmentation
>>>>> because
>>> it
>>>>> is transport-independent is not IMHO a good strategy to adopt
>>>>> here
>>> because
>>>>> it opens the door for interoperable issues, it may lead to
>>>>> sub-optimal implementations if the sfc information is present
>>>>> only in one
>>> fragments,
>>>>> etc.
>>>>>
>>>>> My comments are related to the current text in the -04. This text
>>>>> needs
>>> to
>>>>> be fixed somehow.
>>>>>
>>>>> Cheers,
>>>>> Med
>>>>>
>>>>>> -----Message d'origine-----
>>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche
>>>>>> 24 avril 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas
>>>>>> Narten; sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Hi Med
>>>>>>
>>>>>> I see no need to specify the exact behavior as NSH is transport
>>>>>> independent i.e. like NSH interaction with any other Transport
>>>>>> eh issue of Fragmentation is to be dealt in a way that matches
>>>>>> the mechanisms supported by the Transport used and do not belong
>>>>>> in the NSH draft
>>>>>>
>>>>>> Thx
>>>>>>
>>>>>> Uri ("Oo-Ree")
>>>>>> C: 949-378-7568
>>>>>>
>>>>>>
>>>>>> -----Original Message-----
>>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>> mohamed.boucadair@orange.com
>>>>>> Sent: Thursday, April 14, 2016 12:43 AM
>>>>>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> R-,
>>>>>>
>>>>>> In addition to other pending issues raised for this draft, I
>>>>>> would like to raise this additional one about Section 6.
>>>>>>
>>>>>> =3D=3D
>>>>>> 6.  Fragmentation Considerations
>>>>>>
>>>>>>    NSH and the associated transport header are "added" to the
>>>>>>    encapsulated packet/frame.  This additional information
>>>>>> increases
>>> the
>>>>>>    size of the packet.  In order the ensure proper forwarding of NSH
>>>>>>    data, several options for handling fragmentation and re-assembly
>>>>>>    exist:
>>>>>>
>>>>>>    1.  Jumbo Frames, when supported, enable the transport of NSH and
>>>>>>        associated transport packets without requiring fragmentation.
>>>>>>
>>>>>>    2.  Path MTU Discovery [RFC1191]"describes a technique for
>>>>>>        dynamically discovering the maximum transmission unit
>>>>>> (MTU) of
>>> an
>>>>>>        arbitrary internet path" and can be utilized to ensure
>>>>>> the
>> the
>>>>>>        required packet size is used.
>>>>>>
>>>>>>    3.  [RFC6830] describes two schemes for fragmentation and re-
>>> assembly
>>>>>>        in section 5.4.
>>>>>> =3D=3D
>>>>>>
>>>>>> * The text is weak for a Standard track document that is
>>>>>> intended to solve the problem in
>>>>>> https://tools.ietf.org/html/rfc7498#section-
>> 2.12.
>>>>>> There should be a clear behavior to be followed by an
>> implementation.
>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>
>>>>>> * The text covers only fragmentation when it is induced by SFC
>>>>>> operations, it does not discuss the treatment of a fragment when
>>>>>> received in an SFC domain. IMHO, the draft should also specify
>>>>>> the behavior of the Classifier with regards to fragments for the
>>>>>> sake of proper SFC operation. Applying classification policies
>>>>>> may require the
>>>>> full packet, not only a fragment.
>>>>>> In particular, dedicated resources should dedicated for handling
>>>>>> out of order fragments. Of course, it is out of scope of this
>>>>>> document to describe how SFs handle fragments.
>>>>>>
>>>>>> * If an SFC header is prepended for all fragments, I'm not sure
>>>>>> there is any particular issue at the SFF level...except if
>>>>>> stripping/adding context TLVs depends on the full packet (not
>>>>>> just fragment). It is warranted to consider a little bit this
>>>>>> point before declaring there
>>> is
>>>>> no issue.
>>>>>>
>>>>>> * The text states "several options". This may be interpreted as
>>>>>> if implementing one of them is sufficient...which is not true.
>>>>>> The first two points contribute to minimize the fragmentation
>>>>>> risk, but fragmentation may still be experienced (e.g., other
>>>>>> shims are prepended by other nodes for some other purposes,
>>>>>> nested nsh,
>>>>>> etc.)
>>>>>>
>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>
>>>>>> * The support of jumbo frames by a router/device does not mean
>>>>>> that it can make use of it. Appropriate MTU configuration should
>>>>>> be undertaken in a consistent manner within an SFC domain. The
>>>>>> text should be updated to make it is about (consistent) MTU
>> configuration.
>>>>>>
>>>>>> * BTW, shouldn't the text be reworded to recommended to increase
>>>>>> the MTU of **all nodes** of an SFC-enabled domain by at least
>>>>>> the length of SFC header + transport header?
>>>>>>
>>>>>> * Bullet 2, how PMTU discovery is actually used in this context?
>>>>>> Do you assume that all SFC-aware nodes will issue such messages
>>>>>> towards other SFC-aware node, arbitrary destination, else?
>>>>>>
>>>>>> * Bullet 2, I would drop "describes a technique for dynamically
>>>>>> discovering the maximum transmission unit (MTU) of an arbitrary
>>>>>> internet path".
>>>>>>
>>>>>> * Bullet 2, s/ the the/the.
>>>>>>
>>>>>> * The reference to the LISP specification raises two concerns
>>>>>> and one
>>>>>> comment:
>>>>>>
>>>>>> (1) I don't think it is a good approach that fragments induced
>>>>>> by the network are passed to their ultimate destinations as such
>> (stateless).
>>>>>> IMO, reassembly should be done within the SFC domain
>>>>>> (responsible for
>>>>>> fragmentation) not passed away.
>>>>>> (2) Does the stateful mode require all SFC data plane elements
>>>>>> maintain a full list of MTU for the any SFF/SF instance of the
>>>>>> SFC
>>>>> domain?
>>>>>>
>>>>>> The current text suggests that [RFC6830] should be listed as
>>>>>> normative reference (not an informative one). I would personally
>>>>>> favor removing the reference to LISP (as it is an Experimental RFC).
>>>>>>
>>>>>> * The security section of the draft may be augmented with
>>>>>> informational fragmentation-related pointers to: e.g., RFC1858
>>>>>> (Security Considerations for IP Fragment Filtering), RFC3128
>>>>>> (Protection Against a Variant of the Tiny Fragment Attack), and
>>>>>> RFC
>>>>>> 4963 (IPv4 Reassembly Errors at High Data Rates).
>>>>>>
>>>>>> Cheers,
>>>>>> Med
>>>>>>
>>>>>>> -----Message d'origine-----
>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de
>>>>>>> mohamed.boucadair@orange.com Envoy=E9 : lundi 11 avril 2016 13:14 =
=C0 :
>>>>>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG last call for
>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Dear Thomas, all,
>>>>>>>
>>>>>>> As I mentioned during the meeting, there are several issues
>>>>>>> that are not covered in the last version of the draft. I
>>>>>>> already provided examples of the issues offline as requested by Mar=
tin.
>>>>>>>
>>>>>>> Cheers,
>>>>>>> Med
>>>>>>>
>>>>>>>> -----Message d'origine-----
>>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas
>>>>>>>> Narten Envoy=E9 : jeudi 31 mars 2016 04:48 =C0 : sfc@ietf.org
>>>>>>>> Objet
>>>>>>>> : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Dear WG:
>>>>>>>>
>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>
>>>>>>>> The editors of the NSH document have indicated that they have
>>>>>>>> addressed all known comments and that there are no open issues
>>>>>>>> with the current version of the document.
>>>>>>>>
>>>>>>>> Substantive comments to the list please, editorial comments
>>>>>>>> can go directly to the document editors.
>>>>>>>>
>>>>>>>> We'll also get a brief update from the editors at next week's
>>>>>>>> meeting. If there are any remaining issues with the document,
>>>>>>>> raising them before the meeting would be especially helpful.
>>>>>>>>
>>>>>>>> For the chairs,
>>>>>>>> Thomas
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> sfc mailing list
>>>>>>>> sfc@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> sfc mailing list
>>>>>>> sfc@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Tue Apr 26 08:58:15 2016
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4516112D13F for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 08:58:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.621
X-Spam-Level: 
X-Spam-Status: No, score=-2.621 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XPLJB1uktUr8 for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 08:58:10 -0700 (PDT)
Received: from hub021-ca-8.exch021.serverdata.net (hub021-ca-8.exch021.serverdata.net [64.78.56.73]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4E9A812D0E2 for <sfc@ietf.org>; Tue, 26 Apr 2016 08:58:10 -0700 (PDT)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-8.exch021.domain.local ([10.254.4.112]) with mapi id 14.03.0266.001; Tue, 26 Apr 2016 08:58:09 -0700
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: Linda Dunbar <linda.dunbar@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfPjVJMNJL6xkKtVPhZYT1+65+Er+AwgARg/TCAEMylAIAA6WYAgAAQOQCAAAiIAIAAcdWAgAAIhACAAAJAgIAABF8AgAGaMQCAAAZigIAABDUA//+L/bA=
Date: Tue, 26 Apr 2016 15:58:09 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B6D786B8B@MBX021-W3-CA-2.exch021.domain.local>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb>
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/2h5ONi4P_A6X0i0H4MnMOPvRtic>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 15:58:12 -0000

Linda,

I like the first clause (transport tunnel based fragmentation).

Regarding the second (source based), I think there are more subcases to con=
sider:

1.  Propagation of NSH encapsulated packet from classifier to SFF
2.  Propagation of NSH encapsulated packet from SFF to SF
3.  Propagation of NSH encapsulated packet from SF to SFF (including possib=
ility that NSH size increased at SF)
4.  Propagation of NSH encapsulated packet from SFF to SFF

In each of the 4 cases above,  there is the possibility that MTU will be ex=
ceeded and therefore there are procedures to be defined in that eventuality=
.

Thanks.

    Ron


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Linda Dunbar
Sent: Tuesday, April 26, 2016 11:48 AM
To: Joel M. Halpern <jmh@joelhalpern.com>; mohamed.boucadair@orange.com; El=
zur, Uri <uri.elzur@intel.com>; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Joel,=20

I think the document should add the description on the following two fragme=
ntation scenarios:

- Transport tunnel generated fragmentation:=20
  When a packet fragmentation is caused by transport tunnel (i.e. various e=
ncapsulations), the termination point of the transport tunnel is responsibl=
e for re-assembling the fragmented pieces of the packet. Since there won't =
be any SFF nodes in between the Transport Tunnel, the tunnel generated frag=
mentation does not require any actions by SFF nodes or SF nodes.=20


- Source node generated fragmentation (after adding on the NSH header):
   When fragmentation has to be performed for a packet being encapsulated w=
ith the NSH header, either the intermediate SFF nodes or the SF nodes have =
to be able to reassemble the fragmented pieces.=20



Cheers,=20


Linda

-----Original Message-----
From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
Sent: Tuesday, April 26, 2016 10:33 AM
To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Re-reading your note, it is possible that you are referring only to the cas=
e of transport generated fragmentation of the outer packet.  I had assumed =
you were not talking about that, since the resulting fragments will not all=
 have NSH headers.  As with any tunnel technology, if the tunnel chooses to=
 fragment at its layer, then the tunnel is responsible for reassembly.  Tha=
t would be invisible to the SFF.

Yours,
Joel

On 4/26/16 11:10 AM, Linda Dunbar wrote:
> Agree with Med.
>
> Even if each fragment piece of a packet with NSH header carries the NSH h=
eader, the intermediate SFF nodes still need to put together all the fragme=
nts together before passing the whole data frame to the SF.
>
> Linda
>
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
> mohamed.boucadair@orange.com
> Sent: Monday, April 25, 2016 9:42 AM
> To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> Re-,
>
> How do you instruct the transport layer to ALWAYS prepend an NSH header e=
ven for fragments? Or you don't care about that?
>
> Thank you.
>
> Cheers,
> Med
>
>> -----Message d'origine-----
>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril
>> 2016 16:26 =C0 : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;=20
>> sfc@ietf.org Objet : RE: [sfc] WG last call for=20
>> draft-ietf-sfc-nsh-04.txt
>>
>> Hi Med
>>
>> Not to repeat my position, but I'll do it anyhow :-) As NSH is *NOT*=20
>> a transport, dealing with fragmentation is left to the Transport used.
>>
>> The model I use for NSH, is basically similar to VXLAN . It is an overly=
.
>>
>> Thx
>>
>> Uri ("Oo-Ree")
>> C: 949-378-7568
>>
>>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
>> mohamed.boucadair@orange.com
>> Sent: Monday, April 25, 2016 7:18 AM
>> To: Joel M. Halpern <jmh@joelhalpern.com>; sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Hi Joel,
>>
>> Please see inline.
>>
>> Cheers,
>> Med
>>
>>> -----Message d'origine-----
>>> De : Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoy=E9 : lundi 25=20
>>> avril 2016 15:48 =C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet :
>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> If I am understanding you correctly Med, you are asking that the NSH=20
>>> draft specify how service chaining should cope with packets that=20
>>> have been fragmented?
>>>
>>
>> [Med] To be accurate, I'm asking to assess whether there are implication=
s.
>> If there are, then the draft should be updated accordingly.
>>
>>> NSH, and the SFF functionality, does not care.
>>
>> [Med] I'm not that sure. Some typical implications are listed below:
>>
>> * SFF: If the NSH header is present only in the a fragment but SFF=20
>> didn't maintained a state, subsequent fragments won't be appropriately p=
rocessed.
>> * SFC-aware function: if prepending a context information depends on=20
>> the full packet, not only a fragment.
>>
>>   It just does its job.
>>
>> [Med] which may be disturbed in some situations as listed in the=20
>> examples above.
>>
>>> Ingress and intermediate classifiers may cope with fragments in any=20
>>> number of ways.
>>   Specifying such is clearly out of scope for this draft.
>>
>> [Med] The purpose is not to specify the internal implementation=20
>> details but the external behavior of the classifier function when it=20
>> comes to handle fragments. That behavior may have an incidence on=20
>> SFF, in particular. The purpose is not to recommend the maximum=20
>> resources to be dedicated to out of order fragments nor the timeout=20
>> to cache those; these considerations are of course out of scope.
>> Nevertheless, an implementation should offer a configurable parameter=20
>> so that an operator tweak those according to its context.
>>
>>>   I suppose one could write an informational draft on possible ways=20
>>> of coping.  The IETF has not usually published such.
>>> Service functions have to cope with fragmented packets just as they=20
>>> had to before the advent of NSH, so describing that is clearly not=20
>>> needed here.
>>
>> [Med] The advent of NSH has the following implications:
>> * it exacerbates fragmentation. Handing over this issue to the=20
>> transport layer may lead to interoperability issues.
>> * the chaining may not be efficient if fragments are inappropriately=20
>> handled.
>>
>> Introducing NSH should not degrade the overall service compared to=20
>> legacy service deployment schemes.
>>
>>>
>>> Yours,
>>> Joel
>>>
>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
>>>> Re-,
>>>>
>>>> I hear you, but my comment is that we need, as a WG, to decide what=20
>>>> to
>>> put in the draft. FWIW, I'm discussing two fragmentation issues:
>>>>
>>>> (1) Fragmentation that is caused by prepending an SFC header.
>>>> (2) Handling fragments at the ingress of an SFC-enabled domain.
>>>>
>>>> Increasing the MTU is for sure a recommendation is to be explicitly
>>> called out in the text (see my first message).
>>>>
>>>> There are other issues that need to be discussed, e.g., how to deal=20
>>>> with
>>> fragments in SFFs/Classifiers?
>>>>
>>>> It is also "prudent" to check that no issues will be experienced in=20
>>>> SFF
>>> to handle fragments. If an SFC header is prepended for all=20
>>> fragments, I'm not sure there
>>>> is any particular issue at the SFF level, except if=20
>>>> stripping/adding
>>> context TLVs depends on the full packet (not just fragment). It is=20
>>> warranted to consider a little bit this point before declaring there=20
>>> is no issue.
>>>>
>>>> For point (1), declaring fragmentation out of scope would be meant=20
>>>> that
>>> an implementation must be prepared to receive fragments with or=20
>>> without NSH header as this is a decision that is left to the=20
>>> transport encapsulation. This is a requirement per se!
>>>>
>>>> I won't reiterate all the comments I have about the current wording=20
>>>> of
>>> this section.
>>>>
>>>> Cheers,
>>>> Med
>>>>
>>>>> -----Message d'origine-----
>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25=20
>>>>> avril 2016 08:30 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;=20
>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for=20
>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Med
>>>>>
>>>>> My point is that Fragmentation is yet another transport related=20
>>>>> issue
>>> that
>>>>> is beyond the scope of NSH and beyond the charter of the WG, so it
>>> doesn't
>>>>> really belong in the draft. We are providing an advice as=20
>>>>> extending the size of the packet may lead to fragmentation, but as=20
>>>>> you check RFC 7348 VxLAN, which my create the same issue, you'll=20
>>>>> find it doesn't even
>>> relate
>>>>> to it.
>>>>>
>>>>> Thx
>>>>>
>>>>> Uri ("Oo-Ree")
>>>>> C: 949-378-7568
>>>>>
>>>>>
>>>>> -----Original Message-----
>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
>>>>> mohamed.boucadair@orange.com
>>>>> Sent: Sunday, April 24, 2016 10:32 PM
>>>>> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
>>> <narten@us.ibm.com>;
>>>>> sfc@ietf.org
>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Uri,
>>>>>
>>>>> That's another option that needs to be discussed/investigated.
>>>>> I'm
>>> afraid
>>>>> this is not the rationale adopted in -04 since it includes some=20
>>>>> text
>>> that
>>>>> is far to be sufficient to ensure interoperable implementations.
>>>>>
>>>>> BTW, saying that nsh does not need to deal with fragmentation=20
>>>>> because
>>> it
>>>>> is transport-independent is not IMHO a good strategy to adopt here
>>> because
>>>>> it opens the door for interoperable issues, it may lead to=20
>>>>> sub-optimal implementations if the sfc information is present only=20
>>>>> in one
>>> fragments,
>>>>> etc.
>>>>>
>>>>> My comments are related to the current text in the -04. This text=20
>>>>> needs
>>> to
>>>>> be fixed somehow.
>>>>>
>>>>> Cheers,
>>>>> Med
>>>>>
>>>>>> -----Message d'origine-----
>>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche
>>>>>> 24 avril 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;=
=20
>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for=20
>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Hi Med
>>>>>>
>>>>>> I see no need to specify the exact behavior as NSH is transport=20
>>>>>> independent i.e. like NSH interaction with any other Transport eh=20
>>>>>> issue of Fragmentation is to be dealt in a way that matches the=20
>>>>>> mechanisms supported by the Transport used and do not belong in=20
>>>>>> the NSH draft
>>>>>>
>>>>>> Thx
>>>>>>
>>>>>> Uri ("Oo-Ree")
>>>>>> C: 949-378-7568
>>>>>>
>>>>>>
>>>>>> -----Original Message-----
>>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
>>>>>> mohamed.boucadair@orange.com
>>>>>> Sent: Thursday, April 14, 2016 12:43 AM
>>>>>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> R-,
>>>>>>
>>>>>> In addition to other pending issues raised for this draft, I=20
>>>>>> would like to raise this additional one about Section 6.
>>>>>>
>>>>>> =3D=3D
>>>>>> 6.  Fragmentation Considerations
>>>>>>
>>>>>>    NSH and the associated transport header are "added" to the
>>>>>>    encapsulated packet/frame.  This additional information=20
>>>>>> increases
>>> the
>>>>>>    size of the packet.  In order the ensure proper forwarding of NSH
>>>>>>    data, several options for handling fragmentation and re-assembly
>>>>>>    exist:
>>>>>>
>>>>>>    1.  Jumbo Frames, when supported, enable the transport of NSH and
>>>>>>        associated transport packets without requiring fragmentation.
>>>>>>
>>>>>>    2.  Path MTU Discovery [RFC1191]"describes a technique for
>>>>>>        dynamically discovering the maximum transmission unit
>>>>>> (MTU) of
>>> an
>>>>>>        arbitrary internet path" and can be utilized to ensure the
>> the
>>>>>>        required packet size is used.
>>>>>>
>>>>>>    3.  [RFC6830] describes two schemes for fragmentation and re-
>>> assembly
>>>>>>        in section 5.4.
>>>>>> =3D=3D
>>>>>>
>>>>>> * The text is weak for a Standard track document that is intended=20
>>>>>> to solve the problem in
>>>>>> https://tools.ietf.org/html/rfc7498#section-
>> 2.12.
>>>>>> There should be a clear behavior to be followed by an
>> implementation.
>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>
>>>>>> * The text covers only fragmentation when it is induced by SFC=20
>>>>>> operations, it does not discuss the treatment of a fragment when=20
>>>>>> received in an SFC domain. IMHO, the draft should also specify=20
>>>>>> the behavior of the Classifier with regards to fragments for the=20
>>>>>> sake of proper SFC operation. Applying classification policies=20
>>>>>> may require the
>>>>> full packet, not only a fragment.
>>>>>> In particular, dedicated resources should dedicated for handling=20
>>>>>> out of order fragments. Of course, it is out of scope of this=20
>>>>>> document to describe how SFs handle fragments.
>>>>>>
>>>>>> * If an SFC header is prepended for all fragments, I'm not sure=20
>>>>>> there is any particular issue at the SFF level...except if=20
>>>>>> stripping/adding context TLVs depends on the full packet (not=20
>>>>>> just fragment). It is warranted to consider a little bit this=20
>>>>>> point before declaring there
>>> is
>>>>> no issue.
>>>>>>
>>>>>> * The text states "several options". This may be interpreted as=20
>>>>>> if implementing one of them is sufficient...which is not true.
>>>>>> The first two points contribute to minimize the fragmentation=20
>>>>>> risk, but fragmentation may still be experienced (e.g., other=20
>>>>>> shims are prepended by other nodes for some other purposes,=20
>>>>>> nested nsh,
>>>>>> etc.)
>>>>>>
>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>
>>>>>> * The support of jumbo frames by a router/device does not mean=20
>>>>>> that it can make use of it. Appropriate MTU configuration should=20
>>>>>> be undertaken in a consistent manner within an SFC domain. The=20
>>>>>> text should be updated to make it is about (consistent) MTU
>> configuration.
>>>>>>
>>>>>> * BTW, shouldn't the text be reworded to recommended to increase=20
>>>>>> the MTU of **all nodes** of an SFC-enabled domain by at least the=20
>>>>>> length of SFC header + transport header?
>>>>>>
>>>>>> * Bullet 2, how PMTU discovery is actually used in this context?
>>>>>> Do you assume that all SFC-aware nodes will issue such messages=20
>>>>>> towards other SFC-aware node, arbitrary destination, else?
>>>>>>
>>>>>> * Bullet 2, I would drop "describes a technique for dynamically=20
>>>>>> discovering the maximum transmission unit (MTU) of an arbitrary=20
>>>>>> internet path".
>>>>>>
>>>>>> * Bullet 2, s/ the the/the.
>>>>>>
>>>>>> * The reference to the LISP specification raises two concerns and=20
>>>>>> one
>>>>>> comment:
>>>>>>
>>>>>> (1) I don't think it is a good approach that fragments induced by=20
>>>>>> the network are passed to their ultimate destinations as such
>> (stateless).
>>>>>> IMO, reassembly should be done within the SFC domain (responsible=20
>>>>>> for
>>>>>> fragmentation) not passed away.
>>>>>> (2) Does the stateful mode require all SFC data plane elements=20
>>>>>> maintain a full list of MTU for the any SFF/SF instance of the=20
>>>>>> SFC
>>>>> domain?
>>>>>>
>>>>>> The current text suggests that [RFC6830] should be listed as=20
>>>>>> normative reference (not an informative one). I would personally=20
>>>>>> favor removing the reference to LISP (as it is an Experimental RFC).
>>>>>>
>>>>>> * The security section of the draft may be augmented with=20
>>>>>> informational fragmentation-related pointers to: e.g., RFC1858=20
>>>>>> (Security Considerations for IP Fragment Filtering), RFC3128=20
>>>>>> (Protection Against a Variant of the Tiny Fragment Attack), and=20
>>>>>> RFC
>>>>>> 4963 (IPv4 Reassembly Errors at High Data Rates).
>>>>>>
>>>>>> Cheers,
>>>>>> Med
>>>>>>
>>>>>>> -----Message d'origine-----
>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de=20
>>>>>>> mohamed.boucadair@orange.com Envoy=E9 : lundi 11 avril 2016 13:14 =
=C0 :
>>>>>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG last call for=20
>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Dear Thomas, all,
>>>>>>>
>>>>>>> As I mentioned during the meeting, there are several issues that=20
>>>>>>> are not covered in the last version of the draft. I already=20
>>>>>>> provided examples of the issues offline as requested by Martin.
>>>>>>>
>>>>>>> Cheers,
>>>>>>> Med
>>>>>>>
>>>>>>>> -----Message d'origine-----
>>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas=20
>>>>>>>> Narten Envoy=E9 : jeudi 31 mars 2016 04:48 =C0 : sfc@ietf.org Obje=
t
>>>>>>>> : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Dear WG:
>>>>>>>>
>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt=20
>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>
>>>>>>>> The editors of the NSH document have indicated that they have=20
>>>>>>>> addressed all known comments and that there are no open issues=20
>>>>>>>> with the current version of the document.
>>>>>>>>
>>>>>>>> Substantive comments to the list please, editorial comments can=20
>>>>>>>> go directly to the document editors.
>>>>>>>>
>>>>>>>> We'll also get a brief update from the editors at next week's=20
>>>>>>>> meeting. If there are any remaining issues with the document,=20
>>>>>>>> raising them before the meeting would be especially helpful.
>>>>>>>>
>>>>>>>> For the chairs,
>>>>>>>> Thomas
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> sfc mailing list
>>>>>>>> sfc@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> sfc mailing list
>>>>>>> sfc@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Apr 26 09:13:24 2016
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 484B412D510 for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 09:13:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.217
X-Spam-Level: 
X-Spam-Status: No, score=-5.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Fmuz6ZS9PQbS for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 09:13:19 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D84A912D13A for <sfc@ietf.org>; Tue, 26 Apr 2016 09:13:18 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml706-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CIN69190; Tue, 26 Apr 2016 16:13:17 +0000 (GMT)
Received: from DFWEML702-CAH.china.huawei.com (10.193.5.176) by lhreml706-cah.china.huawei.com (10.201.5.182) with Microsoft SMTP Server (TLS) id 14.3.235.1; Tue, 26 Apr 2016 17:13:16 +0100
Received: from DFWEML501-MBB.china.huawei.com ([10.193.5.179]) by dfweml702-cah.china.huawei.com ([10.193.5.176]) with mapi id 14.03.0235.001; Tue, 26 Apr 2016 09:13:13 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: Ron Parker <Ron_Parker@affirmednetworks.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfPQIp3nrjaS0+VjDL7mlh8GJ+Er+AwgARg/TCAEFX48IABYBMAgAAQOQCAAAiIAIAAcdWAgAAIhACAAAJAgIAABF8AgAEik2CAAH4AgP//ixXggAB7+4D//45cwA==
Date: Tue, 26 Apr 2016 16:13:13 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657E7CDF8@dfweml501-mbb>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D560CE@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <CDF2F015F4429F458815ED2A6C2B6B0B6D786B8B@MBX021-W3-CA-2.exch021.domain.local>
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B6D786B8B@MBX021-W3-CA-2.exch021.domain.local>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.182]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020205.571F939D.011D, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: f00e12aefba01234b913f67e0c7526fe
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/2Xc-Alk6BZyi4lJtZObZBBRsCeY>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 16:13:23 -0000

Ron,=20

That is very good addition. For the Source Based fragmentation, also need t=
o add the description if the NSH header is added to each fragmented piece.=
=20

Linda

-----Original Message-----
From: Ron Parker [mailto:Ron_Parker@affirmednetworks.com]=20
Sent: Tuesday, April 26, 2016 10:58 AM
To: Linda Dunbar; Joel M. Halpern; mohamed.boucadair@orange.com; Elzur, Uri=
; sfc@ietf.org
Subject: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Linda,

I like the first clause (transport tunnel based fragmentation).

Regarding the second (source based), I think there are more subcases to con=
sider:

1.  Propagation of NSH encapsulated packet from classifier to SFF 2.  Propa=
gation of NSH encapsulated packet from SFF to SF 3.  Propagation of NSH enc=
apsulated packet from SF to SFF (including possibility that NSH size increa=
sed at SF) 4.  Propagation of NSH encapsulated packet from SFF to SFF

In each of the 4 cases above,  there is the possibility that MTU will be ex=
ceeded and therefore there are procedures to be defined in that eventuality=
.

Thanks.

    Ron


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Linda Dunbar
Sent: Tuesday, April 26, 2016 11:48 AM
To: Joel M. Halpern <jmh@joelhalpern.com>; mohamed.boucadair@orange.com; El=
zur, Uri <uri.elzur@intel.com>; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Joel,=20

I think the document should add the description on the following two fragme=
ntation scenarios:

- Transport tunnel generated fragmentation:=20
  When a packet fragmentation is caused by transport tunnel (i.e. various e=
ncapsulations), the termination point of the transport tunnel is responsibl=
e for re-assembling the fragmented pieces of the packet. Since there won't =
be any SFF nodes in between the Transport Tunnel, the tunnel generated frag=
mentation does not require any actions by SFF nodes or SF nodes.=20


- Source node generated fragmentation (after adding on the NSH header):
   When fragmentation has to be performed for a packet being encapsulated w=
ith the NSH header, either the intermediate SFF nodes or the SF nodes have =
to be able to reassemble the fragmented pieces.=20



Cheers,=20


Linda

-----Original Message-----
From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
Sent: Tuesday, April 26, 2016 10:33 AM
To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Re-reading your note, it is possible that you are referring only to the cas=
e of transport generated fragmentation of the outer packet.  I had assumed =
you were not talking about that, since the resulting fragments will not all=
 have NSH headers.  As with any tunnel technology, if the tunnel chooses to=
 fragment at its layer, then the tunnel is responsible for reassembly.  Tha=
t would be invisible to the SFF.

Yours,
Joel

On 4/26/16 11:10 AM, Linda Dunbar wrote:
> Agree with Med.
>
> Even if each fragment piece of a packet with NSH header carries the NSH h=
eader, the intermediate SFF nodes still need to put together all the fragme=
nts together before passing the whole data frame to the SF.
>
> Linda
>
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
> mohamed.boucadair@orange.com
> Sent: Monday, April 25, 2016 9:42 AM
> To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> Re-,
>
> How do you instruct the transport layer to ALWAYS prepend an NSH header e=
ven for fragments? Or you don't care about that?
>
> Thank you.
>
> Cheers,
> Med
>
>> -----Message d'origine-----
>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril
>> 2016 16:26 =C0 : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;=20
>> sfc@ietf.org Objet : RE: [sfc] WG last call for=20
>> draft-ietf-sfc-nsh-04.txt
>>
>> Hi Med
>>
>> Not to repeat my position, but I'll do it anyhow :-) As NSH is *NOT*=20
>> a transport, dealing with fragmentation is left to the Transport used.
>>
>> The model I use for NSH, is basically similar to VXLAN . It is an overly=
.
>>
>> Thx
>>
>> Uri ("Oo-Ree")
>> C: 949-378-7568
>>
>>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
>> mohamed.boucadair@orange.com
>> Sent: Monday, April 25, 2016 7:18 AM
>> To: Joel M. Halpern <jmh@joelhalpern.com>; sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Hi Joel,
>>
>> Please see inline.
>>
>> Cheers,
>> Med
>>
>>> -----Message d'origine-----
>>> De : Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoy=E9 : lundi 25=20
>>> avril 2016 15:48 =C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet :
>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> If I am understanding you correctly Med, you are asking that the NSH=20
>>> draft specify how service chaining should cope with packets that=20
>>> have been fragmented?
>>>
>>
>> [Med] To be accurate, I'm asking to assess whether there are implication=
s.
>> If there are, then the draft should be updated accordingly.
>>
>>> NSH, and the SFF functionality, does not care.
>>
>> [Med] I'm not that sure. Some typical implications are listed below:
>>
>> * SFF: If the NSH header is present only in the a fragment but SFF=20
>> didn't maintained a state, subsequent fragments won't be appropriately p=
rocessed.
>> * SFC-aware function: if prepending a context information depends on=20
>> the full packet, not only a fragment.
>>
>>   It just does its job.
>>
>> [Med] which may be disturbed in some situations as listed in the=20
>> examples above.
>>
>>> Ingress and intermediate classifiers may cope with fragments in any=20
>>> number of ways.
>>   Specifying such is clearly out of scope for this draft.
>>
>> [Med] The purpose is not to specify the internal implementation=20
>> details but the external behavior of the classifier function when it=20
>> comes to handle fragments. That behavior may have an incidence on=20
>> SFF, in particular. The purpose is not to recommend the maximum=20
>> resources to be dedicated to out of order fragments nor the timeout=20
>> to cache those; these considerations are of course out of scope.
>> Nevertheless, an implementation should offer a configurable parameter=20
>> so that an operator tweak those according to its context.
>>
>>>   I suppose one could write an informational draft on possible ways=20
>>> of coping.  The IETF has not usually published such.
>>> Service functions have to cope with fragmented packets just as they=20
>>> had to before the advent of NSH, so describing that is clearly not=20
>>> needed here.
>>
>> [Med] The advent of NSH has the following implications:
>> * it exacerbates fragmentation. Handing over this issue to the=20
>> transport layer may lead to interoperability issues.
>> * the chaining may not be efficient if fragments are inappropriately=20
>> handled.
>>
>> Introducing NSH should not degrade the overall service compared to=20
>> legacy service deployment schemes.
>>
>>>
>>> Yours,
>>> Joel
>>>
>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
>>>> Re-,
>>>>
>>>> I hear you, but my comment is that we need, as a WG, to decide what=20
>>>> to
>>> put in the draft. FWIW, I'm discussing two fragmentation issues:
>>>>
>>>> (1) Fragmentation that is caused by prepending an SFC header.
>>>> (2) Handling fragments at the ingress of an SFC-enabled domain.
>>>>
>>>> Increasing the MTU is for sure a recommendation is to be explicitly
>>> called out in the text (see my first message).
>>>>
>>>> There are other issues that need to be discussed, e.g., how to deal=20
>>>> with
>>> fragments in SFFs/Classifiers?
>>>>
>>>> It is also "prudent" to check that no issues will be experienced in=20
>>>> SFF
>>> to handle fragments. If an SFC header is prepended for all=20
>>> fragments, I'm not sure there
>>>> is any particular issue at the SFF level, except if=20
>>>> stripping/adding
>>> context TLVs depends on the full packet (not just fragment). It is=20
>>> warranted to consider a little bit this point before declaring there=20
>>> is no issue.
>>>>
>>>> For point (1), declaring fragmentation out of scope would be meant=20
>>>> that
>>> an implementation must be prepared to receive fragments with or=20
>>> without NSH header as this is a decision that is left to the=20
>>> transport encapsulation. This is a requirement per se!
>>>>
>>>> I won't reiterate all the comments I have about the current wording=20
>>>> of
>>> this section.
>>>>
>>>> Cheers,
>>>> Med
>>>>
>>>>> -----Message d'origine-----
>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25=20
>>>>> avril 2016 08:30 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;=20
>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for=20
>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Med
>>>>>
>>>>> My point is that Fragmentation is yet another transport related=20
>>>>> issue
>>> that
>>>>> is beyond the scope of NSH and beyond the charter of the WG, so it
>>> doesn't
>>>>> really belong in the draft. We are providing an advice as=20
>>>>> extending the size of the packet may lead to fragmentation, but as=20
>>>>> you check RFC 7348 VxLAN, which my create the same issue, you'll=20
>>>>> find it doesn't even
>>> relate
>>>>> to it.
>>>>>
>>>>> Thx
>>>>>
>>>>> Uri ("Oo-Ree")
>>>>> C: 949-378-7568
>>>>>
>>>>>
>>>>> -----Original Message-----
>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
>>>>> mohamed.boucadair@orange.com
>>>>> Sent: Sunday, April 24, 2016 10:32 PM
>>>>> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
>>> <narten@us.ibm.com>;
>>>>> sfc@ietf.org
>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Uri,
>>>>>
>>>>> That's another option that needs to be discussed/investigated.
>>>>> I'm
>>> afraid
>>>>> this is not the rationale adopted in -04 since it includes some=20
>>>>> text
>>> that
>>>>> is far to be sufficient to ensure interoperable implementations.
>>>>>
>>>>> BTW, saying that nsh does not need to deal with fragmentation=20
>>>>> because
>>> it
>>>>> is transport-independent is not IMHO a good strategy to adopt here
>>> because
>>>>> it opens the door for interoperable issues, it may lead to=20
>>>>> sub-optimal implementations if the sfc information is present only=20
>>>>> in one
>>> fragments,
>>>>> etc.
>>>>>
>>>>> My comments are related to the current text in the -04. This text=20
>>>>> needs
>>> to
>>>>> be fixed somehow.
>>>>>
>>>>> Cheers,
>>>>> Med
>>>>>
>>>>>> -----Message d'origine-----
>>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche
>>>>>> 24 avril 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;=
=20
>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for=20
>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Hi Med
>>>>>>
>>>>>> I see no need to specify the exact behavior as NSH is transport=20
>>>>>> independent i.e. like NSH interaction with any other Transport eh=20
>>>>>> issue of Fragmentation is to be dealt in a way that matches the=20
>>>>>> mechanisms supported by the Transport used and do not belong in=20
>>>>>> the NSH draft
>>>>>>
>>>>>> Thx
>>>>>>
>>>>>> Uri ("Oo-Ree")
>>>>>> C: 949-378-7568
>>>>>>
>>>>>>
>>>>>> -----Original Message-----
>>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
>>>>>> mohamed.boucadair@orange.com
>>>>>> Sent: Thursday, April 14, 2016 12:43 AM
>>>>>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> R-,
>>>>>>
>>>>>> In addition to other pending issues raised for this draft, I=20
>>>>>> would like to raise this additional one about Section 6.
>>>>>>
>>>>>> =3D=3D
>>>>>> 6.  Fragmentation Considerations
>>>>>>
>>>>>>    NSH and the associated transport header are "added" to the
>>>>>>    encapsulated packet/frame.  This additional information=20
>>>>>> increases
>>> the
>>>>>>    size of the packet.  In order the ensure proper forwarding of NSH
>>>>>>    data, several options for handling fragmentation and re-assembly
>>>>>>    exist:
>>>>>>
>>>>>>    1.  Jumbo Frames, when supported, enable the transport of NSH and
>>>>>>        associated transport packets without requiring fragmentation.
>>>>>>
>>>>>>    2.  Path MTU Discovery [RFC1191]"describes a technique for
>>>>>>        dynamically discovering the maximum transmission unit
>>>>>> (MTU) of
>>> an
>>>>>>        arbitrary internet path" and can be utilized to ensure the
>> the
>>>>>>        required packet size is used.
>>>>>>
>>>>>>    3.  [RFC6830] describes two schemes for fragmentation and re-
>>> assembly
>>>>>>        in section 5.4.
>>>>>> =3D=3D
>>>>>>
>>>>>> * The text is weak for a Standard track document that is intended=20
>>>>>> to solve the problem in
>>>>>> https://tools.ietf.org/html/rfc7498#section-
>> 2.12.
>>>>>> There should be a clear behavior to be followed by an
>> implementation.
>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>
>>>>>> * The text covers only fragmentation when it is induced by SFC=20
>>>>>> operations, it does not discuss the treatment of a fragment when=20
>>>>>> received in an SFC domain. IMHO, the draft should also specify=20
>>>>>> the behavior of the Classifier with regards to fragments for the=20
>>>>>> sake of proper SFC operation. Applying classification policies=20
>>>>>> may require the
>>>>> full packet, not only a fragment.
>>>>>> In particular, dedicated resources should dedicated for handling=20
>>>>>> out of order fragments. Of course, it is out of scope of this=20
>>>>>> document to describe how SFs handle fragments.
>>>>>>
>>>>>> * If an SFC header is prepended for all fragments, I'm not sure=20
>>>>>> there is any particular issue at the SFF level...except if=20
>>>>>> stripping/adding context TLVs depends on the full packet (not=20
>>>>>> just fragment). It is warranted to consider a little bit this=20
>>>>>> point before declaring there
>>> is
>>>>> no issue.
>>>>>>
>>>>>> * The text states "several options". This may be interpreted as=20
>>>>>> if implementing one of them is sufficient...which is not true.
>>>>>> The first two points contribute to minimize the fragmentation=20
>>>>>> risk, but fragmentation may still be experienced (e.g., other=20
>>>>>> shims are prepended by other nodes for some other purposes,=20
>>>>>> nested nsh,
>>>>>> etc.)
>>>>>>
>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>
>>>>>> * The support of jumbo frames by a router/device does not mean=20
>>>>>> that it can make use of it. Appropriate MTU configuration should=20
>>>>>> be undertaken in a consistent manner within an SFC domain. The=20
>>>>>> text should be updated to make it is about (consistent) MTU
>> configuration.
>>>>>>
>>>>>> * BTW, shouldn't the text be reworded to recommended to increase=20
>>>>>> the MTU of **all nodes** of an SFC-enabled domain by at least the=20
>>>>>> length of SFC header + transport header?
>>>>>>
>>>>>> * Bullet 2, how PMTU discovery is actually used in this context?
>>>>>> Do you assume that all SFC-aware nodes will issue such messages=20
>>>>>> towards other SFC-aware node, arbitrary destination, else?
>>>>>>
>>>>>> * Bullet 2, I would drop "describes a technique for dynamically=20
>>>>>> discovering the maximum transmission unit (MTU) of an arbitrary=20
>>>>>> internet path".
>>>>>>
>>>>>> * Bullet 2, s/ the the/the.
>>>>>>
>>>>>> * The reference to the LISP specification raises two concerns and=20
>>>>>> one
>>>>>> comment:
>>>>>>
>>>>>> (1) I don't think it is a good approach that fragments induced by=20
>>>>>> the network are passed to their ultimate destinations as such
>> (stateless).
>>>>>> IMO, reassembly should be done within the SFC domain (responsible=20
>>>>>> for
>>>>>> fragmentation) not passed away.
>>>>>> (2) Does the stateful mode require all SFC data plane elements=20
>>>>>> maintain a full list of MTU for the any SFF/SF instance of the=20
>>>>>> SFC
>>>>> domain?
>>>>>>
>>>>>> The current text suggests that [RFC6830] should be listed as=20
>>>>>> normative reference (not an informative one). I would personally=20
>>>>>> favor removing the reference to LISP (as it is an Experimental RFC).
>>>>>>
>>>>>> * The security section of the draft may be augmented with=20
>>>>>> informational fragmentation-related pointers to: e.g., RFC1858=20
>>>>>> (Security Considerations for IP Fragment Filtering), RFC3128=20
>>>>>> (Protection Against a Variant of the Tiny Fragment Attack), and=20
>>>>>> RFC
>>>>>> 4963 (IPv4 Reassembly Errors at High Data Rates).
>>>>>>
>>>>>> Cheers,
>>>>>> Med
>>>>>>
>>>>>>> -----Message d'origine-----
>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de=20
>>>>>>> mohamed.boucadair@orange.com Envoy=E9 : lundi 11 avril 2016 13:14 =
=C0 :
>>>>>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG last call for=20
>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Dear Thomas, all,
>>>>>>>
>>>>>>> As I mentioned during the meeting, there are several issues that=20
>>>>>>> are not covered in the last version of the draft. I already=20
>>>>>>> provided examples of the issues offline as requested by Martin.
>>>>>>>
>>>>>>> Cheers,
>>>>>>> Med
>>>>>>>
>>>>>>>> -----Message d'origine-----
>>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas=20
>>>>>>>> Narten Envoy=E9 : jeudi 31 mars 2016 04:48 =C0 : sfc@ietf.org Obje=
t
>>>>>>>> : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Dear WG:
>>>>>>>>
>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt=20
>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>
>>>>>>>> The editors of the NSH document have indicated that they have=20
>>>>>>>> addressed all known comments and that there are no open issues=20
>>>>>>>> with the current version of the document.
>>>>>>>>
>>>>>>>> Substantive comments to the list please, editorial comments can=20
>>>>>>>> go directly to the document editors.
>>>>>>>>
>>>>>>>> We'll also get a brief update from the editors at next week's=20
>>>>>>>> meeting. If there are any remaining issues with the document,=20
>>>>>>>> raising them before the meeting would be especially helpful.
>>>>>>>>
>>>>>>>> For the chairs,
>>>>>>>> Thomas
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> sfc mailing list
>>>>>>>> sfc@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> sfc mailing list
>>>>>>> sfc@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Apr 26 10:06:34 2016
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E28612D541 for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 10:06:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.217
X-Spam-Level: 
X-Spam-Status: No, score=-5.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DFQ5X1CpxrW8 for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 10:06:31 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 378FE12D533 for <sfc@ietf.org>; Tue, 26 Apr 2016 10:06:30 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml706-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CIN76890; Tue, 26 Apr 2016 17:06:28 +0000 (GMT)
Received: from DFWEML701-CAH.china.huawei.com (10.193.5.175) by lhreml706-cah.china.huawei.com (10.201.5.182) with Microsoft SMTP Server (TLS) id 14.3.235.1; Tue, 26 Apr 2016 18:06:27 +0100
Received: from DFWEML501-MBB.china.huawei.com ([10.193.5.179]) by dfweml701-cah.china.huawei.com ([10.193.5.175]) with mapi id 14.03.0235.001; Tue, 26 Apr 2016 10:06:24 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: Sunil Vallamkonda <sunilvk@f5.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: Questions to  SFC-Metadata-model
Thread-Index: AQHRn931TwQxIEnd+UK67M9K4Pjl1g==
Date: Tue, 26 Apr 2016 17:06:23 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657E7CEE6@dfweml501-mbb>
References: <E8355113905631478EFF04F5AA706E9830F0AC6D@wtl-exchp-2.sandvine.com> <1460042865963.25707@F5.com>, <E8355113905631478EFF04F5AA706E9830F11EA7@wtl-exchp-2.sandvine.com>, <1460091126273.230@F5.com> <1D15709113D6B34BAE5E128F392059CA01268568BE@blr-exch-1.sandvine.com>, <TU4PR84MB01596CB74B2CC2D7395C545BFE910@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <1460738575691.54747@F5.com> <E8355113905631478EFF04F5AA706E9830F2432E@wtl-exchp-2.sandvine.com> <f64d98220bfa471b900e6557ff27b506@SEAEXCHMBX06.olympus.F5Net.com>
In-Reply-To: <f64d98220bfa471b900e6557ff27b506@SEAEXCHMBX06.olympus.F5Net.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.182]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020204.571FA014.0206, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: d4e251da4aa51661e299d3d82e2c2504
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ZLexQfsXwRFD1RUme6CJE6Kx_ek>
Subject: [sfc] Questions to  SFC-Metadata-model
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 17:06:33 -0000
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From nobody Tue Apr 26 10:17:54 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 051CD12D1D5 for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 10:17:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QXOWzfUjDnZe for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 10:17:45 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5567D12D530 for <sfc@ietf.org>; Tue, 26 Apr 2016 10:17:45 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 1FE09259F28; Tue, 26 Apr 2016 10:17:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461691065; bh=VsrrmBPEhP2kVKoXVOGXGn9tRt+Xuz6BYw+z0brCAy0=; h=Subject:To:References:From:Date:In-Reply-To:From; b=ddcdfT7D7IFhHZzh1ecZxzsj8diRbcwHOT7kvOL57DdkMWjC9FYyhjOBTPGz247Ce l/SLS6QBWPOBwQRp6mle9bR25wgvjYT8uLSbjUVn4cvpwV+b2+xvxl/CZsEIB1OjGO /uc3B4wdRXJaI8N8dc0MT2E7cVys+6pPrEcH06LI=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 0777D24097D; Tue, 26 Apr 2016 10:17:43 -0700 (PDT)
To: Linda Dunbar <linda.dunbar@huawei.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com>
Date: Tue, 26 Apr 2016 13:17:35 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/E_VaGozIRYm804NiGZN9wK6rMo4>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 17:17:53 -0000

With regard to Transport tunnel fragementation, that seems an issue for
the transport protocol.  I don't actually object to a sentence, but it
does not seem that it will accomplish anything.

With regard to packets fragmented by the source, I completely disagree
with your assertion.  If an SFF were to reassemble the packets, that 
would be a violation of its job.  There is no reason for an SFF to 
reassemble a packet fragmented by the source.  The classifier may have 
to do some interesting things in order to properly classify succeeding 
fragments, but that is an implementation issue (most commonly addressed 
with virtual reassembly, which doe snot delay the fragments.)  We don't 
specity that.

If an SF needs to reassemble fragments to do its job, that is up to the 
SF.  Some will need to actually reassemble.  Some will need to perform 
virtual reassembly, and some will happily process the fragments.  I can 
not see what the NSH document could possibly mandate.

Yours,
Joel

On 4/26/16 11:47 AM, Linda Dunbar wrote:
> Joel,
>
> I think the document should add the description on the following two
> fragmentation scenarios:
>
> - Transport tunnel generated fragmentation: When a packet
> fragmentation is caused by transport tunnel (i.e. various
> encapsulations), the termination point of the transport tunnel is
> responsible for re-assembling the fragmented pieces of the packet.
> Since there won't be any SFF nodes in between the Transport Tunnel,
> the tunnel generated fragmentation does not require any actions by
> SFF nodes or SF nodes.
>
>
> - Source node generated fragmentation (after adding on the NSH
> header): When fragmentation has to be performed for a packet being
> encapsulated with the NSH header, either the intermediate SFF nodes
> or the SF nodes have to be able to reassemble the fragmented pieces.
>
>
>
>
> Cheers,
>
>
> Linda
>
> -----Original Message----- From: Joel M. Halpern
> [mailto:jmh@joelhalpern.com] Sent: Tuesday, April 26, 2016 10:33 AM
> To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri;
> sfc@ietf.org Subject: Re: [sfc] WG last call for
> draft-ietf-sfc-nsh-04.txt
>
> Re-reading your note, it is possible that you are referring only to
> the case of transport generated fragmentation of the outer packet.  I
> had assumed you were not talking about that, since the resulting
> fragments will not all have NSH headers.  As with any tunnel
> technology, if the tunnel chooses to fragment at its layer, then the
> tunnel is responsible for reassembly.  That would be invisible to the
> SFF.
>
> Yours, Joel
>
> On 4/26/16 11:10 AM, Linda Dunbar wrote:
>> Agree with Med.
>>
>> Even if each fragment piece of a packet with NSH header carries the
>> NSH header, the intermediate SFF nodes still need to put together
>> all the fragments together before passing the whole data frame to
>> the SF.
>>
>> Linda
>>
>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]
>> On Behalf Of mohamed.boucadair@orange.com Sent: Monday, April 25,
>> 2016 9:42 AM To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org Subject:
>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Re-,
>>
>> How do you instruct the transport layer to ALWAYS prepend an NSH
>> header even for fragments? Or you don't care about that?
>>
>> Thank you.
>>
>> Cheers, Med
>>
>>> -----Message d'origine----- De : Elzur, Uri
>>> [mailto:uri.elzur@intel.com] Envoyé : lundi 25 avril 2016 16:26 À
>>> : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; sfc@ietf.org Objet
>>> : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> Hi Med
>>>
>>> Not to repeat my position, but I'll do it anyhow :-) As NSH is
>>> *NOT* a transport, dealing with fragmentation is left to the
>>> Transport used.
>>>
>>> The model I use for NSH, is basically similar to VXLAN . It is an
>>> overly.
>>>
>>> Thx
>>>
>>> Uri ("Oo-Ree") C: 949-378-7568
>>>
>>>
>>> -----Original Message----- From: sfc
>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>> mohamed.boucadair@orange.com Sent: Monday, April 25, 2016 7:18
>>> AM To: Joel M. Halpern <jmh@joelhalpern.com>; sfc@ietf.org
>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> Hi Joel,
>>>
>>> Please see inline.
>>>
>>> Cheers, Med
>>>
>>>> -----Message d'origine----- De : Joel M. Halpern
>>>> [mailto:jmh@joelhalpern.com] Envoyé : lundi 25 avril 2016 15:48
>>>> À : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet : Re: [sfc]
>>>> WG last call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> If I am understanding you correctly Med, you are asking that
>>>> the NSH draft specify how service chaining should cope with
>>>> packets that have been fragmented?
>>>>
>>>
>>> [Med] To be accurate, I'm asking to assess whether there are
>>> implications. If there are, then the draft should be updated
>>> accordingly.
>>>
>>>> NSH, and the SFF functionality, does not care.
>>>
>>> [Med] I'm not that sure. Some typical implications are listed
>>> below:
>>>
>>> * SFF: If the NSH header is present only in the a fragment but
>>> SFF didn't maintained a state, subsequent fragments won't be
>>> appropriately processed. * SFC-aware function: if prepending a
>>> context information depends on the full packet, not only a
>>> fragment.
>>>
>>> It just does its job.
>>>
>>> [Med] which may be disturbed in some situations as listed in the
>>>  examples above.
>>>
>>>> Ingress and intermediate classifiers may cope with fragments in
>>>> any number of ways.
>>> Specifying such is clearly out of scope for this draft.
>>>
>>> [Med] The purpose is not to specify the internal implementation
>>> details but the external behavior of the classifier function when
>>> it comes to handle fragments. That behavior may have an incidence
>>> on SFF, in particular. The purpose is not to recommend the
>>> maximum resources to be dedicated to out of order fragments nor
>>> the timeout to cache those; these considerations are of course
>>> out of scope. Nevertheless, an implementation should offer a
>>> configurable parameter so that an operator tweak those according
>>> to its context.
>>>
>>>> I suppose one could write an informational draft on possible
>>>> ways of coping.  The IETF has not usually published such.
>>>> Service functions have to cope with fragmented packets just as
>>>> they had to before the advent of NSH, so describing that is
>>>> clearly not needed here.
>>>
>>> [Med] The advent of NSH has the following implications: * it
>>> exacerbates fragmentation. Handing over this issue to the
>>> transport layer may lead to interoperability issues. * the
>>> chaining may not be efficient if fragments are inappropriately
>>> handled.
>>>
>>> Introducing NSH should not degrade the overall service compared
>>> to legacy service deployment schemes.
>>>
>>>>
>>>> Yours, Joel
>>>>
>>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
>>>>> Re-,
>>>>>
>>>>> I hear you, but my comment is that we need, as a WG, to
>>>>> decide what to
>>>> put in the draft. FWIW, I'm discussing two fragmentation
>>>> issues:
>>>>>
>>>>> (1) Fragmentation that is caused by prepending an SFC
>>>>> header. (2) Handling fragments at the ingress of an
>>>>> SFC-enabled domain.
>>>>>
>>>>> Increasing the MTU is for sure a recommendation is to be
>>>>> explicitly
>>>> called out in the text (see my first message).
>>>>>
>>>>> There are other issues that need to be discussed, e.g., how
>>>>> to deal with
>>>> fragments in SFFs/Classifiers?
>>>>>
>>>>> It is also "prudent" to check that no issues will be
>>>>> experienced in SFF
>>>> to handle fragments. If an SFC header is prepended for all
>>>> fragments, I'm not sure there
>>>>> is any particular issue at the SFF level, except if
>>>>> stripping/adding
>>>> context TLVs depends on the full packet (not just fragment). It
>>>> is warranted to consider a little bit this point before
>>>> declaring there is no issue.
>>>>>
>>>>> For point (1), declaring fragmentation out of scope would be
>>>>> meant that
>>>> an implementation must be prepared to receive fragments with
>>>> or without NSH header as this is a decision that is left to
>>>> the transport encapsulation. This is a requirement per se!
>>>>>
>>>>> I won't reiterate all the comments I have about the current
>>>>> wording of
>>>> this section.
>>>>>
>>>>> Cheers, Med
>>>>>
>>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>> [mailto:uri.elzur@intel.com] Envoyé : lundi 25 avril 2016
>>>>>> 08:30 À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Hi Med
>>>>>>
>>>>>> My point is that Fragmentation is yet another transport
>>>>>> related issue
>>>> that
>>>>>> is beyond the scope of NSH and beyond the charter of the
>>>>>> WG, so it
>>>> doesn't
>>>>>> really belong in the draft. We are providing an advice as
>>>>>> extending the size of the packet may lead to fragmentation,
>>>>>> but as you check RFC 7348 VxLAN, which my create the same
>>>>>> issue, you'll find it doesn't even
>>>> relate
>>>>>> to it.
>>>>>>
>>>>>> Thx
>>>>>>
>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>
>>>>>>
>>>>>> -----Original Message----- From: sfc
>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>> mohamed.boucadair@orange.com Sent: Sunday, April 24, 2016
>>>>>> 10:32 PM To: Elzur, Uri <uri.elzur@intel.com>; Thomas
>>>>>> Narten
>>>> <narten@us.ibm.com>;
>>>>>> sfc@ietf.org Subject: Re: [sfc] WG last call for
>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Hi Uri,
>>>>>>
>>>>>> That's another option that needs to be
>>>>>> discussed/investigated. I'm
>>>> afraid
>>>>>> this is not the rationale adopted in -04 since it includes
>>>>>> some text
>>>> that
>>>>>> is far to be sufficient to ensure interoperable
>>>>>> implementations.
>>>>>>
>>>>>> BTW, saying that nsh does not need to deal with
>>>>>> fragmentation because
>>>> it
>>>>>> is transport-independent is not IMHO a good strategy to
>>>>>> adopt here
>>>> because
>>>>>> it opens the door for interoperable issues, it may lead to
>>>>>> sub-optimal implementations if the sfc information is
>>>>>> present only in one
>>>> fragments,
>>>>>> etc.
>>>>>>
>>>>>> My comments are related to the current text in the -04.
>>>>>> This text needs
>>>> to
>>>>>> be fixed somehow.
>>>>>>
>>>>>> Cheers, Med
>>>>>>
>>>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>>> [mailto:uri.elzur@intel.com] Envoyé : dimanche 24 avril
>>>>>>> 2016 17:36 À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Hi Med
>>>>>>>
>>>>>>> I see no need to specify the exact behavior as NSH is
>>>>>>> transport independent i.e. like NSH interaction with any
>>>>>>> other Transport eh issue of Fragmentation is to be dealt
>>>>>>> in a way that matches the mechanisms supported by the
>>>>>>> Transport used and do not belong in the NSH draft
>>>>>>>
>>>>>>> Thx
>>>>>>>
>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>
>>>>>>>
>>>>>>> -----Original Message----- From: sfc
>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>> mohamed.boucadair@orange.com Sent: Thursday, April 14,
>>>>>>> 2016 12:43 AM To: Thomas Narten <narten@us.ibm.com>;
>>>>>>> sfc@ietf.org Subject: Re: [sfc] WG last call for
>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> R-,
>>>>>>>
>>>>>>> In addition to other pending issues raised for this
>>>>>>> draft, I would like to raise this additional one about
>>>>>>> Section 6.
>>>>>>>
>>>>>>> == 6.  Fragmentation Considerations
>>>>>>>
>>>>>>> NSH and the associated transport header are "added" to
>>>>>>> the encapsulated packet/frame.  This additional
>>>>>>> information increases
>>>> the
>>>>>>> size of the packet.  In order the ensure proper
>>>>>>> forwarding of NSH data, several options for handling
>>>>>>> fragmentation and re-assembly exist:
>>>>>>>
>>>>>>> 1.  Jumbo Frames, when supported, enable the transport of
>>>>>>> NSH and associated transport packets without requiring
>>>>>>> fragmentation.
>>>>>>>
>>>>>>> 2.  Path MTU Discovery [RFC1191]"describes a technique
>>>>>>> for dynamically discovering the maximum transmission
>>>>>>> unit (MTU) of
>>>> an
>>>>>>> arbitrary internet path" and can be utilized to ensure
>>>>>>> the
>>> the
>>>>>>> required packet size is used.
>>>>>>>
>>>>>>> 3.  [RFC6830] describes two schemes for fragmentation and
>>>>>>> re-
>>>> assembly
>>>>>>> in section 5.4. ==
>>>>>>>
>>>>>>> * The text is weak for a Standard track document that is
>>>>>>> intended to solve the problem in
>>>>>>> https://tools.ietf.org/html/rfc7498#section-
>>> 2.12.
>>>>>>> There should be a clear behavior to be followed by an
>>> implementation.
>>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>>
>>>>>>> * The text covers only fragmentation when it is induced
>>>>>>> by SFC operations, it does not discuss the treatment of a
>>>>>>> fragment when received in an SFC domain. IMHO, the draft
>>>>>>> should also specify the behavior of the Classifier with
>>>>>>> regards to fragments for the sake of proper SFC
>>>>>>> operation. Applying classification policies may require
>>>>>>> the
>>>>>> full packet, not only a fragment.
>>>>>>> In particular, dedicated resources should dedicated for
>>>>>>> handling out of order fragments. Of course, it is out of
>>>>>>> scope of this document to describe how SFs handle
>>>>>>> fragments.
>>>>>>>
>>>>>>> * If an SFC header is prepended for all fragments, I'm
>>>>>>> not sure there is any particular issue at the SFF
>>>>>>> level...except if stripping/adding context TLVs depends
>>>>>>> on the full packet (not just fragment). It is warranted
>>>>>>> to consider a little bit this point before declaring
>>>>>>> there
>>>> is
>>>>>> no issue.
>>>>>>>
>>>>>>> * The text states "several options". This may be
>>>>>>> interpreted as if implementing one of them is
>>>>>>> sufficient...which is not true. The first two points
>>>>>>> contribute to minimize the fragmentation risk, but
>>>>>>> fragmentation may still be experienced (e.g., other shims
>>>>>>> are prepended by other nodes for some other purposes,
>>>>>>> nested nsh, etc.)
>>>>>>>
>>>>>>> * The first two points have nothing to do with
>>>>>>> reassembly.
>>>>>>>
>>>>>>> * The support of jumbo frames by a router/device does not
>>>>>>> mean that it can make use of it. Appropriate MTU
>>>>>>> configuration should be undertaken in a consistent manner
>>>>>>> within an SFC domain. The text should be updated to make
>>>>>>> it is about (consistent) MTU
>>> configuration.
>>>>>>>
>>>>>>> * BTW, shouldn't the text be reworded to recommended to
>>>>>>> increase the MTU of **all nodes** of an SFC-enabled
>>>>>>> domain by at least the length of SFC header + transport
>>>>>>> header?
>>>>>>>
>>>>>>> * Bullet 2, how PMTU discovery is actually used in this
>>>>>>> context? Do you assume that all SFC-aware nodes will
>>>>>>> issue such messages towards other SFC-aware node,
>>>>>>> arbitrary destination, else?
>>>>>>>
>>>>>>> * Bullet 2, I would drop "describes a technique for
>>>>>>> dynamically discovering the maximum transmission unit
>>>>>>> (MTU) of an arbitrary internet path".
>>>>>>>
>>>>>>> * Bullet 2, s/ the the/the.
>>>>>>>
>>>>>>> * The reference to the LISP specification raises two
>>>>>>> concerns and one comment:
>>>>>>>
>>>>>>> (1) I don't think it is a good approach that fragments
>>>>>>> induced by the network are passed to their ultimate
>>>>>>> destinations as such
>>> (stateless).
>>>>>>> IMO, reassembly should be done within the SFC domain
>>>>>>> (responsible for fragmentation) not passed away. (2) Does
>>>>>>> the stateful mode require all SFC data plane elements
>>>>>>> maintain a full list of MTU for the any SFF/SF instance
>>>>>>> of the SFC
>>>>>> domain?
>>>>>>>
>>>>>>> The current text suggests that [RFC6830] should be listed
>>>>>>> as normative reference (not an informative one). I would
>>>>>>> personally favor removing the reference to LISP (as it is
>>>>>>> an Experimental RFC).
>>>>>>>
>>>>>>> * The security section of the draft may be augmented
>>>>>>> with informational fragmentation-related pointers to:
>>>>>>> e.g., RFC1858 (Security Considerations for IP Fragment
>>>>>>> Filtering), RFC3128 (Protection Against a Variant of the
>>>>>>> Tiny Fragment Attack), and RFC 4963 (IPv4 Reassembly
>>>>>>> Errors at High Data Rates).
>>>>>>>
>>>>>>> Cheers, Med
>>>>>>>
>>>>>>>> -----Message d'origine----- De : sfc
>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de
>>>>>>>> mohamed.boucadair@orange.com Envoyé : lundi 11 avril
>>>>>>>> 2016 13:14 À : Thomas Narten; sfc@ietf.org Objet : Re:
>>>>>>>> [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Dear Thomas, all,
>>>>>>>>
>>>>>>>> As I mentioned during the meeting, there are several
>>>>>>>> issues that are not covered in the last version of the
>>>>>>>> draft. I already provided examples of the issues
>>>>>>>> offline as requested by Martin.
>>>>>>>>
>>>>>>>> Cheers, Med
>>>>>>>>
>>>>>>>>> -----Message d'origine----- De : sfc
>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de Thomas
>>>>>>>>> Narten Envoyé : jeudi 31 mars 2016 04:48 À :
>>>>>>>>> sfc@ietf.org Objet : [sfc] WG last call for
>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> Dear WG:
>>>>>>>>>
>>>>>>>>> This note begins a WG last call on
>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
The editors of the NSH document have indicated that they have
>>>>>>>>> addressed all known comments and that there are no
>>>>>>>>> open issues with the current version of the
>>>>>>>>> document.
>>>>>>>>>
>>>>>>>>> Substantive comments to the list please, editorial
>>>>>>>>> comments can go directly to the document editors.
>>>>>>>>>
>>>>>>>>> We'll also get a brief update from the editors at
>>>>>>>>> next week's meeting. If there are any remaining
>>>>>>>>> issues with the document, raising them before the
>>>>>>>>> meeting would be especially helpful.
>>>>>>>>>
>>>>>>>>> For the chairs, Thomas
>>>>>>>>>
>>>>>>>>> _______________________________________________ sfc
>>>>>>>>> mailing list sfc@ietf.org
>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>
>>>>>>>> _______________________________________________ sfc
>>>>>>>> mailing list sfc@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________ sfc
>>>>>>> mailing list sfc@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>>> _______________________________________________ sfc mailing
>>>>>> list sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>>> _______________________________________________ sfc mailing
>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>
>>> _______________________________________________ sfc mailing list
>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>
>> _______________________________________________ sfc mailing list
>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>


From nobody Tue Apr 26 10:21:55 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 321A712D1D5 for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 10:21:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oW32AvPwK-mf for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 10:21:50 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C35212B02A for <sfc@ietf.org>; Tue, 26 Apr 2016 10:21:50 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 2E387258B1E; Tue, 26 Apr 2016 10:21:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461691310; bh=8hDtr3txZHRqJaTKYrV+s1tkKXWnxinRaZEtPdoC2OA=; h=Subject:To:References:From:Date:In-Reply-To:From; b=SLgrhXKtdIE4lZAaR2BcA0O5WN7QhyaX1bUjDHDVX8EGwZ586oOsVPu8s9+HHZKXW ibnzMwI2V2/j9dKR5stNDBmq+fJCvCySee1MPY5NMOudjO1nV3cAQAIXYQxNiESO3G T48Mb/KtqFZbnlNXzSr/4bmuHznbV9tTo/ewS+wI=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 0CBBE24EB23; Tue, 26 Apr 2016 10:21:48 -0700 (PDT)
To: Ron Parker <Ron_Parker@affirmednetworks.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <CDF2F015F4429F458815ED2A6C2B6B0B6D786B8B@MBX021-W3-CA-2.exch021.domain.local>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <0f0e8705-1ca4-6df0-81c3-93db0f94a99f@joelhalpern.com>
Date: Tue, 26 Apr 2016 13:21:40 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B6D786B8B@MBX021-W3-CA-2.exch021.domain.local>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/O4QqVYhTyDMxlBCei8ODGwkKIlU>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 17:21:53 -0000

At least so far, we have treated the communication between classifier 
and SFF (ingress or intermediate) as outside of the scope of our work. 
For SF <-> SFF communication we have ntoed the need for a proxy to 
handle the case when the SF can not accept and return the NSH header, 
since we assume that is preserved.  Other than that preservation, 
similar to the above, we have treated the details as outside of our 
scope. That is because they depend so heavily on the implementation 
technique used.  (Hypervisor ,_> application communication vs 
communication inside a user space or communication over an actual 
Ethernet are all very different.)

Trying to extend the NSH document to address these would be a major 
change, and would step into the issues related to transport selection, 
which are explicitly out of scope.

Yours,
Joel

On 4/26/16 11:58 AM, Ron Parker wrote:
> Linda,
>
> I like the first clause (transport tunnel based fragmentation).
>
> Regarding the second (source based), I think there are more subcases to consider:
>
> 1.  Propagation of NSH encapsulated packet from classifier to SFF
> 2.  Propagation of NSH encapsulated packet from SFF to SF
> 3.  Propagation of NSH encapsulated packet from SF to SFF (including possibility that NSH size increased at SF)
> 4.  Propagation of NSH encapsulated packet from SFF to SFF
>
> In each of the 4 cases above,  there is the possibility that MTU will be exceeded and therefore there are procedures to be defined in that eventuality.
>
> Thanks.
>
>     Ron
>
>
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Linda Dunbar
> Sent: Tuesday, April 26, 2016 11:48 AM
> To: Joel M. Halpern <jmh@joelhalpern.com>; mohamed.boucadair@orange.com; Elzur, Uri <uri.elzur@intel.com>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> Joel,
>
> I think the document should add the description on the following two fragmentation scenarios:
>
> - Transport tunnel generated fragmentation:
>   When a packet fragmentation is caused by transport tunnel (i.e. various encapsulations), the termination point of the transport tunnel is responsible for re-assembling the fragmented pieces of the packet. Since there won't be any SFF nodes in between the Transport Tunnel, the tunnel generated fragmentation does not require any actions by SFF nodes or SF nodes.
>
>
> - Source node generated fragmentation (after adding on the NSH header):
>    When fragmentation has to be performed for a packet being encapsulated with the NSH header, either the intermediate SFF nodes or the SF nodes have to be able to reassemble the fragmented pieces.
>
>
>
> Cheers,
>
>
> Linda
>
> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Tuesday, April 26, 2016 10:33 AM
> To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> Re-reading your note, it is possible that you are referring only to the case of transport generated fragmentation of the outer packet.  I had assumed you were not talking about that, since the resulting fragments will not all have NSH headers.  As with any tunnel technology, if the tunnel chooses to fragment at its layer, then the tunnel is responsible for reassembly.  That would be invisible to the SFF.
>
> Yours,
> Joel
>
> On 4/26/16 11:10 AM, Linda Dunbar wrote:
>> Agree with Med.
>>
>> Even if each fragment piece of a packet with NSH header carries the NSH header, the intermediate SFF nodes still need to put together all the fragments together before passing the whole data frame to the SF.
>>
>> Linda
>>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>> mohamed.boucadair@orange.com
>> Sent: Monday, April 25, 2016 9:42 AM
>> To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Re-,
>>
>> How do you instruct the transport layer to ALWAYS prepend an NSH header even for fragments? Or you don't care about that?
>>
>> Thank you.
>>
>> Cheers,
>> Med
>>
>>> -----Message d'origine-----
>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoyé : lundi 25 avril
>>> 2016 16:26 À : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;
>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>> draft-ietf-sfc-nsh-04.txt
>>>
>>> Hi Med
>>>
>>> Not to repeat my position, but I'll do it anyhow :-) As NSH is *NOT*
>>> a transport, dealing with fragmentation is left to the Transport used.
>>>
>>> The model I use for NSH, is basically similar to VXLAN . It is an overly.
>>>
>>> Thx
>>>
>>> Uri ("Oo-Ree")
>>> C: 949-378-7568
>>>
>>>
>>> -----Original Message-----
>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>> mohamed.boucadair@orange.com
>>> Sent: Monday, April 25, 2016 7:18 AM
>>> To: Joel M. Halpern <jmh@joelhalpern.com>; sfc@ietf.org
>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> Hi Joel,
>>>
>>> Please see inline.
>>>
>>> Cheers,
>>> Med
>>>
>>>> -----Message d'origine-----
>>>> De : Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoyé : lundi 25
>>>> avril 2016 15:48 À : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet :
>>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> If I am understanding you correctly Med, you are asking that the NSH
>>>> draft specify how service chaining should cope with packets that
>>>> have been fragmented?
>>>>
>>>
>>> [Med] To be accurate, I'm asking to assess whether there are implications.
>>> If there are, then the draft should be updated accordingly.
>>>
>>>> NSH, and the SFF functionality, does not care.
>>>
>>> [Med] I'm not that sure. Some typical implications are listed below:
>>>
>>> * SFF: If the NSH header is present only in the a fragment but SFF
>>> didn't maintained a state, subsequent fragments won't be appropriately processed.
>>> * SFC-aware function: if prepending a context information depends on
>>> the full packet, not only a fragment.
>>>
>>>   It just does its job.
>>>
>>> [Med] which may be disturbed in some situations as listed in the
>>> examples above.
>>>
>>>> Ingress and intermediate classifiers may cope with fragments in any
>>>> number of ways.
>>>   Specifying such is clearly out of scope for this draft.
>>>
>>> [Med] The purpose is not to specify the internal implementation
>>> details but the external behavior of the classifier function when it
>>> comes to handle fragments. That behavior may have an incidence on
>>> SFF, in particular. The purpose is not to recommend the maximum
>>> resources to be dedicated to out of order fragments nor the timeout
>>> to cache those; these considerations are of course out of scope.
>>> Nevertheless, an implementation should offer a configurable parameter
>>> so that an operator tweak those according to its context.
>>>
>>>>   I suppose one could write an informational draft on possible ways
>>>> of coping.  The IETF has not usually published such.
>>>> Service functions have to cope with fragmented packets just as they
>>>> had to before the advent of NSH, so describing that is clearly not
>>>> needed here.
>>>
>>> [Med] The advent of NSH has the following implications:
>>> * it exacerbates fragmentation. Handing over this issue to the
>>> transport layer may lead to interoperability issues.
>>> * the chaining may not be efficient if fragments are inappropriately
>>> handled.
>>>
>>> Introducing NSH should not degrade the overall service compared to
>>> legacy service deployment schemes.
>>>
>>>>
>>>> Yours,
>>>> Joel
>>>>
>>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
>>>>> Re-,
>>>>>
>>>>> I hear you, but my comment is that we need, as a WG, to decide what
>>>>> to
>>>> put in the draft. FWIW, I'm discussing two fragmentation issues:
>>>>>
>>>>> (1) Fragmentation that is caused by prepending an SFC header.
>>>>> (2) Handling fragments at the ingress of an SFC-enabled domain.
>>>>>
>>>>> Increasing the MTU is for sure a recommendation is to be explicitly
>>>> called out in the text (see my first message).
>>>>>
>>>>> There are other issues that need to be discussed, e.g., how to deal
>>>>> with
>>>> fragments in SFFs/Classifiers?
>>>>>
>>>>> It is also "prudent" to check that no issues will be experienced in
>>>>> SFF
>>>> to handle fragments. If an SFC header is prepended for all
>>>> fragments, I'm not sure there
>>>>> is any particular issue at the SFF level, except if
>>>>> stripping/adding
>>>> context TLVs depends on the full packet (not just fragment). It is
>>>> warranted to consider a little bit this point before declaring there
>>>> is no issue.
>>>>>
>>>>> For point (1), declaring fragmentation out of scope would be meant
>>>>> that
>>>> an implementation must be prepared to receive fragments with or
>>>> without NSH header as this is a decision that is left to the
>>>> transport encapsulation. This is a requirement per se!
>>>>>
>>>>> I won't reiterate all the comments I have about the current wording
>>>>> of
>>>> this section.
>>>>>
>>>>> Cheers,
>>>>> Med
>>>>>
>>>>>> -----Message d'origine-----
>>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoyé : lundi 25
>>>>>> avril 2016 08:30 À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Hi Med
>>>>>>
>>>>>> My point is that Fragmentation is yet another transport related
>>>>>> issue
>>>> that
>>>>>> is beyond the scope of NSH and beyond the charter of the WG, so it
>>>> doesn't
>>>>>> really belong in the draft. We are providing an advice as
>>>>>> extending the size of the packet may lead to fragmentation, but as
>>>>>> you check RFC 7348 VxLAN, which my create the same issue, you'll
>>>>>> find it doesn't even
>>>> relate
>>>>>> to it.
>>>>>>
>>>>>> Thx
>>>>>>
>>>>>> Uri ("Oo-Ree")
>>>>>> C: 949-378-7568
>>>>>>
>>>>>>
>>>>>> -----Original Message-----
>>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>> mohamed.boucadair@orange.com
>>>>>> Sent: Sunday, April 24, 2016 10:32 PM
>>>>>> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
>>>> <narten@us.ibm.com>;
>>>>>> sfc@ietf.org
>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Hi Uri,
>>>>>>
>>>>>> That's another option that needs to be discussed/investigated.
>>>>>> I'm
>>>> afraid
>>>>>> this is not the rationale adopted in -04 since it includes some
>>>>>> text
>>>> that
>>>>>> is far to be sufficient to ensure interoperable implementations.
>>>>>>
>>>>>> BTW, saying that nsh does not need to deal with fragmentation
>>>>>> because
>>>> it
>>>>>> is transport-independent is not IMHO a good strategy to adopt here
>>>> because
>>>>>> it opens the door for interoperable issues, it may lead to
>>>>>> sub-optimal implementations if the sfc information is present only
>>>>>> in one
>>>> fragments,
>>>>>> etc.
>>>>>>
>>>>>> My comments are related to the current text in the -04. This text
>>>>>> needs
>>>> to
>>>>>> be fixed somehow.
>>>>>>
>>>>>> Cheers,
>>>>>> Med
>>>>>>
>>>>>>> -----Message d'origine-----
>>>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoyé : dimanche
>>>>>>> 24 avril 2016 17:36 À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Hi Med
>>>>>>>
>>>>>>> I see no need to specify the exact behavior as NSH is transport
>>>>>>> independent i.e. like NSH interaction with any other Transport eh
>>>>>>> issue of Fragmentation is to be dealt in a way that matches the
>>>>>>> mechanisms supported by the Transport used and do not belong in
>>>>>>> the NSH draft
>>>>>>>
>>>>>>> Thx
>>>>>>>
>>>>>>> Uri ("Oo-Ree")
>>>>>>> C: 949-378-7568
>>>>>>>
>>>>>>>
>>>>>>> -----Original Message-----
>>>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>> mohamed.boucadair@orange.com
>>>>>>> Sent: Thursday, April 14, 2016 12:43 AM
>>>>>>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
>>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> R-,
>>>>>>>
>>>>>>> In addition to other pending issues raised for this draft, I
>>>>>>> would like to raise this additional one about Section 6.
>>>>>>>
>>>>>>> ==
>>>>>>> 6.  Fragmentation Considerations
>>>>>>>
>>>>>>>    NSH and the associated transport header are "added" to the
>>>>>>>    encapsulated packet/frame.  This additional information
>>>>>>> increases
>>>> the
>>>>>>>    size of the packet.  In order the ensure proper forwarding of NSH
>>>>>>>    data, several options for handling fragmentation and re-assembly
>>>>>>>    exist:
>>>>>>>
>>>>>>>    1.  Jumbo Frames, when supported, enable the transport of NSH and
>>>>>>>        associated transport packets without requiring fragmentation.
>>>>>>>
>>>>>>>    2.  Path MTU Discovery [RFC1191]"describes a technique for
>>>>>>>        dynamically discovering the maximum transmission unit
>>>>>>> (MTU) of
>>>> an
>>>>>>>        arbitrary internet path" and can be utilized to ensure the
>>> the
>>>>>>>        required packet size is used.
>>>>>>>
>>>>>>>    3.  [RFC6830] describes two schemes for fragmentation and re-
>>>> assembly
>>>>>>>        in section 5.4.
>>>>>>> ==
>>>>>>>
>>>>>>> * The text is weak for a Standard track document that is intended
>>>>>>> to solve the problem in
>>>>>>> https://tools.ietf.org/html/rfc7498#section-
>>> 2.12.
>>>>>>> There should be a clear behavior to be followed by an
>>> implementation.
>>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>>
>>>>>>> * The text covers only fragmentation when it is induced by SFC
>>>>>>> operations, it does not discuss the treatment of a fragment when
>>>>>>> received in an SFC domain. IMHO, the draft should also specify
>>>>>>> the behavior of the Classifier with regards to fragments for the
>>>>>>> sake of proper SFC operation. Applying classification policies
>>>>>>> may require the
>>>>>> full packet, not only a fragment.
>>>>>>> In particular, dedicated resources should dedicated for handling
>>>>>>> out of order fragments. Of course, it is out of scope of this
>>>>>>> document to describe how SFs handle fragments.
>>>>>>>
>>>>>>> * If an SFC header is prepended for all fragments, I'm not sure
>>>>>>> there is any particular issue at the SFF level...except if
>>>>>>> stripping/adding context TLVs depends on the full packet (not
>>>>>>> just fragment). It is warranted to consider a little bit this
>>>>>>> point before declaring there
>>>> is
>>>>>> no issue.
>>>>>>>
>>>>>>> * The text states "several options". This may be interpreted as
>>>>>>> if implementing one of them is sufficient...which is not true.
>>>>>>> The first two points contribute to minimize the fragmentation
>>>>>>> risk, but fragmentation may still be experienced (e.g., other
>>>>>>> shims are prepended by other nodes for some other purposes,
>>>>>>> nested nsh,
>>>>>>> etc.)
>>>>>>>
>>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>>
>>>>>>> * The support of jumbo frames by a router/device does not mean
>>>>>>> that it can make use of it. Appropriate MTU configuration should
>>>>>>> be undertaken in a consistent manner within an SFC domain. The
>>>>>>> text should be updated to make it is about (consistent) MTU
>>> configuration.
>>>>>>>
>>>>>>> * BTW, shouldn't the text be reworded to recommended to increase
>>>>>>> the MTU of **all nodes** of an SFC-enabled domain by at least the
>>>>>>> length of SFC header + transport header?
>>>>>>>
>>>>>>> * Bullet 2, how PMTU discovery is actually used in this context?
>>>>>>> Do you assume that all SFC-aware nodes will issue such messages
>>>>>>> towards other SFC-aware node, arbitrary destination, else?
>>>>>>>
>>>>>>> * Bullet 2, I would drop "describes a technique for dynamically
>>>>>>> discovering the maximum transmission unit (MTU) of an arbitrary
>>>>>>> internet path".
>>>>>>>
>>>>>>> * Bullet 2, s/ the the/the.
>>>>>>>
>>>>>>> * The reference to the LISP specification raises two concerns and
>>>>>>> one
>>>>>>> comment:
>>>>>>>
>>>>>>> (1) I don't think it is a good approach that fragments induced by
>>>>>>> the network are passed to their ultimate destinations as such
>>> (stateless).
>>>>>>> IMO, reassembly should be done within the SFC domain (responsible
>>>>>>> for
>>>>>>> fragmentation) not passed away.
>>>>>>> (2) Does the stateful mode require all SFC data plane elements
>>>>>>> maintain a full list of MTU for the any SFF/SF instance of the
>>>>>>> SFC
>>>>>> domain?
>>>>>>>
>>>>>>> The current text suggests that [RFC6830] should be listed as
>>>>>>> normative reference (not an informative one). I would personally
>>>>>>> favor removing the reference to LISP (as it is an Experimental RFC).
>>>>>>>
>>>>>>> * The security section of the draft may be augmented with
>>>>>>> informational fragmentation-related pointers to: e.g., RFC1858
>>>>>>> (Security Considerations for IP Fragment Filtering), RFC3128
>>>>>>> (Protection Against a Variant of the Tiny Fragment Attack), and
>>>>>>> RFC
>>>>>>> 4963 (IPv4 Reassembly Errors at High Data Rates).
>>>>>>>
>>>>>>> Cheers,
>>>>>>> Med
>>>>>>>
>>>>>>>> -----Message d'origine-----
>>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de
>>>>>>>> mohamed.boucadair@orange.com Envoyé : lundi 11 avril 2016 13:14 À :
>>>>>>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG last call for
>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Dear Thomas, all,
>>>>>>>>
>>>>>>>> As I mentioned during the meeting, there are several issues that
>>>>>>>> are not covered in the last version of the draft. I already
>>>>>>>> provided examples of the issues offline as requested by Martin.
>>>>>>>>
>>>>>>>> Cheers,
>>>>>>>> Med
>>>>>>>>
>>>>>>>>> -----Message d'origine-----
>>>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas
>>>>>>>>> Narten Envoyé : jeudi 31 mars 2016 04:48 À : sfc@ietf.org Objet
>>>>>>>>> : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> Dear WG:
>>>>>>>>>
>>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>>
>>>>>>>>> The editors of the NSH document have indicated that they have
>>>>>>>>> addressed all known comments and that there are no open issues
>>>>>>>>> with the current version of the document.
>>>>>>>>>
>>>>>>>>> Substantive comments to the list please, editorial comments can
>>>>>>>>> go directly to the document editors.
>>>>>>>>>
>>>>>>>>> We'll also get a brief update from the editors at next week's
>>>>>>>>> meeting. If there are any remaining issues with the document,
>>>>>>>>> raising them before the meeting would be especially helpful.
>>>>>>>>>
>>>>>>>>> For the chairs,
>>>>>>>>> Thomas
>>>>>>>>>
>>>>>>>>> _______________________________________________
>>>>>>>>> sfc mailing list
>>>>>>>>> sfc@ietf.org
>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> sfc mailing list
>>>>>>>> sfc@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> sfc mailing list
>>>>>>> sfc@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Tue Apr 26 11:39:01 2016
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B0F8B12D56E for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 11:38:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id okFMMa7OXIzW for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 11:38:56 -0700 (PDT)
Received: from hub021-ca-6.exch021.serverdata.net (hub021-ca-6.exch021.serverdata.net [64.78.56.71]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C0CFF12B029 for <sfc@ietf.org>; Tue, 26 Apr 2016 11:38:56 -0700 (PDT)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-6.exch021.domain.local ([10.254.4.92]) with mapi id 14.03.0266.001;  Tue, 26 Apr 2016 11:38:56 -0700
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfPjVJMNJL6xkKtVPhZYT1+65+Er+AwgARg/TCAEMylAIAA6WYAgAAQOQCAAAiIAIAAcdWAgAAIhACAAAJAgIAABF8AgAGaMQCAAAZigIAABDUA//+L/bCAAI4zAP//nyBQ
Date: Tue, 26 Apr 2016 18:38:55 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B6D786CDD@MBX021-W3-CA-2.exch021.domain.local>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <CDF2F015F4429F458815ED2A6C2B6B0B6D786B8B@MBX021-W3-CA-2.exch021.domain.local> <0f0e8705-1ca4-6df0-81c3-93db0f94a99f@joelhalpern.com>
In-Reply-To: <0f0e8705-1ca4-6df0-81c3-93db0f94a99f@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/hbtU4557IDVfQevF9H-y0MgUyg8>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 18:38:59 -0000

Joel,

I can't say that I disagree with your analysis on the scope.   I think the =
question raised by some on the thread is if an SFC-node (i.e., classifier, =
SF, SFF) creates fragments, is the NSH header repeated in each fragment ?  =
  I think the answer is "no".   If so, is it worth stating this explicitly =
in the document, or is it just obvious that properly layered systems would =
behave that way.

   Ron


-----Original Message-----
From: Joel M. Halpern [mailto:jmh@joelhalpern.com]=20
Sent: Tuesday, April 26, 2016 1:22 PM
To: Ron Parker <Ron_Parker@affirmednetworks.com>; Joel M. Halpern <jmh@joel=
halpern.com>; mohamed.boucadair@orange.com; Elzur, Uri <uri.elzur@intel.com=
>; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

At least so far, we have treated the communication between classifier and S=
FF (ingress or intermediate) as outside of the scope of our work.=20
For SF <-> SFF communication we have ntoed the need for a proxy to handle t=
he case when the SF can not accept and return the NSH header, since we assu=
me that is preserved.  Other than that preservation, similar to the above, =
we have treated the details as outside of our scope. That is because they d=
epend so heavily on the implementation technique used.  (Hypervisor ,_> app=
lication communication vs communication inside a user space or communicatio=
n over an actual Ethernet are all very different.)

Trying to extend the NSH document to address these would be a major change,=
 and would step into the issues related to transport selection, which are e=
xplicitly out of scope.

Yours,
Joel

On 4/26/16 11:58 AM, Ron Parker wrote:
> Linda,
>
> I like the first clause (transport tunnel based fragmentation).
>
> Regarding the second (source based), I think there are more subcases to c=
onsider:
>
> 1.  Propagation of NSH encapsulated packet from classifier to SFF 2. =20
> Propagation of NSH encapsulated packet from SFF to SF 3.  Propagation=20
> of NSH encapsulated packet from SF to SFF (including possibility that=20
> NSH size increased at SF) 4.  Propagation of NSH encapsulated packet=20
> from SFF to SFF
>
> In each of the 4 cases above,  there is the possibility that MTU will be =
exceeded and therefore there are procedures to be defined in that eventuali=
ty.
>
> Thanks.
>
>     Ron
>
>
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Linda Dunbar
> Sent: Tuesday, April 26, 2016 11:48 AM
> To: Joel M. Halpern <jmh@joelhalpern.com>;=20
> mohamed.boucadair@orange.com; Elzur, Uri <uri.elzur@intel.com>;=20
> sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> Joel,
>
> I think the document should add the description on the following two frag=
mentation scenarios:
>
> - Transport tunnel generated fragmentation:
>   When a packet fragmentation is caused by transport tunnel (i.e. various=
 encapsulations), the termination point of the transport tunnel is responsi=
ble for re-assembling the fragmented pieces of the packet. Since there won'=
t be any SFF nodes in between the Transport Tunnel, the tunnel generated fr=
agmentation does not require any actions by SFF nodes or SF nodes.
>
>
> - Source node generated fragmentation (after adding on the NSH header):
>    When fragmentation has to be performed for a packet being encapsulated=
 with the NSH header, either the intermediate SFF nodes or the SF nodes hav=
e to be able to reassemble the fragmented pieces.
>
>
>
> Cheers,
>
>
> Linda
>
> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Tuesday, April 26, 2016 10:33 AM
> To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri;=20
> sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> Re-reading your note, it is possible that you are referring only to the c=
ase of transport generated fragmentation of the outer packet.  I had assume=
d you were not talking about that, since the resulting fragments will not a=
ll have NSH headers.  As with any tunnel technology, if the tunnel chooses =
to fragment at its layer, then the tunnel is responsible for reassembly.  T=
hat would be invisible to the SFF.
>
> Yours,
> Joel
>
> On 4/26/16 11:10 AM, Linda Dunbar wrote:
>> Agree with Med.
>>
>> Even if each fragment piece of a packet with NSH header carries the NSH =
header, the intermediate SFF nodes still need to put together all the fragm=
ents together before passing the whole data frame to the SF.
>>
>> Linda
>>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
>> mohamed.boucadair@orange.com
>> Sent: Monday, April 25, 2016 9:42 AM
>> To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Re-,
>>
>> How do you instruct the transport layer to ALWAYS prepend an NSH header =
even for fragments? Or you don't care about that?
>>
>> Thank you.
>>
>> Cheers,
>> Med
>>
>>> -----Message d'origine-----
>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril
>>> 2016 16:26 =C0 : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;=20
>>> sfc@ietf.org Objet : RE: [sfc] WG last call for=20
>>> draft-ietf-sfc-nsh-04.txt
>>>
>>> Hi Med
>>>
>>> Not to repeat my position, but I'll do it anyhow :-) As NSH is *NOT*=20
>>> a transport, dealing with fragmentation is left to the Transport used.
>>>
>>> The model I use for NSH, is basically similar to VXLAN . It is an overl=
y.
>>>
>>> Thx
>>>
>>> Uri ("Oo-Ree")
>>> C: 949-378-7568
>>>
>>>
>>> -----Original Message-----
>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
>>> mohamed.boucadair@orange.com
>>> Sent: Monday, April 25, 2016 7:18 AM
>>> To: Joel M. Halpern <jmh@joelhalpern.com>; sfc@ietf.org
>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> Hi Joel,
>>>
>>> Please see inline.
>>>
>>> Cheers,
>>> Med
>>>
>>>> -----Message d'origine-----
>>>> De : Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoy=E9 : lundi 25=
=20
>>>> avril 2016 15:48 =C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet :
>>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> If I am understanding you correctly Med, you are asking that the=20
>>>> NSH draft specify how service chaining should cope with packets=20
>>>> that have been fragmented?
>>>>
>>>
>>> [Med] To be accurate, I'm asking to assess whether there are implicatio=
ns.
>>> If there are, then the draft should be updated accordingly.
>>>
>>>> NSH, and the SFF functionality, does not care.
>>>
>>> [Med] I'm not that sure. Some typical implications are listed below:
>>>
>>> * SFF: If the NSH header is present only in the a fragment but SFF=20
>>> didn't maintained a state, subsequent fragments won't be appropriately =
processed.
>>> * SFC-aware function: if prepending a context information depends on=20
>>> the full packet, not only a fragment.
>>>
>>>   It just does its job.
>>>
>>> [Med] which may be disturbed in some situations as listed in the=20
>>> examples above.
>>>
>>>> Ingress and intermediate classifiers may cope with fragments in any=20
>>>> number of ways.
>>>   Specifying such is clearly out of scope for this draft.
>>>
>>> [Med] The purpose is not to specify the internal implementation=20
>>> details but the external behavior of the classifier function when it=20
>>> comes to handle fragments. That behavior may have an incidence on=20
>>> SFF, in particular. The purpose is not to recommend the maximum=20
>>> resources to be dedicated to out of order fragments nor the timeout=20
>>> to cache those; these considerations are of course out of scope.
>>> Nevertheless, an implementation should offer a configurable=20
>>> parameter so that an operator tweak those according to its context.
>>>
>>>>   I suppose one could write an informational draft on possible ways=20
>>>> of coping.  The IETF has not usually published such.
>>>> Service functions have to cope with fragmented packets just as they=20
>>>> had to before the advent of NSH, so describing that is clearly not=20
>>>> needed here.
>>>
>>> [Med] The advent of NSH has the following implications:
>>> * it exacerbates fragmentation. Handing over this issue to the=20
>>> transport layer may lead to interoperability issues.
>>> * the chaining may not be efficient if fragments are inappropriately=20
>>> handled.
>>>
>>> Introducing NSH should not degrade the overall service compared to=20
>>> legacy service deployment schemes.
>>>
>>>>
>>>> Yours,
>>>> Joel
>>>>
>>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
>>>>> Re-,
>>>>>
>>>>> I hear you, but my comment is that we need, as a WG, to decide=20
>>>>> what to
>>>> put in the draft. FWIW, I'm discussing two fragmentation issues:
>>>>>
>>>>> (1) Fragmentation that is caused by prepending an SFC header.
>>>>> (2) Handling fragments at the ingress of an SFC-enabled domain.
>>>>>
>>>>> Increasing the MTU is for sure a recommendation is to be=20
>>>>> explicitly
>>>> called out in the text (see my first message).
>>>>>
>>>>> There are other issues that need to be discussed, e.g., how to=20
>>>>> deal with
>>>> fragments in SFFs/Classifiers?
>>>>>
>>>>> It is also "prudent" to check that no issues will be experienced=20
>>>>> in SFF
>>>> to handle fragments. If an SFC header is prepended for all=20
>>>> fragments, I'm not sure there
>>>>> is any particular issue at the SFF level, except if=20
>>>>> stripping/adding
>>>> context TLVs depends on the full packet (not just fragment). It is=20
>>>> warranted to consider a little bit this point before declaring=20
>>>> there is no issue.
>>>>>
>>>>> For point (1), declaring fragmentation out of scope would be meant=20
>>>>> that
>>>> an implementation must be prepared to receive fragments with or=20
>>>> without NSH header as this is a decision that is left to the=20
>>>> transport encapsulation. This is a requirement per se!
>>>>>
>>>>> I won't reiterate all the comments I have about the current=20
>>>>> wording of
>>>> this section.
>>>>>
>>>>> Cheers,
>>>>> Med
>>>>>
>>>>>> -----Message d'origine-----
>>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25=20
>>>>>> avril 2016 08:30 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;=20
>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for=20
>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Hi Med
>>>>>>
>>>>>> My point is that Fragmentation is yet another transport related=20
>>>>>> issue
>>>> that
>>>>>> is beyond the scope of NSH and beyond the charter of the WG, so=20
>>>>>> it
>>>> doesn't
>>>>>> really belong in the draft. We are providing an advice as=20
>>>>>> extending the size of the packet may lead to fragmentation, but=20
>>>>>> as you check RFC 7348 VxLAN, which my create the same issue,=20
>>>>>> you'll find it doesn't even
>>>> relate
>>>>>> to it.
>>>>>>
>>>>>> Thx
>>>>>>
>>>>>> Uri ("Oo-Ree")
>>>>>> C: 949-378-7568
>>>>>>
>>>>>>
>>>>>> -----Original Message-----
>>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
>>>>>> mohamed.boucadair@orange.com
>>>>>> Sent: Sunday, April 24, 2016 10:32 PM
>>>>>> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
>>>> <narten@us.ibm.com>;
>>>>>> sfc@ietf.org
>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Hi Uri,
>>>>>>
>>>>>> That's another option that needs to be discussed/investigated.
>>>>>> I'm
>>>> afraid
>>>>>> this is not the rationale adopted in -04 since it includes some=20
>>>>>> text
>>>> that
>>>>>> is far to be sufficient to ensure interoperable implementations.
>>>>>>
>>>>>> BTW, saying that nsh does not need to deal with fragmentation=20
>>>>>> because
>>>> it
>>>>>> is transport-independent is not IMHO a good strategy to adopt=20
>>>>>> here
>>>> because
>>>>>> it opens the door for interoperable issues, it may lead to=20
>>>>>> sub-optimal implementations if the sfc information is present=20
>>>>>> only in one
>>>> fragments,
>>>>>> etc.
>>>>>>
>>>>>> My comments are related to the current text in the -04. This text=20
>>>>>> needs
>>>> to
>>>>>> be fixed somehow.
>>>>>>
>>>>>> Cheers,
>>>>>> Med
>>>>>>
>>>>>>> -----Message d'origine-----
>>>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche
>>>>>>> 24 avril 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas=20
>>>>>>> Narten; sfc@ietf.org Objet : RE: [sfc] WG last call for=20
>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Hi Med
>>>>>>>
>>>>>>> I see no need to specify the exact behavior as NSH is transport=20
>>>>>>> independent i.e. like NSH interaction with any other Transport=20
>>>>>>> eh issue of Fragmentation is to be dealt in a way that matches=20
>>>>>>> the mechanisms supported by the Transport used and do not belong=20
>>>>>>> in the NSH draft
>>>>>>>
>>>>>>> Thx
>>>>>>>
>>>>>>> Uri ("Oo-Ree")
>>>>>>> C: 949-378-7568
>>>>>>>
>>>>>>>
>>>>>>> -----Original Message-----
>>>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of=20
>>>>>>> mohamed.boucadair@orange.com
>>>>>>> Sent: Thursday, April 14, 2016 12:43 AM
>>>>>>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
>>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> R-,
>>>>>>>
>>>>>>> In addition to other pending issues raised for this draft, I=20
>>>>>>> would like to raise this additional one about Section 6.
>>>>>>>
>>>>>>> =3D=3D
>>>>>>> 6.  Fragmentation Considerations
>>>>>>>
>>>>>>>    NSH and the associated transport header are "added" to the
>>>>>>>    encapsulated packet/frame.  This additional information=20
>>>>>>> increases
>>>> the
>>>>>>>    size of the packet.  In order the ensure proper forwarding of NS=
H
>>>>>>>    data, several options for handling fragmentation and re-assembly
>>>>>>>    exist:
>>>>>>>
>>>>>>>    1.  Jumbo Frames, when supported, enable the transport of NSH an=
d
>>>>>>>        associated transport packets without requiring fragmentation=
.
>>>>>>>
>>>>>>>    2.  Path MTU Discovery [RFC1191]"describes a technique for
>>>>>>>        dynamically discovering the maximum transmission unit
>>>>>>> (MTU) of
>>>> an
>>>>>>>        arbitrary internet path" and can be utilized to ensure=20
>>>>>>> the
>>> the
>>>>>>>        required packet size is used.
>>>>>>>
>>>>>>>    3.  [RFC6830] describes two schemes for fragmentation and re-
>>>> assembly
>>>>>>>        in section 5.4.
>>>>>>> =3D=3D
>>>>>>>
>>>>>>> * The text is weak for a Standard track document that is=20
>>>>>>> intended to solve the problem in
>>>>>>> https://tools.ietf.org/html/rfc7498#section-
>>> 2.12.
>>>>>>> There should be a clear behavior to be followed by an
>>> implementation.
>>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>>
>>>>>>> * The text covers only fragmentation when it is induced by SFC=20
>>>>>>> operations, it does not discuss the treatment of a fragment when=20
>>>>>>> received in an SFC domain. IMHO, the draft should also specify=20
>>>>>>> the behavior of the Classifier with regards to fragments for the=20
>>>>>>> sake of proper SFC operation. Applying classification policies=20
>>>>>>> may require the
>>>>>> full packet, not only a fragment.
>>>>>>> In particular, dedicated resources should dedicated for handling=20
>>>>>>> out of order fragments. Of course, it is out of scope of this=20
>>>>>>> document to describe how SFs handle fragments.
>>>>>>>
>>>>>>> * If an SFC header is prepended for all fragments, I'm not sure=20
>>>>>>> there is any particular issue at the SFF level...except if=20
>>>>>>> stripping/adding context TLVs depends on the full packet (not=20
>>>>>>> just fragment). It is warranted to consider a little bit this=20
>>>>>>> point before declaring there
>>>> is
>>>>>> no issue.
>>>>>>>
>>>>>>> * The text states "several options". This may be interpreted as=20
>>>>>>> if implementing one of them is sufficient...which is not true.
>>>>>>> The first two points contribute to minimize the fragmentation=20
>>>>>>> risk, but fragmentation may still be experienced (e.g., other=20
>>>>>>> shims are prepended by other nodes for some other purposes,=20
>>>>>>> nested nsh,
>>>>>>> etc.)
>>>>>>>
>>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>>
>>>>>>> * The support of jumbo frames by a router/device does not mean=20
>>>>>>> that it can make use of it. Appropriate MTU configuration should=20
>>>>>>> be undertaken in a consistent manner within an SFC domain. The=20
>>>>>>> text should be updated to make it is about (consistent) MTU
>>> configuration.
>>>>>>>
>>>>>>> * BTW, shouldn't the text be reworded to recommended to increase=20
>>>>>>> the MTU of **all nodes** of an SFC-enabled domain by at least=20
>>>>>>> the length of SFC header + transport header?
>>>>>>>
>>>>>>> * Bullet 2, how PMTU discovery is actually used in this context?
>>>>>>> Do you assume that all SFC-aware nodes will issue such messages=20
>>>>>>> towards other SFC-aware node, arbitrary destination, else?
>>>>>>>
>>>>>>> * Bullet 2, I would drop "describes a technique for dynamically=20
>>>>>>> discovering the maximum transmission unit (MTU) of an arbitrary=20
>>>>>>> internet path".
>>>>>>>
>>>>>>> * Bullet 2, s/ the the/the.
>>>>>>>
>>>>>>> * The reference to the LISP specification raises two concerns=20
>>>>>>> and one
>>>>>>> comment:
>>>>>>>
>>>>>>> (1) I don't think it is a good approach that fragments induced=20
>>>>>>> by the network are passed to their ultimate destinations as such
>>> (stateless).
>>>>>>> IMO, reassembly should be done within the SFC domain=20
>>>>>>> (responsible for
>>>>>>> fragmentation) not passed away.
>>>>>>> (2) Does the stateful mode require all SFC data plane elements=20
>>>>>>> maintain a full list of MTU for the any SFF/SF instance of the=20
>>>>>>> SFC
>>>>>> domain?
>>>>>>>
>>>>>>> The current text suggests that [RFC6830] should be listed as=20
>>>>>>> normative reference (not an informative one). I would personally=20
>>>>>>> favor removing the reference to LISP (as it is an Experimental RFC)=
.
>>>>>>>
>>>>>>> * The security section of the draft may be augmented with=20
>>>>>>> informational fragmentation-related pointers to: e.g., RFC1858=20
>>>>>>> (Security Considerations for IP Fragment Filtering), RFC3128=20
>>>>>>> (Protection Against a Variant of the Tiny Fragment Attack), and=20
>>>>>>> RFC
>>>>>>> 4963 (IPv4 Reassembly Errors at High Data Rates).
>>>>>>>
>>>>>>> Cheers,
>>>>>>> Med
>>>>>>>
>>>>>>>> -----Message d'origine-----
>>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de=20
>>>>>>>> mohamed.boucadair@orange.com Envoy=E9 : lundi 11 avril 2016 13:14 =
=C0 :
>>>>>>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG last call for=20
>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Dear Thomas, all,
>>>>>>>>
>>>>>>>> As I mentioned during the meeting, there are several issues=20
>>>>>>>> that are not covered in the last version of the draft. I=20
>>>>>>>> already provided examples of the issues offline as requested by Ma=
rtin.
>>>>>>>>
>>>>>>>> Cheers,
>>>>>>>> Med
>>>>>>>>
>>>>>>>>> -----Message d'origine-----
>>>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas=20
>>>>>>>>> Narten Envoy=E9 : jeudi 31 mars 2016 04:48 =C0 : sfc@ietf.org=20
>>>>>>>>> Objet
>>>>>>>>> : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> Dear WG:
>>>>>>>>>
>>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt=20
>>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>>
>>>>>>>>> The editors of the NSH document have indicated that they have=20
>>>>>>>>> addressed all known comments and that there are no open issues=20
>>>>>>>>> with the current version of the document.
>>>>>>>>>
>>>>>>>>> Substantive comments to the list please, editorial comments=20
>>>>>>>>> can go directly to the document editors.
>>>>>>>>>
>>>>>>>>> We'll also get a brief update from the editors at next week's=20
>>>>>>>>> meeting. If there are any remaining issues with the document,=20
>>>>>>>>> raising them before the meeting would be especially helpful.
>>>>>>>>>
>>>>>>>>> For the chairs,
>>>>>>>>> Thomas
>>>>>>>>>
>>>>>>>>> _______________________________________________
>>>>>>>>> sfc mailing list
>>>>>>>>> sfc@ietf.org
>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> sfc mailing list
>>>>>>>> sfc@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> sfc mailing list
>>>>>>> sfc@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>>> _______________________________________________
>>>>> sfc mailing list
>>>>> sfc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Tue Apr 26 12:12:25 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8231612D56C for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 12:12:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LYtPj9x5DiPC for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 12:12:22 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 27EF212D56A for <sfc@ietf.org>; Tue, 26 Apr 2016 12:12:22 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 9E562258B35; Tue, 26 Apr 2016 12:12:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461697941; bh=7VS62SbCWYddXZBBB99QQlyLOrXaoWgaS4fh2tFimhs=; h=Subject:To:References:From:Date:In-Reply-To:From; b=BEyuGYLqlwHf00lzKR8TKVXR4ldGpUd6VPkbce6AF5zLaXZRVJgRbn4bdrKI/ZF8T 8uDBru6MkiYFKWA3a3jvPTzasvpf50AzK685WRT5l6X39CKtXJ2fiwYSgUCWCR0VmR u1b6jvq1tdPkQ6hcxxYaN4CiJiijOOKOqLfn85fM=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id BF30D24097D; Tue, 26 Apr 2016 12:12:20 -0700 (PDT)
To: Ron Parker <Ron_Parker@affirmednetworks.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <CDF2F015F4429F458815ED2A6C2B6B0B6D786B8B@MBX021-W3-CA-2.exch021.domain.local> <0f0e8705-1ca4-6df0-81c3-93db0f94a99f@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D786CDD@MBX021-W3-CA-2.exch021.domain.local>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <1d9ca816-42ae-333c-a316-7ec5bff8b55b@joelhalpern.com>
Date: Tue, 26 Apr 2016 15:12:11 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <CDF2F015F4429F458815ED2A6C2B6B0B6D786CDD@MBX021-W3-CA-2.exch021.domain.local>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ZcUwDa_jDwtmgvsSufsVx2qXvys>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 19:12:24 -0000

In most tunnel anlysis, a tunnel entry point (in this case, the 
transport interface from the SFC component) can either fragment outer 
or, if available fragment inner.  This is defined by the transport 
technology, not the user.

In the case of SFC NSH, I would usually expect outer fragmentation, 
which is a pure transport issue.  If the innermost packet is IP, and the 
tunnel entry wants to be complicated, it is permitted to fragment the 
inner packet and produce the proper NSH headers for the fragments. 
Inherently, an implementation can only choose to do this if it can 
construct the right metdata to put on each fragment.  I don't actually 
know how to reliably do that, so I don't recommend it.

In either case, the NSH document can't tell the implementation what to 
do or how to do it.

Yours,
Joel

On 4/26/16 2:38 PM, Ron Parker wrote:
> Joel,
>
> I can't say that I disagree with your analysis on the scope.   I think the question raised by some on the thread is if an SFC-node (i.e., classifier, SF, SFF) creates fragments, is the NSH header repeated in each fragment ?    I think the answer is "no".   If so, is it worth stating this explicitly in the document, or is it just obvious that properly layered systems would behave that way.
>
>    Ron
>
>
> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Tuesday, April 26, 2016 1:22 PM
> To: Ron Parker <Ron_Parker@affirmednetworks.com>; Joel M. Halpern <jmh@joelhalpern.com>; mohamed.boucadair@orange.com; Elzur, Uri <uri.elzur@intel.com>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> At least so far, we have treated the communication between classifier and SFF (ingress or intermediate) as outside of the scope of our work.
> For SF <-> SFF communication we have ntoed the need for a proxy to handle the case when the SF can not accept and return the NSH header, since we assume that is preserved.  Other than that preservation, similar to the above, we have treated the details as outside of our scope. That is because they depend so heavily on the implementation technique used.  (Hypervisor ,_> application communication vs communication inside a user space or communication over an actual Ethernet are all very different.)
>
> Trying to extend the NSH document to address these would be a major change, and would step into the issues related to transport selection, which are explicitly out of scope.
>
> Yours,
> Joel
>
> On 4/26/16 11:58 AM, Ron Parker wrote:
>> Linda,
>>
>> I like the first clause (transport tunnel based fragmentation).
>>
>> Regarding the second (source based), I think there are more subcases to consider:
>>
>> 1.  Propagation of NSH encapsulated packet from classifier to SFF 2.
>> Propagation of NSH encapsulated packet from SFF to SF 3.  Propagation
>> of NSH encapsulated packet from SF to SFF (including possibility that
>> NSH size increased at SF) 4.  Propagation of NSH encapsulated packet
>> from SFF to SFF
>>
>> In each of the 4 cases above,  there is the possibility that MTU will be exceeded and therefore there are procedures to be defined in that eventuality.
>>
>> Thanks.
>>
>>     Ron
>>
>>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Linda Dunbar
>> Sent: Tuesday, April 26, 2016 11:48 AM
>> To: Joel M. Halpern <jmh@joelhalpern.com>;
>> mohamed.boucadair@orange.com; Elzur, Uri <uri.elzur@intel.com>;
>> sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Joel,
>>
>> I think the document should add the description on the following two fragmentation scenarios:
>>
>> - Transport tunnel generated fragmentation:
>>   When a packet fragmentation is caused by transport tunnel (i.e. various encapsulations), the termination point of the transport tunnel is responsible for re-assembling the fragmented pieces of the packet. Since there won't be any SFF nodes in between the Transport Tunnel, the tunnel generated fragmentation does not require any actions by SFF nodes or SF nodes.
>>
>>
>> - Source node generated fragmentation (after adding on the NSH header):
>>    When fragmentation has to be performed for a packet being encapsulated with the NSH header, either the intermediate SFF nodes or the SF nodes have to be able to reassemble the fragmented pieces.
>>
>>
>>
>> Cheers,
>>
>>
>> Linda
>>
>> -----Original Message-----
>> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
>> Sent: Tuesday, April 26, 2016 10:33 AM
>> To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri;
>> sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Re-reading your note, it is possible that you are referring only to the case of transport generated fragmentation of the outer packet.  I had assumed you were not talking about that, since the resulting fragments will not all have NSH headers.  As with any tunnel technology, if the tunnel chooses to fragment at its layer, then the tunnel is responsible for reassembly.  That would be invisible to the SFF.
>>
>> Yours,
>> Joel
>>
>> On 4/26/16 11:10 AM, Linda Dunbar wrote:
>>> Agree with Med.
>>>
>>> Even if each fragment piece of a packet with NSH header carries the NSH header, the intermediate SFF nodes still need to put together all the fragments together before passing the whole data frame to the SF.
>>>
>>> Linda
>>>
>>> -----Original Message-----
>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>> mohamed.boucadair@orange.com
>>> Sent: Monday, April 25, 2016 9:42 AM
>>> To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org
>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> Re-,
>>>
>>> How do you instruct the transport layer to ALWAYS prepend an NSH header even for fragments? Or you don't care about that?
>>>
>>> Thank you.
>>>
>>> Cheers,
>>> Med
>>>
>>>> -----Message d'origine-----
>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoyé : lundi 25 avril
>>>> 2016 16:26 À : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;
>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>> draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Hi Med
>>>>
>>>> Not to repeat my position, but I'll do it anyhow :-) As NSH is *NOT*
>>>> a transport, dealing with fragmentation is left to the Transport used.
>>>>
>>>> The model I use for NSH, is basically similar to VXLAN . It is an overly.
>>>>
>>>> Thx
>>>>
>>>> Uri ("Oo-Ree")
>>>> C: 949-378-7568
>>>>
>>>>
>>>> -----Original Message-----
>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>> mohamed.boucadair@orange.com
>>>> Sent: Monday, April 25, 2016 7:18 AM
>>>> To: Joel M. Halpern <jmh@joelhalpern.com>; sfc@ietf.org
>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Hi Joel,
>>>>
>>>> Please see inline.
>>>>
>>>> Cheers,
>>>> Med
>>>>
>>>>> -----Message d'origine-----
>>>>> De : Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoyé : lundi 25
>>>>> avril 2016 15:48 À : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet :
>>>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> If I am understanding you correctly Med, you are asking that the
>>>>> NSH draft specify how service chaining should cope with packets
>>>>> that have been fragmented?
>>>>>
>>>>
>>>> [Med] To be accurate, I'm asking to assess whether there are implications.
>>>> If there are, then the draft should be updated accordingly.
>>>>
>>>>> NSH, and the SFF functionality, does not care.
>>>>
>>>> [Med] I'm not that sure. Some typical implications are listed below:
>>>>
>>>> * SFF: If the NSH header is present only in the a fragment but SFF
>>>> didn't maintained a state, subsequent fragments won't be appropriately processed.
>>>> * SFC-aware function: if prepending a context information depends on
>>>> the full packet, not only a fragment.
>>>>
>>>>   It just does its job.
>>>>
>>>> [Med] which may be disturbed in some situations as listed in the
>>>> examples above.
>>>>
>>>>> Ingress and intermediate classifiers may cope with fragments in any
>>>>> number of ways.
>>>>   Specifying such is clearly out of scope for this draft.
>>>>
>>>> [Med] The purpose is not to specify the internal implementation
>>>> details but the external behavior of the classifier function when it
>>>> comes to handle fragments. That behavior may have an incidence on
>>>> SFF, in particular. The purpose is not to recommend the maximum
>>>> resources to be dedicated to out of order fragments nor the timeout
>>>> to cache those; these considerations are of course out of scope.
>>>> Nevertheless, an implementation should offer a configurable
>>>> parameter so that an operator tweak those according to its context.
>>>>
>>>>>   I suppose one could write an informational draft on possible ways
>>>>> of coping.  The IETF has not usually published such.
>>>>> Service functions have to cope with fragmented packets just as they
>>>>> had to before the advent of NSH, so describing that is clearly not
>>>>> needed here.
>>>>
>>>> [Med] The advent of NSH has the following implications:
>>>> * it exacerbates fragmentation. Handing over this issue to the
>>>> transport layer may lead to interoperability issues.
>>>> * the chaining may not be efficient if fragments are inappropriately
>>>> handled.
>>>>
>>>> Introducing NSH should not degrade the overall service compared to
>>>> legacy service deployment schemes.
>>>>
>>>>>
>>>>> Yours,
>>>>> Joel
>>>>>
>>>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
>>>>>> Re-,
>>>>>>
>>>>>> I hear you, but my comment is that we need, as a WG, to decide
>>>>>> what to
>>>>> put in the draft. FWIW, I'm discussing two fragmentation issues:
>>>>>>
>>>>>> (1) Fragmentation that is caused by prepending an SFC header.
>>>>>> (2) Handling fragments at the ingress of an SFC-enabled domain.
>>>>>>
>>>>>> Increasing the MTU is for sure a recommendation is to be
>>>>>> explicitly
>>>>> called out in the text (see my first message).
>>>>>>
>>>>>> There are other issues that need to be discussed, e.g., how to
>>>>>> deal with
>>>>> fragments in SFFs/Classifiers?
>>>>>>
>>>>>> It is also "prudent" to check that no issues will be experienced
>>>>>> in SFF
>>>>> to handle fragments. If an SFC header is prepended for all
>>>>> fragments, I'm not sure there
>>>>>> is any particular issue at the SFF level, except if
>>>>>> stripping/adding
>>>>> context TLVs depends on the full packet (not just fragment). It is
>>>>> warranted to consider a little bit this point before declaring
>>>>> there is no issue.
>>>>>>
>>>>>> For point (1), declaring fragmentation out of scope would be meant
>>>>>> that
>>>>> an implementation must be prepared to receive fragments with or
>>>>> without NSH header as this is a decision that is left to the
>>>>> transport encapsulation. This is a requirement per se!
>>>>>>
>>>>>> I won't reiterate all the comments I have about the current
>>>>>> wording of
>>>>> this section.
>>>>>>
>>>>>> Cheers,
>>>>>> Med
>>>>>>
>>>>>>> -----Message d'origine-----
>>>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoyé : lundi 25
>>>>>>> avril 2016 08:30 À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Hi Med
>>>>>>>
>>>>>>> My point is that Fragmentation is yet another transport related
>>>>>>> issue
>>>>> that
>>>>>>> is beyond the scope of NSH and beyond the charter of the WG, so
>>>>>>> it
>>>>> doesn't
>>>>>>> really belong in the draft. We are providing an advice as
>>>>>>> extending the size of the packet may lead to fragmentation, but
>>>>>>> as you check RFC 7348 VxLAN, which my create the same issue,
>>>>>>> you'll find it doesn't even
>>>>> relate
>>>>>>> to it.
>>>>>>>
>>>>>>> Thx
>>>>>>>
>>>>>>> Uri ("Oo-Ree")
>>>>>>> C: 949-378-7568
>>>>>>>
>>>>>>>
>>>>>>> -----Original Message-----
>>>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>> mohamed.boucadair@orange.com
>>>>>>> Sent: Sunday, April 24, 2016 10:32 PM
>>>>>>> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
>>>>> <narten@us.ibm.com>;
>>>>>>> sfc@ietf.org
>>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Hi Uri,
>>>>>>>
>>>>>>> That's another option that needs to be discussed/investigated.
>>>>>>> I'm
>>>>> afraid
>>>>>>> this is not the rationale adopted in -04 since it includes some
>>>>>>> text
>>>>> that
>>>>>>> is far to be sufficient to ensure interoperable implementations.
>>>>>>>
>>>>>>> BTW, saying that nsh does not need to deal with fragmentation
>>>>>>> because
>>>>> it
>>>>>>> is transport-independent is not IMHO a good strategy to adopt
>>>>>>> here
>>>>> because
>>>>>>> it opens the door for interoperable issues, it may lead to
>>>>>>> sub-optimal implementations if the sfc information is present
>>>>>>> only in one
>>>>> fragments,
>>>>>>> etc.
>>>>>>>
>>>>>>> My comments are related to the current text in the -04. This text
>>>>>>> needs
>>>>> to
>>>>>>> be fixed somehow.
>>>>>>>
>>>>>>> Cheers,
>>>>>>> Med
>>>>>>>
>>>>>>>> -----Message d'origine-----
>>>>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoyé : dimanche
>>>>>>>> 24 avril 2016 17:36 À : BOUCADAIR Mohamed IMT/OLN; Thomas
>>>>>>>> Narten; sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Hi Med
>>>>>>>>
>>>>>>>> I see no need to specify the exact behavior as NSH is transport
>>>>>>>> independent i.e. like NSH interaction with any other Transport
>>>>>>>> eh issue of Fragmentation is to be dealt in a way that matches
>>>>>>>> the mechanisms supported by the Transport used and do not belong
>>>>>>>> in the NSH draft
>>>>>>>>
>>>>>>>> Thx
>>>>>>>>
>>>>>>>> Uri ("Oo-Ree")
>>>>>>>> C: 949-378-7568
>>>>>>>>
>>>>>>>>
>>>>>>>> -----Original Message-----
>>>>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>>> mohamed.boucadair@orange.com
>>>>>>>> Sent: Thursday, April 14, 2016 12:43 AM
>>>>>>>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
>>>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> R-,
>>>>>>>>
>>>>>>>> In addition to other pending issues raised for this draft, I
>>>>>>>> would like to raise this additional one about Section 6.
>>>>>>>>
>>>>>>>> ==
>>>>>>>> 6.  Fragmentation Considerations
>>>>>>>>
>>>>>>>>    NSH and the associated transport header are "added" to the
>>>>>>>>    encapsulated packet/frame.  This additional information
>>>>>>>> increases
>>>>> the
>>>>>>>>    size of the packet.  In order the ensure proper forwarding of NSH
>>>>>>>>    data, several options for handling fragmentation and re-assembly
>>>>>>>>    exist:
>>>>>>>>
>>>>>>>>    1.  Jumbo Frames, when supported, enable the transport of NSH and
>>>>>>>>        associated transport packets without requiring fragmentation.
>>>>>>>>
>>>>>>>>    2.  Path MTU Discovery [RFC1191]"describes a technique for
>>>>>>>>        dynamically discovering the maximum transmission unit
>>>>>>>> (MTU) of
>>>>> an
>>>>>>>>        arbitrary internet path" and can be utilized to ensure
>>>>>>>> the
>>>> the
>>>>>>>>        required packet size is used.
>>>>>>>>
>>>>>>>>    3.  [RFC6830] describes two schemes for fragmentation and re-
>>>>> assembly
>>>>>>>>        in section 5.4.
>>>>>>>> ==
>>>>>>>>
>>>>>>>> * The text is weak for a Standard track document that is
>>>>>>>> intended to solve the problem in
>>>>>>>> https://tools.ietf.org/html/rfc7498#section-
>>>> 2.12.
>>>>>>>> There should be a clear behavior to be followed by an
>>>> implementation.
>>>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>>>
>>>>>>>> * The text covers only fragmentation when it is induced by SFC
>>>>>>>> operations, it does not discuss the treatment of a fragment when
>>>>>>>> received in an SFC domain. IMHO, the draft should also specify
>>>>>>>> the behavior of the Classifier with regards to fragments for the
>>>>>>>> sake of proper SFC operation. Applying classification policies
>>>>>>>> may require the
>>>>>>> full packet, not only a fragment.
>>>>>>>> In particular, dedicated resources should dedicated for handling
>>>>>>>> out of order fragments. Of course, it is out of scope of this
>>>>>>>> document to describe how SFs handle fragments.
>>>>>>>>
>>>>>>>> * If an SFC header is prepended for all fragments, I'm not sure
>>>>>>>> there is any particular issue at the SFF level...except if
>>>>>>>> stripping/adding context TLVs depends on the full packet (not
>>>>>>>> just fragment). It is warranted to consider a little bit this
>>>>>>>> point before declaring there
>>>>> is
>>>>>>> no issue.
>>>>>>>>
>>>>>>>> * The text states "several options". This may be interpreted as
>>>>>>>> if implementing one of them is sufficient...which is not true.
>>>>>>>> The first two points contribute to minimize the fragmentation
>>>>>>>> risk, but fragmentation may still be experienced (e.g., other
>>>>>>>> shims are prepended by other nodes for some other purposes,
>>>>>>>> nested nsh,
>>>>>>>> etc.)
>>>>>>>>
>>>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>>>
>>>>>>>> * The support of jumbo frames by a router/device does not mean
>>>>>>>> that it can make use of it. Appropriate MTU configuration should
>>>>>>>> be undertaken in a consistent manner within an SFC domain. The
>>>>>>>> text should be updated to make it is about (consistent) MTU
>>>> configuration.
>>>>>>>>
>>>>>>>> * BTW, shouldn't the text be reworded to recommended to increase
>>>>>>>> the MTU of **all nodes** of an SFC-enabled domain by at least
>>>>>>>> the length of SFC header + transport header?
>>>>>>>>
>>>>>>>> * Bullet 2, how PMTU discovery is actually used in this context?
>>>>>>>> Do you assume that all SFC-aware nodes will issue such messages
>>>>>>>> towards other SFC-aware node, arbitrary destination, else?
>>>>>>>>
>>>>>>>> * Bullet 2, I would drop "describes a technique for dynamically
>>>>>>>> discovering the maximum transmission unit (MTU) of an arbitrary
>>>>>>>> internet path".
>>>>>>>>
>>>>>>>> * Bullet 2, s/ the the/the.
>>>>>>>>
>>>>>>>> * The reference to the LISP specification raises two concerns
>>>>>>>> and one
>>>>>>>> comment:
>>>>>>>>
>>>>>>>> (1) I don't think it is a good approach that fragments induced
>>>>>>>> by the network are passed to their ultimate destinations as such
>>>> (stateless).
>>>>>>>> IMO, reassembly should be done within the SFC domain
>>>>>>>> (responsible for
>>>>>>>> fragmentation) not passed away.
>>>>>>>> (2) Does the stateful mode require all SFC data plane elements
>>>>>>>> maintain a full list of MTU for the any SFF/SF instance of the
>>>>>>>> SFC
>>>>>>> domain?
>>>>>>>>
>>>>>>>> The current text suggests that [RFC6830] should be listed as
>>>>>>>> normative reference (not an informative one). I would personally
>>>>>>>> favor removing the reference to LISP (as it is an Experimental RFC).
>>>>>>>>
>>>>>>>> * The security section of the draft may be augmented with
>>>>>>>> informational fragmentation-related pointers to: e.g., RFC1858
>>>>>>>> (Security Considerations for IP Fragment Filtering), RFC3128
>>>>>>>> (Protection Against a Variant of the Tiny Fragment Attack), and
>>>>>>>> RFC
>>>>>>>> 4963 (IPv4 Reassembly Errors at High Data Rates).
>>>>>>>>
>>>>>>>> Cheers,
>>>>>>>> Med
>>>>>>>>
>>>>>>>>> -----Message d'origine-----
>>>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de
>>>>>>>>> mohamed.boucadair@orange.com Envoyé : lundi 11 avril 2016 13:14 À :
>>>>>>>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG last call for
>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> Dear Thomas, all,
>>>>>>>>>
>>>>>>>>> As I mentioned during the meeting, there are several issues
>>>>>>>>> that are not covered in the last version of the draft. I
>>>>>>>>> already provided examples of the issues offline as requested by Martin.
>>>>>>>>>
>>>>>>>>> Cheers,
>>>>>>>>> Med
>>>>>>>>>
>>>>>>>>>> -----Message d'origine-----
>>>>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas
>>>>>>>>>> Narten Envoyé : jeudi 31 mars 2016 04:48 À : sfc@ietf.org
>>>>>>>>>> Objet
>>>>>>>>>> : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>
>>>>>>>>>> Dear WG:
>>>>>>>>>>
>>>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>>>
>>>>>>>>>> The editors of the NSH document have indicated that they have
>>>>>>>>>> addressed all known comments and that there are no open issues
>>>>>>>>>> with the current version of the document.
>>>>>>>>>>
>>>>>>>>>> Substantive comments to the list please, editorial comments
>>>>>>>>>> can go directly to the document editors.
>>>>>>>>>>
>>>>>>>>>> We'll also get a brief update from the editors at next week's
>>>>>>>>>> meeting. If there are any remaining issues with the document,
>>>>>>>>>> raising them before the meeting would be especially helpful.
>>>>>>>>>>
>>>>>>>>>> For the chairs,
>>>>>>>>>> Thomas
>>>>>>>>>>
>>>>>>>>>> _______________________________________________
>>>>>>>>>> sfc mailing list
>>>>>>>>>> sfc@ietf.org
>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>
>>>>>>>>> _______________________________________________
>>>>>>>>> sfc mailing list
>>>>>>>>> sfc@ietf.org
>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> sfc mailing list
>>>>>>>> sfc@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> sfc mailing list
>>>>>>> sfc@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>


From nobody Tue Apr 26 12:20:51 2016
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD03512D0A6 for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 12:20:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.216
X-Spam-Level: 
X-Spam-Status: No, score=-5.216 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g0XKZpLC9pdZ for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 12:20:44 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0AE3412B069 for <sfc@ietf.org>; Tue, 26 Apr 2016 12:20:42 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml703-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CNH94426; Tue, 26 Apr 2016 19:20:39 +0000 (GMT)
Received: from DFWEML703-CAH.china.huawei.com (10.193.5.177) by lhreml703-cah.china.huawei.com (10.201.5.104) with Microsoft SMTP Server (TLS) id 14.3.235.1; Tue, 26 Apr 2016 20:20:38 +0100
Received: from DFWEML501-MBB.china.huawei.com ([10.193.5.179]) by DFWEML703-CAH.china.huawei.com ([10.193.5.177]) with mapi id 14.03.0235.001; Tue, 26 Apr 2016 12:20:32 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfPQIp3nrjaS0+VjDL7mlh8GJ+Er+AwgARg/TCAEFX48IABYBMAgAAQOQCAAAiIAIAAcdWAgAAIhACAAAJAgIAABF8AgAEik2CAAH4AgP//ixXggACSLID//6nIYA==
Date: Tue, 26 Apr 2016 19:20:32 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657E7CFA1@dfweml501-mbb>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com>
In-Reply-To: <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.182]
Content-Type: multipart/alternative; boundary="_000_4A95BA014132FF49AE685FAB4B9F17F657E7CFA1dfweml501mbb_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090202.571FBF88.008D, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 7f390b4846863f306fe54fcbe9ebbbe3
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/QblcWZYMN7_R9ZMFywbviI_yRsQ>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 19:20:50 -0000

--_000_4A95BA014132FF49AE685FAB4B9F17F657E7CFA1dfweml501mbb_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Joel,

Replies are inserted below:



-----Original Message-----
From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
Sent: Tuesday, April 26, 2016 12:18 PM
To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

With regard to Transport tunnel fragementation, that seems an issue for the=
 transport protocol.  I don't actually object to a sentence, but it does no=
t seem that it will accomplish anything.

[Linda] By having this description, you avoid a lot of future unnecessary d=
ebate about how fragmentation should be processed because some people are o=
nly thinking about Tunnel induced fragmentation where as some other people =
are thinking of Source induced fragmentation.


With regard to packets fragmented by the source, I completely disagree with=
 your assertion.  If an SFF were to reassemble the packets, that would be a=
 violation of its job.  There is no reason for an SFF to reassemble a packe=
t fragmented by the source.  The classifier may have to do some interesting=
 things in order to properly classify succeeding fragments, but that is an =
implementation issue (most commonly addressed with virtual reassembly, whic=
h doe snot delay the fragments.)  We don't specity that.

If an SF needs to reassemble fragments to do its job, that is up to the SF.=
  Some will need to actually reassemble.  Some will need to perform virtual=
 reassembly, and some will happily process the fragments.  I can not see wh=
at the NSH document could possibly mandate.

[Linda] I said "either SFF or SF" has to re-assemble the fragmented packets=
. I don't have strong opinion on who perform the re-assembling job (as long=
 as one of them do). If a set of SFs attached to a SFF are not capable of p=
erforming the re-assembling and they need the whole packet to do inspection=
, then the SFF don't have any choice.  I just think that it is necessary to=
 add the description because it can be very messy (if not impossible) for S=
Fs to process partial packets.


Linda




Yours,
Joel

On 4/26/16 11:47 AM, Linda Dunbar wrote:
> Joel,
>
> I think the document should add the description on the following two
> fragmentation scenarios:
>
> - Transport tunnel generated fragmentation: When a packet
> fragmentation is caused by transport tunnel (i.e. various
> encapsulations), the termination point of the transport tunnel is
> responsible for re-assembling the fragmented pieces of the packet.
> Since there won't be any SFF nodes in between the Transport Tunnel,
> the tunnel generated fragmentation does not require any actions by SFF
> nodes or SF nodes.
>
>
> - Source node generated fragmentation (after adding on the NSH
> header): When fragmentation has to be performed for a packet being
> encapsulated with the NSH header, either the intermediate SFF nodes or
> the SF nodes have to be able to reassemble the fragmented pieces.
>
>
>
>
> Cheers,
>
>
> Linda
>
> -----Original Message----- From: Joel M. Halpern
> [mailto:jmh@joelhalpern.com] Sent: Tuesday, April 26, 2016 10:33 AM
> To: Linda Dunbar; mohamed.boucadair@orange.com<mailto:mohamed.boucadair@o=
range.com>; Elzur, Uri;
> sfc@ietf.org<mailto:sfc@ietf.org> Subject: Re: [sfc] WG last call for
> draft-ietf-sfc-nsh-04.txt
>
> Re-reading your note, it is possible that you are referring only to
> the case of transport generated fragmentation of the outer packet.  I
> had assumed you were not talking about that, since the resulting
> fragments will not all have NSH headers.  As with any tunnel
> technology, if the tunnel chooses to fragment at its layer, then the
> tunnel is responsible for reassembly.  That would be invisible to the
> SFF.
>
> Yours, Joel
>
> On 4/26/16 11:10 AM, Linda Dunbar wrote:
>> Agree with Med.
>>
>> Even if each fragment piece of a packet with NSH header carries the
>> NSH header, the intermediate SFF nodes still need to put together all
>> the fragments together before passing the whole data frame to the SF.
>>
>> Linda
>>
>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org] On
>> Behalf Of mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.c=
om> Sent: Monday, April 25,
>> 2016 9:42 AM To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org<mailto:sfc@ie=
tf.org> Subject:
>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Re-,
>>
>> How do you instruct the transport layer to ALWAYS prepend an NSH
>> header even for fragments? Or you don't care about that?
>>
>> Thank you.
>>
>> Cheers, Med
>>
>>> -----Message d'origine----- De : Elzur, Uri
>>> [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril 2016 16:26 =C0
>>> : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; sfc@ietf.org<mailto:sfc@i=
etf.org> Objet
>>> : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> Hi Med
>>>
>>> Not to repeat my position, but I'll do it anyhow :-) As NSH is
>>> *NOT* a transport, dealing with fragmentation is left to the
>>> Transport used.
>>>
>>> The model I use for NSH, is basically similar to VXLAN . It is an
>>> overly.
>>>
>>> Thx
>>>
>>> Uri ("Oo-Ree") C: 949-378-7568
>>>
>>>
>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]
>>> On Behalf Of mohamed.boucadair@orange.com<mailto:mohamed.boucadair@oran=
ge.com> Sent: Monday, April 25,
>>> 2016 7:18 AM To: Joel M. Halpern <jmh@joelhalpern.com<mailto:jmh@joelha=
lpern.com>>; sfc@ietf.org<mailto:sfc@ietf.org>
>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> Hi Joel,
>>>
>>> Please see inline.
>>>
>>> Cheers, Med
>>>
>>>> -----Message d'origine----- De : Joel M. Halpern
>>>> [mailto:jmh@joelhalpern.com] Envoy=E9 : lundi 25 avril 2016 15:48 =C0 =
:
>>>> BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org<mailto:sfc@ietf.org> Objet : R=
e: [sfc] WG last
>>>> call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> If I am understanding you correctly Med, you are asking that the
>>>> NSH draft specify how service chaining should cope with packets
>>>> that have been fragmented?
>>>>
>>>
>>> [Med] To be accurate, I'm asking to assess whether there are
>>> implications. If there are, then the draft should be updated
>>> accordingly.
>>>
>>>> NSH, and the SFF functionality, does not care.
>>>
>>> [Med] I'm not that sure. Some typical implications are listed
>>> below:
>>>
>>> * SFF: If the NSH header is present only in the a fragment but SFF
>>> didn't maintained a state, subsequent fragments won't be
>>> appropriately processed. * SFC-aware function: if prepending a
>>> context information depends on the full packet, not only a fragment.
>>>
>>> It just does its job.
>>>
>>> [Med] which may be disturbed in some situations as listed in the
>>> examples above.
>>>
>>>> Ingress and intermediate classifiers may cope with fragments in any
>>>> number of ways.
>>> Specifying such is clearly out of scope for this draft.
>>>
>>> [Med] The purpose is not to specify the internal implementation
>>> details but the external behavior of the classifier function when it
>>> comes to handle fragments. That behavior may have an incidence on
>>> SFF, in particular. The purpose is not to recommend the maximum
>>> resources to be dedicated to out of order fragments nor the timeout
>>> to cache those; these considerations are of course out of scope.
>>> Nevertheless, an implementation should offer a configurable
>>> parameter so that an operator tweak those according to its context.
>>>
>>>> I suppose one could write an informational draft on possible ways
>>>> of coping.  The IETF has not usually published such.
>>>> Service functions have to cope with fragmented packets just as they
>>>> had to before the advent of NSH, so describing that is clearly not
>>>> needed here.
>>>
>>> [Med] The advent of NSH has the following implications: * it
>>> exacerbates fragmentation. Handing over this issue to the transport
>>> layer may lead to interoperability issues. * the chaining may not be
>>> efficient if fragments are inappropriately handled.
>>>
>>> Introducing NSH should not degrade the overall service compared to
>>> legacy service deployment schemes.
>>>
>>>>
>>>> Yours, Joel
>>>>
>>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com<mailto:mohamed.boucad=
air@orange.com> wrote:
>>>>> Re-,
>>>>>
>>>>> I hear you, but my comment is that we need, as a WG, to decide
>>>>> what to
>>>> put in the draft. FWIW, I'm discussing two fragmentation
>>>> issues:
>>>>>
>>>>> (1) Fragmentation that is caused by prepending an SFC header. (2)
>>>>> Handling fragments at the ingress of an SFC-enabled domain.
>>>>>
>>>>> Increasing the MTU is for sure a recommendation is to be
>>>>> explicitly
>>>> called out in the text (see my first message).
>>>>>
>>>>> There are other issues that need to be discussed, e.g., how to
>>>>> deal with
>>>> fragments in SFFs/Classifiers?
>>>>>
>>>>> It is also "prudent" to check that no issues will be experienced
>>>>> in SFF
>>>> to handle fragments. If an SFC header is prepended for all
>>>> fragments, I'm not sure there
>>>>> is any particular issue at the SFF level, except if
>>>>> stripping/adding
>>>> context TLVs depends on the full packet (not just fragment). It is
>>>> warranted to consider a little bit this point before declaring
>>>> there is no issue.
>>>>>
>>>>> For point (1), declaring fragmentation out of scope would be meant
>>>>> that
>>>> an implementation must be prepared to receive fragments with or
>>>> without NSH header as this is a decision that is left to the
>>>> transport encapsulation. This is a requirement per se!
>>>>>
>>>>> I won't reiterate all the comments I have about the current
>>>>> wording of
>>>> this section.
>>>>>
>>>>> Cheers, Med
>>>>>
>>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril 2016
>>>>>> 08:30 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten; sfc@ietf.org<m=
ailto:sfc@ietf.org>
>>>>>> Objet : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Hi Med
>>>>>>
>>>>>> My point is that Fragmentation is yet another transport related
>>>>>> issue
>>>> that
>>>>>> is beyond the scope of NSH and beyond the charter of the WG, so
>>>>>> it
>>>> doesn't
>>>>>> really belong in the draft. We are providing an advice as
>>>>>> extending the size of the packet may lead to fragmentation, but
>>>>>> as you check RFC 7348 VxLAN, which my create the same issue,
>>>>>> you'll find it doesn't even
>>>> relate
>>>>>> to it.
>>>>>>
>>>>>> Thx
>>>>>>
>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>
>>>>>>
>>>>>> -----Original Message----- From: sfc
>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>> mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> Se=
nt: Sunday, April 24, 2016
>>>>>> 10:32 PM To: Elzur, Uri <uri.elzur@intel.com<mailto:uri.elzur@intel.=
com>>; Thomas Narten
>>>> <narten@us.ibm.com<mailto:narten@us.ibm.com>>;
>>>>>> sfc@ietf.org<mailto:sfc@ietf.org> Subject: Re: [sfc] WG last call fo=
r
>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Hi Uri,
>>>>>>
>>>>>> That's another option that needs to be discussed/investigated.
>>>>>> I'm
>>>> afraid
>>>>>> this is not the rationale adopted in -04 since it includes some
>>>>>> text
>>>> that
>>>>>> is far to be sufficient to ensure interoperable implementations.
>>>>>>
>>>>>> BTW, saying that nsh does not need to deal with fragmentation
>>>>>> because
>>>> it
>>>>>> is transport-independent is not IMHO a good strategy to adopt
>>>>>> here
>>>> because
>>>>>> it opens the door for interoperable issues, it may lead to
>>>>>> sub-optimal implementations if the sfc information is present
>>>>>> only in one
>>>> fragments,
>>>>>> etc.
>>>>>>
>>>>>> My comments are related to the current text in the -04.
>>>>>> This text needs
>>>> to
>>>>>> be fixed somehow.
>>>>>>
>>>>>> Cheers, Med
>>>>>>
>>>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche 24 avril
>>>>>>> 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>>>> sfc@ietf.org<mailto:sfc@ietf.org> Objet : RE: [sfc] WG last call fo=
r
>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Hi Med
>>>>>>>
>>>>>>> I see no need to specify the exact behavior as NSH is transport
>>>>>>> independent i.e. like NSH interaction with any other Transport
>>>>>>> eh issue of Fragmentation is to be dealt in a way that matches
>>>>>>> the mechanisms supported by the Transport used and do not belong
>>>>>>> in the NSH draft
>>>>>>>
>>>>>>> Thx
>>>>>>>
>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>
>>>>>>>
>>>>>>> -----Original Message----- From: sfc
>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>> mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> S=
ent: Thursday, April 14,
>>>>>>> 2016 12:43 AM To: Thomas Narten <narten@us.ibm.com<mailto:narten@us=
.ibm.com>>;
>>>>>>> sfc@ietf.org<mailto:sfc@ietf.org> Subject: Re: [sfc] WG last call f=
or
>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> R-,
>>>>>>>
>>>>>>> In addition to other pending issues raised for this draft, I
>>>>>>> would like to raise this additional one about Section 6.
>>>>>>>
>>>>>>> =3D=3D 6.  Fragmentation Considerations
>>>>>>>
>>>>>>> NSH and the associated transport header are "added" to the
>>>>>>> encapsulated packet/frame.  This additional information
>>>>>>> increases
>>>> the
>>>>>>> size of the packet.  In order the ensure proper forwarding of
>>>>>>> NSH data, several options for handling fragmentation and
>>>>>>> re-assembly exist:
>>>>>>>
>>>>>>> 1.  Jumbo Frames, when supported, enable the transport of NSH
>>>>>>> and associated transport packets without requiring
>>>>>>> fragmentation.
>>>>>>>
>>>>>>> 2.  Path MTU Discovery [RFC1191]"describes a technique for
>>>>>>> dynamically discovering the maximum transmission unit (MTU) of
>>>> an
>>>>>>> arbitrary internet path" and can be utilized to ensure the
>>> the
>>>>>>> required packet size is used.
>>>>>>>
>>>>>>> 3.  [RFC6830] describes two schemes for fragmentation and
>>>>>>> re-
>>>> assembly
>>>>>>> in section 5.4. =3D=3D
>>>>>>>
>>>>>>> * The text is weak for a Standard track document that is
>>>>>>> intended to solve the problem in
>>>>>>> https://tools.ietf.org/html/rfc7498#section-
>>> 2.12.
>>>>>>> There should be a clear behavior to be followed by an
>>> implementation.
>>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>>
>>>>>>> * The text covers only fragmentation when it is induced by SFC
>>>>>>> operations, it does not discuss the treatment of a fragment when
>>>>>>> received in an SFC domain. IMHO, the draft should also specify
>>>>>>> the behavior of the Classifier with regards to fragments for the
>>>>>>> sake of proper SFC operation. Applying classification policies
>>>>>>> may require the
>>>>>> full packet, not only a fragment.
>>>>>>> In particular, dedicated resources should dedicated for handling
>>>>>>> out of order fragments. Of course, it is out of scope of this
>>>>>>> document to describe how SFs handle fragments.
>>>>>>>
>>>>>>> * If an SFC header is prepended for all fragments, I'm not sure
>>>>>>> there is any particular issue at the SFF level...except if
>>>>>>> stripping/adding context TLVs depends on the full packet (not
>>>>>>> just fragment). It is warranted to consider a little bit this
>>>>>>> point before declaring there
>>>> is
>>>>>> no issue.
>>>>>>>
>>>>>>> * The text states "several options". This may be interpreted as
>>>>>>> if implementing one of them is sufficient...which is not true.
>>>>>>> The first two points contribute to minimize the fragmentation
>>>>>>> risk, but fragmentation may still be experienced (e.g., other
>>>>>>> shims are prepended by other nodes for some other purposes,
>>>>>>> nested nsh, etc.)
>>>>>>>
>>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>>
>>>>>>> * The support of jumbo frames by a router/device does not mean
>>>>>>> that it can make use of it. Appropriate MTU configuration should
>>>>>>> be undertaken in a consistent manner within an SFC domain. The
>>>>>>> text should be updated to make it is about (consistent) MTU
>>> configuration.
>>>>>>>
>>>>>>> * BTW, shouldn't the text be reworded to recommended to increase
>>>>>>> the MTU of **all nodes** of an SFC-enabled domain by at least
>>>>>>> the length of SFC header + transport header?
>>>>>>>
>>>>>>> * Bullet 2, how PMTU discovery is actually used in this context?
>>>>>>> Do you assume that all SFC-aware nodes will issue such messages
>>>>>>> towards other SFC-aware node, arbitrary destination, else?
>>>>>>>
>>>>>>> * Bullet 2, I would drop "describes a technique for dynamically
>>>>>>> discovering the maximum transmission unit
>>>>>>> (MTU) of an arbitrary internet path".
>>>>>>>
>>>>>>> * Bullet 2, s/ the the/the.
>>>>>>>
>>>>>>> * The reference to the LISP specification raises two concerns
>>>>>>> and one comment:
>>>>>>>
>>>>>>> (1) I don't think it is a good approach that fragments induced
>>>>>>> by the network are passed to their ultimate destinations as such
>>> (stateless).
>>>>>>> IMO, reassembly should be done within the SFC domain
>>>>>>> (responsible for fragmentation) not passed away. (2) Does the
>>>>>>> stateful mode require all SFC data plane elements maintain a
>>>>>>> full list of MTU for the any SFF/SF instance of the SFC
>>>>>> domain?
>>>>>>>
>>>>>>> The current text suggests that [RFC6830] should be listed as
>>>>>>> normative reference (not an informative one). I would personally
>>>>>>> favor removing the reference to LISP (as it is an Experimental
>>>>>>> RFC).
>>>>>>>
>>>>>>> * The security section of the draft may be augmented with
>>>>>>> informational fragmentation-related pointers to:
>>>>>>> e.g., RFC1858 (Security Considerations for IP Fragment
>>>>>>> Filtering), RFC3128 (Protection Against a Variant of the Tiny
>>>>>>> Fragment Attack), and RFC 4963 (IPv4 Reassembly Errors at High
>>>>>>> Data Rates).
>>>>>>>
>>>>>>> Cheers, Med
>>>>>>>
>>>>>>>> -----Message d'origine----- De : sfc
>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de
>>>>>>>> mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> =
Envoy=E9 : lundi 11 avril
>>>>>>>> 2016 13:14 =C0 : Thomas Narten; sfc@ietf.org<mailto:sfc@ietf.org> =
Objet : Re:
>>>>>>>> [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Dear Thomas, all,
>>>>>>>>
>>>>>>>> As I mentioned during the meeting, there are several issues
>>>>>>>> that are not covered in the last version of the draft. I
>>>>>>>> already provided examples of the issues offline as requested by
>>>>>>>> Martin.
>>>>>>>>
>>>>>>>> Cheers, Med
>>>>>>>>
>>>>>>>>> -----Message d'origine----- De : sfc
>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten
>>>>>>>>> Envoy=E9 : jeudi 31 mars 2016 04:48 =C0 :
>>>>>>>>> sfc@ietf.org<mailto:sfc@ietf.org> Objet : [sfc] WG last call for
>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> Dear WG:
>>>>>>>>>
>>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
The editors of the NSH document have indicated that they have
>>>>>>>>> addressed all known comments and that there are no open issues
>>>>>>>>> with the current version of the document.
>>>>>>>>>
>>>>>>>>> Substantive comments to the list please, editorial comments
>>>>>>>>> can go directly to the document editors.
>>>>>>>>>
>>>>>>>>> We'll also get a brief update from the editors at next week's
>>>>>>>>> meeting. If there are any remaining issues with the document,
>>>>>>>>> raising them before the meeting would be especially helpful.
>>>>>>>>>
>>>>>>>>> For the chairs, Thomas
>>>>>>>>>
>>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>>> list sfc@ietf.org<mailto:sfc@ietf.org> https://www.ietf.org/mailm=
an/listinfo/sfc
>>>>>>>>
>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>> list sfc@ietf.org<mailto:sfc@ietf.org> https://www.ietf.org/mailma=
n/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________ sfc mailing list
>>>>>>> sfc@ietf.org<mailto:sfc@ietf.org> https://www.ietf.org/mailman/list=
info/sfc
>>>>>>
>>>>>> _______________________________________________ sfc mailing list
>>>>>> sfc@ietf.org<mailto:sfc@ietf.org> https://www.ietf.org/mailman/listi=
nfo/sfc
>>>>>
>>>>> _______________________________________________ sfc mailing list
>>>>> sfc@ietf.org<mailto:sfc@ietf.org> https://www.ietf.org/mailman/listin=
fo/sfc
>>>>>
>>>
>>> _______________________________________________ sfc mailing list
>>> sfc@ietf.org<mailto:sfc@ietf.org> https://www.ietf.org/mailman/listinfo=
/sfc
>>
>> _______________________________________________ sfc mailing list
>> sfc@ietf.org<mailto:sfc@ietf.org> https://www.ietf.org/mailman/listinfo/=
sfc
>>


--_000_4A95BA014132FF49AE685FAB4B9F17F657E7CFA1dfweml501mbb_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Exchange Server">
<!-- converted from rtf -->
<style><!-- .EmailQuote { margin-left: 1pt; padding-left: 4pt; border-left:=
 #800000 2px solid; } --></style>
</head>
<body>
<font face=3D"Consolas" size=3D"2"><span style=3D"font-size:10.5pt;">
<div>Joel, </div>
<div>&nbsp;</div>
<div>Replies are inserted below:</div>
<div>&nbsp;</div>
<div><font face=3D"Times New Roman">&nbsp;</font></div>
<div><font face=3D"Times New Roman">&nbsp;</font></div>
<div>-----Original Message-----<br>

From: Joel M. Halpern [<a href=3D"mailto:jmh@joelhalpern.com">mailto:jmh@jo=
elhalpern.com</a>]
<br>

Sent: Tuesday, April 26, 2016 12:18 PM<br>

To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri; sfc@ietf.org<br=
>

Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt</div>
<div><font face=3D"Times New Roman">&nbsp;</font></div>
<div>With regard to Transport tunnel fragementation, that seems an issue fo=
r the transport protocol.&nbsp; I don't actually object to a sentence, but =
it does not seem that it will accomplish anything.</div>
<div><font face=3D"Times New Roman">&nbsp;</font></div>
<div><font color=3D"#0070C0">[Linda] By having this description, you avoid =
a lot of future unnecessary debate about how fragmentation should be proces=
sed because some people are only thinking about Tunnel induced fragmentatio=
n where as some other people are thinking
of Source induced fragmentation. </font></div>
<div><font face=3D"Times New Roman">&nbsp;</font></div>
<div><font face=3D"Times New Roman">&nbsp;</font></div>
<div>With regard to packets fragmented by the source, I completely disagree=
 with your assertion.&nbsp; If an SFF were to reassemble the packets, that =
would be a violation of its job.&nbsp; There is no reason for an SFF to rea=
ssemble a packet fragmented by the source.&nbsp;
The classifier may have to do some interesting things in order to properly =
classify succeeding fragments, but that is an implementation issue (most co=
mmonly addressed with virtual reassembly, which doe snot delay the fragment=
s.)&nbsp; We don't specity that.</div>
<div><font face=3D"Times New Roman">&nbsp;</font></div>
<div>If an SF needs to reassemble fragments to do its job, that is up to th=
e SF.&nbsp; Some will need to actually reassemble.&nbsp; Some will need to =
perform virtual reassembly, and some will happily process the fragments.&nb=
sp; I can not see what the NSH document could possibly
mandate.</div>
<div><font face=3D"Times New Roman">&nbsp;</font></div>
<div><font color=3D"#0070C0">[Linda] I said &#8220;either SFF or SF&#8221; =
has to re-assemble the fragmented packets. I don&#8217;t have strong opinio=
n on who perform the re-assembling job (as long as one of them do). If a se=
t of SFs attached to a SFF are not capable of performing
the re-assembling and they need the whole packet to do inspection, then the=
 SFF don&#8217;t have any choice.  I just think that it is necessary to add=
 the description because it can be very messy (if not impossible) for SFs t=
o process partial packets. </font></div>
<div><font face=3D"Times New Roman">&nbsp;</font></div>
<div><font face=3D"Times New Roman">&nbsp;</font></div>
<div><font color=3D"#0070C0">Linda</font></div>
<div><font face=3D"Times New Roman">&nbsp;</font></div>
<div><font face=3D"Times New Roman">&nbsp;</font></div>
<div><font face=3D"Times New Roman">&nbsp;</font></div>
<div><font face=3D"Times New Roman">&nbsp;</font></div>
<div>Yours,</div>
<div>Joel</div>
<div>&nbsp;</div>
<div>On 4/26/16 11:47 AM, Linda Dunbar wrote:</div>
<div>&gt; Joel,</div>
<div>&gt;</div>
<div>&gt; I think the document should add the description on the following =
two </div>
<div>&gt; fragmentation scenarios:</div>
<div>&gt;</div>
<div>&gt; - Transport tunnel generated fragmentation: When a packet </div>
<div>&gt; fragmentation is caused by transport tunnel (i.e. various </div>
<div>&gt; encapsulations), the termination point of the transport tunnel is=
 </div>
<div>&gt; responsible for re-assembling the fragmented pieces of the packet=
.</div>
<div>&gt; Since there won't be any SFF nodes in between the Transport Tunne=
l, </div>
<div>&gt; the tunnel generated fragmentation does not require any actions b=
y SFF </div>
<div>&gt; nodes or SF nodes.</div>
<div>&gt;</div>
<div>&gt;</div>
<div>&gt; - Source node generated fragmentation (after adding on the NSH</d=
iv>
<div>&gt; header): When fragmentation has to be performed for a packet bein=
g </div>
<div>&gt; encapsulated with the NSH header, either the intermediate SFF nod=
es or </div>
<div>&gt; the SF nodes have to be able to reassemble the fragmented pieces.=
</div>
<div>&gt;</div>
<div>&gt;</div>
<div>&gt;</div>
<div>&gt;</div>
<div>&gt; Cheers,</div>
<div>&gt;</div>
<div>&gt;</div>
<div>&gt; Linda</div>
<div>&gt;</div>
<div>&gt; -----Original Message----- From: Joel M. Halpern </div>
<div>&gt; [<a href=3D"mailto:jmh@joelhalpern.com">mailto:jmh@joelhalpern.co=
m</a>] Sent: Tuesday, April 26, 2016 10:33 AM</div>
<div>&gt; To: Linda Dunbar; <a href=3D"mailto:mohamed.boucadair@orange.com"=
>mohamed.boucadair@orange.com</a>; Elzur, Uri; </div>
<div>&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> Subject: Re: [sf=
c] WG last call for </div>
<div>&gt; draft-ietf-sfc-nsh-04.txt</div>
<div>&gt;</div>
<div>&gt; Re-reading your note, it is possible that you are referring only =
to </div>
<div>&gt; the case of transport generated fragmentation of the outer packet=
.&nbsp; I </div>
<div>&gt; had assumed you were not talking about that, since the resulting =
</div>
<div>&gt; fragments will not all have NSH headers.&nbsp; As with any tunnel=
 </div>
<div>&gt; technology, if the tunnel chooses to fragment at its layer, then =
the </div>
<div>&gt; tunnel is responsible for reassembly.&nbsp; That would be invisib=
le to the </div>
<div>&gt; SFF.</div>
<div>&gt;</div>
<div>&gt; Yours, Joel</div>
<div>&gt;</div>
<div>&gt; On 4/26/16 11:10 AM, Linda Dunbar wrote:</div>
<div>&gt;&gt; Agree with Med.</div>
<div>&gt;&gt;</div>
<div>&gt;&gt; Even if each fragment piece of a packet with NSH header carri=
es the </div>
<div>&gt;&gt; NSH header, the intermediate SFF nodes still need to put toge=
ther all </div>
<div>&gt;&gt; the fragments together before passing the whole data frame to=
 the SF.</div>
<div>&gt;&gt;</div>
<div>&gt;&gt; Linda</div>
<div>&gt;&gt;</div>
<div>&gt;&gt; -----Original Message----- From: sfc [<a href=3D"mailto:sfc-b=
ounces@ietf.org">mailto:sfc-bounces@ietf.org</a>] On </div>
<div>&gt;&gt; Behalf Of <a href=3D"mailto:mohamed.boucadair@orange.com">moh=
amed.boucadair@orange.com</a> Sent: Monday, April 25,</div>
<div>&gt;&gt; 2016 9:42 AM To: Elzur, Uri; Joel M. Halpern; <a href=3D"mail=
to:sfc@ietf.org">sfc@ietf.org</a> Subject:</div>
<div>&gt;&gt; Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt</div>
<div>&gt;&gt;</div>
<div>&gt;&gt; Re-,</div>
<div>&gt;&gt;</div>
<div>&gt;&gt; How do you instruct the transport layer to ALWAYS prepend an =
NSH </div>
<div>&gt;&gt; header even for fragments? Or you don't care about that?</div=
>
<div>&gt;&gt;</div>
<div>&gt;&gt; Thank you.</div>
<div>&gt;&gt;</div>
<div>&gt;&gt; Cheers, Med</div>
<div>&gt;&gt;</div>
<div>&gt;&gt;&gt; -----Message d'origine----- De : Elzur, Uri </div>
<div>&gt;&gt;&gt; [<a href=3D"mailto:uri.elzur@intel.com">mailto:uri.elzur@=
intel.com</a>] Envoy=E9 : lundi 25 avril 2016 16:26 =C0</div>
<div>&gt;&gt;&gt; : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; <a href=3D"=
mailto:sfc@ietf.org">sfc@ietf.org</a> Objet</div>
<div>&gt;&gt;&gt; : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt</d=
iv>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; Hi Med</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; Not to repeat my position, but I'll do it anyhow :-) As N=
SH is</div>
<div>&gt;&gt;&gt; *NOT* a transport, dealing with fragmentation is left to =
the </div>
<div>&gt;&gt;&gt; Transport used.</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; The model I use for NSH, is basically similar to VXLAN . =
It is an </div>
<div>&gt;&gt;&gt; overly.</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; Thx</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; Uri (&quot;Oo-Ree&quot;) C: 949-378-7568</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; -----Original Message----- From: sfc [<a href=3D"mailto:s=
fc-bounces@ietf.org">mailto:sfc-bounces@ietf.org</a>] </div>
<div>&gt;&gt;&gt; On Behalf Of <a href=3D"mailto:mohamed.boucadair@orange.c=
om">mohamed.boucadair@orange.com</a> Sent: Monday, April 25, </div>
<div>&gt;&gt;&gt; 2016 7:18 AM To: Joel M. Halpern &lt;<a href=3D"mailto:jm=
h@joelhalpern.com">jmh@joelhalpern.com</a>&gt;; <a href=3D"mailto:sfc@ietf.=
org">sfc@ietf.org</a></div>
<div>&gt;&gt;&gt; Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04=
.txt</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; Hi Joel,</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; Please see inline.</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; Cheers, Med</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt; -----Message d'origine----- De : Joel M. Halpern </di=
v>
<div>&gt;&gt;&gt;&gt; [<a href=3D"mailto:jmh@joelhalpern.com">mailto:jmh@jo=
elhalpern.com</a>] Envoy=E9 : lundi 25 avril 2016 15:48 =C0 : </div>
<div>&gt;&gt;&gt;&gt; BOUCADAIR Mohamed IMT/OLN; <a href=3D"mailto:sfc@ietf=
.org">sfc@ietf.org</a> Objet : Re: [sfc] WG last </div>
<div>&gt;&gt;&gt;&gt; call for draft-ietf-sfc-nsh-04.txt</div>
<div>&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt; If I am understanding you correctly Med, you are aski=
ng that the </div>
<div>&gt;&gt;&gt;&gt; NSH draft specify how service chaining should cope wi=
th packets </div>
<div>&gt;&gt;&gt;&gt; that have been fragmented?</div>
<div>&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; [Med] To be accurate, I'm asking to assess whether there =
are </div>
<div>&gt;&gt;&gt; implications. If there are, then the draft should be upda=
ted </div>
<div>&gt;&gt;&gt; accordingly.</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt; NSH, and the SFF functionality, does not care.</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; [Med] I'm not that sure. Some typical implications are li=
sted</div>
<div>&gt;&gt;&gt; below:</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; * SFF: If the NSH header is present only in the a fragmen=
t but SFF </div>
<div>&gt;&gt;&gt; didn't maintained a state, subsequent fragments won't be =
</div>
<div>&gt;&gt;&gt; appropriately processed. * SFC-aware function: if prepend=
ing a </div>
<div>&gt;&gt;&gt; context information depends on the full packet, not only =
a fragment.</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; It just does its job.</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; [Med] which may be disturbed in some situations as listed=
 in the&nbsp; </div>
<div>&gt;&gt;&gt; examples above.</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt; Ingress and intermediate classifiers may cope with fr=
agments in any </div>
<div>&gt;&gt;&gt;&gt; number of ways.</div>
<div>&gt;&gt;&gt; Specifying such is clearly out of scope for this draft.</=
div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; [Med] The purpose is not to specify the internal implemen=
tation </div>
<div>&gt;&gt;&gt; details but the external behavior of the classifier funct=
ion when it </div>
<div>&gt;&gt;&gt; comes to handle fragments. That behavior may have an inci=
dence on </div>
<div>&gt;&gt;&gt; SFF, in particular. The purpose is not to recommend the m=
aximum </div>
<div>&gt;&gt;&gt; resources to be dedicated to out of order fragments nor t=
he timeout </div>
<div>&gt;&gt;&gt; to cache those; these considerations are of course out of=
 scope. </div>
<div>&gt;&gt;&gt; Nevertheless, an implementation should offer a configurab=
le </div>
<div>&gt;&gt;&gt; parameter so that an operator tweak those according to it=
s context.</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt; I suppose one could write an informational draft on p=
ossible ways </div>
<div>&gt;&gt;&gt;&gt; of coping.&nbsp; The IETF has not usually published s=
uch.</div>
<div>&gt;&gt;&gt;&gt; Service functions have to cope with fragmented packet=
s just as they </div>
<div>&gt;&gt;&gt;&gt; had to before the advent of NSH, so describing that i=
s clearly not </div>
<div>&gt;&gt;&gt;&gt; needed here.</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; [Med] The advent of NSH has the following implications: *=
 it </div>
<div>&gt;&gt;&gt; exacerbates fragmentation. Handing over this issue to the=
 transport </div>
<div>&gt;&gt;&gt; layer may lead to interoperability issues. * the chaining=
 may not be </div>
<div>&gt;&gt;&gt; efficient if fragments are inappropriately handled.</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; Introducing NSH should not degrade the overall service co=
mpared to </div>
<div>&gt;&gt;&gt; legacy service deployment schemes.</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt; Yours, Joel</div>
<div>&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt; On 4/25/16 3:00 AM, <a href=3D"mailto:mohamed.boucada=
ir@orange.com">mohamed.boucadair@orange.com</a> wrote:</div>
<div>&gt;&gt;&gt;&gt;&gt; Re-,</div>
<div>&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt; I hear you, but my comment is that we need, as a =
WG, to decide </div>
<div>&gt;&gt;&gt;&gt;&gt; what to</div>
<div>&gt;&gt;&gt;&gt; put in the draft. FWIW, I'm discussing two fragmentat=
ion</div>
<div>&gt;&gt;&gt;&gt; issues:</div>
<div>&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt; (1) Fragmentation that is caused by prepending an=
 SFC header. (2) </div>
<div>&gt;&gt;&gt;&gt;&gt; Handling fragments at the ingress of an SFC-enabl=
ed domain.</div>
<div>&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt; Increasing the MTU is for sure a recommendation i=
s to be </div>
<div>&gt;&gt;&gt;&gt;&gt; explicitly</div>
<div>&gt;&gt;&gt;&gt; called out in the text (see my first message).</div>
<div>&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt; There are other issues that need to be discussed,=
 e.g., how to </div>
<div>&gt;&gt;&gt;&gt;&gt; deal with</div>
<div>&gt;&gt;&gt;&gt; fragments in SFFs/Classifiers?</div>
<div>&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt; It is also &quot;prudent&quot; to check that no i=
ssues will be experienced </div>
<div>&gt;&gt;&gt;&gt;&gt; in SFF</div>
<div>&gt;&gt;&gt;&gt; to handle fragments. If an SFC header is prepended fo=
r all </div>
<div>&gt;&gt;&gt;&gt; fragments, I'm not sure there</div>
<div>&gt;&gt;&gt;&gt;&gt; is any particular issue at the SFF level, except =
if </div>
<div>&gt;&gt;&gt;&gt;&gt; stripping/adding</div>
<div>&gt;&gt;&gt;&gt; context TLVs depends on the full packet (not just fra=
gment). It is </div>
<div>&gt;&gt;&gt;&gt; warranted to consider a little bit this point before =
declaring </div>
<div>&gt;&gt;&gt;&gt; there is no issue.</div>
<div>&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt; For point (1), declaring fragmentation out of sco=
pe would be meant </div>
<div>&gt;&gt;&gt;&gt;&gt; that</div>
<div>&gt;&gt;&gt;&gt; an implementation must be prepared to receive fragmen=
ts with or </div>
<div>&gt;&gt;&gt;&gt; without NSH header as this is a decision that is left=
 to the </div>
<div>&gt;&gt;&gt;&gt; transport encapsulation. This is a requirement per se=
!</div>
<div>&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt; I won't reiterate all the comments I have about t=
he current </div>
<div>&gt;&gt;&gt;&gt;&gt; wording of</div>
<div>&gt;&gt;&gt;&gt; this section.</div>
<div>&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt; Cheers, Med</div>
<div>&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; -----Message d'origine----- De : Elzur, Uri <=
/div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; [<a href=3D"mailto:uri.elzur@intel.com">mailt=
o:uri.elzur@intel.com</a>] Envoy=E9 : lundi 25 avril 2016</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; 08:30 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas=
 Narten; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; Objet : RE: [sfc] WG last call for draft-ietf=
-sfc-nsh-04.txt</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; Hi Med</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; My point is that Fragmentation is yet another=
 transport related </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; issue</div>
<div>&gt;&gt;&gt;&gt; that</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; is beyond the scope of NSH and beyond the cha=
rter of the WG, so </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; it</div>
<div>&gt;&gt;&gt;&gt; doesn't</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; really belong in the draft. We are providing =
an advice as </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; extending the size of the packet may lead to =
fragmentation, but </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; as you check RFC 7348 VxLAN, which my create =
the same issue, </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; you'll find it doesn't even</div>
<div>&gt;&gt;&gt;&gt; relate</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; to it.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; Thx</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; Uri (&quot;Oo-Ree&quot;) C: 949-378-7568</div=
>
<div>&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; -----Original Message----- From: sfc </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; [<a href=3D"mailto:sfc-bounces@ietf.org">mail=
to:sfc-bounces@ietf.org</a>] On Behalf Of </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; <a href=3D"mailto:mohamed.boucadair@orange.co=
m">mohamed.boucadair@orange.com</a> Sent: Sunday, April 24, 2016</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; 10:32 PM To: Elzur, Uri &lt;<a href=3D"mailto=
:uri.elzur@intel.com">uri.elzur@intel.com</a>&gt;; Thomas Narten</div>
<div>&gt;&gt;&gt;&gt; &lt;<a href=3D"mailto:narten@us.ibm.com">narten@us.ib=
m.com</a>&gt;;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org<=
/a> Subject: Re: [sfc] WG last call for </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; draft-ietf-sfc-nsh-04.txt</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; Hi Uri,</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; That's another option that needs to be discus=
sed/investigated. </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; I'm</div>
<div>&gt;&gt;&gt;&gt; afraid</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; this is not the rationale adopted in -04 sinc=
e it includes some </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; text</div>
<div>&gt;&gt;&gt;&gt; that</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; is far to be sufficient to ensure interoperab=
le implementations.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; BTW, saying that nsh does not need to deal wi=
th fragmentation </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; because</div>
<div>&gt;&gt;&gt;&gt; it</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; is transport-independent is not IMHO a good s=
trategy to adopt </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; here</div>
<div>&gt;&gt;&gt;&gt; because</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; it opens the door for interoperable issues, i=
t may lead to </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; sub-optimal implementations if the sfc inform=
ation is present </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; only in one</div>
<div>&gt;&gt;&gt;&gt; fragments,</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; etc.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; My comments are related to the current text i=
n the -04.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; This text needs</div>
<div>&gt;&gt;&gt;&gt; to</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; be fixed somehow.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; Cheers, Med</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; -----Message d'origine----- De : Elzur, U=
ri </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; [<a href=3D"mailto:uri.elzur@intel.com">m=
ailto:uri.elzur@intel.com</a>] Envoy=E9 : dimanche 24 avril</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OL=
N; Thomas Narten; </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.=
org</a> Objet : RE: [sfc] WG last call for </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; draft-ietf-sfc-nsh-04.txt</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; Hi Med</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; I see no need to specify the exact behavi=
or as NSH is transport </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; independent i.e. like NSH interaction wit=
h any other Transport </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; eh issue of Fragmentation is to be dealt =
in a way that matches </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; the mechanisms supported by the Transport=
 used and do not belong </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; in the NSH draft</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; Thx</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; Uri (&quot;Oo-Ree&quot;) C: 949-378-7568<=
/div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; -----Original Message----- From: sfc </di=
v>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; [<a href=3D"mailto:sfc-bounces@ietf.org">=
mailto:sfc-bounces@ietf.org</a>] On Behalf Of </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; <a href=3D"mailto:mohamed.boucadair@orang=
e.com">mohamed.boucadair@orange.com</a> Sent: Thursday, April 14,</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; 2016 12:43 AM To: Thomas Narten &lt;<a hr=
ef=3D"mailto:narten@us.ibm.com">narten@us.ibm.com</a>&gt;; </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.=
org</a> Subject: Re: [sfc] WG last call for </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; draft-ietf-sfc-nsh-04.txt</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; R-,</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; In addition to other pending issues raise=
d for this draft, I </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; would like to raise this additional one a=
bout Section 6.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; =3D=3D 6.&nbsp; Fragmentation Considerati=
ons</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; NSH and the associated transport header a=
re &quot;added&quot; to the </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; encapsulated packet/frame.&nbsp; This add=
itional information </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; increases</div>
<div>&gt;&gt;&gt;&gt; the</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; size of the packet.&nbsp; In order the en=
sure proper forwarding of </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; NSH data, several options for handling fr=
agmentation and </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; re-assembly exist:</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; 1.&nbsp; Jumbo Frames, when supported, en=
able the transport of NSH </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; and associated transport packets without =
requiring </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; fragmentation.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; 2.&nbsp; Path MTU Discovery [RFC1191]&quo=
t;describes a technique for </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; dynamically discovering the maximum trans=
mission unit (MTU) of</div>
<div>&gt;&gt;&gt;&gt; an</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; arbitrary internet path&quot; and can be =
utilized to ensure the</div>
<div>&gt;&gt;&gt; the</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; required packet size is used.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; 3.&nbsp; [RFC6830] describes two schemes =
for fragmentation and</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; re-</div>
<div>&gt;&gt;&gt;&gt; assembly</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; in section 5.4. =3D=3D</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; * The text is weak for a Standard track d=
ocument that is </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; intended to solve the problem in</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; <a href=3D"https://tools.ietf.org/html/rf=
c7498#section-">https://tools.ietf.org/html/rfc7498#section-</a></div>
<div>&gt;&gt;&gt; 2.12.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; There should be a clear behavior to be fo=
llowed by an</div>
<div>&gt;&gt;&gt; implementation.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; Further, I would avoid the use of words s=
uch as &quot;can&quot;.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; * The text covers only fragmentation when=
 it is induced by SFC </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; operations, it does not discuss the treat=
ment of a fragment when </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; received in an SFC domain. IMHO, the draf=
t should also specify </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; the behavior of the Classifier with regar=
ds to fragments for the </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; sake of proper SFC operation. Applying cl=
assification policies </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; may require the</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; full packet, not only a fragment.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; In particular, dedicated resources should=
 dedicated for handling </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; out of order fragments. Of course, it is =
out of scope of this </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; document to describe how SFs handle fragm=
ents.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; * If an SFC header is prepended for all f=
ragments, I'm not sure </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; there is any particular issue at the SFF =
level...except if </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; stripping/adding context TLVs depends on =
the full packet (not </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; just fragment). It is warranted to consid=
er a little bit this </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; point before declaring there</div>
<div>&gt;&gt;&gt;&gt; is</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; no issue.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; * The text states &quot;several options&q=
uot;. This may be interpreted as </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; if implementing one of them is sufficient=
...which is not true. </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; The first two points contribute to minimi=
ze the fragmentation </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; risk, but fragmentation may still be expe=
rienced (e.g., other </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; shims are prepended by other nodes for so=
me other purposes, </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; nested nsh, etc.)</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; * The first two points have nothing to do=
 with reassembly.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; * The support of jumbo frames by a router=
/device does not mean </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; that it can make use of it. Appropriate M=
TU configuration should </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; be undertaken in a consistent manner with=
in an SFC domain. The </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; text should be updated to make it is abou=
t (consistent) MTU</div>
<div>&gt;&gt;&gt; configuration.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; * BTW, shouldn't the text be reworded to =
recommended to increase </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; the MTU of **all nodes** of an SFC-enable=
d domain by at least </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; the length of SFC header &#43; transport =
header?</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; * Bullet 2, how PMTU discovery is actuall=
y used in this context? </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; Do you assume that all SFC-aware nodes wi=
ll issue such messages </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; towards other SFC-aware node, arbitrary d=
estination, else?</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; * Bullet 2, I would drop &quot;describes =
a technique for dynamically </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; discovering the maximum transmission unit=
</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; (MTU) of an arbitrary internet path&quot;=
.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; * Bullet 2, s/ the the/the.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; * The reference to the LISP specification=
 raises two concerns </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; and one comment:</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; (1) I don't think it is a good approach t=
hat fragments induced </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; by the network are passed to their ultima=
te destinations as such</div>
<div>&gt;&gt;&gt; (stateless).</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; IMO, reassembly should be done within the=
 SFC domain </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; (responsible for fragmentation) not passe=
d away. (2) Does the </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; stateful mode require all SFC data plane =
elements maintain a </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; full list of MTU for the any SFF/SF insta=
nce of the SFC</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; domain?</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; The current text suggests that [RFC6830] =
should be listed as </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; normative reference (not an informative o=
ne). I would personally </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; favor removing the reference to LISP (as =
it is an Experimental </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; RFC).</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; * The security section of the draft may b=
e augmented with </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; informational fragmentation-related point=
ers to:</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; e.g., RFC1858 (Security Considerations fo=
r IP Fragment </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; Filtering), RFC3128 (Protection Against a=
 Variant of the Tiny </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; Fragment Attack), and RFC 4963 (IPv4 Reas=
sembly Errors at High </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; Data Rates).</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; Cheers, Med</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; -----Message d'origine----- De : sfc =
</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; [<a href=3D"mailto:sfc-bounces@ietf.o=
rg">mailto:sfc-bounces@ietf.org</a>] De la part de </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; <a href=3D"mailto:mohamed.boucadair@o=
range.com">mohamed.boucadair@orange.com</a> Envoy=E9 : lundi 11 avril</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 2016 13:14 =C0 : Thomas Narten; <a hr=
ef=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> Objet : Re:</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; [sfc] WG last call for draft-ietf-sfc=
-nsh-04.txt</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Dear Thomas, all,</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; As I mentioned during the meeting, th=
ere are several issues </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; that are not covered in the last vers=
ion of the draft. I </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; already provided examples of the issu=
es offline as requested by </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Martin.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Cheers, Med</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; -----Message d'origine----- De : =
sfc </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; [<a href=3D"mailto:sfc-bounces@ie=
tf.org">mailto:sfc-bounces@ietf.org</a>] De la part de Thomas Narten </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Envoy=E9 : jeudi 31 mars 2016 04:=
48 =C0 :</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; <a href=3D"mailto:sfc@ietf.org">s=
fc@ietf.org</a> Objet : [sfc] WG last call for </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; draft-ietf-sfc-nsh-04.txt</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Dear WG:</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; This note begins a WG last call o=
n draft-ietf-sfc-nsh-04.txt </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; (<a href=3D"https://datatracker.i=
etf.org/doc/draft-ietf-sfc-nsh/">https://datatracker.ietf.org/doc/draft-iet=
f-sfc-nsh/</a>).</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>The editors of the NSH document have indicated that they have</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; addressed all known comments and =
that there are no open issues </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; with the current version of the d=
ocument.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Substantive comments to the list =
please, editorial comments </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; can go directly to the document e=
ditors.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; We'll also get a brief update fro=
m the editors at next week's </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; meeting. If there are any remaini=
ng issues with the document, </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; raising them before the meeting w=
ould be especially helpful.</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; For the chairs, Thomas</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; _________________________________=
______________ sfc mailing </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; list <a href=3D"mailto:sfc@ietf.o=
rg">sfc@ietf.org</a> <a href=3D"https://www.ietf.org/mailman/listinfo/sfc">=
https://www.ietf.org/mailman/listinfo/sfc</a></div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; _____________________________________=
__________ sfc mailing </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; list <a href=3D"mailto:sfc@ietf.org">=
sfc@ietf.org</a> <a href=3D"https://www.ietf.org/mailman/listinfo/sfc">http=
s://www.ietf.org/mailman/listinfo/sfc</a></div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; _________________________________________=
______ sfc mailing list </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.=
org</a> <a href=3D"https://www.ietf.org/mailman/listinfo/sfc">https://www.i=
etf.org/mailman/listinfo/sfc</a></div>
<div>&gt;&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; _____________________________________________=
__ sfc mailing list </div>
<div>&gt;&gt;&gt;&gt;&gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org<=
/a> <a href=3D"https://www.ietf.org/mailman/listinfo/sfc">https://www.ietf.=
org/mailman/listinfo/sfc</a></div>
<div>&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;&gt;&gt; _______________________________________________ s=
fc mailing list </div>
<div>&gt;&gt;&gt;&gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> =
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc">https://www.ietf.org/=
mailman/listinfo/sfc</a></div>
<div>&gt;&gt;&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt;</div>
<div>&gt;&gt;&gt; _______________________________________________ sfc maili=
ng list </div>
<div>&gt;&gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <a href=
=3D"https://www.ietf.org/mailman/listinfo/sfc">https://www.ietf.org/mailman=
/listinfo/sfc</a></div>
<div>&gt;&gt;</div>
<div>&gt;&gt; _______________________________________________ sfc mailing l=
ist </div>
<div>&gt;&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <a href=3D"h=
ttps://www.ietf.org/mailman/listinfo/sfc">https://www.ietf.org/mailman/list=
info/sfc</a></div>
<div>&gt;&gt;</div>
<div><font face=3D"Times New Roman">&nbsp;</font></div>
</span></font>
</body>
</html>

--_000_4A95BA014132FF49AE685FAB4B9F17F657E7CFA1dfweml501mbb_--


From nobody Tue Apr 26 12:55:28 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A13B612D57F for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 12:55:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level: 
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JpoLXlKdFKNE for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 12:55:24 -0700 (PDT)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id D3D1812D0BA for <sfc@ietf.org>; Tue, 26 Apr 2016 12:55:23 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Tue, 26 Apr 2016 15:55:22 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Ron Parker <Ron_Parker@affirmednetworks.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfOeSAX3MU5GUyUYGxYNRxnVJ+E858AgAR8AoCAEDuWAIAA6WYAgAAQOQCAAAiIAIAAcdWAgAAIhACAAAJAgIAABF8AgAGaMgCAAAZigIAABDQAgAAC24CAABdWAIAAFZWAgAAJS4D//8DWkA==
Date: Tue, 26 Apr 2016 19:55:22 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F3DA6E@wtl-exchp-2.sandvine.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <CDF2F015F4429F458815ED2A6C2B6B0B6D786B8B@MBX021-W3-CA-2.exch021.domain.local> <0f0e8705-1ca4-6df0-81c3-93db0f94a99f@joelhalpern.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D786CDD@MBX021-W3-CA-2.exch021.domain.local> <1d9ca816-42ae-333c-a316-7ec5bff8b55b@joelhalpern.com>
In-Reply-To: <1d9ca816-42ae-333c-a316-7ec5bff8b55b@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/eEKJ8JohO8ClbAqOaehKx3hMf68>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 19:55:26 -0000

Fragment reassembly is a computationally expensive process
and tunnel fragmentation can substantially inflate the number of=20
packets, so I prefer fragmenting the inner packet.
This allows SFFs and SFs to forward NSH packets without first reassembling
them.

If the inner packet is IPv6 or IPv4 with DF=3D1, Path-MTU discovery
can be facilitated by sending an ICMP "Packet too big" message to=20
the sender. (RFC 1191, RFC 1981)

There is an additional benefit that inner fragmentation/PMTU discovery
allow service chaining to work even if the transport layer does not=20
facilitate fragmentation (e.g., when NSH is transported directly over=20
Ethernet).

The fragmentation and Path MTU discovery are standard mechanisms,
and permitted to be used for any link, so nothing needs to be
said in the NSH draft to permit this. However, I think it would
be useful to recommend these approaches.

-Dave


-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
Sent: Tuesday, April 26, 2016 3:12 PM
To: Ron Parker; mohamed.boucadair@orange.com; Elzur, Uri; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

In most tunnel anlysis, a tunnel entry point (in this case, the=20
transport interface from the SFC component) can either fragment outer=20
or, if available fragment inner.  This is defined by the transport=20
technology, not the user.

In the case of SFC NSH, I would usually expect outer fragmentation,=20
which is a pure transport issue.  If the innermost packet is IP, and the=20
tunnel entry wants to be complicated, it is permitted to fragment the=20
inner packet and produce the proper NSH headers for the fragments.=20
Inherently, an implementation can only choose to do this if it can=20
construct the right metdata to put on each fragment.  I don't actually=20
know how to reliably do that, so I don't recommend it.

In either case, the NSH document can't tell the implementation what to=20
do or how to do it.

Yours,
Joel

On 4/26/16 2:38 PM, Ron Parker wrote:
> Joel,
>
> I can't say that I disagree with your analysis on the scope.   I think th=
e question raised by some on the thread is if an SFC-node (i.e., classifier=
, SF, SFF) creates fragments, is the NSH header repeated in each fragment ?=
    I think the answer is "no".   If so, is it worth stating this explicitl=
y in the document, or is it just obvious that properly layered systems woul=
d behave that way.
>
>    Ron
>
>
> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Tuesday, April 26, 2016 1:22 PM
> To: Ron Parker <Ron_Parker@affirmednetworks.com>; Joel M. Halpern <jmh@jo=
elhalpern.com>; mohamed.boucadair@orange.com; Elzur, Uri <uri.elzur@intel.c=
om>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> At least so far, we have treated the communication between classifier and=
 SFF (ingress or intermediate) as outside of the scope of our work.
> For SF <-> SFF communication we have ntoed the need for a proxy to handle=
 the case when the SF can not accept and return the NSH header, since we as=
sume that is preserved.  Other than that preservation, similar to the above=
, we have treated the details as outside of our scope. That is because they=
 depend so heavily on the implementation technique used.  (Hypervisor ,_> a=
pplication communication vs communication inside a user space or communicat=
ion over an actual Ethernet are all very different.)
>
> Trying to extend the NSH document to address these would be a major chang=
e, and would step into the issues related to transport selection, which are=
 explicitly out of scope.
>
> Yours,
> Joel
>
> On 4/26/16 11:58 AM, Ron Parker wrote:
>> Linda,
>>
>> I like the first clause (transport tunnel based fragmentation).
>>
>> Regarding the second (source based), I think there are more subcases to =
consider:
>>
>> 1.  Propagation of NSH encapsulated packet from classifier to SFF 2.
>> Propagation of NSH encapsulated packet from SFF to SF 3.  Propagation
>> of NSH encapsulated packet from SF to SFF (including possibility that
>> NSH size increased at SF) 4.  Propagation of NSH encapsulated packet
>> from SFF to SFF
>>
>> In each of the 4 cases above,  there is the possibility that MTU will be=
 exceeded and therefore there are procedures to be defined in that eventual=
ity.
>>
>> Thanks.
>>
>>     Ron
>>
>>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Linda Dunbar
>> Sent: Tuesday, April 26, 2016 11:48 AM
>> To: Joel M. Halpern <jmh@joelhalpern.com>;
>> mohamed.boucadair@orange.com; Elzur, Uri <uri.elzur@intel.com>;
>> sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Joel,
>>
>> I think the document should add the description on the following two fra=
gmentation scenarios:
>>
>> - Transport tunnel generated fragmentation:
>>   When a packet fragmentation is caused by transport tunnel (i.e. variou=
s encapsulations), the termination point of the transport tunnel is respons=
ible for re-assembling the fragmented pieces of the packet. Since there won=
't be any SFF nodes in between the Transport Tunnel, the tunnel generated f=
ragmentation does not require any actions by SFF nodes or SF nodes.
>>
>>
>> - Source node generated fragmentation (after adding on the NSH header):
>>    When fragmentation has to be performed for a packet being encapsulate=
d with the NSH header, either the intermediate SFF nodes or the SF nodes ha=
ve to be able to reassemble the fragmented pieces.
>>
>>
>>
>> Cheers,
>>
>>
>> Linda
>>
>> -----Original Message-----
>> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
>> Sent: Tuesday, April 26, 2016 10:33 AM
>> To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri;
>> sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Re-reading your note, it is possible that you are referring only to the =
case of transport generated fragmentation of the outer packet.  I had assum=
ed you were not talking about that, since the resulting fragments will not =
all have NSH headers.  As with any tunnel technology, if the tunnel chooses=
 to fragment at its layer, then the tunnel is responsible for reassembly.  =
That would be invisible to the SFF.
>>
>> Yours,
>> Joel
>>
>> On 4/26/16 11:10 AM, Linda Dunbar wrote:
>>> Agree with Med.
>>>
>>> Even if each fragment piece of a packet with NSH header carries the NSH=
 header, the intermediate SFF nodes still need to put together all the frag=
ments together before passing the whole data frame to the SF.
>>>
>>> Linda
>>>
>>> -----Original Message-----
>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>> mohamed.boucadair@orange.com
>>> Sent: Monday, April 25, 2016 9:42 AM
>>> To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org
>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> Re-,
>>>
>>> How do you instruct the transport layer to ALWAYS prepend an NSH header=
 even for fragments? Or you don't care about that?
>>>
>>> Thank you.
>>>
>>> Cheers,
>>> Med
>>>
>>>> -----Message d'origine-----
>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril
>>>> 2016 16:26 =C0 : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;
>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>> draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Hi Med
>>>>
>>>> Not to repeat my position, but I'll do it anyhow :-) As NSH is *NOT*
>>>> a transport, dealing with fragmentation is left to the Transport used.
>>>>
>>>> The model I use for NSH, is basically similar to VXLAN . It is an over=
ly.
>>>>
>>>> Thx
>>>>
>>>> Uri ("Oo-Ree")
>>>> C: 949-378-7568
>>>>
>>>>
>>>> -----Original Message-----
>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>> mohamed.boucadair@orange.com
>>>> Sent: Monday, April 25, 2016 7:18 AM
>>>> To: Joel M. Halpern <jmh@joelhalpern.com>; sfc@ietf.org
>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Hi Joel,
>>>>
>>>> Please see inline.
>>>>
>>>> Cheers,
>>>> Med
>>>>
>>>>> -----Message d'origine-----
>>>>> De : Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoy=E9 : lundi 25
>>>>> avril 2016 15:48 =C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet =
:
>>>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> If I am understanding you correctly Med, you are asking that the
>>>>> NSH draft specify how service chaining should cope with packets
>>>>> that have been fragmented?
>>>>>
>>>>
>>>> [Med] To be accurate, I'm asking to assess whether there are implicati=
ons.
>>>> If there are, then the draft should be updated accordingly.
>>>>
>>>>> NSH, and the SFF functionality, does not care.
>>>>
>>>> [Med] I'm not that sure. Some typical implications are listed below:
>>>>
>>>> * SFF: If the NSH header is present only in the a fragment but SFF
>>>> didn't maintained a state, subsequent fragments won't be appropriately=
 processed.
>>>> * SFC-aware function: if prepending a context information depends on
>>>> the full packet, not only a fragment.
>>>>
>>>>   It just does its job.
>>>>
>>>> [Med] which may be disturbed in some situations as listed in the
>>>> examples above.
>>>>
>>>>> Ingress and intermediate classifiers may cope with fragments in any
>>>>> number of ways.
>>>>   Specifying such is clearly out of scope for this draft.
>>>>
>>>> [Med] The purpose is not to specify the internal implementation
>>>> details but the external behavior of the classifier function when it
>>>> comes to handle fragments. That behavior may have an incidence on
>>>> SFF, in particular. The purpose is not to recommend the maximum
>>>> resources to be dedicated to out of order fragments nor the timeout
>>>> to cache those; these considerations are of course out of scope.
>>>> Nevertheless, an implementation should offer a configurable
>>>> parameter so that an operator tweak those according to its context.
>>>>
>>>>>   I suppose one could write an informational draft on possible ways
>>>>> of coping.  The IETF has not usually published such.
>>>>> Service functions have to cope with fragmented packets just as they
>>>>> had to before the advent of NSH, so describing that is clearly not
>>>>> needed here.
>>>>
>>>> [Med] The advent of NSH has the following implications:
>>>> * it exacerbates fragmentation. Handing over this issue to the
>>>> transport layer may lead to interoperability issues.
>>>> * the chaining may not be efficient if fragments are inappropriately
>>>> handled.
>>>>
>>>> Introducing NSH should not degrade the overall service compared to
>>>> legacy service deployment schemes.
>>>>
>>>>>
>>>>> Yours,
>>>>> Joel
>>>>>
>>>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
>>>>>> Re-,
>>>>>>
>>>>>> I hear you, but my comment is that we need, as a WG, to decide
>>>>>> what to
>>>>> put in the draft. FWIW, I'm discussing two fragmentation issues:
>>>>>>
>>>>>> (1) Fragmentation that is caused by prepending an SFC header.
>>>>>> (2) Handling fragments at the ingress of an SFC-enabled domain.
>>>>>>
>>>>>> Increasing the MTU is for sure a recommendation is to be
>>>>>> explicitly
>>>>> called out in the text (see my first message).
>>>>>>
>>>>>> There are other issues that need to be discussed, e.g., how to
>>>>>> deal with
>>>>> fragments in SFFs/Classifiers?
>>>>>>
>>>>>> It is also "prudent" to check that no issues will be experienced
>>>>>> in SFF
>>>>> to handle fragments. If an SFC header is prepended for all
>>>>> fragments, I'm not sure there
>>>>>> is any particular issue at the SFF level, except if
>>>>>> stripping/adding
>>>>> context TLVs depends on the full packet (not just fragment). It is
>>>>> warranted to consider a little bit this point before declaring
>>>>> there is no issue.
>>>>>>
>>>>>> For point (1), declaring fragmentation out of scope would be meant
>>>>>> that
>>>>> an implementation must be prepared to receive fragments with or
>>>>> without NSH header as this is a decision that is left to the
>>>>> transport encapsulation. This is a requirement per se!
>>>>>>
>>>>>> I won't reiterate all the comments I have about the current
>>>>>> wording of
>>>>> this section.
>>>>>>
>>>>>> Cheers,
>>>>>> Med
>>>>>>
>>>>>>> -----Message d'origine-----
>>>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25
>>>>>>> avril 2016 08:30 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Hi Med
>>>>>>>
>>>>>>> My point is that Fragmentation is yet another transport related
>>>>>>> issue
>>>>> that
>>>>>>> is beyond the scope of NSH and beyond the charter of the WG, so
>>>>>>> it
>>>>> doesn't
>>>>>>> really belong in the draft. We are providing an advice as
>>>>>>> extending the size of the packet may lead to fragmentation, but
>>>>>>> as you check RFC 7348 VxLAN, which my create the same issue,
>>>>>>> you'll find it doesn't even
>>>>> relate
>>>>>>> to it.
>>>>>>>
>>>>>>> Thx
>>>>>>>
>>>>>>> Uri ("Oo-Ree")
>>>>>>> C: 949-378-7568
>>>>>>>
>>>>>>>
>>>>>>> -----Original Message-----
>>>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>> mohamed.boucadair@orange.com
>>>>>>> Sent: Sunday, April 24, 2016 10:32 PM
>>>>>>> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
>>>>> <narten@us.ibm.com>;
>>>>>>> sfc@ietf.org
>>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Hi Uri,
>>>>>>>
>>>>>>> That's another option that needs to be discussed/investigated.
>>>>>>> I'm
>>>>> afraid
>>>>>>> this is not the rationale adopted in -04 since it includes some
>>>>>>> text
>>>>> that
>>>>>>> is far to be sufficient to ensure interoperable implementations.
>>>>>>>
>>>>>>> BTW, saying that nsh does not need to deal with fragmentation
>>>>>>> because
>>>>> it
>>>>>>> is transport-independent is not IMHO a good strategy to adopt
>>>>>>> here
>>>>> because
>>>>>>> it opens the door for interoperable issues, it may lead to
>>>>>>> sub-optimal implementations if the sfc information is present
>>>>>>> only in one
>>>>> fragments,
>>>>>>> etc.
>>>>>>>
>>>>>>> My comments are related to the current text in the -04. This text
>>>>>>> needs
>>>>> to
>>>>>>> be fixed somehow.
>>>>>>>
>>>>>>> Cheers,
>>>>>>> Med
>>>>>>>
>>>>>>>> -----Message d'origine-----
>>>>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche
>>>>>>>> 24 avril 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas
>>>>>>>> Narten; sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Hi Med
>>>>>>>>
>>>>>>>> I see no need to specify the exact behavior as NSH is transport
>>>>>>>> independent i.e. like NSH interaction with any other Transport
>>>>>>>> eh issue of Fragmentation is to be dealt in a way that matches
>>>>>>>> the mechanisms supported by the Transport used and do not belong
>>>>>>>> in the NSH draft
>>>>>>>>
>>>>>>>> Thx
>>>>>>>>
>>>>>>>> Uri ("Oo-Ree")
>>>>>>>> C: 949-378-7568
>>>>>>>>
>>>>>>>>
>>>>>>>> -----Original Message-----
>>>>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>>> mohamed.boucadair@orange.com
>>>>>>>> Sent: Thursday, April 14, 2016 12:43 AM
>>>>>>>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
>>>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> R-,
>>>>>>>>
>>>>>>>> In addition to other pending issues raised for this draft, I
>>>>>>>> would like to raise this additional one about Section 6.
>>>>>>>>
>>>>>>>> =3D=3D
>>>>>>>> 6.  Fragmentation Considerations
>>>>>>>>
>>>>>>>>    NSH and the associated transport header are "added" to the
>>>>>>>>    encapsulated packet/frame.  This additional information
>>>>>>>> increases
>>>>> the
>>>>>>>>    size of the packet.  In order the ensure proper forwarding of N=
SH
>>>>>>>>    data, several options for handling fragmentation and re-assembl=
y
>>>>>>>>    exist:
>>>>>>>>
>>>>>>>>    1.  Jumbo Frames, when supported, enable the transport of NSH a=
nd
>>>>>>>>        associated transport packets without requiring fragmentatio=
n.
>>>>>>>>
>>>>>>>>    2.  Path MTU Discovery [RFC1191]"describes a technique for
>>>>>>>>        dynamically discovering the maximum transmission unit
>>>>>>>> (MTU) of
>>>>> an
>>>>>>>>        arbitrary internet path" and can be utilized to ensure
>>>>>>>> the
>>>> the
>>>>>>>>        required packet size is used.
>>>>>>>>
>>>>>>>>    3.  [RFC6830] describes two schemes for fragmentation and re-
>>>>> assembly
>>>>>>>>        in section 5.4.
>>>>>>>> =3D=3D
>>>>>>>>
>>>>>>>> * The text is weak for a Standard track document that is
>>>>>>>> intended to solve the problem in
>>>>>>>> https://tools.ietf.org/html/rfc7498#section-
>>>> 2.12.
>>>>>>>> There should be a clear behavior to be followed by an
>>>> implementation.
>>>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>>>
>>>>>>>> * The text covers only fragmentation when it is induced by SFC
>>>>>>>> operations, it does not discuss the treatment of a fragment when
>>>>>>>> received in an SFC domain. IMHO, the draft should also specify
>>>>>>>> the behavior of the Classifier with regards to fragments for the
>>>>>>>> sake of proper SFC operation. Applying classification policies
>>>>>>>> may require the
>>>>>>> full packet, not only a fragment.
>>>>>>>> In particular, dedicated resources should dedicated for handling
>>>>>>>> out of order fragments. Of course, it is out of scope of this
>>>>>>>> document to describe how SFs handle fragments.
>>>>>>>>
>>>>>>>> * If an SFC header is prepended for all fragments, I'm not sure
>>>>>>>> there is any particular issue at the SFF level...except if
>>>>>>>> stripping/adding context TLVs depends on the full packet (not
>>>>>>>> just fragment). It is warranted to consider a little bit this
>>>>>>>> point before declaring there
>>>>> is
>>>>>>> no issue.
>>>>>>>>
>>>>>>>> * The text states "several options". This may be interpreted as
>>>>>>>> if implementing one of them is sufficient...which is not true.
>>>>>>>> The first two points contribute to minimize the fragmentation
>>>>>>>> risk, but fragmentation may still be experienced (e.g., other
>>>>>>>> shims are prepended by other nodes for some other purposes,
>>>>>>>> nested nsh,
>>>>>>>> etc.)
>>>>>>>>
>>>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>>>
>>>>>>>> * The support of jumbo frames by a router/device does not mean
>>>>>>>> that it can make use of it. Appropriate MTU configuration should
>>>>>>>> be undertaken in a consistent manner within an SFC domain. The
>>>>>>>> text should be updated to make it is about (consistent) MTU
>>>> configuration.
>>>>>>>>
>>>>>>>> * BTW, shouldn't the text be reworded to recommended to increase
>>>>>>>> the MTU of **all nodes** of an SFC-enabled domain by at least
>>>>>>>> the length of SFC header + transport header?
>>>>>>>>
>>>>>>>> * Bullet 2, how PMTU discovery is actually used in this context?
>>>>>>>> Do you assume that all SFC-aware nodes will issue such messages
>>>>>>>> towards other SFC-aware node, arbitrary destination, else?
>>>>>>>>
>>>>>>>> * Bullet 2, I would drop "describes a technique for dynamically
>>>>>>>> discovering the maximum transmission unit (MTU) of an arbitrary
>>>>>>>> internet path".
>>>>>>>>
>>>>>>>> * Bullet 2, s/ the the/the.
>>>>>>>>
>>>>>>>> * The reference to the LISP specification raises two concerns
>>>>>>>> and one
>>>>>>>> comment:
>>>>>>>>
>>>>>>>> (1) I don't think it is a good approach that fragments induced
>>>>>>>> by the network are passed to their ultimate destinations as such
>>>> (stateless).
>>>>>>>> IMO, reassembly should be done within the SFC domain
>>>>>>>> (responsible for
>>>>>>>> fragmentation) not passed away.
>>>>>>>> (2) Does the stateful mode require all SFC data plane elements
>>>>>>>> maintain a full list of MTU for the any SFF/SF instance of the
>>>>>>>> SFC
>>>>>>> domain?
>>>>>>>>
>>>>>>>> The current text suggests that [RFC6830] should be listed as
>>>>>>>> normative reference (not an informative one). I would personally
>>>>>>>> favor removing the reference to LISP (as it is an Experimental RFC=
).
>>>>>>>>
>>>>>>>> * The security section of the draft may be augmented with
>>>>>>>> informational fragmentation-related pointers to: e.g., RFC1858
>>>>>>>> (Security Considerations for IP Fragment Filtering), RFC3128
>>>>>>>> (Protection Against a Variant of the Tiny Fragment Attack), and
>>>>>>>> RFC
>>>>>>>> 4963 (IPv4 Reassembly Errors at High Data Rates).
>>>>>>>>
>>>>>>>> Cheers,
>>>>>>>> Med
>>>>>>>>
>>>>>>>>> -----Message d'origine-----
>>>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de
>>>>>>>>> mohamed.boucadair@orange.com Envoy=E9 : lundi 11 avril 2016 13:14=
 =C0 :
>>>>>>>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG last call for
>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> Dear Thomas, all,
>>>>>>>>>
>>>>>>>>> As I mentioned during the meeting, there are several issues
>>>>>>>>> that are not covered in the last version of the draft. I
>>>>>>>>> already provided examples of the issues offline as requested by M=
artin.
>>>>>>>>>
>>>>>>>>> Cheers,
>>>>>>>>> Med
>>>>>>>>>
>>>>>>>>>> -----Message d'origine-----
>>>>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas
>>>>>>>>>> Narten Envoy=E9 : jeudi 31 mars 2016 04:48 =C0 : sfc@ietf.org
>>>>>>>>>> Objet
>>>>>>>>>> : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>
>>>>>>>>>> Dear WG:
>>>>>>>>>>
>>>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>>>
>>>>>>>>>> The editors of the NSH document have indicated that they have
>>>>>>>>>> addressed all known comments and that there are no open issues
>>>>>>>>>> with the current version of the document.
>>>>>>>>>>
>>>>>>>>>> Substantive comments to the list please, editorial comments
>>>>>>>>>> can go directly to the document editors.
>>>>>>>>>>
>>>>>>>>>> We'll also get a brief update from the editors at next week's
>>>>>>>>>> meeting. If there are any remaining issues with the document,
>>>>>>>>>> raising them before the meeting would be especially helpful.
>>>>>>>>>>
>>>>>>>>>> For the chairs,
>>>>>>>>>> Thomas
>>>>>>>>>>
>>>>>>>>>> _______________________________________________
>>>>>>>>>> sfc mailing list
>>>>>>>>>> sfc@ietf.org
>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>
>>>>>>>>> _______________________________________________
>>>>>>>>> sfc mailing list
>>>>>>>>> sfc@ietf.org
>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> sfc mailing list
>>>>>>>> sfc@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> sfc mailing list
>>>>>>> sfc@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>>> _______________________________________________
>>>>>> sfc mailing list
>>>>>> sfc@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Apr 26 13:03:26 2016
Return-Path: <jmh.direct@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC0CB12B038 for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 13:03:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level: 
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QoR88w0kjWfC for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 13:03:20 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE9A512B015 for <sfc@ietf.org>; Tue, 26 Apr 2016 13:03:20 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 904462662AA; Tue, 26 Apr 2016 13:03:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461701000; bh=CGBq6lStTWOJP3YFViKLM9rdb2clnT7Wv6o8PNXULt0=; h=Date:Subject:From:To:From; b=P6hqhWRgjM6GU9oYFtZi5QgK4YBrqSmmIocoEIkhif7v736CltkyPQc2CiDFWABDn A3UqXSYZM/P6EFf5ilwPMluLLOtn8L0gV3UIUwOdfQYoJI+mZK1vsJhB4x08y1uiGP btT0URjotU8QRbCqCpKisnQ1ZrHK0iq12XqiCIyI=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from [10.239.34.68] (mobile-166-171-058-125.mycingular.net [166.171.58.125]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 22731259F28; Tue, 26 Apr 2016 13:03:19 -0700 (PDT)
Date: Tue, 26 Apr 2016 16:03:16 -0400
Message-ID: <u46olfbiwol0u8n11pdb5mpg.1461700996836@email.android.com>
Importance: normal
From: "jmh.direct" <jmh.direct@joelhalpern.com>
To: Dave Dolson <ddolson@sandvine.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Ron Parker <Ron_Parker@affirmednetworks.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="--_com.samsung.android.email_3503018393531020"
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/CLwfGxUKHSa_gT1RdhKk_7qFKcE>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 20:03:25 -0000

----_com.samsung.android.email_3503018393531020
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: base64

RG9pbmcgcGF0aCBNVFUgZGlzY292ZXJ5IGluc3RlYWQgb2YgZnJhZ21lbnRhdGlvbiBpcyBhIHZl
cnkgcmVhc29uYWJsZSBzdHJhdGVneSwgcGFydGljdWxhcmx5IGluIHN1cHBvcnRpbmcgSVB2Ni4K
VGhlIHBvaW50IGlzIHRoYXQgdGhlcmUgYXJlIG11bHRpcGxlIHJlYXNvbmFibGUgcmVzcG9uc2Vz
LCBkZXBlbmRpbmcgdXBvbiB0aGUgdHJhbnNwb3J0IGFuZCBvdGhlciBmYWN0b3JzLiDCoEl0IGlz
IG5vdCBmb3IgTlNIIHRvIG1hbmRhdGUgb25lLgpZb3VycyxKb2VsCgoKU2VudCB2aWEgdGhlIFNh
bXN1bmcgR2FsYXh5IFPCriA2LCBhbiBBVCZUIDRHIExURSBzbWFydHBob25lLS0tLS0tLS0gT3Jp
Z2luYWwgbWVzc2FnZSAtLS0tLS0tLUZyb206IERhdmUgRG9sc29uIDxkZG9sc29uQHNhbmR2aW5l
LmNvbT4gRGF0ZTogNC8yNi8yMDE2ICAzOjU1IFBNICAoR01ULTA1OjAwKSBUbzogIkpvZWwgTS4g
SGFscGVybiIgPGptaEBqb2VsaGFscGVybi5jb20+LCBSb24gUGFya2VyIDxSb25fUGFya2VyQGFm
ZmlybWVkbmV0d29ya3MuY29tPiwgbW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbSwgIkVsenVy
LCBVcmkiIDx1cmkuZWx6dXJAaW50ZWwuY29tPiwgc2ZjQGlldGYub3JnIFN1YmplY3Q6IFJlOiBb
c2ZjXSBXRyBsYXN0IGNhbGwgZm9yIGRyYWZ0LWlldGYtc2ZjLW5zaC0wNC50eHQgCkZyYWdtZW50
IHJlYXNzZW1ibHkgaXMgYSBjb21wdXRhdGlvbmFsbHkgZXhwZW5zaXZlIHByb2Nlc3MKYW5kIHR1
bm5lbCBmcmFnbWVudGF0aW9uIGNhbiBzdWJzdGFudGlhbGx5IGluZmxhdGUgdGhlIG51bWJlciBv
ZiAKcGFja2V0cywgc28gSSBwcmVmZXIgZnJhZ21lbnRpbmcgdGhlIGlubmVyIHBhY2tldC4KVGhp
cyBhbGxvd3MgU0ZGcyBhbmQgU0ZzIHRvIGZvcndhcmQgTlNIIHBhY2tldHMgd2l0aG91dCBmaXJz
dCByZWFzc2VtYmxpbmcKdGhlbS4KCklmIHRoZSBpbm5lciBwYWNrZXQgaXMgSVB2NiBvciBJUHY0
IHdpdGggREY9MSwgUGF0aC1NVFUgZGlzY292ZXJ5CmNhbiBiZSBmYWNpbGl0YXRlZCBieSBzZW5k
aW5nIGFuIElDTVAgIlBhY2tldCB0b28gYmlnIiBtZXNzYWdlIHRvIAp0aGUgc2VuZGVyLiAoUkZD
IDExOTEsIFJGQyAxOTgxKQoKVGhlcmUgaXMgYW4gYWRkaXRpb25hbCBiZW5lZml0IHRoYXQgaW5u
ZXIgZnJhZ21lbnRhdGlvbi9QTVRVIGRpc2NvdmVyeQphbGxvdyBzZXJ2aWNlIGNoYWluaW5nIHRv
IHdvcmsgZXZlbiBpZiB0aGUgdHJhbnNwb3J0IGxheWVyIGRvZXMgbm90IApmYWNpbGl0YXRlIGZy
YWdtZW50YXRpb24gKGUuZy4sIHdoZW4gTlNIIGlzIHRyYW5zcG9ydGVkIGRpcmVjdGx5IG92ZXIg
CkV0aGVybmV0KS4KClRoZSBmcmFnbWVudGF0aW9uIGFuZCBQYXRoIE1UVSBkaXNjb3ZlcnkgYXJl
IHN0YW5kYXJkIG1lY2hhbmlzbXMsCmFuZCBwZXJtaXR0ZWQgdG8gYmUgdXNlZCBmb3IgYW55IGxp
bmssIHNvIG5vdGhpbmcgbmVlZHMgdG8gYmUKc2FpZCBpbiB0aGUgTlNIIGRyYWZ0IHRvIHBlcm1p
dCB0aGlzLiBIb3dldmVyLCBJIHRoaW5rIGl0IHdvdWxkCmJlIHVzZWZ1bCB0byByZWNvbW1lbmQg
dGhlc2UgYXBwcm9hY2hlcy4KCi1EYXZlCgoKLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0KRnJv
bTogc2ZjIFttYWlsdG86c2ZjLWJvdW5jZXNAaWV0Zi5vcmddIE9uIEJlaGFsZiBPZiBKb2VsIE0u
IEhhbHBlcm4KU2VudDogVHVlc2RheSwgQXByaWwgMjYsIDIwMTYgMzoxMiBQTQpUbzogUm9uIFBh
cmtlcjsgbW9oYW1lZC5ib3VjYWRhaXJAb3JhbmdlLmNvbTsgRWx6dXIsIFVyaTsgc2ZjQGlldGYu
b3JnClN1YmplY3Q6IFJlOiBbc2ZjXSBXRyBsYXN0IGNhbGwgZm9yIGRyYWZ0LWlldGYtc2ZjLW5z
aC0wNC50eHQKCkluIG1vc3QgdHVubmVsIGFubHlzaXMsIGEgdHVubmVsIGVudHJ5IHBvaW50IChp
biB0aGlzIGNhc2UsIHRoZSAKdHJhbnNwb3J0IGludGVyZmFjZSBmcm9tIHRoZSBTRkMgY29tcG9u
ZW50KSBjYW4gZWl0aGVyIGZyYWdtZW50IG91dGVyIApvciwgaWYgYXZhaWxhYmxlIGZyYWdtZW50
IGlubmVyLsKgIFRoaXMgaXMgZGVmaW5lZCBieSB0aGUgdHJhbnNwb3J0IAp0ZWNobm9sb2d5LCBu
b3QgdGhlIHVzZXIuCgpJbiB0aGUgY2FzZSBvZiBTRkMgTlNILCBJIHdvdWxkIHVzdWFsbHkgZXhw
ZWN0IG91dGVyIGZyYWdtZW50YXRpb24sIAp3aGljaCBpcyBhIHB1cmUgdHJhbnNwb3J0IGlzc3Vl
LsKgIElmIHRoZSBpbm5lcm1vc3QgcGFja2V0IGlzIElQLCBhbmQgdGhlIAp0dW5uZWwgZW50cnkg
d2FudHMgdG8gYmUgY29tcGxpY2F0ZWQsIGl0IGlzIHBlcm1pdHRlZCB0byBmcmFnbWVudCB0aGUg
CmlubmVyIHBhY2tldCBhbmQgcHJvZHVjZSB0aGUgcHJvcGVyIE5TSCBoZWFkZXJzIGZvciB0aGUg
ZnJhZ21lbnRzLiAKSW5oZXJlbnRseSwgYW4gaW1wbGVtZW50YXRpb24gY2FuIG9ubHkgY2hvb3Nl
IHRvIGRvIHRoaXMgaWYgaXQgY2FuIApjb25zdHJ1Y3QgdGhlIHJpZ2h0IG1ldGRhdGEgdG8gcHV0
IG9uIGVhY2ggZnJhZ21lbnQuwqAgSSBkb24ndCBhY3R1YWxseSAKa25vdyBob3cgdG8gcmVsaWFi
bHkgZG8gdGhhdCwgc28gSSBkb24ndCByZWNvbW1lbmQgaXQuCgpJbiBlaXRoZXIgY2FzZSwgdGhl
IE5TSCBkb2N1bWVudCBjYW4ndCB0ZWxsIHRoZSBpbXBsZW1lbnRhdGlvbiB3aGF0IHRvIApkbyBv
ciBob3cgdG8gZG8gaXQuCgpZb3VycywKSm9lbAoKT24gNC8yNi8xNiAyOjM4IFBNLCBSb24gUGFy
a2VyIHdyb3RlOgo+IEpvZWwsCj4KPiBJIGNhbid0IHNheSB0aGF0IEkgZGlzYWdyZWUgd2l0aCB5
b3VyIGFuYWx5c2lzIG9uIHRoZSBzY29wZS7CoMKgIEkgdGhpbmsgdGhlIHF1ZXN0aW9uIHJhaXNl
ZCBieSBzb21lIG9uIHRoZSB0aHJlYWQgaXMgaWYgYW4gU0ZDLW5vZGUgKGkuZS4sIGNsYXNzaWZp
ZXIsIFNGLCBTRkYpIGNyZWF0ZXMgZnJhZ21lbnRzLCBpcyB0aGUgTlNIIGhlYWRlciByZXBlYXRl
ZCBpbiBlYWNoIGZyYWdtZW50ID/CoMKgwqAgSSB0aGluayB0aGUgYW5zd2VyIGlzICJubyIuwqDC
oCBJZiBzbywgaXMgaXQgd29ydGggc3RhdGluZyB0aGlzIGV4cGxpY2l0bHkgaW4gdGhlIGRvY3Vt
ZW50LCBvciBpcyBpdCBqdXN0IG9idmlvdXMgdGhhdCBwcm9wZXJseSBsYXllcmVkIHN5c3RlbXMg
d291bGQgYmVoYXZlIHRoYXQgd2F5Lgo+Cj7CoMKgwqAgUm9uCj4KPgo+IC0tLS0tT3JpZ2luYWwg
TWVzc2FnZS0tLS0tCj4gRnJvbTogSm9lbCBNLiBIYWxwZXJuIFttYWlsdG86am1oQGpvZWxoYWxw
ZXJuLmNvbV0KPiBTZW50OiBUdWVzZGF5LCBBcHJpbCAyNiwgMjAxNiAxOjIyIFBNCj4gVG86IFJv
biBQYXJrZXIgPFJvbl9QYXJrZXJAYWZmaXJtZWRuZXR3b3Jrcy5jb20+OyBKb2VsIE0uIEhhbHBl
cm4gPGptaEBqb2VsaGFscGVybi5jb20+OyBtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tOyBF
bHp1ciwgVXJpIDx1cmkuZWx6dXJAaW50ZWwuY29tPjsgc2ZjQGlldGYub3JnCj4gU3ViamVjdDog
UmU6IFtzZmNdIFdHIGxhc3QgY2FsbCBmb3IgZHJhZnQtaWV0Zi1zZmMtbnNoLTA0LnR4dAo+Cj4g
QXQgbGVhc3Qgc28gZmFyLCB3ZSBoYXZlIHRyZWF0ZWQgdGhlIGNvbW11bmljYXRpb24gYmV0d2Vl
biBjbGFzc2lmaWVyIGFuZCBTRkYgKGluZ3Jlc3Mgb3IgaW50ZXJtZWRpYXRlKSBhcyBvdXRzaWRl
IG9mIHRoZSBzY29wZSBvZiBvdXIgd29yay4KPiBGb3IgU0YgPC0+IFNGRiBjb21tdW5pY2F0aW9u
IHdlIGhhdmUgbnRvZWQgdGhlIG5lZWQgZm9yIGEgcHJveHkgdG8gaGFuZGxlIHRoZSBjYXNlIHdo
ZW4gdGhlIFNGIGNhbiBub3QgYWNjZXB0IGFuZCByZXR1cm4gdGhlIE5TSCBoZWFkZXIsIHNpbmNl
IHdlIGFzc3VtZSB0aGF0IGlzIHByZXNlcnZlZC7CoCBPdGhlciB0aGFuIHRoYXQgcHJlc2VydmF0
aW9uLCBzaW1pbGFyIHRvIHRoZSBhYm92ZSwgd2UgaGF2ZSB0cmVhdGVkIHRoZSBkZXRhaWxzIGFz
IG91dHNpZGUgb2Ygb3VyIHNjb3BlLiBUaGF0IGlzIGJlY2F1c2UgdGhleSBkZXBlbmQgc28gaGVh
dmlseSBvbiB0aGUgaW1wbGVtZW50YXRpb24gdGVjaG5pcXVlIHVzZWQuwqAgKEh5cGVydmlzb3Ig
LF8+IGFwcGxpY2F0aW9uIGNvbW11bmljYXRpb24gdnMgY29tbXVuaWNhdGlvbiBpbnNpZGUgYSB1
c2VyIHNwYWNlIG9yIGNvbW11bmljYXRpb24gb3ZlciBhbiBhY3R1YWwgRXRoZXJuZXQgYXJlIGFs
bCB2ZXJ5IGRpZmZlcmVudC4pCj4KPiBUcnlpbmcgdG8gZXh0ZW5kIHRoZSBOU0ggZG9jdW1lbnQg
dG8gYWRkcmVzcyB0aGVzZSB3b3VsZCBiZSBhIG1ham9yIGNoYW5nZSwgYW5kIHdvdWxkIHN0ZXAg
aW50byB0aGUgaXNzdWVzIHJlbGF0ZWQgdG8gdHJhbnNwb3J0IHNlbGVjdGlvbiwgd2hpY2ggYXJl
IGV4cGxpY2l0bHkgb3V0IG9mIHNjb3BlLgo+Cj4gWW91cnMsCj4gSm9lbAo+Cj4gT24gNC8yNi8x
NiAxMTo1OCBBTSwgUm9uIFBhcmtlciB3cm90ZToKPj4gTGluZGEsCj4+Cj4+IEkgbGlrZSB0aGUg
Zmlyc3QgY2xhdXNlICh0cmFuc3BvcnQgdHVubmVsIGJhc2VkIGZyYWdtZW50YXRpb24pLgo+Pgo+
PiBSZWdhcmRpbmcgdGhlIHNlY29uZCAoc291cmNlIGJhc2VkKSwgSSB0aGluayB0aGVyZSBhcmUg
bW9yZSBzdWJjYXNlcyB0byBjb25zaWRlcjoKPj4KPj4gMS7CoCBQcm9wYWdhdGlvbiBvZiBOU0gg
ZW5jYXBzdWxhdGVkIHBhY2tldCBmcm9tIGNsYXNzaWZpZXIgdG8gU0ZGIDIuCj4+IFByb3BhZ2F0
aW9uIG9mIE5TSCBlbmNhcHN1bGF0ZWQgcGFja2V0IGZyb20gU0ZGIHRvIFNGIDMuwqAgUHJvcGFn
YXRpb24KPj4gb2YgTlNIIGVuY2Fwc3VsYXRlZCBwYWNrZXQgZnJvbSBTRiB0byBTRkYgKGluY2x1
ZGluZyBwb3NzaWJpbGl0eSB0aGF0Cj4+IE5TSCBzaXplIGluY3JlYXNlZCBhdCBTRikgNC7CoCBQ
cm9wYWdhdGlvbiBvZiBOU0ggZW5jYXBzdWxhdGVkIHBhY2tldAo+PiBmcm9tIFNGRiB0byBTRkYK
Pj4KPj4gSW4gZWFjaCBvZiB0aGUgNCBjYXNlcyBhYm92ZSzCoCB0aGVyZSBpcyB0aGUgcG9zc2li
aWxpdHkgdGhhdCBNVFUgd2lsbCBiZSBleGNlZWRlZCBhbmQgdGhlcmVmb3JlIHRoZXJlIGFyZSBw
cm9jZWR1cmVzIHRvIGJlIGRlZmluZWQgaW4gdGhhdCBldmVudHVhbGl0eS4KPj4KPj4gVGhhbmtz
Lgo+Pgo+PsKgwqDCoMKgIFJvbgo+Pgo+Pgo+PiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQo+
PiBGcm9tOiBzZmMgW21haWx0bzpzZmMtYm91bmNlc0BpZXRmLm9yZ10gT24gQmVoYWxmIE9mIExp
bmRhIER1bmJhcgo+PiBTZW50OiBUdWVzZGF5LCBBcHJpbCAyNiwgMjAxNiAxMTo0OCBBTQo+PiBU
bzogSm9lbCBNLiBIYWxwZXJuIDxqbWhAam9lbGhhbHBlcm4uY29tPjsKPj4gbW9oYW1lZC5ib3Vj
YWRhaXJAb3JhbmdlLmNvbTsgRWx6dXIsIFVyaSA8dXJpLmVsenVyQGludGVsLmNvbT47Cj4+IHNm
Y0BpZXRmLm9yZwo+PiBTdWJqZWN0OiBSZTogW3NmY10gV0cgbGFzdCBjYWxsIGZvciBkcmFmdC1p
ZXRmLXNmYy1uc2gtMDQudHh0Cj4+Cj4+IEpvZWwsCj4+Cj4+IEkgdGhpbmsgdGhlIGRvY3VtZW50
IHNob3VsZCBhZGQgdGhlIGRlc2NyaXB0aW9uIG9uIHRoZSBmb2xsb3dpbmcgdHdvIGZyYWdtZW50
YXRpb24gc2NlbmFyaW9zOgo+Pgo+PiAtIFRyYW5zcG9ydCB0dW5uZWwgZ2VuZXJhdGVkIGZyYWdt
ZW50YXRpb246Cj4+wqDCoCBXaGVuIGEgcGFja2V0IGZyYWdtZW50YXRpb24gaXMgY2F1c2VkIGJ5
IHRyYW5zcG9ydCB0dW5uZWwgKGkuZS4gdmFyaW91cyBlbmNhcHN1bGF0aW9ucyksIHRoZSB0ZXJt
aW5hdGlvbiBwb2ludCBvZiB0aGUgdHJhbnNwb3J0IHR1bm5lbCBpcyByZXNwb25zaWJsZSBmb3Ig
cmUtYXNzZW1ibGluZyB0aGUgZnJhZ21lbnRlZCBwaWVjZXMgb2YgdGhlIHBhY2tldC4gU2luY2Ug
dGhlcmUgd29uJ3QgYmUgYW55IFNGRiBub2RlcyBpbiBiZXR3ZWVuIHRoZSBUcmFuc3BvcnQgVHVu
bmVsLCB0aGUgdHVubmVsIGdlbmVyYXRlZCBmcmFnbWVudGF0aW9uIGRvZXMgbm90IHJlcXVpcmUg
YW55IGFjdGlvbnMgYnkgU0ZGIG5vZGVzIG9yIFNGIG5vZGVzLgo+Pgo+Pgo+PiAtIFNvdXJjZSBu
b2RlIGdlbmVyYXRlZCBmcmFnbWVudGF0aW9uIChhZnRlciBhZGRpbmcgb24gdGhlIE5TSCBoZWFk
ZXIpOgo+PsKgwqDCoCBXaGVuIGZyYWdtZW50YXRpb24gaGFzIHRvIGJlIHBlcmZvcm1lZCBmb3Ig
YSBwYWNrZXQgYmVpbmcgZW5jYXBzdWxhdGVkIHdpdGggdGhlIE5TSCBoZWFkZXIsIGVpdGhlciB0
aGUgaW50ZXJtZWRpYXRlIFNGRiBub2RlcyBvciB0aGUgU0Ygbm9kZXMgaGF2ZSB0byBiZSBhYmxl
IHRvIHJlYXNzZW1ibGUgdGhlIGZyYWdtZW50ZWQgcGllY2VzLgo+Pgo+Pgo+Pgo+PiBDaGVlcnMs
Cj4+Cj4+Cj4+IExpbmRhCj4+Cj4+IC0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tCj4+IEZyb206
IEpvZWwgTS4gSGFscGVybiBbbWFpbHRvOmptaEBqb2VsaGFscGVybi5jb21dCj4+IFNlbnQ6IFR1
ZXNkYXksIEFwcmlsIDI2LCAyMDE2IDEwOjMzIEFNCj4+IFRvOiBMaW5kYSBEdW5iYXI7IG1vaGFt
ZWQuYm91Y2FkYWlyQG9yYW5nZS5jb207IEVsenVyLCBVcmk7Cj4+IHNmY0BpZXRmLm9yZwo+PiBT
dWJqZWN0OiBSZTogW3NmY10gV0cgbGFzdCBjYWxsIGZvciBkcmFmdC1pZXRmLXNmYy1uc2gtMDQu
dHh0Cj4+Cj4+IFJlLXJlYWRpbmcgeW91ciBub3RlLCBpdCBpcyBwb3NzaWJsZSB0aGF0IHlvdSBh
cmUgcmVmZXJyaW5nIG9ubHkgdG8gdGhlIGNhc2Ugb2YgdHJhbnNwb3J0IGdlbmVyYXRlZCBmcmFn
bWVudGF0aW9uIG9mIHRoZSBvdXRlciBwYWNrZXQuwqAgSSBoYWQgYXNzdW1lZCB5b3Ugd2VyZSBu
b3QgdGFsa2luZyBhYm91dCB0aGF0LCBzaW5jZSB0aGUgcmVzdWx0aW5nIGZyYWdtZW50cyB3aWxs
IG5vdCBhbGwgaGF2ZSBOU0ggaGVhZGVycy7CoCBBcyB3aXRoIGFueSB0dW5uZWwgdGVjaG5vbG9n
eSwgaWYgdGhlIHR1bm5lbCBjaG9vc2VzIHRvIGZyYWdtZW50IGF0IGl0cyBsYXllciwgdGhlbiB0
aGUgdHVubmVsIGlzIHJlc3BvbnNpYmxlIGZvciByZWFzc2VtYmx5LsKgIFRoYXQgd291bGQgYmUg
aW52aXNpYmxlIHRvIHRoZSBTRkYuCj4+Cj4+IFlvdXJzLAo+PiBKb2VsCj4+Cj4+IE9uIDQvMjYv
MTYgMTE6MTAgQU0sIExpbmRhIER1bmJhciB3cm90ZToKPj4+IEFncmVlIHdpdGggTWVkLgo+Pj4K
Pj4+IEV2ZW4gaWYgZWFjaCBmcmFnbWVudCBwaWVjZSBvZiBhIHBhY2tldCB3aXRoIE5TSCBoZWFk
ZXIgY2FycmllcyB0aGUgTlNIIGhlYWRlciwgdGhlIGludGVybWVkaWF0ZSBTRkYgbm9kZXMgc3Rp
bGwgbmVlZCB0byBwdXQgdG9nZXRoZXIgYWxsIHRoZSBmcmFnbWVudHMgdG9nZXRoZXIgYmVmb3Jl
IHBhc3NpbmcgdGhlIHdob2xlIGRhdGEgZnJhbWUgdG8gdGhlIFNGLgo+Pj4KPj4+IExpbmRhCj4+
Pgo+Pj4gLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0KPj4+IEZyb206IHNmYyBbbWFpbHRvOnNm
Yy1ib3VuY2VzQGlldGYub3JnXSBPbiBCZWhhbGYgT2YKPj4+IG1vaGFtZWQuYm91Y2FkYWlyQG9y
YW5nZS5jb20KPj4+IFNlbnQ6IE1vbmRheSwgQXByaWwgMjUsIDIwMTYgOTo0MiBBTQo+Pj4gVG86
IEVsenVyLCBVcmk7IEpvZWwgTS4gSGFscGVybjsgc2ZjQGlldGYub3JnCj4+PiBTdWJqZWN0OiBS
ZTogW3NmY10gV0cgbGFzdCBjYWxsIGZvciBkcmFmdC1pZXRmLXNmYy1uc2gtMDQudHh0Cj4+Pgo+
Pj4gUmUtLAo+Pj4KPj4+IEhvdyBkbyB5b3UgaW5zdHJ1Y3QgdGhlIHRyYW5zcG9ydCBsYXllciB0
byBBTFdBWVMgcHJlcGVuZCBhbiBOU0ggaGVhZGVyIGV2ZW4gZm9yIGZyYWdtZW50cz8gT3IgeW91
IGRvbid0IGNhcmUgYWJvdXQgdGhhdD8KPj4+Cj4+PiBUaGFuayB5b3UuCj4+Pgo+Pj4gQ2hlZXJz
LAo+Pj4gTWVkCj4+Pgo+Pj4+IC0tLS0tTWVzc2FnZSBkJ29yaWdpbmUtLS0tLQo+Pj4+IERlIDog
RWx6dXIsIFVyaSBbbWFpbHRvOnVyaS5lbHp1ckBpbnRlbC5jb21dIEVudm95w6kgOiBsdW5kaSAy
NSBhdnJpbAo+Pj4+IDIwMTYgMTY6MjYgw4AgOiBCT1VDQURBSVIgTW9oYW1lZCBJTVQvT0xOOyBK
b2VsIE0uIEhhbHBlcm47Cj4+Pj4gc2ZjQGlldGYub3JnIE9iamV0IDogUkU6IFtzZmNdIFdHIGxh
c3QgY2FsbCBmb3IKPj4+PiBkcmFmdC1pZXRmLXNmYy1uc2gtMDQudHh0Cj4+Pj4KPj4+PiBIaSBN
ZWQKPj4+Pgo+Pj4+IE5vdCB0byByZXBlYXQgbXkgcG9zaXRpb24sIGJ1dCBJJ2xsIGRvIGl0IGFu
eWhvdyA6LSkgQXMgTlNIIGlzICpOT1QqCj4+Pj4gYSB0cmFuc3BvcnQsIGRlYWxpbmcgd2l0aCBm
cmFnbWVudGF0aW9uIGlzIGxlZnQgdG8gdGhlIFRyYW5zcG9ydCB1c2VkLgo+Pj4+Cj4+Pj4gVGhl
IG1vZGVsIEkgdXNlIGZvciBOU0gsIGlzIGJhc2ljYWxseSBzaW1pbGFyIHRvIFZYTEFOIC4gSXQg
aXMgYW4gb3Zlcmx5Lgo+Pj4+Cj4+Pj4gVGh4Cj4+Pj4KPj4+PiBVcmkgKCJPby1SZWUiKQo+Pj4+
IEM6IDk0OS0zNzgtNzU2OAo+Pj4+Cj4+Pj4KPj4+PiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0t
LQo+Pj4+IEZyb206IHNmYyBbbWFpbHRvOnNmYy1ib3VuY2VzQGlldGYub3JnXSBPbiBCZWhhbGYg
T2YKPj4+PiBtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tCj4+Pj4gU2VudDogTW9uZGF5LCBB
cHJpbCAyNSwgMjAxNiA3OjE4IEFNCj4+Pj4gVG86IEpvZWwgTS4gSGFscGVybiA8am1oQGpvZWxo
YWxwZXJuLmNvbT47IHNmY0BpZXRmLm9yZwo+Pj4+IFN1YmplY3Q6IFJlOiBbc2ZjXSBXRyBsYXN0
IGNhbGwgZm9yIGRyYWZ0LWlldGYtc2ZjLW5zaC0wNC50eHQKPj4+Pgo+Pj4+IEhpIEpvZWwsCj4+
Pj4KPj4+PiBQbGVhc2Ugc2VlIGlubGluZS4KPj4+Pgo+Pj4+IENoZWVycywKPj4+PiBNZWQKPj4+
Pgo+Pj4+PiAtLS0tLU1lc3NhZ2UgZCdvcmlnaW5lLS0tLS0KPj4+Pj4gRGUgOiBKb2VsIE0uIEhh
bHBlcm4gW21haWx0bzpqbWhAam9lbGhhbHBlcm4uY29tXSBFbnZvecOpIDogbHVuZGkgMjUKPj4+
Pj4gYXZyaWwgMjAxNiAxNTo0OCDDgCA6IEJPVUNBREFJUiBNb2hhbWVkIElNVC9PTE47IHNmY0Bp
ZXRmLm9yZyBPYmpldCA6Cj4+Pj4+IFJlOiBbc2ZjXSBXRyBsYXN0IGNhbGwgZm9yIGRyYWZ0LWll
dGYtc2ZjLW5zaC0wNC50eHQKPj4+Pj4KPj4+Pj4gSWYgSSBhbSB1bmRlcnN0YW5kaW5nIHlvdSBj
b3JyZWN0bHkgTWVkLCB5b3UgYXJlIGFza2luZyB0aGF0IHRoZQo+Pj4+PiBOU0ggZHJhZnQgc3Bl
Y2lmeSBob3cgc2VydmljZSBjaGFpbmluZyBzaG91bGQgY29wZSB3aXRoIHBhY2tldHMKPj4+Pj4g
dGhhdCBoYXZlIGJlZW4gZnJhZ21lbnRlZD8KPj4+Pj4KPj4+Pgo+Pj4+IFtNZWRdIFRvIGJlIGFj
Y3VyYXRlLCBJJ20gYXNraW5nIHRvIGFzc2VzcyB3aGV0aGVyIHRoZXJlIGFyZSBpbXBsaWNhdGlv
bnMuCj4+Pj4gSWYgdGhlcmUgYXJlLCB0aGVuIHRoZSBkcmFmdCBzaG91bGQgYmUgdXBkYXRlZCBh
Y2NvcmRpbmdseS4KPj4+Pgo+Pj4+PiBOU0gsIGFuZCB0aGUgU0ZGIGZ1bmN0aW9uYWxpdHksIGRv
ZXMgbm90IGNhcmUuCj4+Pj4KPj4+PiBbTWVkXSBJJ20gbm90IHRoYXQgc3VyZS4gU29tZSB0eXBp
Y2FsIGltcGxpY2F0aW9ucyBhcmUgbGlzdGVkIGJlbG93Ogo+Pj4+Cj4+Pj4gKiBTRkY6IElmIHRo
ZSBOU0ggaGVhZGVyIGlzIHByZXNlbnQgb25seSBpbiB0aGUgYSBmcmFnbWVudCBidXQgU0ZGCj4+
Pj4gZGlkbid0IG1haW50YWluZWQgYSBzdGF0ZSwgc3Vic2VxdWVudCBmcmFnbWVudHMgd29uJ3Qg
YmUgYXBwcm9wcmlhdGVseSBwcm9jZXNzZWQuCj4+Pj4gKiBTRkMtYXdhcmUgZnVuY3Rpb246IGlm
IHByZXBlbmRpbmcgYSBjb250ZXh0IGluZm9ybWF0aW9uIGRlcGVuZHMgb24KPj4+PiB0aGUgZnVs
bCBwYWNrZXQsIG5vdCBvbmx5IGEgZnJhZ21lbnQuCj4+Pj4KPj4+PsKgwqAgSXQganVzdCBkb2Vz
IGl0cyBqb2IuCj4+Pj4KPj4+PiBbTWVkXSB3aGljaCBtYXkgYmUgZGlzdHVyYmVkIGluIHNvbWUg
c2l0dWF0aW9ucyBhcyBsaXN0ZWQgaW4gdGhlCj4+Pj4gZXhhbXBsZXMgYWJvdmUuCj4+Pj4KPj4+
Pj4gSW5ncmVzcyBhbmQgaW50ZXJtZWRpYXRlIGNsYXNzaWZpZXJzIG1heSBjb3BlIHdpdGggZnJh
Z21lbnRzIGluIGFueQo+Pj4+PiBudW1iZXIgb2Ygd2F5cy4KPj4+PsKgwqAgU3BlY2lmeWluZyBz
dWNoIGlzIGNsZWFybHkgb3V0IG9mIHNjb3BlIGZvciB0aGlzIGRyYWZ0Lgo+Pj4+Cj4+Pj4gW01l
ZF0gVGhlIHB1cnBvc2UgaXMgbm90IHRvIHNwZWNpZnkgdGhlIGludGVybmFsIGltcGxlbWVudGF0
aW9uCj4+Pj4gZGV0YWlscyBidXQgdGhlIGV4dGVybmFsIGJlaGF2aW9yIG9mIHRoZSBjbGFzc2lm
aWVyIGZ1bmN0aW9uIHdoZW4gaXQKPj4+PiBjb21lcyB0byBoYW5kbGUgZnJhZ21lbnRzLiBUaGF0
IGJlaGF2aW9yIG1heSBoYXZlIGFuIGluY2lkZW5jZSBvbgo+Pj4+IFNGRiwgaW4gcGFydGljdWxh
ci4gVGhlIHB1cnBvc2UgaXMgbm90IHRvIHJlY29tbWVuZCB0aGUgbWF4aW11bQo+Pj4+IHJlc291
cmNlcyB0byBiZSBkZWRpY2F0ZWQgdG8gb3V0IG9mIG9yZGVyIGZyYWdtZW50cyBub3IgdGhlIHRp
bWVvdXQKPj4+PiB0byBjYWNoZSB0aG9zZTsgdGhlc2UgY29uc2lkZXJhdGlvbnMgYXJlIG9mIGNv
dXJzZSBvdXQgb2Ygc2NvcGUuCj4+Pj4gTmV2ZXJ0aGVsZXNzLCBhbiBpbXBsZW1lbnRhdGlvbiBz
aG91bGQgb2ZmZXIgYSBjb25maWd1cmFibGUKPj4+PiBwYXJhbWV0ZXIgc28gdGhhdCBhbiBvcGVy
YXRvciB0d2VhayB0aG9zZSBhY2NvcmRpbmcgdG8gaXRzIGNvbnRleHQuCj4+Pj4KPj4+Pj7CoMKg
IEkgc3VwcG9zZSBvbmUgY291bGQgd3JpdGUgYW4gaW5mb3JtYXRpb25hbCBkcmFmdCBvbiBwb3Nz
aWJsZSB3YXlzCj4+Pj4+IG9mIGNvcGluZy7CoCBUaGUgSUVURiBoYXMgbm90IHVzdWFsbHkgcHVi
bGlzaGVkIHN1Y2guCj4+Pj4+IFNlcnZpY2UgZnVuY3Rpb25zIGhhdmUgdG8gY29wZSB3aXRoIGZy
YWdtZW50ZWQgcGFja2V0cyBqdXN0IGFzIHRoZXkKPj4+Pj4gaGFkIHRvIGJlZm9yZSB0aGUgYWR2
ZW50IG9mIE5TSCwgc28gZGVzY3JpYmluZyB0aGF0IGlzIGNsZWFybHkgbm90Cj4+Pj4+IG5lZWRl
ZCBoZXJlLgo+Pj4+Cj4+Pj4gW01lZF0gVGhlIGFkdmVudCBvZiBOU0ggaGFzIHRoZSBmb2xsb3dp
bmcgaW1wbGljYXRpb25zOgo+Pj4+ICogaXQgZXhhY2VyYmF0ZXMgZnJhZ21lbnRhdGlvbi4gSGFu
ZGluZyBvdmVyIHRoaXMgaXNzdWUgdG8gdGhlCj4+Pj4gdHJhbnNwb3J0IGxheWVyIG1heSBsZWFk
IHRvIGludGVyb3BlcmFiaWxpdHkgaXNzdWVzLgo+Pj4+ICogdGhlIGNoYWluaW5nIG1heSBub3Qg
YmUgZWZmaWNpZW50IGlmIGZyYWdtZW50cyBhcmUgaW5hcHByb3ByaWF0ZWx5Cj4+Pj4gaGFuZGxl
ZC4KPj4+Pgo+Pj4+IEludHJvZHVjaW5nIE5TSCBzaG91bGQgbm90IGRlZ3JhZGUgdGhlIG92ZXJh
bGwgc2VydmljZSBjb21wYXJlZCB0bwo+Pj4+IGxlZ2FjeSBzZXJ2aWNlIGRlcGxveW1lbnQgc2No
ZW1lcy4KPj4+Pgo+Pj4+Pgo+Pj4+PiBZb3VycywKPj4+Pj4gSm9lbAo+Pj4+Pgo+Pj4+PiBPbiA0
LzI1LzE2IDM6MDAgQU0sIG1vaGFtZWQuYm91Y2FkYWlyQG9yYW5nZS5jb20gd3JvdGU6Cj4+Pj4+
PiBSZS0sCj4+Pj4+Pgo+Pj4+Pj4gSSBoZWFyIHlvdSwgYnV0IG15IGNvbW1lbnQgaXMgdGhhdCB3
ZSBuZWVkLCBhcyBhIFdHLCB0byBkZWNpZGUKPj4+Pj4+IHdoYXQgdG8KPj4+Pj4gcHV0IGluIHRo
ZSBkcmFmdC4gRldJVywgSSdtIGRpc2N1c3NpbmcgdHdvIGZyYWdtZW50YXRpb24gaXNzdWVzOgo+
Pj4+Pj4KPj4+Pj4+ICgxKSBGcmFnbWVudGF0aW9uIHRoYXQgaXMgY2F1c2VkIGJ5IHByZXBlbmRp
bmcgYW4gU0ZDIGhlYWRlci4KPj4+Pj4+ICgyKSBIYW5kbGluZyBmcmFnbWVudHMgYXQgdGhlIGlu
Z3Jlc3Mgb2YgYW4gU0ZDLWVuYWJsZWQgZG9tYWluLgo+Pj4+Pj4KPj4+Pj4+IEluY3JlYXNpbmcg
dGhlIE1UVSBpcyBmb3Igc3VyZSBhIHJlY29tbWVuZGF0aW9uIGlzIHRvIGJlCj4+Pj4+PiBleHBs
aWNpdGx5Cj4+Pj4+IGNhbGxlZCBvdXQgaW4gdGhlIHRleHQgKHNlZSBteSBmaXJzdCBtZXNzYWdl
KS4KPj4+Pj4+Cj4+Pj4+PiBUaGVyZSBhcmUgb3RoZXIgaXNzdWVzIHRoYXQgbmVlZCB0byBiZSBk
aXNjdXNzZWQsIGUuZy4sIGhvdyB0bwo+Pj4+Pj4gZGVhbCB3aXRoCj4+Pj4+IGZyYWdtZW50cyBp
biBTRkZzL0NsYXNzaWZpZXJzPwo+Pj4+Pj4KPj4+Pj4+IEl0IGlzIGFsc28gInBydWRlbnQiIHRv
IGNoZWNrIHRoYXQgbm8gaXNzdWVzIHdpbGwgYmUgZXhwZXJpZW5jZWQKPj4+Pj4+IGluIFNGRgo+
Pj4+PiB0byBoYW5kbGUgZnJhZ21lbnRzLiBJZiBhbiBTRkMgaGVhZGVyIGlzIHByZXBlbmRlZCBm
b3IgYWxsCj4+Pj4+IGZyYWdtZW50cywgSSdtIG5vdCBzdXJlIHRoZXJlCj4+Pj4+PiBpcyBhbnkg
cGFydGljdWxhciBpc3N1ZSBhdCB0aGUgU0ZGIGxldmVsLCBleGNlcHQgaWYKPj4+Pj4+IHN0cmlw
cGluZy9hZGRpbmcKPj4+Pj4gY29udGV4dCBUTFZzIGRlcGVuZHMgb24gdGhlIGZ1bGwgcGFja2V0
IChub3QganVzdCBmcmFnbWVudCkuIEl0IGlzCj4+Pj4+IHdhcnJhbnRlZCB0byBjb25zaWRlciBh
IGxpdHRsZSBiaXQgdGhpcyBwb2ludCBiZWZvcmUgZGVjbGFyaW5nCj4+Pj4+IHRoZXJlIGlzIG5v
IGlzc3VlLgo+Pj4+Pj4KPj4+Pj4+IEZvciBwb2ludCAoMSksIGRlY2xhcmluZyBmcmFnbWVudGF0
aW9uIG91dCBvZiBzY29wZSB3b3VsZCBiZSBtZWFudAo+Pj4+Pj4gdGhhdAo+Pj4+PiBhbiBpbXBs
ZW1lbnRhdGlvbiBtdXN0IGJlIHByZXBhcmVkIHRvIHJlY2VpdmUgZnJhZ21lbnRzIHdpdGggb3IK
Pj4+Pj4gd2l0aG91dCBOU0ggaGVhZGVyIGFzIHRoaXMgaXMgYSBkZWNpc2lvbiB0aGF0IGlzIGxl
ZnQgdG8gdGhlCj4+Pj4+IHRyYW5zcG9ydCBlbmNhcHN1bGF0aW9uLiBUaGlzIGlzIGEgcmVxdWly
ZW1lbnQgcGVyIHNlIQo+Pj4+Pj4KPj4+Pj4+IEkgd29uJ3QgcmVpdGVyYXRlIGFsbCB0aGUgY29t
bWVudHMgSSBoYXZlIGFib3V0IHRoZSBjdXJyZW50Cj4+Pj4+PiB3b3JkaW5nIG9mCj4+Pj4+IHRo
aXMgc2VjdGlvbi4KPj4+Pj4+Cj4+Pj4+PiBDaGVlcnMsCj4+Pj4+PiBNZWQKPj4+Pj4+Cj4+Pj4+
Pj4gLS0tLS1NZXNzYWdlIGQnb3JpZ2luZS0tLS0tCj4+Pj4+Pj4gRGUgOiBFbHp1ciwgVXJpIFtt
YWlsdG86dXJpLmVsenVyQGludGVsLmNvbV0gRW52b3nDqSA6IGx1bmRpIDI1Cj4+Pj4+Pj4gYXZy
aWwgMjAxNiAwODozMCDDgCA6IEJPVUNBREFJUiBNb2hhbWVkIElNVC9PTE47IFRob21hcyBOYXJ0
ZW47Cj4+Pj4+Pj4gc2ZjQGlldGYub3JnIE9iamV0IDogUkU6IFtzZmNdIFdHIGxhc3QgY2FsbCBm
b3IKPj4+Pj4+PiBkcmFmdC1pZXRmLXNmYy1uc2gtMDQudHh0Cj4+Pj4+Pj4KPj4+Pj4+PiBIaSBN
ZWQKPj4+Pj4+Pgo+Pj4+Pj4+IE15IHBvaW50IGlzIHRoYXQgRnJhZ21lbnRhdGlvbiBpcyB5ZXQg
YW5vdGhlciB0cmFuc3BvcnQgcmVsYXRlZAo+Pj4+Pj4+IGlzc3VlCj4+Pj4+IHRoYXQKPj4+Pj4+
PiBpcyBiZXlvbmQgdGhlIHNjb3BlIG9mIE5TSCBhbmQgYmV5b25kIHRoZSBjaGFydGVyIG9mIHRo
ZSBXRywgc28KPj4+Pj4+PiBpdAo+Pj4+PiBkb2Vzbid0Cj4+Pj4+Pj4gcmVhbGx5IGJlbG9uZyBp
biB0aGUgZHJhZnQuIFdlIGFyZSBwcm92aWRpbmcgYW4gYWR2aWNlIGFzCj4+Pj4+Pj4gZXh0ZW5k
aW5nIHRoZSBzaXplIG9mIHRoZSBwYWNrZXQgbWF5IGxlYWQgdG8gZnJhZ21lbnRhdGlvbiwgYnV0
Cj4+Pj4+Pj4gYXMgeW91IGNoZWNrIFJGQyA3MzQ4IFZ4TEFOLCB3aGljaCBteSBjcmVhdGUgdGhl
IHNhbWUgaXNzdWUsCj4+Pj4+Pj4geW91J2xsIGZpbmQgaXQgZG9lc24ndCBldmVuCj4+Pj4+IHJl
bGF0ZQo+Pj4+Pj4+IHRvIGl0Lgo+Pj4+Pj4+Cj4+Pj4+Pj4gVGh4Cj4+Pj4+Pj4KPj4+Pj4+PiBV
cmkgKCJPby1SZWUiKQo+Pj4+Pj4+IEM6IDk0OS0zNzgtNzU2OAo+Pj4+Pj4+Cj4+Pj4+Pj4KPj4+
Pj4+PiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQo+Pj4+Pj4+IEZyb206IHNmYyBbbWFpbHRv
OnNmYy1ib3VuY2VzQGlldGYub3JnXSBPbiBCZWhhbGYgT2YKPj4+Pj4+PiBtb2hhbWVkLmJvdWNh
ZGFpckBvcmFuZ2UuY29tCj4+Pj4+Pj4gU2VudDogU3VuZGF5LCBBcHJpbCAyNCwgMjAxNiAxMDoz
MiBQTQo+Pj4+Pj4+IFRvOiBFbHp1ciwgVXJpIDx1cmkuZWx6dXJAaW50ZWwuY29tPjsgVGhvbWFz
IE5hcnRlbgo+Pj4+PiA8bmFydGVuQHVzLmlibS5jb20+Owo+Pj4+Pj4+IHNmY0BpZXRmLm9yZwo+
Pj4+Pj4+IFN1YmplY3Q6IFJlOiBbc2ZjXSBXRyBsYXN0IGNhbGwgZm9yIGRyYWZ0LWlldGYtc2Zj
LW5zaC0wNC50eHQKPj4+Pj4+Pgo+Pj4+Pj4+IEhpIFVyaSwKPj4+Pj4+Pgo+Pj4+Pj4+IFRoYXQn
cyBhbm90aGVyIG9wdGlvbiB0aGF0IG5lZWRzIHRvIGJlIGRpc2N1c3NlZC9pbnZlc3RpZ2F0ZWQu
Cj4+Pj4+Pj4gSSdtCj4+Pj4+IGFmcmFpZAo+Pj4+Pj4+IHRoaXMgaXMgbm90IHRoZSByYXRpb25h
bGUgYWRvcHRlZCBpbiAtMDQgc2luY2UgaXQgaW5jbHVkZXMgc29tZQo+Pj4+Pj4+IHRleHQKPj4+
Pj4gdGhhdAo+Pj4+Pj4+IGlzIGZhciB0byBiZSBzdWZmaWNpZW50IHRvIGVuc3VyZSBpbnRlcm9w
ZXJhYmxlIGltcGxlbWVudGF0aW9ucy4KPj4+Pj4+Pgo+Pj4+Pj4+IEJUVywgc2F5aW5nIHRoYXQg
bnNoIGRvZXMgbm90IG5lZWQgdG8gZGVhbCB3aXRoIGZyYWdtZW50YXRpb24KPj4+Pj4+PiBiZWNh
dXNlCj4+Pj4+IGl0Cj4+Pj4+Pj4gaXMgdHJhbnNwb3J0LWluZGVwZW5kZW50IGlzIG5vdCBJTUhP
IGEgZ29vZCBzdHJhdGVneSB0byBhZG9wdAo+Pj4+Pj4+IGhlcmUKPj4+Pj4gYmVjYXVzZQo+Pj4+
Pj4+IGl0IG9wZW5zIHRoZSBkb29yIGZvciBpbnRlcm9wZXJhYmxlIGlzc3VlcywgaXQgbWF5IGxl
YWQgdG8KPj4+Pj4+PiBzdWItb3B0aW1hbCBpbXBsZW1lbnRhdGlvbnMgaWYgdGhlIHNmYyBpbmZv
cm1hdGlvbiBpcyBwcmVzZW50Cj4+Pj4+Pj4gb25seSBpbiBvbmUKPj4+Pj4gZnJhZ21lbnRzLAo+
Pj4+Pj4+IGV0Yy4KPj4+Pj4+Pgo+Pj4+Pj4+IE15IGNvbW1lbnRzIGFyZSByZWxhdGVkIHRvIHRo
ZSBjdXJyZW50IHRleHQgaW4gdGhlIC0wNC4gVGhpcyB0ZXh0Cj4+Pj4+Pj4gbmVlZHMKPj4+Pj4g
dG8KPj4+Pj4+PiBiZSBmaXhlZCBzb21laG93Lgo+Pj4+Pj4+Cj4+Pj4+Pj4gQ2hlZXJzLAo+Pj4+
Pj4+IE1lZAo+Pj4+Pj4+Cj4+Pj4+Pj4+IC0tLS0tTWVzc2FnZSBkJ29yaWdpbmUtLS0tLQo+Pj4+
Pj4+PiBEZSA6IEVsenVyLCBVcmkgW21haWx0bzp1cmkuZWx6dXJAaW50ZWwuY29tXSBFbnZvecOp
IDogZGltYW5jaGUKPj4+Pj4+Pj4gMjQgYXZyaWwgMjAxNiAxNzozNiDDgCA6IEJPVUNBREFJUiBN
b2hhbWVkIElNVC9PTE47IFRob21hcwo+Pj4+Pj4+PiBOYXJ0ZW47IHNmY0BpZXRmLm9yZyBPYmpl
dCA6IFJFOiBbc2ZjXSBXRyBsYXN0IGNhbGwgZm9yCj4+Pj4+Pj4+IGRyYWZ0LWlldGYtc2ZjLW5z
aC0wNC50eHQKPj4+Pj4+Pj4KPj4+Pj4+Pj4gSGkgTWVkCj4+Pj4+Pj4+Cj4+Pj4+Pj4+IEkgc2Vl
IG5vIG5lZWQgdG8gc3BlY2lmeSB0aGUgZXhhY3QgYmVoYXZpb3IgYXMgTlNIIGlzIHRyYW5zcG9y
dAo+Pj4+Pj4+PiBpbmRlcGVuZGVudCBpLmUuIGxpa2UgTlNIIGludGVyYWN0aW9uIHdpdGggYW55
IG90aGVyIFRyYW5zcG9ydAo+Pj4+Pj4+PiBlaCBpc3N1ZSBvZiBGcmFnbWVudGF0aW9uIGlzIHRv
IGJlIGRlYWx0IGluIGEgd2F5IHRoYXQgbWF0Y2hlcwo+Pj4+Pj4+PiB0aGUgbWVjaGFuaXNtcyBz
dXBwb3J0ZWQgYnkgdGhlIFRyYW5zcG9ydCB1c2VkIGFuZCBkbyBub3QgYmVsb25nCj4+Pj4+Pj4+
IGluIHRoZSBOU0ggZHJhZnQKPj4+Pj4+Pj4KPj4+Pj4+Pj4gVGh4Cj4+Pj4+Pj4+Cj4+Pj4+Pj4+
IFVyaSAoIk9vLVJlZSIpCj4+Pj4+Pj4+IEM6IDk0OS0zNzgtNzU2OAo+Pj4+Pj4+Pgo+Pj4+Pj4+
Pgo+Pj4+Pj4+PiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQo+Pj4+Pj4+PiBGcm9tOiBzZmMg
W21haWx0bzpzZmMtYm91bmNlc0BpZXRmLm9yZ10gT24gQmVoYWxmIE9mCj4+Pj4+Pj4+IG1vaGFt
ZWQuYm91Y2FkYWlyQG9yYW5nZS5jb20KPj4+Pj4+Pj4gU2VudDogVGh1cnNkYXksIEFwcmlsIDE0
LCAyMDE2IDEyOjQzIEFNCj4+Pj4+Pj4+IFRvOiBUaG9tYXMgTmFydGVuIDxuYXJ0ZW5AdXMuaWJt
LmNvbT47IHNmY0BpZXRmLm9yZwo+Pj4+Pj4+PiBTdWJqZWN0OiBSZTogW3NmY10gV0cgbGFzdCBj
YWxsIGZvciBkcmFmdC1pZXRmLXNmYy1uc2gtMDQudHh0Cj4+Pj4+Pj4+Cj4+Pj4+Pj4+IFItLAo+
Pj4+Pj4+Pgo+Pj4+Pj4+PiBJbiBhZGRpdGlvbiB0byBvdGhlciBwZW5kaW5nIGlzc3VlcyByYWlz
ZWQgZm9yIHRoaXMgZHJhZnQsIEkKPj4+Pj4+Pj4gd291bGQgbGlrZSB0byByYWlzZSB0aGlzIGFk
ZGl0aW9uYWwgb25lIGFib3V0IFNlY3Rpb24gNi4KPj4+Pj4+Pj4KPj4+Pj4+Pj4gPT0KPj4+Pj4+
Pj4gNi7CoCBGcmFnbWVudGF0aW9uIENvbnNpZGVyYXRpb25zCj4+Pj4+Pj4+Cj4+Pj4+Pj4+wqDC
oMKgIE5TSCBhbmQgdGhlIGFzc29jaWF0ZWQgdHJhbnNwb3J0IGhlYWRlciBhcmUgImFkZGVkIiB0
byB0aGUKPj4+Pj4+Pj7CoMKgwqAgZW5jYXBzdWxhdGVkIHBhY2tldC9mcmFtZS7CoCBUaGlzIGFk
ZGl0aW9uYWwgaW5mb3JtYXRpb24KPj4+Pj4+Pj4gaW5jcmVhc2VzCj4+Pj4+IHRoZQo+Pj4+Pj4+
PsKgwqDCoCBzaXplIG9mIHRoZSBwYWNrZXQuwqAgSW4gb3JkZXIgdGhlIGVuc3VyZSBwcm9wZXIg
Zm9yd2FyZGluZyBvZiBOU0gKPj4+Pj4+Pj7CoMKgwqAgZGF0YSwgc2V2ZXJhbCBvcHRpb25zIGZv
ciBoYW5kbGluZyBmcmFnbWVudGF0aW9uIGFuZCByZS1hc3NlbWJseQo+Pj4+Pj4+PsKgwqDCoCBl
eGlzdDoKPj4+Pj4+Pj4KPj4+Pj4+Pj7CoMKgwqAgMS7CoCBKdW1ibyBGcmFtZXMsIHdoZW4gc3Vw
cG9ydGVkLCBlbmFibGUgdGhlIHRyYW5zcG9ydCBvZiBOU0ggYW5kCj4+Pj4+Pj4+wqDCoMKgwqDC
oMKgwqAgYXNzb2NpYXRlZCB0cmFuc3BvcnQgcGFja2V0cyB3aXRob3V0IHJlcXVpcmluZyBmcmFn
bWVudGF0aW9uLgo+Pj4+Pj4+Pgo+Pj4+Pj4+PsKgwqDCoCAyLsKgIFBhdGggTVRVIERpc2NvdmVy
eSBbUkZDMTE5MV0iZGVzY3JpYmVzIGEgdGVjaG5pcXVlIGZvcgo+Pj4+Pj4+PsKgwqDCoMKgwqDC
oMKgIGR5bmFtaWNhbGx5IGRpc2NvdmVyaW5nIHRoZSBtYXhpbXVtIHRyYW5zbWlzc2lvbiB1bml0
Cj4+Pj4+Pj4+IChNVFUpIG9mCj4+Pj4+IGFuCj4+Pj4+Pj4+wqDCoMKgwqDCoMKgwqAgYXJiaXRy
YXJ5IGludGVybmV0IHBhdGgiIGFuZCBjYW4gYmUgdXRpbGl6ZWQgdG8gZW5zdXJlCj4+Pj4+Pj4+
IHRoZQo+Pj4+IHRoZQo+Pj4+Pj4+PsKgwqDCoMKgwqDCoMKgIHJlcXVpcmVkIHBhY2tldCBzaXpl
IGlzIHVzZWQuCj4+Pj4+Pj4+Cj4+Pj4+Pj4+wqDCoMKgIDMuwqAgW1JGQzY4MzBdIGRlc2NyaWJl
cyB0d28gc2NoZW1lcyBmb3IgZnJhZ21lbnRhdGlvbiBhbmQgcmUtCj4+Pj4+IGFzc2VtYmx5Cj4+
Pj4+Pj4+wqDCoMKgwqDCoMKgwqAgaW4gc2VjdGlvbiA1LjQuCj4+Pj4+Pj4+ID09Cj4+Pj4+Pj4+
Cj4+Pj4+Pj4+ICogVGhlIHRleHQgaXMgd2VhayBmb3IgYSBTdGFuZGFyZCB0cmFjayBkb2N1bWVu
dCB0aGF0IGlzCj4+Pj4+Pj4+IGludGVuZGVkIHRvIHNvbHZlIHRoZSBwcm9ibGVtIGluCj4+Pj4+
Pj4+IGh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9yZmM3NDk4I3NlY3Rpb24tCj4+Pj4gMi4x
Mi4KPj4+Pj4+Pj4gVGhlcmUgc2hvdWxkIGJlIGEgY2xlYXIgYmVoYXZpb3IgdG8gYmUgZm9sbG93
ZWQgYnkgYW4KPj4+PiBpbXBsZW1lbnRhdGlvbi4KPj4+Pj4+Pj4gRnVydGhlciwgSSB3b3VsZCBh
dm9pZCB0aGUgdXNlIG9mIHdvcmRzIHN1Y2ggYXMgImNhbiIuCj4+Pj4+Pj4+Cj4+Pj4+Pj4+ICog
VGhlIHRleHQgY292ZXJzIG9ubHkgZnJhZ21lbnRhdGlvbiB3aGVuIGl0IGlzIGluZHVjZWQgYnkg
U0ZDCj4+Pj4+Pj4+IG9wZXJhdGlvbnMsIGl0IGRvZXMgbm90IGRpc2N1c3MgdGhlIHRyZWF0bWVu
dCBvZiBhIGZyYWdtZW50IHdoZW4KPj4+Pj4+Pj4gcmVjZWl2ZWQgaW4gYW4gU0ZDIGRvbWFpbi4g
SU1ITywgdGhlIGRyYWZ0IHNob3VsZCBhbHNvIHNwZWNpZnkKPj4+Pj4+Pj4gdGhlIGJlaGF2aW9y
IG9mIHRoZSBDbGFzc2lmaWVyIHdpdGggcmVnYXJkcyB0byBmcmFnbWVudHMgZm9yIHRoZQo+Pj4+
Pj4+PiBzYWtlIG9mIHByb3BlciBTRkMgb3BlcmF0aW9uLiBBcHBseWluZyBjbGFzc2lmaWNhdGlv
biBwb2xpY2llcwo+Pj4+Pj4+PiBtYXkgcmVxdWlyZSB0aGUKPj4+Pj4+PiBmdWxsIHBhY2tldCwg
bm90IG9ubHkgYSBmcmFnbWVudC4KPj4+Pj4+Pj4gSW4gcGFydGljdWxhciwgZGVkaWNhdGVkIHJl
c291cmNlcyBzaG91bGQgZGVkaWNhdGVkIGZvciBoYW5kbGluZwo+Pj4+Pj4+PiBvdXQgb2Ygb3Jk
ZXIgZnJhZ21lbnRzLiBPZiBjb3Vyc2UsIGl0IGlzIG91dCBvZiBzY29wZSBvZiB0aGlzCj4+Pj4+
Pj4+IGRvY3VtZW50IHRvIGRlc2NyaWJlIGhvdyBTRnMgaGFuZGxlIGZyYWdtZW50cy4KPj4+Pj4+
Pj4KPj4+Pj4+Pj4gKiBJZiBhbiBTRkMgaGVhZGVyIGlzIHByZXBlbmRlZCBmb3IgYWxsIGZyYWdt
ZW50cywgSSdtIG5vdCBzdXJlCj4+Pj4+Pj4+IHRoZXJlIGlzIGFueSBwYXJ0aWN1bGFyIGlzc3Vl
IGF0IHRoZSBTRkYgbGV2ZWwuLi5leGNlcHQgaWYKPj4+Pj4+Pj4gc3RyaXBwaW5nL2FkZGluZyBj
b250ZXh0IFRMVnMgZGVwZW5kcyBvbiB0aGUgZnVsbCBwYWNrZXQgKG5vdAo+Pj4+Pj4+PiBqdXN0
IGZyYWdtZW50KS4gSXQgaXMgd2FycmFudGVkIHRvIGNvbnNpZGVyIGEgbGl0dGxlIGJpdCB0aGlz
Cj4+Pj4+Pj4+IHBvaW50IGJlZm9yZSBkZWNsYXJpbmcgdGhlcmUKPj4+Pj4gaXMKPj4+Pj4+PiBu
byBpc3N1ZS4KPj4+Pj4+Pj4KPj4+Pj4+Pj4gKiBUaGUgdGV4dCBzdGF0ZXMgInNldmVyYWwgb3B0
aW9ucyIuIFRoaXMgbWF5IGJlIGludGVycHJldGVkIGFzCj4+Pj4+Pj4+IGlmIGltcGxlbWVudGlu
ZyBvbmUgb2YgdGhlbSBpcyBzdWZmaWNpZW50Li4ud2hpY2ggaXMgbm90IHRydWUuCj4+Pj4+Pj4+
IFRoZSBmaXJzdCB0d28gcG9pbnRzIGNvbnRyaWJ1dGUgdG8gbWluaW1pemUgdGhlIGZyYWdtZW50
YXRpb24KPj4+Pj4+Pj4gcmlzaywgYnV0IGZyYWdtZW50YXRpb24gbWF5IHN0aWxsIGJlIGV4cGVy
aWVuY2VkIChlLmcuLCBvdGhlcgo+Pj4+Pj4+PiBzaGltcyBhcmUgcHJlcGVuZGVkIGJ5IG90aGVy
IG5vZGVzIGZvciBzb21lIG90aGVyIHB1cnBvc2VzLAo+Pj4+Pj4+PiBuZXN0ZWQgbnNoLAo+Pj4+
Pj4+PiBldGMuKQo+Pj4+Pj4+Pgo+Pj4+Pj4+PiAqIFRoZSBmaXJzdCB0d28gcG9pbnRzIGhhdmUg
bm90aGluZyB0byBkbyB3aXRoIHJlYXNzZW1ibHkuCj4+Pj4+Pj4+Cj4+Pj4+Pj4+ICogVGhlIHN1
cHBvcnQgb2YganVtYm8gZnJhbWVzIGJ5IGEgcm91dGVyL2RldmljZSBkb2VzIG5vdCBtZWFuCj4+
Pj4+Pj4+IHRoYXQgaXQgY2FuIG1ha2UgdXNlIG9mIGl0LiBBcHByb3ByaWF0ZSBNVFUgY29uZmln
dXJhdGlvbiBzaG91bGQKPj4+Pj4+Pj4gYmUgdW5kZXJ0YWtlbiBpbiBhIGNvbnNpc3RlbnQgbWFu
bmVyIHdpdGhpbiBhbiBTRkMgZG9tYWluLiBUaGUKPj4+Pj4+Pj4gdGV4dCBzaG91bGQgYmUgdXBk
YXRlZCB0byBtYWtlIGl0IGlzIGFib3V0IChjb25zaXN0ZW50KSBNVFUKPj4+PiBjb25maWd1cmF0
aW9uLgo+Pj4+Pj4+Pgo+Pj4+Pj4+PiAqIEJUVywgc2hvdWxkbid0IHRoZSB0ZXh0IGJlIHJld29y
ZGVkIHRvIHJlY29tbWVuZGVkIHRvIGluY3JlYXNlCj4+Pj4+Pj4+IHRoZSBNVFUgb2YgKiphbGwg
bm9kZXMqKiBvZiBhbiBTRkMtZW5hYmxlZCBkb21haW4gYnkgYXQgbGVhc3QKPj4+Pj4+Pj4gdGhl
IGxlbmd0aCBvZiBTRkMgaGVhZGVyICsgdHJhbnNwb3J0IGhlYWRlcj8KPj4+Pj4+Pj4KPj4+Pj4+
Pj4gKiBCdWxsZXQgMiwgaG93IFBNVFUgZGlzY292ZXJ5IGlzIGFjdHVhbGx5IHVzZWQgaW4gdGhp
cyBjb250ZXh0Pwo+Pj4+Pj4+PiBEbyB5b3UgYXNzdW1lIHRoYXQgYWxsIFNGQy1hd2FyZSBub2Rl
cyB3aWxsIGlzc3VlIHN1Y2ggbWVzc2FnZXMKPj4+Pj4+Pj4gdG93YXJkcyBvdGhlciBTRkMtYXdh
cmUgbm9kZSwgYXJiaXRyYXJ5IGRlc3RpbmF0aW9uLCBlbHNlPwo+Pj4+Pj4+Pgo+Pj4+Pj4+PiAq
IEJ1bGxldCAyLCBJIHdvdWxkIGRyb3AgImRlc2NyaWJlcyBhIHRlY2huaXF1ZSBmb3IgZHluYW1p
Y2FsbHkKPj4+Pj4+Pj4gZGlzY292ZXJpbmcgdGhlIG1heGltdW0gdHJhbnNtaXNzaW9uIHVuaXQg
KE1UVSkgb2YgYW4gYXJiaXRyYXJ5Cj4+Pj4+Pj4+IGludGVybmV0IHBhdGgiLgo+Pj4+Pj4+Pgo+
Pj4+Pj4+PiAqIEJ1bGxldCAyLCBzLyB0aGUgdGhlL3RoZS4KPj4+Pj4+Pj4KPj4+Pj4+Pj4gKiBU
aGUgcmVmZXJlbmNlIHRvIHRoZSBMSVNQIHNwZWNpZmljYXRpb24gcmFpc2VzIHR3byBjb25jZXJu
cwo+Pj4+Pj4+PiBhbmQgb25lCj4+Pj4+Pj4+IGNvbW1lbnQ6Cj4+Pj4+Pj4+Cj4+Pj4+Pj4+ICgx
KSBJIGRvbid0IHRoaW5rIGl0IGlzIGEgZ29vZCBhcHByb2FjaCB0aGF0IGZyYWdtZW50cyBpbmR1
Y2VkCj4+Pj4+Pj4+IGJ5IHRoZSBuZXR3b3JrIGFyZSBwYXNzZWQgdG8gdGhlaXIgdWx0aW1hdGUg
ZGVzdGluYXRpb25zIGFzIHN1Y2gKPj4+PiAoc3RhdGVsZXNzKS4KPj4+Pj4+Pj4gSU1PLCByZWFz
c2VtYmx5IHNob3VsZCBiZSBkb25lIHdpdGhpbiB0aGUgU0ZDIGRvbWFpbgo+Pj4+Pj4+PiAocmVz
cG9uc2libGUgZm9yCj4+Pj4+Pj4+IGZyYWdtZW50YXRpb24pIG5vdCBwYXNzZWQgYXdheS4KPj4+
Pj4+Pj4gKDIpIERvZXMgdGhlIHN0YXRlZnVsIG1vZGUgcmVxdWlyZSBhbGwgU0ZDIGRhdGEgcGxh
bmUgZWxlbWVudHMKPj4+Pj4+Pj4gbWFpbnRhaW4gYSBmdWxsIGxpc3Qgb2YgTVRVIGZvciB0aGUg
YW55IFNGRi9TRiBpbnN0YW5jZSBvZiB0aGUKPj4+Pj4+Pj4gU0ZDCj4+Pj4+Pj4gZG9tYWluPwo+
Pj4+Pj4+Pgo+Pj4+Pj4+PiBUaGUgY3VycmVudCB0ZXh0IHN1Z2dlc3RzIHRoYXQgW1JGQzY4MzBd
IHNob3VsZCBiZSBsaXN0ZWQgYXMKPj4+Pj4+Pj4gbm9ybWF0aXZlIHJlZmVyZW5jZSAobm90IGFu
IGluZm9ybWF0aXZlIG9uZSkuIEkgd291bGQgcGVyc29uYWxseQo+Pj4+Pj4+PiBmYXZvciByZW1v
dmluZyB0aGUgcmVmZXJlbmNlIHRvIExJU1AgKGFzIGl0IGlzIGFuIEV4cGVyaW1lbnRhbCBSRkMp
Lgo+Pj4+Pj4+Pgo+Pj4+Pj4+PiAqIFRoZSBzZWN1cml0eSBzZWN0aW9uIG9mIHRoZSBkcmFmdCBt
YXkgYmUgYXVnbWVudGVkIHdpdGgKPj4+Pj4+Pj4gaW5mb3JtYXRpb25hbCBmcmFnbWVudGF0aW9u
LXJlbGF0ZWQgcG9pbnRlcnMgdG86IGUuZy4sIFJGQzE4NTgKPj4+Pj4+Pj4gKFNlY3VyaXR5IENv
bnNpZGVyYXRpb25zIGZvciBJUCBGcmFnbWVudCBGaWx0ZXJpbmcpLCBSRkMzMTI4Cj4+Pj4+Pj4+
IChQcm90ZWN0aW9uIEFnYWluc3QgYSBWYXJpYW50IG9mIHRoZSBUaW55IEZyYWdtZW50IEF0dGFj
ayksIGFuZAo+Pj4+Pj4+PiBSRkMKPj4+Pj4+Pj4gNDk2MyAoSVB2NCBSZWFzc2VtYmx5IEVycm9y
cyBhdCBIaWdoIERhdGEgUmF0ZXMpLgo+Pj4+Pj4+Pgo+Pj4+Pj4+PiBDaGVlcnMsCj4+Pj4+Pj4+
IE1lZAo+Pj4+Pj4+Pgo+Pj4+Pj4+Pj4gLS0tLS1NZXNzYWdlIGQnb3JpZ2luZS0tLS0tCj4+Pj4+
Pj4+PiBEZSA6IHNmYyBbbWFpbHRvOnNmYy1ib3VuY2VzQGlldGYub3JnXSBEZSBsYSBwYXJ0IGRl
Cj4+Pj4+Pj4+PiBtb2hhbWVkLmJvdWNhZGFpckBvcmFuZ2UuY29tIEVudm95w6kgOiBsdW5kaSAx
MSBhdnJpbCAyMDE2IDEzOjE0IMOAIDoKPj4+Pj4+Pj4+IFRob21hcyBOYXJ0ZW47IHNmY0BpZXRm
Lm9yZyBPYmpldCA6IFJlOiBbc2ZjXSBXRyBsYXN0IGNhbGwgZm9yCj4+Pj4+Pj4+PiBkcmFmdC1p
ZXRmLXNmYy1uc2gtMDQudHh0Cj4+Pj4+Pj4+Pgo+Pj4+Pj4+Pj4gRGVhciBUaG9tYXMsIGFsbCwK
Pj4+Pj4+Pj4+Cj4+Pj4+Pj4+PiBBcyBJIG1lbnRpb25lZCBkdXJpbmcgdGhlIG1lZXRpbmcsIHRo
ZXJlIGFyZSBzZXZlcmFsIGlzc3Vlcwo+Pj4+Pj4+Pj4gdGhhdCBhcmUgbm90IGNvdmVyZWQgaW4g
dGhlIGxhc3QgdmVyc2lvbiBvZiB0aGUgZHJhZnQuIEkKPj4+Pj4+Pj4+IGFscmVhZHkgcHJvdmlk
ZWQgZXhhbXBsZXMgb2YgdGhlIGlzc3VlcyBvZmZsaW5lIGFzIHJlcXVlc3RlZCBieSBNYXJ0aW4u
Cj4+Pj4+Pj4+Pgo+Pj4+Pj4+Pj4gQ2hlZXJzLAo+Pj4+Pj4+Pj4gTWVkCj4+Pj4+Pj4+Pgo+Pj4+
Pj4+Pj4+IC0tLS0tTWVzc2FnZSBkJ29yaWdpbmUtLS0tLQo+Pj4+Pj4+Pj4+IERlIDogc2ZjIFtt
YWlsdG86c2ZjLWJvdW5jZXNAaWV0Zi5vcmddIERlIGxhIHBhcnQgZGUgVGhvbWFzCj4+Pj4+Pj4+
Pj4gTmFydGVuIEVudm95w6kgOiBqZXVkaSAzMSBtYXJzIDIwMTYgMDQ6NDggw4AgOiBzZmNAaWV0
Zi5vcmcKPj4+Pj4+Pj4+PiBPYmpldAo+Pj4+Pj4+Pj4+IDogW3NmY10gV0cgbGFzdCBjYWxsIGZv
ciBkcmFmdC1pZXRmLXNmYy1uc2gtMDQudHh0Cj4+Pj4+Pj4+Pj4KPj4+Pj4+Pj4+PiBEZWFyIFdH
Ogo+Pj4+Pj4+Pj4+Cj4+Pj4+Pj4+Pj4gVGhpcyBub3RlIGJlZ2lucyBhIFdHIGxhc3QgY2FsbCBv
biBkcmFmdC1pZXRmLXNmYy1uc2gtMDQudHh0Cj4+Pj4+Pj4+Pj4gKGh0dHBzOi8vZGF0YXRyYWNr
ZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWlldGYtc2ZjLW5zaC8pLgo+Pj4+Pj4+Pj4+Cj4+Pj4+Pj4+
Pj4gVGhlIGVkaXRvcnMgb2YgdGhlIE5TSCBkb2N1bWVudCBoYXZlIGluZGljYXRlZCB0aGF0IHRo
ZXkgaGF2ZQo+Pj4+Pj4+Pj4+IGFkZHJlc3NlZCBhbGwga25vd24gY29tbWVudHMgYW5kIHRoYXQg
dGhlcmUgYXJlIG5vIG9wZW4gaXNzdWVzCj4+Pj4+Pj4+Pj4gd2l0aCB0aGUgY3VycmVudCB2ZXJz
aW9uIG9mIHRoZSBkb2N1bWVudC4KPj4+Pj4+Pj4+Pgo+Pj4+Pj4+Pj4+IFN1YnN0YW50aXZlIGNv
bW1lbnRzIHRvIHRoZSBsaXN0IHBsZWFzZSwgZWRpdG9yaWFsIGNvbW1lbnRzCj4+Pj4+Pj4+Pj4g
Y2FuIGdvIGRpcmVjdGx5IHRvIHRoZSBkb2N1bWVudCBlZGl0b3JzLgo+Pj4+Pj4+Pj4+Cj4+Pj4+
Pj4+Pj4gV2UnbGwgYWxzbyBnZXQgYSBicmllZiB1cGRhdGUgZnJvbSB0aGUgZWRpdG9ycyBhdCBu
ZXh0IHdlZWsncwo+Pj4+Pj4+Pj4+IG1lZXRpbmcuIElmIHRoZXJlIGFyZSBhbnkgcmVtYWluaW5n
IGlzc3VlcyB3aXRoIHRoZSBkb2N1bWVudCwKPj4+Pj4+Pj4+PiByYWlzaW5nIHRoZW0gYmVmb3Jl
IHRoZSBtZWV0aW5nIHdvdWxkIGJlIGVzcGVjaWFsbHkgaGVscGZ1bC4KPj4+Pj4+Pj4+Pgo+Pj4+
Pj4+Pj4+IEZvciB0aGUgY2hhaXJzLAo+Pj4+Pj4+Pj4+IFRob21hcwo+Pj4+Pj4+Pj4+Cj4+Pj4+
Pj4+Pj4gX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KPj4+
Pj4+Pj4+PiBzZmMgbWFpbGluZyBsaXN0Cj4+Pj4+Pj4+Pj4gc2ZjQGlldGYub3JnCj4+Pj4+Pj4+
Pj4gaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zZmMKPj4+Pj4+Pj4+Cj4+
Pj4+Pj4+PiBfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwo+
Pj4+Pj4+Pj4gc2ZjIG1haWxpbmcgbGlzdAo+Pj4+Pj4+Pj4gc2ZjQGlldGYub3JnCj4+Pj4+Pj4+
PiBodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL3NmYwo+Pj4+Pj4+Pgo+Pj4+
Pj4+PiBfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwo+Pj4+
Pj4+PiBzZmMgbWFpbGluZyBsaXN0Cj4+Pj4+Pj4+IHNmY0BpZXRmLm9yZwo+Pj4+Pj4+PiBodHRw
czovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL3NmYwo+Pj4+Pj4+Cj4+Pj4+Pj4gX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KPj4+Pj4+PiBzZmMg
bWFpbGluZyBsaXN0Cj4+Pj4+Pj4gc2ZjQGlldGYub3JnCj4+Pj4+Pj4gaHR0cHM6Ly93d3cuaWV0
Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zZmMKPj4+Pj4+Cj4+Pj4+PiBfX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwo+Pj4+Pj4gc2ZjIG1haWxpbmcgbGlzdAo+
Pj4+Pj4gc2ZjQGlldGYub3JnCj4+Pj4+PiBodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xp
c3RpbmZvL3NmYwo+Pj4+Pj4KPj4+Pgo+Pj4+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fCj4+Pj4gc2ZjIG1haWxpbmcgbGlzdAo+Pj4+IHNmY0BpZXRmLm9y
Zwo+Pj4+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjCj4+Pgo+Pj4g
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KPj4+IHNmYyBt
YWlsaW5nIGxpc3QKPj4+IHNmY0BpZXRmLm9yZwo+Pj4gaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFp
bG1hbi9saXN0aW5mby9zZmMKPj4+Cj4+Cj4+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fCj4+IHNmYyBtYWlsaW5nIGxpc3QKPj4gc2ZjQGlldGYub3JnCj4+
IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjCj4+CgpfX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwpzZmMgbWFpbGluZyBsaXN0CnNm
Y0BpZXRmLm9yZwpodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL3NmYwoKX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18Kc2ZjIG1haWxpbmcg
bGlzdApzZmNAaWV0Zi5vcmcKaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9z
ZmMK

----_com.samsung.android.email_3503018393531020
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: base64
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----_com.samsung.android.email_3503018393531020--


From nobody Tue Apr 26 13:53:08 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9E59212D10F for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 13:53:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KdMJVsqvI-ub for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 13:53:05 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EF30012B04B for <sfc@ietf.org>; Tue, 26 Apr 2016 13:53:04 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id BD504240828; Tue, 26 Apr 2016 13:53:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461703984; bh=uUfvQaO5fTzHQky2rKFRcYIPyzlQCQKnTZZ7vKDUqCc=; h=Subject:To:References:From:Date:In-Reply-To:From; b=RRFYYtFv5ARhECYoKdP1e4n/zv4nV9ZziWryV/CttHEJQo99ogmdjJ1kfMhM9dw71 zctpd3m8vEqVVE2TDTNce/uELWBTpla9GwMNtWbmppeIkkhikyM4QKbotMXWpP9wwG eG4oXSQOguZMHZ8QpbMeBYK7gusMwOgTd7/vRnlc=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 02541240E0F; Tue, 26 Apr 2016 13:53:03 -0700 (PDT)
To: Linda Dunbar <linda.dunbar@huawei.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <m3egarz7kh.wl-narten@us.ibm.com> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CFA1@dfweml501-mbb>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <40836304-a3b3-d16d-c9e5-4951d0100b65@joelhalpern.com>
Date: Tue, 26 Apr 2016 16:52:54 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657E7CFA1@dfweml501-mbb>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/vrQqg0wOCZgtYNU2zNXK89fzFrs>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 20:53:07 -0000

You second insertion below seems to assume that service functions 
require reassembled packets.  That is not generally true.  I am sure 
that there are some service functions that require that.  But most of 
them either:
1) do not require reassembly at all;
2) can get by with virtual reassembly where they preserve needed state 
between fragments;
3) or, even more rarely, can get by with reassembling the first and 
second packet, and then applying stateful processing thereafter.

Yours,
Joel

On 4/26/16 3:20 PM, Linda Dunbar wrote:
> Joel,
>
> Replies are inserted below:
>
>
>
> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Tuesday, April 26, 2016 12:18 PM
> To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> With regard to Transport tunnel fragementation, that seems an issue for
> the transport protocol.  I don't actually object to a sentence, but it
> does not seem that it will accomplish anything.
>
> [Linda] By having this description, you avoid a lot of future
> unnecessary debate about how fragmentation should be processed because
> some people are only thinking about Tunnel induced fragmentation where
> as some other people are thinking of Source induced fragmentation.
>
>
> With regard to packets fragmented by the source, I completely disagree
> with your assertion.  If an SFF were to reassemble the packets, that
> would be a violation of its job.  There is no reason for an SFF to
> reassemble a packet fragmented by the source.  The classifier may have
> to do some interesting things in order to properly classify succeeding
> fragments, but that is an implementation issue (most commonly addressed
> with virtual reassembly, which doe snot delay the fragments.)  We don't
> specity that.
>
> If an SF needs to reassemble fragments to do its job, that is up to the
> SF.  Some will need to actually reassemble.  Some will need to perform
> virtual reassembly, and some will happily process the fragments.  I can
> not see what the NSH document could possibly mandate.
>
> [Linda] I said “either SFF or SF” has to re-assemble the fragmented
> packets. I don’t have strong opinion on who perform the re-assembling
> job (as long as one of them do). If a set of SFs attached to a SFF are
> not capable of performing the re-assembling and they need the whole
> packet to do inspection, then the SFF don’t have any choice. I just
> think that it is necessary to add the description because it can be very
> messy (if not impossible) for SFs to process partial packets.
>
>
> Linda
>
>
>
>
> Yours,
> Joel
>
> On 4/26/16 11:47 AM, Linda Dunbar wrote:
>> Joel,
>>
>> I think the document should add the description on the following two
>> fragmentation scenarios:
>>
>> - Transport tunnel generated fragmentation: When a packet
>> fragmentation is caused by transport tunnel (i.e. various
>> encapsulations), the termination point of the transport tunnel is
>> responsible for re-assembling the fragmented pieces of the packet.
>> Since there won't be any SFF nodes in between the Transport Tunnel,
>> the tunnel generated fragmentation does not require any actions by SFF
>> nodes or SF nodes.
>>
>>
>> - Source node generated fragmentation (after adding on the NSH
>> header): When fragmentation has to be performed for a packet being
>> encapsulated with the NSH header, either the intermediate SFF nodes or
>> the SF nodes have to be able to reassemble the fragmented pieces.
>>
>>
>>
>>
>> Cheers,
>>
>>
>> Linda
>>
>> -----Original Message----- From: Joel M. Halpern
>> [mailto:jmh@joelhalpern.com] Sent: Tuesday, April 26, 2016 10:33 AM
>> To: Linda Dunbar; mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>;
> Elzur, Uri;
>> sfc@ietf.org <mailto:sfc@ietf.org> Subject: Re: [sfc] WG last call for
>> draft-ietf-sfc-nsh-04.txt
>>
>> Re-reading your note, it is possible that you are referring only to
>> the case of transport generated fragmentation of the outer packet.  I
>> had assumed you were not talking about that, since the resulting
>> fragments will not all have NSH headers.  As with any tunnel
>> technology, if the tunnel chooses to fragment at its layer, then the
>> tunnel is responsible for reassembly.  That would be invisible to the
>> SFF.
>>
>> Yours, Joel
>>
>> On 4/26/16 11:10 AM, Linda Dunbar wrote:
>>> Agree with Med.
>>>
>>> Even if each fragment piece of a packet with NSH header carries the
>>> NSH header, the intermediate SFF nodes still need to put together all
>>> the fragments together before passing the whole data frame to the SF.
>>>
>>> Linda
>>>
>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org] On
>>> Behalf Of mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> Sent:
> Monday, April 25,
>>> 2016 9:42 AM To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org <mailto:sfc@ietf.org> Subject:
>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> Re-,
>>>
>>> How do you instruct the transport layer to ALWAYS prepend an NSH
>>> header even for fragments? Or you don't care about that?
>>>
>>> Thank you.
>>>
>>> Cheers, Med
>>>
>>>> -----Message d'origine----- De : Elzur, Uri
>>>> [mailto:uri.elzur@intel.com] Envoyé : lundi 25 avril 2016 16:26 À
>>>> : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; sfc@ietf.org <mailto:sfc@ietf.org> Objet
>>>> : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Hi Med
>>>>
>>>> Not to repeat my position, but I'll do it anyhow :-) As NSH is
>>>> *NOT* a transport, dealing with fragmentation is left to the
>>>> Transport used.
>>>>
>>>> The model I use for NSH, is basically similar to VXLAN . It is an
>>>> overly.
>>>>
>>>> Thx
>>>>
>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>
>>>>
>>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]
>>>> On Behalf Of mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> Sent:
> Monday, April 25,
>>>> 2016 7:18 AM To: Joel M. Halpern <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>>; sfc@ietf.org
> <mailto:sfc@ietf.org>
>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Hi Joel,
>>>>
>>>> Please see inline.
>>>>
>>>> Cheers, Med
>>>>
>>>>> -----Message d'origine----- De : Joel M. Halpern
>>>>> [mailto:jmh@joelhalpern.com] Envoyé : lundi 25 avril 2016 15:48 À :
>>>>> BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org <mailto:sfc@ietf.org> Objet : Re: [sfc] WG last
>>>>> call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> If I am understanding you correctly Med, you are asking that the
>>>>> NSH draft specify how service chaining should cope with packets
>>>>> that have been fragmented?
>>>>>
>>>>
>>>> [Med] To be accurate, I'm asking to assess whether there are
>>>> implications. If there are, then the draft should be updated
>>>> accordingly.
>>>>
>>>>> NSH, and the SFF functionality, does not care.
>>>>
>>>> [Med] I'm not that sure. Some typical implications are listed
>>>> below:
>>>>
>>>> * SFF: If the NSH header is present only in the a fragment but SFF
>>>> didn't maintained a state, subsequent fragments won't be
>>>> appropriately processed. * SFC-aware function: if prepending a
>>>> context information depends on the full packet, not only a fragment.
>>>>
>>>> It just does its job.
>>>>
>>>> [Med] which may be disturbed in some situations as listed in the
>>>> examples above.
>>>>
>>>>> Ingress and intermediate classifiers may cope with fragments in any
>>>>> number of ways.
>>>> Specifying such is clearly out of scope for this draft.
>>>>
>>>> [Med] The purpose is not to specify the internal implementation
>>>> details but the external behavior of the classifier function when it
>>>> comes to handle fragments. That behavior may have an incidence on
>>>> SFF, in particular. The purpose is not to recommend the maximum
>>>> resources to be dedicated to out of order fragments nor the timeout
>>>> to cache those; these considerations are of course out of scope.
>>>> Nevertheless, an implementation should offer a configurable
>>>> parameter so that an operator tweak those according to its context.
>>>>
>>>>> I suppose one could write an informational draft on possible ways
>>>>> of coping.  The IETF has not usually published such.
>>>>> Service functions have to cope with fragmented packets just as they
>>>>> had to before the advent of NSH, so describing that is clearly not
>>>>> needed here.
>>>>
>>>> [Med] The advent of NSH has the following implications: * it
>>>> exacerbates fragmentation. Handing over this issue to the transport
>>>> layer may lead to interoperability issues. * the chaining may not be
>>>> efficient if fragments are inappropriately handled.
>>>>
>>>> Introducing NSH should not degrade the overall service compared to
>>>> legacy service deployment schemes.
>>>>
>>>>>
>>>>> Yours, Joel
>>>>>
>>>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> wrote:
>>>>>> Re-,
>>>>>>
>>>>>> I hear you, but my comment is that we need, as a WG, to decide
>>>>>> what to
>>>>> put in the draft. FWIW, I'm discussing two fragmentation
>>>>> issues:
>>>>>>
>>>>>> (1) Fragmentation that is caused by prepending an SFC header. (2)
>>>>>> Handling fragments at the ingress of an SFC-enabled domain.
>>>>>>
>>>>>> Increasing the MTU is for sure a recommendation is to be
>>>>>> explicitly
>>>>> called out in the text (see my first message).
>>>>>>
>>>>>> There are other issues that need to be discussed, e.g., how to
>>>>>> deal with
>>>>> fragments in SFFs/Classifiers?
>>>>>>
>>>>>> It is also "prudent" to check that no issues will be experienced
>>>>>> in SFF
>>>>> to handle fragments. If an SFC header is prepended for all
>>>>> fragments, I'm not sure there
>>>>>> is any particular issue at the SFF level, except if
>>>>>> stripping/adding
>>>>> context TLVs depends on the full packet (not just fragment). It is
>>>>> warranted to consider a little bit this point before declaring
>>>>> there is no issue.
>>>>>>
>>>>>> For point (1), declaring fragmentation out of scope would be meant
>>>>>> that
>>>>> an implementation must be prepared to receive fragments with or
>>>>> without NSH header as this is a decision that is left to the
>>>>> transport encapsulation. This is a requirement per se!
>>>>>>
>>>>>> I won't reiterate all the comments I have about the current
>>>>>> wording of
>>>>> this section.
>>>>>>
>>>>>> Cheers, Med
>>>>>>
>>>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>>> [mailto:uri.elzur@intel.com] Envoyé : lundi 25 avril 2016
>>>>>>> 08:30 À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten; sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>>> Objet : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Hi Med
>>>>>>>
>>>>>>> My point is that Fragmentation is yet another transport related
>>>>>>> issue
>>>>> that
>>>>>>> is beyond the scope of NSH and beyond the charter of the WG, so
>>>>>>> it
>>>>> doesn't
>>>>>>> really belong in the draft. We are providing an advice as
>>>>>>> extending the size of the packet may lead to fragmentation, but
>>>>>>> as you check RFC 7348 VxLAN, which my create the same issue,
>>>>>>> you'll find it doesn't even
>>>>> relate
>>>>>>> to it.
>>>>>>>
>>>>>>> Thx
>>>>>>>
>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>
>>>>>>>
>>>>>>> -----Original Message----- From: sfc
>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>> mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> Sent:
> Sunday, April 24, 2016
>>>>>>> 10:32 PM To: Elzur, Uri <uri.elzur@intel.com <mailto:uri.elzur@intel.com>>; Thomas Narten
>>>>> <narten@us.ibm.com <mailto:narten@us.ibm.com>>;
>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Subject: Re: [sfc] WG last call for
>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Hi Uri,
>>>>>>>
>>>>>>> That's another option that needs to be discussed/investigated.
>>>>>>> I'm
>>>>> afraid
>>>>>>> this is not the rationale adopted in -04 since it includes some
>>>>>>> text
>>>>> that
>>>>>>> is far to be sufficient to ensure interoperable implementations.
>>>>>>>
>>>>>>> BTW, saying that nsh does not need to deal with fragmentation
>>>>>>> because
>>>>> it
>>>>>>> is transport-independent is not IMHO a good strategy to adopt
>>>>>>> here
>>>>> because
>>>>>>> it opens the door for interoperable issues, it may lead to
>>>>>>> sub-optimal implementations if the sfc information is present
>>>>>>> only in one
>>>>> fragments,
>>>>>>> etc.
>>>>>>>
>>>>>>> My comments are related to the current text in the -04.
>>>>>>> This text needs
>>>>> to
>>>>>>> be fixed somehow.
>>>>>>>
>>>>>>> Cheers, Med
>>>>>>>
>>>>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>>>> [mailto:uri.elzur@intel.com] Envoyé : dimanche 24 avril
>>>>>>>> 2016 17:36 À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Objet : RE: [sfc] WG last call for
>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Hi Med
>>>>>>>>
>>>>>>>> I see no need to specify the exact behavior as NSH is transport
>>>>>>>> independent i.e. like NSH interaction with any other Transport
>>>>>>>> eh issue of Fragmentation is to be dealt in a way that matches
>>>>>>>> the mechanisms supported by the Transport used and do not belong
>>>>>>>> in the NSH draft
>>>>>>>>
>>>>>>>> Thx
>>>>>>>>
>>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>>
>>>>>>>>
>>>>>>>> -----Original Message----- From: sfc
>>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>>> mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> Sent:
> Thursday, April 14,
>>>>>>>> 2016 12:43 AM To: Thomas Narten <narten@us.ibm.com <mailto:narten@us.ibm.com>>;
>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Subject: Re: [sfc] WG last call for
>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> R-,
>>>>>>>>
>>>>>>>> In addition to other pending issues raised for this draft, I
>>>>>>>> would like to raise this additional one about Section 6.
>>>>>>>>
>>>>>>>> == 6.  Fragmentation Considerations
>>>>>>>>
>>>>>>>> NSH and the associated transport header are "added" to the
>>>>>>>> encapsulated packet/frame.  This additional information
>>>>>>>> increases
>>>>> the
>>>>>>>> size of the packet.  In order the ensure proper forwarding of
>>>>>>>> NSH data, several options for handling fragmentation and
>>>>>>>> re-assembly exist:
>>>>>>>>
>>>>>>>> 1.  Jumbo Frames, when supported, enable the transport of NSH
>>>>>>>> and associated transport packets without requiring
>>>>>>>> fragmentation.
>>>>>>>>
>>>>>>>> 2.  Path MTU Discovery [RFC1191]"describes a technique for
>>>>>>>> dynamically discovering the maximum transmission unit (MTU) of
>>>>> an
>>>>>>>> arbitrary internet path" and can be utilized to ensure the
>>>> the
>>>>>>>> required packet size is used.
>>>>>>>>
>>>>>>>> 3.  [RFC6830] describes two schemes for fragmentation and
>>>>>>>> re-
>>>>> assembly
>>>>>>>> in section 5.4. ==
>>>>>>>>
>>>>>>>> * The text is weak for a Standard track document that is
>>>>>>>> intended to solve the problem in
>>>>>>>> https://tools.ietf.org/html/rfc7498#section-
>>>> 2.12.
>>>>>>>> There should be a clear behavior to be followed by an
>>>> implementation.
>>>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>>>
>>>>>>>> * The text covers only fragmentation when it is induced by SFC
>>>>>>>> operations, it does not discuss the treatment of a fragment when
>>>>>>>> received in an SFC domain. IMHO, the draft should also specify
>>>>>>>> the behavior of the Classifier with regards to fragments for the
>>>>>>>> sake of proper SFC operation. Applying classification policies
>>>>>>>> may require the
>>>>>>> full packet, not only a fragment.
>>>>>>>> In particular, dedicated resources should dedicated for handling
>>>>>>>> out of order fragments. Of course, it is out of scope of this
>>>>>>>> document to describe how SFs handle fragments.
>>>>>>>>
>>>>>>>> * If an SFC header is prepended for all fragments, I'm not sure
>>>>>>>> there is any particular issue at the SFF level...except if
>>>>>>>> stripping/adding context TLVs depends on the full packet (not
>>>>>>>> just fragment). It is warranted to consider a little bit this
>>>>>>>> point before declaring there
>>>>> is
>>>>>>> no issue.
>>>>>>>>
>>>>>>>> * The text states "several options". This may be interpreted as
>>>>>>>> if implementing one of them is sufficient...which is not true.
>>>>>>>> The first two points contribute to minimize the fragmentation
>>>>>>>> risk, but fragmentation may still be experienced (e.g., other
>>>>>>>> shims are prepended by other nodes for some other purposes,
>>>>>>>> nested nsh, etc.)
>>>>>>>>
>>>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>>>
>>>>>>>> * The support of jumbo frames by a router/device does not mean
>>>>>>>> that it can make use of it. Appropriate MTU configuration should
>>>>>>>> be undertaken in a consistent manner within an SFC domain. The
>>>>>>>> text should be updated to make it is about (consistent) MTU
>>>> configuration.
>>>>>>>>
>>>>>>>> * BTW, shouldn't the text be reworded to recommended to increase
>>>>>>>> the MTU of **all nodes** of an SFC-enabled domain by at least
>>>>>>>> the length of SFC header + transport header?
>>>>>>>>
>>>>>>>> * Bullet 2, how PMTU discovery is actually used in this context?
>>>>>>>> Do you assume that all SFC-aware nodes will issue such messages
>>>>>>>> towards other SFC-aware node, arbitrary destination, else?
>>>>>>>>
>>>>>>>> * Bullet 2, I would drop "describes a technique for dynamically
>>>>>>>> discovering the maximum transmission unit
>>>>>>>> (MTU) of an arbitrary internet path".
>>>>>>>>
>>>>>>>> * Bullet 2, s/ the the/the.
>>>>>>>>
>>>>>>>> * The reference to the LISP specification raises two concerns
>>>>>>>> and one comment:
>>>>>>>>
>>>>>>>> (1) I don't think it is a good approach that fragments induced
>>>>>>>> by the network are passed to their ultimate destinations as such
>>>> (stateless).
>>>>>>>> IMO, reassembly should be done within the SFC domain
>>>>>>>> (responsible for fragmentation) not passed away. (2) Does the
>>>>>>>> stateful mode require all SFC data plane elements maintain a
>>>>>>>> full list of MTU for the any SFF/SF instance of the SFC
>>>>>>> domain?
>>>>>>>>
>>>>>>>> The current text suggests that [RFC6830] should be listed as
>>>>>>>> normative reference (not an informative one). I would personally
>>>>>>>> favor removing the reference to LISP (as it is an Experimental
>>>>>>>> RFC).
>>>>>>>>
>>>>>>>> * The security section of the draft may be augmented with
>>>>>>>> informational fragmentation-related pointers to:
>>>>>>>> e.g., RFC1858 (Security Considerations for IP Fragment
>>>>>>>> Filtering), RFC3128 (Protection Against a Variant of the Tiny
>>>>>>>> Fragment Attack), and RFC 4963 (IPv4 Reassembly Errors at High
>>>>>>>> Data Rates).
>>>>>>>>
>>>>>>>> Cheers, Med
>>>>>>>>
>>>>>>>>> -----Message d'origine----- De : sfc
>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de
>>>>>>>>> mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>
> Envoyé : lundi 11 avril
>>>>>>>>> 2016 13:14 À : Thomas Narten; sfc@ietf.org <mailto:sfc@ietf.org> Objet : Re:
>>>>>>>>> [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> Dear Thomas, all,
>>>>>>>>>
>>>>>>>>> As I mentioned during the meeting, there are several issues
>>>>>>>>> that are not covered in the last version of the draft. I
>>>>>>>>> already provided examples of the issues offline as requested by
>>>>>>>>> Martin.
>>>>>>>>>
>>>>>>>>> Cheers, Med
>>>>>>>>>
>>>>>>>>>> -----Message d'origine----- De : sfc
>>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten
>>>>>>>>>> Envoyé : jeudi 31 mars 2016 04:48 À :
>>>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Objet : [sfc] WG last call for
>>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>
>>>>>>>>>> Dear WG:
>>>>>>>>>>
>>>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
> The editors of the NSH document have indicated that they have
>>>>>>>>>> addressed all known comments and that there are no open issues
>>>>>>>>>> with the current version of the document.
>>>>>>>>>>
>>>>>>>>>> Substantive comments to the list please, editorial comments
>>>>>>>>>> can go directly to the document editors.
>>>>>>>>>>
>>>>>>>>>> We'll also get a brief update from the editors at next week's
>>>>>>>>>> meeting. If there are any remaining issues with the document,
>>>>>>>>>> raising them before the meeting would be especially helpful.
>>>>>>>>>>
>>>>>>>>>> For the chairs, Thomas
>>>>>>>>>>
>>>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>>>> list sfc@ietf.org <mailto:sfc@ietf.org> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>
>>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>>> list sfc@ietf.org <mailto:sfc@ietf.org> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>
>>>>>>>> _______________________________________________ sfc mailing list
>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________ sfc mailing list
>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>>> _______________________________________________ sfc mailing list
>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>
>>>> _______________________________________________ sfc mailing list
>>>> sfc@ietf.org <mailto:sfc@ietf.org> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>> _______________________________________________ sfc mailing list
>>> sfc@ietf.org <mailto:sfc@ietf.org> https://www.ietf.org/mailman/listinfo/sfc
>>>
>


From nobody Tue Apr 26 14:32:28 2016
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C124C12D0C9 for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 14:32:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.217
X-Spam-Level: 
X-Spam-Status: No, score=-5.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id warEklDJKVKJ for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 14:32:25 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 001C1120727 for <sfc@ietf.org>; Tue, 26 Apr 2016 14:32:23 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml701-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CIO09456; Tue, 26 Apr 2016 21:32:21 +0000 (GMT)
Received: from DFWEML702-CAH.china.huawei.com (10.193.5.176) by lhreml701-cah.china.huawei.com (10.201.5.93) with Microsoft SMTP Server (TLS) id 14.3.235.1; Tue, 26 Apr 2016 22:32:20 +0100
Received: from DFWEML501-MBB.china.huawei.com ([10.193.5.179]) by dfweml702-cah.china.huawei.com ([10.193.5.176]) with mapi id 14.03.0235.001; Tue, 26 Apr 2016 14:32:15 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfPQIp3nrjaS0+VjDL7mlh8GJ+Er+AwgARg/TCAEFX48IABYBMAgAAQOQCAAAiIAIAAcdWAgAAIhACAAAJAgIAABF8AgAEik2CAAH4AgP//ixXggACSLID//6nIYIAAkmEA//+UMlA=
Date: Tue, 26 Apr 2016 21:32:15 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657E7D111@dfweml501-mbb>
References: <m3egarz7kh.wl-narten@us.ibm.com> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CFA1@dfweml501-mbb> <40836304-a3b3-d16d-c9e5-4951d0100b65@joelhalpern.com>
In-Reply-To: <40836304-a3b3-d16d-c9e5-4951d0100b65@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.182]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020205.571FDE66.006C, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: f00e12aefba01234b913f67e0c7526fe
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/-Qq9lQCmCmiZkgT7U0_ghXXwuD0>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 21:32:27 -0000

Joel,=20

I agree that some SFs don't need to re-assemble fragmented packets. But I a=
m also aware of SFs that need to process the whole packets.=20
It would be helpful to describe your assumptions in the draft

Linda
-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
Sent: Tuesday, April 26, 2016 3:53 PM
To: Linda Dunbar; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

You second insertion below seems to assume that service functions require r=
eassembled packets.  That is not generally true.  I am sure that there are =
some service functions that require that.  But most of them either:
1) do not require reassembly at all;
2) can get by with virtual reassembly where they preserve needed state betw=
een fragments;
3) or, even more rarely, can get by with reassembling the first and second =
packet, and then applying stateful processing thereafter.

Yours,
Joel

On 4/26/16 3:20 PM, Linda Dunbar wrote:
> Joel,
>
> Replies are inserted below:
>
>
>
> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Tuesday, April 26, 2016 12:18 PM
> To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri;=20
> sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> With regard to Transport tunnel fragementation, that seems an issue=20
> for the transport protocol.  I don't actually object to a sentence,=20
> but it does not seem that it will accomplish anything.
>
> [Linda] By having this description, you avoid a lot of future=20
> unnecessary debate about how fragmentation should be processed because=20
> some people are only thinking about Tunnel induced fragmentation where=20
> as some other people are thinking of Source induced fragmentation.
>
>
> With regard to packets fragmented by the source, I completely disagree=20
> with your assertion.  If an SFF were to reassemble the packets, that=20
> would be a violation of its job.  There is no reason for an SFF to=20
> reassemble a packet fragmented by the source.  The classifier may have=20
> to do some interesting things in order to properly classify succeeding=20
> fragments, but that is an implementation issue (most commonly=20
> addressed with virtual reassembly, which doe snot delay the=20
> fragments.)  We don't specity that.
>
> If an SF needs to reassemble fragments to do its job, that is up to=20
> the SF.  Some will need to actually reassemble.  Some will need to=20
> perform virtual reassembly, and some will happily process the=20
> fragments.  I can not see what the NSH document could possibly mandate.
>
> [Linda] I said "either SFF or SF" has to re-assemble the fragmented=20
> packets. I don't have strong opinion on who perform the re-assembling=20
> job (as long as one of them do). If a set of SFs attached to a SFF are=20
> not capable of performing the re-assembling and they need the whole=20
> packet to do inspection, then the SFF don't have any choice. I just=20
> think that it is necessary to add the description because it can be=20
> very messy (if not impossible) for SFs to process partial packets.
>
>
> Linda
>
>
>
>
> Yours,
> Joel
>
> On 4/26/16 11:47 AM, Linda Dunbar wrote:
>> Joel,
>>
>> I think the document should add the description on the following two=20
>> fragmentation scenarios:
>>
>> - Transport tunnel generated fragmentation: When a packet=20
>> fragmentation is caused by transport tunnel (i.e. various=20
>> encapsulations), the termination point of the transport tunnel is=20
>> responsible for re-assembling the fragmented pieces of the packet.
>> Since there won't be any SFF nodes in between the Transport Tunnel,=20
>> the tunnel generated fragmentation does not require any actions by=20
>> SFF nodes or SF nodes.
>>
>>
>> - Source node generated fragmentation (after adding on the NSH
>> header): When fragmentation has to be performed for a packet being=20
>> encapsulated with the NSH header, either the intermediate SFF nodes=20
>> or the SF nodes have to be able to reassemble the fragmented pieces.
>>
>>
>>
>>
>> Cheers,
>>
>>
>> Linda
>>
>> -----Original Message----- From: Joel M. Halpern=20
>> [mailto:jmh@joelhalpern.com] Sent: Tuesday, April 26, 2016 10:33 AM
>> To: Linda Dunbar; mohamed.boucadair@orange.com=20
>> <mailto:mohamed.boucadair@orange.com>;
> Elzur, Uri;
>> sfc@ietf.org <mailto:sfc@ietf.org> Subject: Re: [sfc] WG last call=20
>> for draft-ietf-sfc-nsh-04.txt
>>
>> Re-reading your note, it is possible that you are referring only to=20
>> the case of transport generated fragmentation of the outer packet.  I=20
>> had assumed you were not talking about that, since the resulting=20
>> fragments will not all have NSH headers.  As with any tunnel=20
>> technology, if the tunnel chooses to fragment at its layer, then the=20
>> tunnel is responsible for reassembly.  That would be invisible to the=20
>> SFF.
>>
>> Yours, Joel
>>
>> On 4/26/16 11:10 AM, Linda Dunbar wrote:
>>> Agree with Med.
>>>
>>> Even if each fragment piece of a packet with NSH header carries the=20
>>> NSH header, the intermediate SFF nodes still need to put together=20
>>> all the fragments together before passing the whole data frame to the S=
F.
>>>
>>> Linda
>>>
>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]=20
>>> On Behalf Of mohamed.boucadair@orange.com <mailto:mohamed.boucadair@ora=
nge.com> Sent:
> Monday, April 25,
>>> 2016 9:42 AM To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org <mailto:sfc@=
ietf.org> Subject:
>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> Re-,
>>>
>>> How do you instruct the transport layer to ALWAYS prepend an NSH=20
>>> header even for fragments? Or you don't care about that?
>>>
>>> Thank you.
>>>
>>> Cheers, Med
>>>
>>>> -----Message d'origine----- De : Elzur, Uri=20
>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril 2016 16:26 =C0
>>>> : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; sfc@ietf.org=20
>>>> <mailto:sfc@ietf.org> Objet
>>>> : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Hi Med
>>>>
>>>> Not to repeat my position, but I'll do it anyhow :-) As NSH is
>>>> *NOT* a transport, dealing with fragmentation is left to the=20
>>>> Transport used.
>>>>
>>>> The model I use for NSH, is basically similar to VXLAN . It is an=20
>>>> overly.
>>>>
>>>> Thx
>>>>
>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>
>>>>
>>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]=20
>>>> On Behalf Of mohamed.boucadair@orange.com <mailto:mohamed.boucadair@or=
ange.com> Sent:
> Monday, April 25,
>>>> 2016 7:18 AM To: Joel M. Halpern <jmh@joelhalpern.com=20
>>>> <mailto:jmh@joelhalpern.com>>; sfc@ietf.org
> <mailto:sfc@ietf.org>
>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Hi Joel,
>>>>
>>>> Please see inline.
>>>>
>>>> Cheers, Med
>>>>
>>>>> -----Message d'origine----- De : Joel M. Halpern=20
>>>>> [mailto:jmh@joelhalpern.com] Envoy=E9 : lundi 25 avril 2016 15:48 =C0=
 :
>>>>> BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org <mailto:sfc@ietf.org>=20
>>>>> Objet : Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> If I am understanding you correctly Med, you are asking that the=20
>>>>> NSH draft specify how service chaining should cope with packets=20
>>>>> that have been fragmented?
>>>>>
>>>>
>>>> [Med] To be accurate, I'm asking to assess whether there are=20
>>>> implications. If there are, then the draft should be updated=20
>>>> accordingly.
>>>>
>>>>> NSH, and the SFF functionality, does not care.
>>>>
>>>> [Med] I'm not that sure. Some typical implications are listed
>>>> below:
>>>>
>>>> * SFF: If the NSH header is present only in the a fragment but SFF=20
>>>> didn't maintained a state, subsequent fragments won't be=20
>>>> appropriately processed. * SFC-aware function: if prepending a=20
>>>> context information depends on the full packet, not only a fragment.
>>>>
>>>> It just does its job.
>>>>
>>>> [Med] which may be disturbed in some situations as listed in the=20
>>>> examples above.
>>>>
>>>>> Ingress and intermediate classifiers may cope with fragments in=20
>>>>> any number of ways.
>>>> Specifying such is clearly out of scope for this draft.
>>>>
>>>> [Med] The purpose is not to specify the internal implementation=20
>>>> details but the external behavior of the classifier function when=20
>>>> it comes to handle fragments. That behavior may have an incidence=20
>>>> on SFF, in particular. The purpose is not to recommend the maximum=20
>>>> resources to be dedicated to out of order fragments nor the timeout=20
>>>> to cache those; these considerations are of course out of scope.
>>>> Nevertheless, an implementation should offer a configurable=20
>>>> parameter so that an operator tweak those according to its context.
>>>>
>>>>> I suppose one could write an informational draft on possible ways=20
>>>>> of coping.  The IETF has not usually published such.
>>>>> Service functions have to cope with fragmented packets just as=20
>>>>> they had to before the advent of NSH, so describing that is=20
>>>>> clearly not needed here.
>>>>
>>>> [Med] The advent of NSH has the following implications: * it=20
>>>> exacerbates fragmentation. Handing over this issue to the transport=20
>>>> layer may lead to interoperability issues. * the chaining may not=20
>>>> be efficient if fragments are inappropriately handled.
>>>>
>>>> Introducing NSH should not degrade the overall service compared to=20
>>>> legacy service deployment schemes.
>>>>
>>>>>
>>>>> Yours, Joel
>>>>>
>>>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com <mailto:mohamed.bouc=
adair@orange.com> wrote:
>>>>>> Re-,
>>>>>>
>>>>>> I hear you, but my comment is that we need, as a WG, to decide=20
>>>>>> what to
>>>>> put in the draft. FWIW, I'm discussing two fragmentation
>>>>> issues:
>>>>>>
>>>>>> (1) Fragmentation that is caused by prepending an SFC header. (2)=20
>>>>>> Handling fragments at the ingress of an SFC-enabled domain.
>>>>>>
>>>>>> Increasing the MTU is for sure a recommendation is to be=20
>>>>>> explicitly
>>>>> called out in the text (see my first message).
>>>>>>
>>>>>> There are other issues that need to be discussed, e.g., how to=20
>>>>>> deal with
>>>>> fragments in SFFs/Classifiers?
>>>>>>
>>>>>> It is also "prudent" to check that no issues will be experienced=20
>>>>>> in SFF
>>>>> to handle fragments. If an SFC header is prepended for all=20
>>>>> fragments, I'm not sure there
>>>>>> is any particular issue at the SFF level, except if=20
>>>>>> stripping/adding
>>>>> context TLVs depends on the full packet (not just fragment). It is=20
>>>>> warranted to consider a little bit this point before declaring=20
>>>>> there is no issue.
>>>>>>
>>>>>> For point (1), declaring fragmentation out of scope would be=20
>>>>>> meant that
>>>>> an implementation must be prepared to receive fragments with or=20
>>>>> without NSH header as this is a decision that is left to the=20
>>>>> transport encapsulation. This is a requirement per se!
>>>>>>
>>>>>> I won't reiterate all the comments I have about the current=20
>>>>>> wording of
>>>>> this section.
>>>>>>
>>>>>> Cheers, Med
>>>>>>
>>>>>>> -----Message d'origine----- De : Elzur, Uri=20
>>>>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril 2016
>>>>>>> 08:30 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten; sfc@ietf.org=
=20
>>>>>>> <mailto:sfc@ietf.org> Objet : RE: [sfc] WG last call for=20
>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Hi Med
>>>>>>>
>>>>>>> My point is that Fragmentation is yet another transport related=20
>>>>>>> issue
>>>>> that
>>>>>>> is beyond the scope of NSH and beyond the charter of the WG, so=20
>>>>>>> it
>>>>> doesn't
>>>>>>> really belong in the draft. We are providing an advice as=20
>>>>>>> extending the size of the packet may lead to fragmentation, but=20
>>>>>>> as you check RFC 7348 VxLAN, which my create the same issue,=20
>>>>>>> you'll find it doesn't even
>>>>> relate
>>>>>>> to it.
>>>>>>>
>>>>>>> Thx
>>>>>>>
>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>
>>>>>>>
>>>>>>> -----Original Message----- From: sfc=20
>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of=20
>>>>>>> mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> =
Sent:
> Sunday, April 24, 2016
>>>>>>> 10:32 PM To: Elzur, Uri <uri.elzur@intel.com=20
>>>>>>> <mailto:uri.elzur@intel.com>>; Thomas Narten
>>>>> <narten@us.ibm.com <mailto:narten@us.ibm.com>>;
>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Subject: Re: [sfc] WG last=20
>>>>>>> call for draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> Hi Uri,
>>>>>>>
>>>>>>> That's another option that needs to be discussed/investigated.
>>>>>>> I'm
>>>>> afraid
>>>>>>> this is not the rationale adopted in -04 since it includes some=20
>>>>>>> text
>>>>> that
>>>>>>> is far to be sufficient to ensure interoperable implementations.
>>>>>>>
>>>>>>> BTW, saying that nsh does not need to deal with fragmentation=20
>>>>>>> because
>>>>> it
>>>>>>> is transport-independent is not IMHO a good strategy to adopt=20
>>>>>>> here
>>>>> because
>>>>>>> it opens the door for interoperable issues, it may lead to=20
>>>>>>> sub-optimal implementations if the sfc information is present=20
>>>>>>> only in one
>>>>> fragments,
>>>>>>> etc.
>>>>>>>
>>>>>>> My comments are related to the current text in the -04.
>>>>>>> This text needs
>>>>> to
>>>>>>> be fixed somehow.
>>>>>>>
>>>>>>> Cheers, Med
>>>>>>>
>>>>>>>> -----Message d'origine----- De : Elzur, Uri=20
>>>>>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche 24 avril
>>>>>>>> 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;=20
>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Objet : RE: [sfc] WG last=20
>>>>>>>> call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Hi Med
>>>>>>>>
>>>>>>>> I see no need to specify the exact behavior as NSH is transport=20
>>>>>>>> independent i.e. like NSH interaction with any other Transport=20
>>>>>>>> eh issue of Fragmentation is to be dealt in a way that matches=20
>>>>>>>> the mechanisms supported by the Transport used and do not=20
>>>>>>>> belong in the NSH draft
>>>>>>>>
>>>>>>>> Thx
>>>>>>>>
>>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>>
>>>>>>>>
>>>>>>>> -----Original Message----- From: sfc=20
>>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of=20
>>>>>>>> mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>=
 Sent:
> Thursday, April 14,
>>>>>>>> 2016 12:43 AM To: Thomas Narten <narten@us.ibm.com=20
>>>>>>>> <mailto:narten@us.ibm.com>>; sfc@ietf.org <mailto:sfc@ietf.org>=20
>>>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> R-,
>>>>>>>>
>>>>>>>> In addition to other pending issues raised for this draft, I=20
>>>>>>>> would like to raise this additional one about Section 6.
>>>>>>>>
>>>>>>>> =3D=3D 6.  Fragmentation Considerations
>>>>>>>>
>>>>>>>> NSH and the associated transport header are "added" to the=20
>>>>>>>> encapsulated packet/frame.  This additional information=20
>>>>>>>> increases
>>>>> the
>>>>>>>> size of the packet.  In order the ensure proper forwarding of=20
>>>>>>>> NSH data, several options for handling fragmentation and=20
>>>>>>>> re-assembly exist:
>>>>>>>>
>>>>>>>> 1.  Jumbo Frames, when supported, enable the transport of NSH=20
>>>>>>>> and associated transport packets without requiring=20
>>>>>>>> fragmentation.
>>>>>>>>
>>>>>>>> 2.  Path MTU Discovery [RFC1191]"describes a technique for=20
>>>>>>>> dynamically discovering the maximum transmission unit (MTU) of
>>>>> an
>>>>>>>> arbitrary internet path" and can be utilized to ensure the
>>>> the
>>>>>>>> required packet size is used.
>>>>>>>>
>>>>>>>> 3.  [RFC6830] describes two schemes for fragmentation and
>>>>>>>> re-
>>>>> assembly
>>>>>>>> in section 5.4. =3D=3D
>>>>>>>>
>>>>>>>> * The text is weak for a Standard track document that is=20
>>>>>>>> intended to solve the problem in
>>>>>>>> https://tools.ietf.org/html/rfc7498#section-
>>>> 2.12.
>>>>>>>> There should be a clear behavior to be followed by an
>>>> implementation.
>>>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>>>
>>>>>>>> * The text covers only fragmentation when it is induced by SFC=20
>>>>>>>> operations, it does not discuss the treatment of a fragment=20
>>>>>>>> when received in an SFC domain. IMHO, the draft should also=20
>>>>>>>> specify the behavior of the Classifier with regards to=20
>>>>>>>> fragments for the sake of proper SFC operation. Applying=20
>>>>>>>> classification policies may require the
>>>>>>> full packet, not only a fragment.
>>>>>>>> In particular, dedicated resources should dedicated for=20
>>>>>>>> handling out of order fragments. Of course, it is out of scope=20
>>>>>>>> of this document to describe how SFs handle fragments.
>>>>>>>>
>>>>>>>> * If an SFC header is prepended for all fragments, I'm not sure=20
>>>>>>>> there is any particular issue at the SFF level...except if=20
>>>>>>>> stripping/adding context TLVs depends on the full packet (not=20
>>>>>>>> just fragment). It is warranted to consider a little bit this=20
>>>>>>>> point before declaring there
>>>>> is
>>>>>>> no issue.
>>>>>>>>
>>>>>>>> * The text states "several options". This may be interpreted as=20
>>>>>>>> if implementing one of them is sufficient...which is not true.
>>>>>>>> The first two points contribute to minimize the fragmentation=20
>>>>>>>> risk, but fragmentation may still be experienced (e.g., other=20
>>>>>>>> shims are prepended by other nodes for some other purposes,=20
>>>>>>>> nested nsh, etc.)
>>>>>>>>
>>>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>>>
>>>>>>>> * The support of jumbo frames by a router/device does not mean=20
>>>>>>>> that it can make use of it. Appropriate MTU configuration=20
>>>>>>>> should be undertaken in a consistent manner within an SFC=20
>>>>>>>> domain. The text should be updated to make it is about=20
>>>>>>>> (consistent) MTU
>>>> configuration.
>>>>>>>>
>>>>>>>> * BTW, shouldn't the text be reworded to recommended to=20
>>>>>>>> increase the MTU of **all nodes** of an SFC-enabled domain by=20
>>>>>>>> at least the length of SFC header + transport header?
>>>>>>>>
>>>>>>>> * Bullet 2, how PMTU discovery is actually used in this context?
>>>>>>>> Do you assume that all SFC-aware nodes will issue such messages=20
>>>>>>>> towards other SFC-aware node, arbitrary destination, else?
>>>>>>>>
>>>>>>>> * Bullet 2, I would drop "describes a technique for dynamically=20
>>>>>>>> discovering the maximum transmission unit
>>>>>>>> (MTU) of an arbitrary internet path".
>>>>>>>>
>>>>>>>> * Bullet 2, s/ the the/the.
>>>>>>>>
>>>>>>>> * The reference to the LISP specification raises two concerns=20
>>>>>>>> and one comment:
>>>>>>>>
>>>>>>>> (1) I don't think it is a good approach that fragments induced=20
>>>>>>>> by the network are passed to their ultimate destinations as=20
>>>>>>>> such
>>>> (stateless).
>>>>>>>> IMO, reassembly should be done within the SFC domain=20
>>>>>>>> (responsible for fragmentation) not passed away. (2) Does the=20
>>>>>>>> stateful mode require all SFC data plane elements maintain a=20
>>>>>>>> full list of MTU for the any SFF/SF instance of the SFC
>>>>>>> domain?
>>>>>>>>
>>>>>>>> The current text suggests that [RFC6830] should be listed as=20
>>>>>>>> normative reference (not an informative one). I would=20
>>>>>>>> personally favor removing the reference to LISP (as it is an=20
>>>>>>>> Experimental RFC).
>>>>>>>>
>>>>>>>> * The security section of the draft may be augmented with=20
>>>>>>>> informational fragmentation-related pointers to:
>>>>>>>> e.g., RFC1858 (Security Considerations for IP Fragment=20
>>>>>>>> Filtering), RFC3128 (Protection Against a Variant of the Tiny=20
>>>>>>>> Fragment Attack), and RFC 4963 (IPv4 Reassembly Errors at High=20
>>>>>>>> Data Rates).
>>>>>>>>
>>>>>>>> Cheers, Med
>>>>>>>>
>>>>>>>>> -----Message d'origine----- De : sfc=20
>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de=20
>>>>>>>>> mohamed.boucadair@orange.com=20
>>>>>>>>> <mailto:mohamed.boucadair@orange.com>
> Envoy=E9 : lundi 11 avril
>>>>>>>>> 2016 13:14 =C0 : Thomas Narten; sfc@ietf.org <mailto:sfc@ietf.org=
> Objet : Re:
>>>>>>>>> [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> Dear Thomas, all,
>>>>>>>>>
>>>>>>>>> As I mentioned during the meeting, there are several issues=20
>>>>>>>>> that are not covered in the last version of the draft. I=20
>>>>>>>>> already provided examples of the issues offline as requested=20
>>>>>>>>> by Martin.
>>>>>>>>>
>>>>>>>>> Cheers, Med
>>>>>>>>>
>>>>>>>>>> -----Message d'origine----- De : sfc=20
>>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten=20
>>>>>>>>>> Envoy=E9 : jeudi 31 mars 2016 04:48 =C0 :
>>>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Objet : [sfc] WG last call=20
>>>>>>>>>> for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>
>>>>>>>>>> Dear WG:
>>>>>>>>>>
>>>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt=20
>>>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
> The editors of the NSH document have indicated that they have
>>>>>>>>>> addressed all known comments and that there are no open=20
>>>>>>>>>> issues with the current version of the document.
>>>>>>>>>>
>>>>>>>>>> Substantive comments to the list please, editorial comments=20
>>>>>>>>>> can go directly to the document editors.
>>>>>>>>>>
>>>>>>>>>> We'll also get a brief update from the editors at next week's=20
>>>>>>>>>> meeting. If there are any remaining issues with the document,=20
>>>>>>>>>> raising them before the meeting would be especially helpful.
>>>>>>>>>>
>>>>>>>>>> For the chairs, Thomas
>>>>>>>>>>
>>>>>>>>>> _______________________________________________ sfc mailing=20
>>>>>>>>>> list sfc@ietf.org <mailto:sfc@ietf.org>=20
>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>
>>>>>>>>> _______________________________________________ sfc mailing=20
>>>>>>>>> list sfc@ietf.org <mailto:sfc@ietf.org>=20
>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>
>>>>>>>> _______________________________________________ sfc mailing=20
>>>>>>>> list sfc@ietf.org <mailto:sfc@ietf.org>=20
>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________ sfc mailing list=20
>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org>=20
>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>>> _______________________________________________ sfc mailing list=20
>>>>>> sfc@ietf.org <mailto:sfc@ietf.org>=20
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>
>>>> _______________________________________________ sfc mailing list=20
>>>> sfc@ietf.org <mailto:sfc@ietf.org>=20
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>> _______________________________________________ sfc mailing list=20
>>> sfc@ietf.org <mailto:sfc@ietf.org>=20
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Apr 26 14:43:08 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D5C6512B071 for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 14:43:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id myx7wqBm7Zed for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 14:43:05 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 100FC120727 for <sfc@ietf.org>; Tue, 26 Apr 2016 14:43:05 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id CC1A5259F28; Tue, 26 Apr 2016 14:43:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461706984; bh=d7EdJG1HU5Mo1L4zGTfw7PUOmluIMXEWmysgT5BS5AA=; h=Subject:To:References:From:Date:In-Reply-To:From; b=NkeZmzPcs6a8gaqtkZTH2LTMSUZAj2ujAMWDrtghRJzgnmH5FvN992UiGJn05L6Rj JD5I1coqRTx8O8VldUTKnzhER80cylSlDVHcrt/Ma2mowT2ZsbQSOfI2OHguMDvHEw fgQVNooKqWKqQqqtOKR1xPYjDU3p5VwHxj5ZxRN4=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id EA39424E0BB; Tue, 26 Apr 2016 14:43:03 -0700 (PDT)
To: Linda Dunbar <linda.dunbar@huawei.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CFA1@dfweml501-mbb> <40836304-a3b3-d16d-c9e5-4951d0100b65@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7D111@dfweml501-mbb>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <f01ccc02-7891-63c9-142b-b1aa72a4c3d6@joelhalpern.com>
Date: Tue, 26 Apr 2016 17:42:54 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657E7D111@dfweml501-mbb>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/plV5oWBh4bkon9tFO9Kq2Wr86cY>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 21:43:08 -0000

The draft assumes that SFF are network elements.  Network elements do 
not normally reassemble packets not addressed to themselves.  As such, 
the assumption you refer to is the norm.

Yes, some SF need to reassemble packets.  We presume that functions 
which need to do somethign will do so.  This is not something that 
changes by adding SFC or NSH to service chaining or even to non-chaining 
transparent in-line service delivery.

I have trouble seeing how a sentence such as "Service Functions which 
require fully reassembled transport packets are responsible for such 
reassembly" would add value.  I also don't see how it could go in the 
NSH document, as it has nothing to do with NSH.

Yours,
Joel

On 4/26/16 5:32 PM, Linda Dunbar wrote:
> Joel,
>
> I agree that some SFs don't need to re-assemble fragmented packets. But I am also aware of SFs that need to process the whole packets.
> It would be helpful to describe your assumptions in the draft
>
> Linda
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
> Sent: Tuesday, April 26, 2016 3:53 PM
> To: Linda Dunbar; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> You second insertion below seems to assume that service functions require reassembled packets.  That is not generally true.  I am sure that there are some service functions that require that.  But most of them either:
> 1) do not require reassembly at all;
> 2) can get by with virtual reassembly where they preserve needed state between fragments;
> 3) or, even more rarely, can get by with reassembling the first and second packet, and then applying stateful processing thereafter.
>
> Yours,
> Joel
>
> On 4/26/16 3:20 PM, Linda Dunbar wrote:
>> Joel,
>>
>> Replies are inserted below:
>>
>>
>>
>> -----Original Message-----
>> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
>> Sent: Tuesday, April 26, 2016 12:18 PM
>> To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri;
>> sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> With regard to Transport tunnel fragementation, that seems an issue
>> for the transport protocol.  I don't actually object to a sentence,
>> but it does not seem that it will accomplish anything.
>>
>> [Linda] By having this description, you avoid a lot of future
>> unnecessary debate about how fragmentation should be processed because
>> some people are only thinking about Tunnel induced fragmentation where
>> as some other people are thinking of Source induced fragmentation.
>>
>>
>> With regard to packets fragmented by the source, I completely disagree
>> with your assertion.  If an SFF were to reassemble the packets, that
>> would be a violation of its job.  There is no reason for an SFF to
>> reassemble a packet fragmented by the source.  The classifier may have
>> to do some interesting things in order to properly classify succeeding
>> fragments, but that is an implementation issue (most commonly
>> addressed with virtual reassembly, which doe snot delay the
>> fragments.)  We don't specity that.
>>
>> If an SF needs to reassemble fragments to do its job, that is up to
>> the SF.  Some will need to actually reassemble.  Some will need to
>> perform virtual reassembly, and some will happily process the
>> fragments.  I can not see what the NSH document could possibly mandate.
>>
>> [Linda] I said "either SFF or SF" has to re-assemble the fragmented
>> packets. I don't have strong opinion on who perform the re-assembling
>> job (as long as one of them do). If a set of SFs attached to a SFF are
>> not capable of performing the re-assembling and they need the whole
>> packet to do inspection, then the SFF don't have any choice. I just
>> think that it is necessary to add the description because it can be
>> very messy (if not impossible) for SFs to process partial packets.
>>
>>
>> Linda
>>
>>
>>
>>
>> Yours,
>> Joel
>>
>> On 4/26/16 11:47 AM, Linda Dunbar wrote:
>>> Joel,
>>>
>>> I think the document should add the description on the following two
>>> fragmentation scenarios:
>>>
>>> - Transport tunnel generated fragmentation: When a packet
>>> fragmentation is caused by transport tunnel (i.e. various
>>> encapsulations), the termination point of the transport tunnel is
>>> responsible for re-assembling the fragmented pieces of the packet.
>>> Since there won't be any SFF nodes in between the Transport Tunnel,
>>> the tunnel generated fragmentation does not require any actions by
>>> SFF nodes or SF nodes.
>>>
>>>
>>> - Source node generated fragmentation (after adding on the NSH
>>> header): When fragmentation has to be performed for a packet being
>>> encapsulated with the NSH header, either the intermediate SFF nodes
>>> or the SF nodes have to be able to reassemble the fragmented pieces.
>>>
>>>
>>>
>>>
>>> Cheers,
>>>
>>>
>>> Linda
>>>
>>> -----Original Message----- From: Joel M. Halpern
>>> [mailto:jmh@joelhalpern.com] Sent: Tuesday, April 26, 2016 10:33 AM
>>> To: Linda Dunbar; mohamed.boucadair@orange.com
>>> <mailto:mohamed.boucadair@orange.com>;
>> Elzur, Uri;
>>> sfc@ietf.org <mailto:sfc@ietf.org> Subject: Re: [sfc] WG last call
>>> for draft-ietf-sfc-nsh-04.txt
>>>
>>> Re-reading your note, it is possible that you are referring only to
>>> the case of transport generated fragmentation of the outer packet.  I
>>> had assumed you were not talking about that, since the resulting
>>> fragments will not all have NSH headers.  As with any tunnel
>>> technology, if the tunnel chooses to fragment at its layer, then the
>>> tunnel is responsible for reassembly.  That would be invisible to the
>>> SFF.
>>>
>>> Yours, Joel
>>>
>>> On 4/26/16 11:10 AM, Linda Dunbar wrote:
>>>> Agree with Med.
>>>>
>>>> Even if each fragment piece of a packet with NSH header carries the
>>>> NSH header, the intermediate SFF nodes still need to put together
>>>> all the fragments together before passing the whole data frame to the SF.
>>>>
>>>> Linda
>>>>
>>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]
>>>> On Behalf Of mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> Sent:
>> Monday, April 25,
>>>> 2016 9:42 AM To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org <mailto:sfc@ietf.org> Subject:
>>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Re-,
>>>>
>>>> How do you instruct the transport layer to ALWAYS prepend an NSH
>>>> header even for fragments? Or you don't care about that?
>>>>
>>>> Thank you.
>>>>
>>>> Cheers, Med
>>>>
>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>> [mailto:uri.elzur@intel.com] Envoyé : lundi 25 avril 2016 16:26 À
>>>>> : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; sfc@ietf.org
>>>>> <mailto:sfc@ietf.org> Objet
>>>>> : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Med
>>>>>
>>>>> Not to repeat my position, but I'll do it anyhow :-) As NSH is
>>>>> *NOT* a transport, dealing with fragmentation is left to the
>>>>> Transport used.
>>>>>
>>>>> The model I use for NSH, is basically similar to VXLAN . It is an
>>>>> overly.
>>>>>
>>>>> Thx
>>>>>
>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>
>>>>>
>>>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]
>>>>> On Behalf Of mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> Sent:
>> Monday, April 25,
>>>>> 2016 7:18 AM To: Joel M. Halpern <jmh@joelhalpern.com
>>>>> <mailto:jmh@joelhalpern.com>>; sfc@ietf.org
>> <mailto:sfc@ietf.org>
>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Joel,
>>>>>
>>>>> Please see inline.
>>>>>
>>>>> Cheers, Med
>>>>>
>>>>>> -----Message d'origine----- De : Joel M. Halpern
>>>>>> [mailto:jmh@joelhalpern.com] Envoyé : lundi 25 avril 2016 15:48 À :
>>>>>> BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>> Objet : Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> If I am understanding you correctly Med, you are asking that the
>>>>>> NSH draft specify how service chaining should cope with packets
>>>>>> that have been fragmented?
>>>>>>
>>>>>
>>>>> [Med] To be accurate, I'm asking to assess whether there are
>>>>> implications. If there are, then the draft should be updated
>>>>> accordingly.
>>>>>
>>>>>> NSH, and the SFF functionality, does not care.
>>>>>
>>>>> [Med] I'm not that sure. Some typical implications are listed
>>>>> below:
>>>>>
>>>>> * SFF: If the NSH header is present only in the a fragment but SFF
>>>>> didn't maintained a state, subsequent fragments won't be
>>>>> appropriately processed. * SFC-aware function: if prepending a
>>>>> context information depends on the full packet, not only a fragment.
>>>>>
>>>>> It just does its job.
>>>>>
>>>>> [Med] which may be disturbed in some situations as listed in the
>>>>> examples above.
>>>>>
>>>>>> Ingress and intermediate classifiers may cope with fragments in
>>>>>> any number of ways.
>>>>> Specifying such is clearly out of scope for this draft.
>>>>>
>>>>> [Med] The purpose is not to specify the internal implementation
>>>>> details but the external behavior of the classifier function when
>>>>> it comes to handle fragments. That behavior may have an incidence
>>>>> on SFF, in particular. The purpose is not to recommend the maximum
>>>>> resources to be dedicated to out of order fragments nor the timeout
>>>>> to cache those; these considerations are of course out of scope.
>>>>> Nevertheless, an implementation should offer a configurable
>>>>> parameter so that an operator tweak those according to its context.
>>>>>
>>>>>> I suppose one could write an informational draft on possible ways
>>>>>> of coping.  The IETF has not usually published such.
>>>>>> Service functions have to cope with fragmented packets just as
>>>>>> they had to before the advent of NSH, so describing that is
>>>>>> clearly not needed here.
>>>>>
>>>>> [Med] The advent of NSH has the following implications: * it
>>>>> exacerbates fragmentation. Handing over this issue to the transport
>>>>> layer may lead to interoperability issues. * the chaining may not
>>>>> be efficient if fragments are inappropriately handled.
>>>>>
>>>>> Introducing NSH should not degrade the overall service compared to
>>>>> legacy service deployment schemes.
>>>>>
>>>>>>
>>>>>> Yours, Joel
>>>>>>
>>>>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> wrote:
>>>>>>> Re-,
>>>>>>>
>>>>>>> I hear you, but my comment is that we need, as a WG, to decide
>>>>>>> what to
>>>>>> put in the draft. FWIW, I'm discussing two fragmentation
>>>>>> issues:
>>>>>>>
>>>>>>> (1) Fragmentation that is caused by prepending an SFC header. (2)
>>>>>>> Handling fragments at the ingress of an SFC-enabled domain.
>>>>>>>
>>>>>>> Increasing the MTU is for sure a recommendation is to be
>>>>>>> explicitly
>>>>>> called out in the text (see my first message).
>>>>>>>
>>>>>>> There are other issues that need to be discussed, e.g., how to
>>>>>>> deal with
>>>>>> fragments in SFFs/Classifiers?
>>>>>>>
>>>>>>> It is also "prudent" to check that no issues will be experienced
>>>>>>> in SFF
>>>>>> to handle fragments. If an SFC header is prepended for all
>>>>>> fragments, I'm not sure there
>>>>>>> is any particular issue at the SFF level, except if
>>>>>>> stripping/adding
>>>>>> context TLVs depends on the full packet (not just fragment). It is
>>>>>> warranted to consider a little bit this point before declaring
>>>>>> there is no issue.
>>>>>>>
>>>>>>> For point (1), declaring fragmentation out of scope would be
>>>>>>> meant that
>>>>>> an implementation must be prepared to receive fragments with or
>>>>>> without NSH header as this is a decision that is left to the
>>>>>> transport encapsulation. This is a requirement per se!
>>>>>>>
>>>>>>> I won't reiterate all the comments I have about the current
>>>>>>> wording of
>>>>>> this section.
>>>>>>>
>>>>>>> Cheers, Med
>>>>>>>
>>>>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>>>> [mailto:uri.elzur@intel.com] Envoyé : lundi 25 avril 2016
>>>>>>>> 08:30 À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten; sfc@ietf.org
>>>>>>>> <mailto:sfc@ietf.org> Objet : RE: [sfc] WG last call for
>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Hi Med
>>>>>>>>
>>>>>>>> My point is that Fragmentation is yet another transport related
>>>>>>>> issue
>>>>>> that
>>>>>>>> is beyond the scope of NSH and beyond the charter of the WG, so
>>>>>>>> it
>>>>>> doesn't
>>>>>>>> really belong in the draft. We are providing an advice as
>>>>>>>> extending the size of the packet may lead to fragmentation, but
>>>>>>>> as you check RFC 7348 VxLAN, which my create the same issue,
>>>>>>>> you'll find it doesn't even
>>>>>> relate
>>>>>>>> to it.
>>>>>>>>
>>>>>>>> Thx
>>>>>>>>
>>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>>
>>>>>>>>
>>>>>>>> -----Original Message----- From: sfc
>>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>>> mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> Sent:
>> Sunday, April 24, 2016
>>>>>>>> 10:32 PM To: Elzur, Uri <uri.elzur@intel.com
>>>>>>>> <mailto:uri.elzur@intel.com>>; Thomas Narten
>>>>>> <narten@us.ibm.com <mailto:narten@us.ibm.com>>;
>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Subject: Re: [sfc] WG last
>>>>>>>> call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Hi Uri,
>>>>>>>>
>>>>>>>> That's another option that needs to be discussed/investigated.
>>>>>>>> I'm
>>>>>> afraid
>>>>>>>> this is not the rationale adopted in -04 since it includes some
>>>>>>>> text
>>>>>> that
>>>>>>>> is far to be sufficient to ensure interoperable implementations.
>>>>>>>>
>>>>>>>> BTW, saying that nsh does not need to deal with fragmentation
>>>>>>>> because
>>>>>> it
>>>>>>>> is transport-independent is not IMHO a good strategy to adopt
>>>>>>>> here
>>>>>> because
>>>>>>>> it opens the door for interoperable issues, it may lead to
>>>>>>>> sub-optimal implementations if the sfc information is present
>>>>>>>> only in one
>>>>>> fragments,
>>>>>>>> etc.
>>>>>>>>
>>>>>>>> My comments are related to the current text in the -04.
>>>>>>>> This text needs
>>>>>> to
>>>>>>>> be fixed somehow.
>>>>>>>>
>>>>>>>> Cheers, Med
>>>>>>>>
>>>>>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>>>>> [mailto:uri.elzur@intel.com] Envoyé : dimanche 24 avril
>>>>>>>>> 2016 17:36 À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Objet : RE: [sfc] WG last
>>>>>>>>> call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> Hi Med
>>>>>>>>>
>>>>>>>>> I see no need to specify the exact behavior as NSH is transport
>>>>>>>>> independent i.e. like NSH interaction with any other Transport
>>>>>>>>> eh issue of Fragmentation is to be dealt in a way that matches
>>>>>>>>> the mechanisms supported by the Transport used and do not
>>>>>>>>> belong in the NSH draft
>>>>>>>>>
>>>>>>>>> Thx
>>>>>>>>>
>>>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> -----Original Message----- From: sfc
>>>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>>>> mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> Sent:
>> Thursday, April 14,
>>>>>>>>> 2016 12:43 AM To: Thomas Narten <narten@us.ibm.com
>>>>>>>>> <mailto:narten@us.ibm.com>>; sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> R-,
>>>>>>>>>
>>>>>>>>> In addition to other pending issues raised for this draft, I
>>>>>>>>> would like to raise this additional one about Section 6.
>>>>>>>>>
>>>>>>>>> == 6.  Fragmentation Considerations
>>>>>>>>>
>>>>>>>>> NSH and the associated transport header are "added" to the
>>>>>>>>> encapsulated packet/frame.  This additional information
>>>>>>>>> increases
>>>>>> the
>>>>>>>>> size of the packet.  In order the ensure proper forwarding of
>>>>>>>>> NSH data, several options for handling fragmentation and
>>>>>>>>> re-assembly exist:
>>>>>>>>>
>>>>>>>>> 1.  Jumbo Frames, when supported, enable the transport of NSH
>>>>>>>>> and associated transport packets without requiring
>>>>>>>>> fragmentation.
>>>>>>>>>
>>>>>>>>> 2.  Path MTU Discovery [RFC1191]"describes a technique for
>>>>>>>>> dynamically discovering the maximum transmission unit (MTU) of
>>>>>> an
>>>>>>>>> arbitrary internet path" and can be utilized to ensure the
>>>>> the
>>>>>>>>> required packet size is used.
>>>>>>>>>
>>>>>>>>> 3.  [RFC6830] describes two schemes for fragmentation and
>>>>>>>>> re-
>>>>>> assembly
>>>>>>>>> in section 5.4. ==
>>>>>>>>>
>>>>>>>>> * The text is weak for a Standard track document that is
>>>>>>>>> intended to solve the problem in
>>>>>>>>> https://tools.ietf.org/html/rfc7498#section-
>>>>> 2.12.
>>>>>>>>> There should be a clear behavior to be followed by an
>>>>> implementation.
>>>>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>>>>
>>>>>>>>> * The text covers only fragmentation when it is induced by SFC
>>>>>>>>> operations, it does not discuss the treatment of a fragment
>>>>>>>>> when received in an SFC domain. IMHO, the draft should also
>>>>>>>>> specify the behavior of the Classifier with regards to
>>>>>>>>> fragments for the sake of proper SFC operation. Applying
>>>>>>>>> classification policies may require the
>>>>>>>> full packet, not only a fragment.
>>>>>>>>> In particular, dedicated resources should dedicated for
>>>>>>>>> handling out of order fragments. Of course, it is out of scope
>>>>>>>>> of this document to describe how SFs handle fragments.
>>>>>>>>>
>>>>>>>>> * If an SFC header is prepended for all fragments, I'm not sure
>>>>>>>>> there is any particular issue at the SFF level...except if
>>>>>>>>> stripping/adding context TLVs depends on the full packet (not
>>>>>>>>> just fragment). It is warranted to consider a little bit this
>>>>>>>>> point before declaring there
>>>>>> is
>>>>>>>> no issue.
>>>>>>>>>
>>>>>>>>> * The text states "several options". This may be interpreted as
>>>>>>>>> if implementing one of them is sufficient...which is not true.
>>>>>>>>> The first two points contribute to minimize the fragmentation
>>>>>>>>> risk, but fragmentation may still be experienced (e.g., other
>>>>>>>>> shims are prepended by other nodes for some other purposes,
>>>>>>>>> nested nsh, etc.)
>>>>>>>>>
>>>>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>>>>
>>>>>>>>> * The support of jumbo frames by a router/device does not mean
>>>>>>>>> that it can make use of it. Appropriate MTU configuration
>>>>>>>>> should be undertaken in a consistent manner within an SFC
>>>>>>>>> domain. The text should be updated to make it is about
>>>>>>>>> (consistent) MTU
>>>>> configuration.
>>>>>>>>>
>>>>>>>>> * BTW, shouldn't the text be reworded to recommended to
>>>>>>>>> increase the MTU of **all nodes** of an SFC-enabled domain by
>>>>>>>>> at least the length of SFC header + transport header?
>>>>>>>>>
>>>>>>>>> * Bullet 2, how PMTU discovery is actually used in this context?
>>>>>>>>> Do you assume that all SFC-aware nodes will issue such messages
>>>>>>>>> towards other SFC-aware node, arbitrary destination, else?
>>>>>>>>>
>>>>>>>>> * Bullet 2, I would drop "describes a technique for dynamically
>>>>>>>>> discovering the maximum transmission unit
>>>>>>>>> (MTU) of an arbitrary internet path".
>>>>>>>>>
>>>>>>>>> * Bullet 2, s/ the the/the.
>>>>>>>>>
>>>>>>>>> * The reference to the LISP specification raises two concerns
>>>>>>>>> and one comment:
>>>>>>>>>
>>>>>>>>> (1) I don't think it is a good approach that fragments induced
>>>>>>>>> by the network are passed to their ultimate destinations as
>>>>>>>>> such
>>>>> (stateless).
>>>>>>>>> IMO, reassembly should be done within the SFC domain
>>>>>>>>> (responsible for fragmentation) not passed away. (2) Does the
>>>>>>>>> stateful mode require all SFC data plane elements maintain a
>>>>>>>>> full list of MTU for the any SFF/SF instance of the SFC
>>>>>>>> domain?
>>>>>>>>>
>>>>>>>>> The current text suggests that [RFC6830] should be listed as
>>>>>>>>> normative reference (not an informative one). I would
>>>>>>>>> personally favor removing the reference to LISP (as it is an
>>>>>>>>> Experimental RFC).
>>>>>>>>>
>>>>>>>>> * The security section of the draft may be augmented with
>>>>>>>>> informational fragmentation-related pointers to:
>>>>>>>>> e.g., RFC1858 (Security Considerations for IP Fragment
>>>>>>>>> Filtering), RFC3128 (Protection Against a Variant of the Tiny
>>>>>>>>> Fragment Attack), and RFC 4963 (IPv4 Reassembly Errors at High
>>>>>>>>> Data Rates).
>>>>>>>>>
>>>>>>>>> Cheers, Med
>>>>>>>>>
>>>>>>>>>> -----Message d'origine----- De : sfc
>>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de
>>>>>>>>>> mohamed.boucadair@orange.com
>>>>>>>>>> <mailto:mohamed.boucadair@orange.com>
>> Envoyé : lundi 11 avril
>>>>>>>>>> 2016 13:14 À : Thomas Narten; sfc@ietf.org <mailto:sfc@ietf.org> Objet : Re:
>>>>>>>>>> [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>
>>>>>>>>>> Dear Thomas, all,
>>>>>>>>>>
>>>>>>>>>> As I mentioned during the meeting, there are several issues
>>>>>>>>>> that are not covered in the last version of the draft. I
>>>>>>>>>> already provided examples of the issues offline as requested
>>>>>>>>>> by Martin.
>>>>>>>>>>
>>>>>>>>>> Cheers, Med
>>>>>>>>>>
>>>>>>>>>>> -----Message d'origine----- De : sfc
>>>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten
>>>>>>>>>>> Envoyé : jeudi 31 mars 2016 04:48 À :
>>>>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Objet : [sfc] WG last call
>>>>>>>>>>> for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>>
>>>>>>>>>>> Dear WG:
>>>>>>>>>>>
>>>>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>> The editors of the NSH document have indicated that they have
>>>>>>>>>>> addressed all known comments and that there are no open
>>>>>>>>>>> issues with the current version of the document.
>>>>>>>>>>>
>>>>>>>>>>> Substantive comments to the list please, editorial comments
>>>>>>>>>>> can go directly to the document editors.
>>>>>>>>>>>
>>>>>>>>>>> We'll also get a brief update from the editors at next week's
>>>>>>>>>>> meeting. If there are any remaining issues with the document,
>>>>>>>>>>> raising them before the meeting would be especially helpful.
>>>>>>>>>>>
>>>>>>>>>>> For the chairs, Thomas
>>>>>>>>>>>
>>>>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>>>>> list sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>>
>>>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>>>> list sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>
>>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>>> list sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>
>>>>>>>> _______________________________________________ sfc mailing list
>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________ sfc mailing list
>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>
>>>>> _______________________________________________ sfc mailing list
>>>>> sfc@ietf.org <mailto:sfc@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>>> _______________________________________________ sfc mailing list
>>>> sfc@ietf.org <mailto:sfc@ietf.org>
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Tue Apr 26 15:23:45 2016
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B16112B02B for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 15:23:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.217
X-Spam-Level: 
X-Spam-Status: No, score=-5.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PhtiBik_0YKl for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 15:23:40 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F8ED12D0B0 for <sfc@ietf.org>; Tue, 26 Apr 2016 15:23:38 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml701-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CIO15158; Tue, 26 Apr 2016 22:22:33 +0000 (GMT)
Received: from DFWEML702-CAH.china.huawei.com (10.193.5.176) by lhreml701-cah.china.huawei.com (10.201.5.93) with Microsoft SMTP Server (TLS) id 14.3.235.1; Tue, 26 Apr 2016 23:22:32 +0100
Received: from DFWEML501-MBB.china.huawei.com ([10.193.5.179]) by dfweml702-cah.china.huawei.com ([10.193.5.176]) with mapi id 14.03.0235.001; Tue, 26 Apr 2016 15:22:26 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfPQIp3nrjaS0+VjDL7mlh8GJ+Er+AwgARg/TCAEFX48IABYBMAgAAQOQCAAAiIAIAAcdWAgAAIhACAAAJAgIAABF8AgAEik2CAAH4AgP//ixXggACSLID//6nIYIAAkmEA//+UMlAADzjUAAANlJ/Q
Date: Tue, 26 Apr 2016 22:22:25 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657E7D1A2@dfweml501-mbb>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CFA1@dfweml501-mbb> <40836304-a3b3-d16d-c9e5-4951d0100b65@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7D111@dfweml501-mbb> <f01ccc02-7891-63c9-142b-b1aa72a4c3d6@joelhalpern.com>
In-Reply-To: <f01ccc02-7891-63c9-142b-b1aa72a4c3d6@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.182]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A0B0201.571FEA69.013A, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: f00e12aefba01234b913f67e0c7526fe
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/HZnngFPbnh8YHKDL5UZoxcyY0zw>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 22:23:44 -0000

Joel,=20

Where is a better place to describe how to deal with the Fragmentation indu=
ced by NSH header than the NSF document?=20

The NSH header induced fragmentation is very different from Tunnel encapsul=
ation induced fragmentation in the following aspects:

- Tunnel induced fragmented pieces of a packet will not be processed by any=
 intermediate nodes other than forwarding. As all fragmented pieces have th=
e Dest/Source, all the intermediate nodes can forward based on the Dst/Src.=
=20

- NSH induced fragmented pieces of a packet will be processed by SF in the =
middle. Some of the SFs do need to inspect the whole packet or multiple fra=
gmented pieces --> warrant partial or whole re-assembling.=20


Therefore, I disagree with your statement of "NSH header induced fragmentat=
ion has nothing to do with NSH".=20

Linda=20
=20

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
Sent: Tuesday, April 26, 2016 4:43 PM
To: Linda Dunbar; sfc@ietf.org
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

The draft assumes that SFF are network elements.  Network elements do not n=
ormally reassemble packets not addressed to themselves.  As such, the assum=
ption you refer to is the norm.

Yes, some SF need to reassemble packets.  We presume that functions which n=
eed to do somethign will do so.  This is not something that changes by addi=
ng SFC or NSH to service chaining or even to non-chaining transparent in-li=
ne service delivery.

I have trouble seeing how a sentence such as "Service Functions which requi=
re fully reassembled transport packets are responsible for such reassembly"=
 would add value.  I also don't see how it could go in the NSH document, as=
 it has nothing to do with NSH.

Yours,
Joel

On 4/26/16 5:32 PM, Linda Dunbar wrote:
> Joel,
>
> I agree that some SFs don't need to re-assemble fragmented packets. But I=
 am also aware of SFs that need to process the whole packets.
> It would be helpful to describe your assumptions in the draft
>
> Linda
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
> Sent: Tuesday, April 26, 2016 3:53 PM
> To: Linda Dunbar; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> You second insertion below seems to assume that service functions require=
 reassembled packets.  That is not generally true.  I am sure that there ar=
e some service functions that require that.  But most of them either:
> 1) do not require reassembly at all;
> 2) can get by with virtual reassembly where they preserve needed state=20
> between fragments;
> 3) or, even more rarely, can get by with reassembling the first and secon=
d packet, and then applying stateful processing thereafter.
>
> Yours,
> Joel
>
> On 4/26/16 3:20 PM, Linda Dunbar wrote:
>> Joel,
>>
>> Replies are inserted below:
>>
>>
>>
>> -----Original Message-----
>> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
>> Sent: Tuesday, April 26, 2016 12:18 PM
>> To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri;=20
>> sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> With regard to Transport tunnel fragementation, that seems an issue=20
>> for the transport protocol.  I don't actually object to a sentence,=20
>> but it does not seem that it will accomplish anything.
>>
>> [Linda] By having this description, you avoid a lot of future=20
>> unnecessary debate about how fragmentation should be processed=20
>> because some people are only thinking about Tunnel induced=20
>> fragmentation where as some other people are thinking of Source induced =
fragmentation.
>>
>>
>> With regard to packets fragmented by the source, I completely=20
>> disagree with your assertion.  If an SFF were to reassemble the=20
>> packets, that would be a violation of its job.  There is no reason=20
>> for an SFF to reassemble a packet fragmented by the source.  The=20
>> classifier may have to do some interesting things in order to=20
>> properly classify succeeding fragments, but that is an implementation=20
>> issue (most commonly addressed with virtual reassembly, which doe=20
>> snot delay the
>> fragments.)  We don't specity that.
>>
>> If an SF needs to reassemble fragments to do its job, that is up to=20
>> the SF.  Some will need to actually reassemble.  Some will need to=20
>> perform virtual reassembly, and some will happily process the=20
>> fragments.  I can not see what the NSH document could possibly mandate.
>>
>> [Linda] I said "either SFF or SF" has to re-assemble the fragmented=20
>> packets. I don't have strong opinion on who perform the re-assembling=20
>> job (as long as one of them do). If a set of SFs attached to a SFF=20
>> are not capable of performing the re-assembling and they need the=20
>> whole packet to do inspection, then the SFF don't have any choice. I=20
>> just think that it is necessary to add the description because it can=20
>> be very messy (if not impossible) for SFs to process partial packets.
>>
>>
>> Linda
>>
>>
>>
>>
>> Yours,
>> Joel
>>
>> On 4/26/16 11:47 AM, Linda Dunbar wrote:
>>> Joel,
>>>
>>> I think the document should add the description on the following two=20
>>> fragmentation scenarios:
>>>
>>> - Transport tunnel generated fragmentation: When a packet=20
>>> fragmentation is caused by transport tunnel (i.e. various=20
>>> encapsulations), the termination point of the transport tunnel is=20
>>> responsible for re-assembling the fragmented pieces of the packet.
>>> Since there won't be any SFF nodes in between the Transport Tunnel,=20
>>> the tunnel generated fragmentation does not require any actions by=20
>>> SFF nodes or SF nodes.
>>>
>>>
>>> - Source node generated fragmentation (after adding on the NSH
>>> header): When fragmentation has to be performed for a packet being=20
>>> encapsulated with the NSH header, either the intermediate SFF nodes=20
>>> or the SF nodes have to be able to reassemble the fragmented pieces.
>>>
>>>
>>>
>>>
>>> Cheers,
>>>
>>>
>>> Linda
>>>
>>> -----Original Message----- From: Joel M. Halpern=20
>>> [mailto:jmh@joelhalpern.com] Sent: Tuesday, April 26, 2016 10:33 AM
>>> To: Linda Dunbar; mohamed.boucadair@orange.com=20
>>> <mailto:mohamed.boucadair@orange.com>;
>> Elzur, Uri;
>>> sfc@ietf.org <mailto:sfc@ietf.org> Subject: Re: [sfc] WG last call=20
>>> for draft-ietf-sfc-nsh-04.txt
>>>
>>> Re-reading your note, it is possible that you are referring only to=20
>>> the case of transport generated fragmentation of the outer packet. =20
>>> I had assumed you were not talking about that, since the resulting=20
>>> fragments will not all have NSH headers.  As with any tunnel=20
>>> technology, if the tunnel chooses to fragment at its layer, then the=20
>>> tunnel is responsible for reassembly.  That would be invisible to=20
>>> the SFF.
>>>
>>> Yours, Joel
>>>
>>> On 4/26/16 11:10 AM, Linda Dunbar wrote:
>>>> Agree with Med.
>>>>
>>>> Even if each fragment piece of a packet with NSH header carries the=20
>>>> NSH header, the intermediate SFF nodes still need to put together=20
>>>> all the fragments together before passing the whole data frame to the =
SF.
>>>>
>>>> Linda
>>>>
>>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]=20
>>>> On Behalf Of mohamed.boucadair@orange.com <mailto:mohamed.boucadair@or=
ange.com> Sent:
>> Monday, April 25,
>>>> 2016 9:42 AM To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org <mailto:sfc=
@ietf.org> Subject:
>>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Re-,
>>>>
>>>> How do you instruct the transport layer to ALWAYS prepend an NSH=20
>>>> header even for fragments? Or you don't care about that?
>>>>
>>>> Thank you.
>>>>
>>>> Cheers, Med
>>>>
>>>>> -----Message d'origine----- De : Elzur, Uri=20
>>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril 2016 16:26 =C0
>>>>> : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; sfc@ietf.org=20
>>>>> <mailto:sfc@ietf.org> Objet
>>>>> : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Med
>>>>>
>>>>> Not to repeat my position, but I'll do it anyhow :-) As NSH is
>>>>> *NOT* a transport, dealing with fragmentation is left to the=20
>>>>> Transport used.
>>>>>
>>>>> The model I use for NSH, is basically similar to VXLAN . It is an=20
>>>>> overly.
>>>>>
>>>>> Thx
>>>>>
>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>
>>>>>
>>>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]=20
>>>>> On Behalf Of mohamed.boucadair@orange.com <mailto:mohamed.boucadair@o=
range.com> Sent:
>> Monday, April 25,
>>>>> 2016 7:18 AM To: Joel M. Halpern <jmh@joelhalpern.com=20
>>>>> <mailto:jmh@joelhalpern.com>>; sfc@ietf.org
>> <mailto:sfc@ietf.org>
>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Joel,
>>>>>
>>>>> Please see inline.
>>>>>
>>>>> Cheers, Med
>>>>>
>>>>>> -----Message d'origine----- De : Joel M. Halpern=20
>>>>>> [mailto:jmh@joelhalpern.com] Envoy=E9 : lundi 25 avril 2016 15:48 =
=C0 :
>>>>>> BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org <mailto:sfc@ietf.org>=20
>>>>>> Objet : Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> If I am understanding you correctly Med, you are asking that the=20
>>>>>> NSH draft specify how service chaining should cope with packets=20
>>>>>> that have been fragmented?
>>>>>>
>>>>>
>>>>> [Med] To be accurate, I'm asking to assess whether there are=20
>>>>> implications. If there are, then the draft should be updated=20
>>>>> accordingly.
>>>>>
>>>>>> NSH, and the SFF functionality, does not care.
>>>>>
>>>>> [Med] I'm not that sure. Some typical implications are listed
>>>>> below:
>>>>>
>>>>> * SFF: If the NSH header is present only in the a fragment but SFF=20
>>>>> didn't maintained a state, subsequent fragments won't be=20
>>>>> appropriately processed. * SFC-aware function: if prepending a=20
>>>>> context information depends on the full packet, not only a fragment.
>>>>>
>>>>> It just does its job.
>>>>>
>>>>> [Med] which may be disturbed in some situations as listed in the=20
>>>>> examples above.
>>>>>
>>>>>> Ingress and intermediate classifiers may cope with fragments in=20
>>>>>> any number of ways.
>>>>> Specifying such is clearly out of scope for this draft.
>>>>>
>>>>> [Med] The purpose is not to specify the internal implementation=20
>>>>> details but the external behavior of the classifier function when=20
>>>>> it comes to handle fragments. That behavior may have an incidence=20
>>>>> on SFF, in particular. The purpose is not to recommend the maximum=20
>>>>> resources to be dedicated to out of order fragments nor the=20
>>>>> timeout to cache those; these considerations are of course out of sco=
pe.
>>>>> Nevertheless, an implementation should offer a configurable=20
>>>>> parameter so that an operator tweak those according to its context.
>>>>>
>>>>>> I suppose one could write an informational draft on possible ways=20
>>>>>> of coping.  The IETF has not usually published such.
>>>>>> Service functions have to cope with fragmented packets just as=20
>>>>>> they had to before the advent of NSH, so describing that is=20
>>>>>> clearly not needed here.
>>>>>
>>>>> [Med] The advent of NSH has the following implications: * it=20
>>>>> exacerbates fragmentation. Handing over this issue to the=20
>>>>> transport layer may lead to interoperability issues. * the=20
>>>>> chaining may not be efficient if fragments are inappropriately handle=
d.
>>>>>
>>>>> Introducing NSH should not degrade the overall service compared to=20
>>>>> legacy service deployment schemes.
>>>>>
>>>>>>
>>>>>> Yours, Joel
>>>>>>
>>>>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com <mailto:mohamed.bou=
cadair@orange.com> wrote:
>>>>>>> Re-,
>>>>>>>
>>>>>>> I hear you, but my comment is that we need, as a WG, to decide=20
>>>>>>> what to
>>>>>> put in the draft. FWIW, I'm discussing two fragmentation
>>>>>> issues:
>>>>>>>
>>>>>>> (1) Fragmentation that is caused by prepending an SFC header.=20
>>>>>>> (2) Handling fragments at the ingress of an SFC-enabled domain.
>>>>>>>
>>>>>>> Increasing the MTU is for sure a recommendation is to be=20
>>>>>>> explicitly
>>>>>> called out in the text (see my first message).
>>>>>>>
>>>>>>> There are other issues that need to be discussed, e.g., how to=20
>>>>>>> deal with
>>>>>> fragments in SFFs/Classifiers?
>>>>>>>
>>>>>>> It is also "prudent" to check that no issues will be experienced=20
>>>>>>> in SFF
>>>>>> to handle fragments. If an SFC header is prepended for all=20
>>>>>> fragments, I'm not sure there
>>>>>>> is any particular issue at the SFF level, except if=20
>>>>>>> stripping/adding
>>>>>> context TLVs depends on the full packet (not just fragment). It=20
>>>>>> is warranted to consider a little bit this point before declaring=20
>>>>>> there is no issue.
>>>>>>>
>>>>>>> For point (1), declaring fragmentation out of scope would be=20
>>>>>>> meant that
>>>>>> an implementation must be prepared to receive fragments with or=20
>>>>>> without NSH header as this is a decision that is left to the=20
>>>>>> transport encapsulation. This is a requirement per se!
>>>>>>>
>>>>>>> I won't reiterate all the comments I have about the current=20
>>>>>>> wording of
>>>>>> this section.
>>>>>>>
>>>>>>> Cheers, Med
>>>>>>>
>>>>>>>> -----Message d'origine----- De : Elzur, Uri=20
>>>>>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril 2016
>>>>>>>> 08:30 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;=20
>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Objet : RE: [sfc] WG last=20
>>>>>>>> call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Hi Med
>>>>>>>>
>>>>>>>> My point is that Fragmentation is yet another transport related=20
>>>>>>>> issue
>>>>>> that
>>>>>>>> is beyond the scope of NSH and beyond the charter of the WG, so=20
>>>>>>>> it
>>>>>> doesn't
>>>>>>>> really belong in the draft. We are providing an advice as=20
>>>>>>>> extending the size of the packet may lead to fragmentation, but=20
>>>>>>>> as you check RFC 7348 VxLAN, which my create the same issue,=20
>>>>>>>> you'll find it doesn't even
>>>>>> relate
>>>>>>>> to it.
>>>>>>>>
>>>>>>>> Thx
>>>>>>>>
>>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>>
>>>>>>>>
>>>>>>>> -----Original Message----- From: sfc=20
>>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of=20
>>>>>>>> mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>=
 Sent:
>> Sunday, April 24, 2016
>>>>>>>> 10:32 PM To: Elzur, Uri <uri.elzur@intel.com=20
>>>>>>>> <mailto:uri.elzur@intel.com>>; Thomas Narten
>>>>>> <narten@us.ibm.com <mailto:narten@us.ibm.com>>;
>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Subject: Re: [sfc] WG last=20
>>>>>>>> call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Hi Uri,
>>>>>>>>
>>>>>>>> That's another option that needs to be discussed/investigated.
>>>>>>>> I'm
>>>>>> afraid
>>>>>>>> this is not the rationale adopted in -04 since it includes some=20
>>>>>>>> text
>>>>>> that
>>>>>>>> is far to be sufficient to ensure interoperable implementations.
>>>>>>>>
>>>>>>>> BTW, saying that nsh does not need to deal with fragmentation=20
>>>>>>>> because
>>>>>> it
>>>>>>>> is transport-independent is not IMHO a good strategy to adopt=20
>>>>>>>> here
>>>>>> because
>>>>>>>> it opens the door for interoperable issues, it may lead to=20
>>>>>>>> sub-optimal implementations if the sfc information is present=20
>>>>>>>> only in one
>>>>>> fragments,
>>>>>>>> etc.
>>>>>>>>
>>>>>>>> My comments are related to the current text in the -04.
>>>>>>>> This text needs
>>>>>> to
>>>>>>>> be fixed somehow.
>>>>>>>>
>>>>>>>> Cheers, Med
>>>>>>>>
>>>>>>>>> -----Message d'origine----- De : Elzur, Uri=20
>>>>>>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche 24 avril
>>>>>>>>> 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;=20
>>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Objet : RE: [sfc] WG last=20
>>>>>>>>> call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> Hi Med
>>>>>>>>>
>>>>>>>>> I see no need to specify the exact behavior as NSH is=20
>>>>>>>>> transport independent i.e. like NSH interaction with any other=20
>>>>>>>>> Transport eh issue of Fragmentation is to be dealt in a way=20
>>>>>>>>> that matches the mechanisms supported by the Transport used=20
>>>>>>>>> and do not belong in the NSH draft
>>>>>>>>>
>>>>>>>>> Thx
>>>>>>>>>
>>>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> -----Original Message----- From: sfc=20
>>>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of=20
>>>>>>>>> mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com=
> Sent:
>> Thursday, April 14,
>>>>>>>>> 2016 12:43 AM To: Thomas Narten <narten@us.ibm.com=20
>>>>>>>>> <mailto:narten@us.ibm.com>>; sfc@ietf.org=20
>>>>>>>>> <mailto:sfc@ietf.org>
>>>>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> R-,
>>>>>>>>>
>>>>>>>>> In addition to other pending issues raised for this draft, I=20
>>>>>>>>> would like to raise this additional one about Section 6.
>>>>>>>>>
>>>>>>>>> =3D=3D 6.  Fragmentation Considerations
>>>>>>>>>
>>>>>>>>> NSH and the associated transport header are "added" to the=20
>>>>>>>>> encapsulated packet/frame.  This additional information=20
>>>>>>>>> increases
>>>>>> the
>>>>>>>>> size of the packet.  In order the ensure proper forwarding of=20
>>>>>>>>> NSH data, several options for handling fragmentation and=20
>>>>>>>>> re-assembly exist:
>>>>>>>>>
>>>>>>>>> 1.  Jumbo Frames, when supported, enable the transport of NSH=20
>>>>>>>>> and associated transport packets without requiring=20
>>>>>>>>> fragmentation.
>>>>>>>>>
>>>>>>>>> 2.  Path MTU Discovery [RFC1191]"describes a technique for=20
>>>>>>>>> dynamically discovering the maximum transmission unit (MTU) of
>>>>>> an
>>>>>>>>> arbitrary internet path" and can be utilized to ensure the
>>>>> the
>>>>>>>>> required packet size is used.
>>>>>>>>>
>>>>>>>>> 3.  [RFC6830] describes two schemes for fragmentation and
>>>>>>>>> re-
>>>>>> assembly
>>>>>>>>> in section 5.4. =3D=3D
>>>>>>>>>
>>>>>>>>> * The text is weak for a Standard track document that is=20
>>>>>>>>> intended to solve the problem in
>>>>>>>>> https://tools.ietf.org/html/rfc7498#section-
>>>>> 2.12.
>>>>>>>>> There should be a clear behavior to be followed by an
>>>>> implementation.
>>>>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>>>>
>>>>>>>>> * The text covers only fragmentation when it is induced by SFC=20
>>>>>>>>> operations, it does not discuss the treatment of a fragment=20
>>>>>>>>> when received in an SFC domain. IMHO, the draft should also=20
>>>>>>>>> specify the behavior of the Classifier with regards to=20
>>>>>>>>> fragments for the sake of proper SFC operation. Applying=20
>>>>>>>>> classification policies may require the
>>>>>>>> full packet, not only a fragment.
>>>>>>>>> In particular, dedicated resources should dedicated for=20
>>>>>>>>> handling out of order fragments. Of course, it is out of scope=20
>>>>>>>>> of this document to describe how SFs handle fragments.
>>>>>>>>>
>>>>>>>>> * If an SFC header is prepended for all fragments, I'm not=20
>>>>>>>>> sure there is any particular issue at the SFF level...except=20
>>>>>>>>> if stripping/adding context TLVs depends on the full packet=20
>>>>>>>>> (not just fragment). It is warranted to consider a little bit=20
>>>>>>>>> this point before declaring there
>>>>>> is
>>>>>>>> no issue.
>>>>>>>>>
>>>>>>>>> * The text states "several options". This may be interpreted=20
>>>>>>>>> as if implementing one of them is sufficient...which is not true.
>>>>>>>>> The first two points contribute to minimize the fragmentation=20
>>>>>>>>> risk, but fragmentation may still be experienced (e.g., other=20
>>>>>>>>> shims are prepended by other nodes for some other purposes,=20
>>>>>>>>> nested nsh, etc.)
>>>>>>>>>
>>>>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>>>>
>>>>>>>>> * The support of jumbo frames by a router/device does not mean=20
>>>>>>>>> that it can make use of it. Appropriate MTU configuration=20
>>>>>>>>> should be undertaken in a consistent manner within an SFC=20
>>>>>>>>> domain. The text should be updated to make it is about
>>>>>>>>> (consistent) MTU
>>>>> configuration.
>>>>>>>>>
>>>>>>>>> * BTW, shouldn't the text be reworded to recommended to=20
>>>>>>>>> increase the MTU of **all nodes** of an SFC-enabled domain by=20
>>>>>>>>> at least the length of SFC header + transport header?
>>>>>>>>>
>>>>>>>>> * Bullet 2, how PMTU discovery is actually used in this context?
>>>>>>>>> Do you assume that all SFC-aware nodes will issue such=20
>>>>>>>>> messages towards other SFC-aware node, arbitrary destination, els=
e?
>>>>>>>>>
>>>>>>>>> * Bullet 2, I would drop "describes a technique for=20
>>>>>>>>> dynamically discovering the maximum transmission unit
>>>>>>>>> (MTU) of an arbitrary internet path".
>>>>>>>>>
>>>>>>>>> * Bullet 2, s/ the the/the.
>>>>>>>>>
>>>>>>>>> * The reference to the LISP specification raises two concerns=20
>>>>>>>>> and one comment:
>>>>>>>>>
>>>>>>>>> (1) I don't think it is a good approach that fragments induced=20
>>>>>>>>> by the network are passed to their ultimate destinations as=20
>>>>>>>>> such
>>>>> (stateless).
>>>>>>>>> IMO, reassembly should be done within the SFC domain=20
>>>>>>>>> (responsible for fragmentation) not passed away. (2) Does the=20
>>>>>>>>> stateful mode require all SFC data plane elements maintain a=20
>>>>>>>>> full list of MTU for the any SFF/SF instance of the SFC
>>>>>>>> domain?
>>>>>>>>>
>>>>>>>>> The current text suggests that [RFC6830] should be listed as=20
>>>>>>>>> normative reference (not an informative one). I would=20
>>>>>>>>> personally favor removing the reference to LISP (as it is an=20
>>>>>>>>> Experimental RFC).
>>>>>>>>>
>>>>>>>>> * The security section of the draft may be augmented with=20
>>>>>>>>> informational fragmentation-related pointers to:
>>>>>>>>> e.g., RFC1858 (Security Considerations for IP Fragment=20
>>>>>>>>> Filtering), RFC3128 (Protection Against a Variant of the Tiny=20
>>>>>>>>> Fragment Attack), and RFC 4963 (IPv4 Reassembly Errors at High=20
>>>>>>>>> Data Rates).
>>>>>>>>>
>>>>>>>>> Cheers, Med
>>>>>>>>>
>>>>>>>>>> -----Message d'origine----- De : sfc=20
>>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de=20
>>>>>>>>>> mohamed.boucadair@orange.com=20
>>>>>>>>>> <mailto:mohamed.boucadair@orange.com>
>> Envoy=E9 : lundi 11 avril
>>>>>>>>>> 2016 13:14 =C0 : Thomas Narten; sfc@ietf.org <mailto:sfc@ietf.or=
g> Objet : Re:
>>>>>>>>>> [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>
>>>>>>>>>> Dear Thomas, all,
>>>>>>>>>>
>>>>>>>>>> As I mentioned during the meeting, there are several issues=20
>>>>>>>>>> that are not covered in the last version of the draft. I=20
>>>>>>>>>> already provided examples of the issues offline as requested=20
>>>>>>>>>> by Martin.
>>>>>>>>>>
>>>>>>>>>> Cheers, Med
>>>>>>>>>>
>>>>>>>>>>> -----Message d'origine----- De : sfc=20
>>>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten=20
>>>>>>>>>>> Envoy=E9 : jeudi 31 mars 2016 04:48 =C0 :
>>>>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Objet : [sfc] WG last=20
>>>>>>>>>>> call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>>
>>>>>>>>>>> Dear WG:
>>>>>>>>>>>
>>>>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt=20
>>>>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>> The editors of the NSH document have indicated that they have
>>>>>>>>>>> addressed all known comments and that there are no open=20
>>>>>>>>>>> issues with the current version of the document.
>>>>>>>>>>>
>>>>>>>>>>> Substantive comments to the list please, editorial comments=20
>>>>>>>>>>> can go directly to the document editors.
>>>>>>>>>>>
>>>>>>>>>>> We'll also get a brief update from the editors at next=20
>>>>>>>>>>> week's meeting. If there are any remaining issues with the=20
>>>>>>>>>>> document, raising them before the meeting would be especially h=
elpful.
>>>>>>>>>>>
>>>>>>>>>>> For the chairs, Thomas
>>>>>>>>>>>
>>>>>>>>>>> _______________________________________________ sfc mailing=20
>>>>>>>>>>> list sfc@ietf.org <mailto:sfc@ietf.org>=20
>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>>
>>>>>>>>>> _______________________________________________ sfc mailing=20
>>>>>>>>>> list sfc@ietf.org <mailto:sfc@ietf.org>=20
>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>
>>>>>>>>> _______________________________________________ sfc mailing=20
>>>>>>>>> list sfc@ietf.org <mailto:sfc@ietf.org>=20
>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>
>>>>>>>> _______________________________________________ sfc mailing=20
>>>>>>>> list sfc@ietf.org <mailto:sfc@ietf.org>=20
>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________ sfc mailing list=20
>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org>=20
>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>
>>>>> _______________________________________________ sfc mailing list=20
>>>>> sfc@ietf.org <mailto:sfc@ietf.org>=20
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>>> _______________________________________________ sfc mailing list=20
>>>> sfc@ietf.org <mailto:sfc@ietf.org>=20
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Apr 26 15:29:21 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5CAA512D0B0 for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 15:29:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 17Dee0QubKwV for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 15:29:17 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A655812D0FA for <sfc@ietf.org>; Tue, 26 Apr 2016 15:29:17 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 6FD50258B35; Tue, 26 Apr 2016 15:29:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461709757; bh=XeogAdZToVpzG1SqZ9RLov29qGIZSkj/J2YaxfX8sMo=; h=Subject:To:References:From:Date:In-Reply-To:From; b=dN6gDEbtpnc7yDfA0mrzZ9nUk62MJQsobnPl+VwAp36z2GrCQCg+dJBFovF9VciOk 2sbgOCieZiXAbEfimCkjbAqmweov7bvA7044SpiISzE5/UJHn5w7pkcxTfgOM7i5/H F8e23GZvBNDw15R5LJGQx1xoZrbi9vrx/FpNCD6c=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id A209C24E0BB; Tue, 26 Apr 2016 15:29:16 -0700 (PDT)
To: Linda Dunbar <linda.dunbar@huawei.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CFA1@dfweml501-mbb> <40836304-a3b3-d16d-c9e5-4951d0100b65@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7D111@dfweml501-mbb> <f01ccc02-7891-63c9-142b-b1aa72a4c3d6@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7D1A2@dfweml501-mbb>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <ced99e32-64fd-c2f2-ae97-1d7a15b6934f@joelhalpern.com>
Date: Tue, 26 Apr 2016 18:29:07 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657E7D1A2@dfweml501-mbb>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/lAV2Aq_Hr0C0G--wK9N0QoTdVf0>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2016 22:29:20 -0000

That is not what I said.
There are two different cases.  One is Transport fragmentation.
And one is source fragmentation.

You argued that source fragmentation needs to be discussed in the NSH 
document.  I pointed out that the requirement you claim is not 
wide-spread, and that for the cases where it exists, it exists before 
SFC.  So that does not seem to be an NSH problem at all.

With regard to Tunnel fragmentation, the question of where to describe 
all the possible issues is more complex.  There is text in section 6 of 
the document.  Beyond that, the problem is that the mechanism needed 
depends upon the underlying packet and the transport technology.  It 
also depends upon whether the service chaining environment can enable a 
larger MTU, and thereby avoid all of the problems.  I will grant that 
this problem is not unrelated to NSH.  However, given our requirement to 
be transport agnostic, I am confused as to why anything more than what 
is stated in section 6 is needed.

Yours,
Joel

On 4/26/16 6:22 PM, Linda Dunbar wrote:
> Joel,
>
> Where is a better place to describe how to deal with the Fragmentation induced by NSH header than the NSF document?
>
> The NSH header induced fragmentation is very different from Tunnel encapsulation induced fragmentation in the following aspects:
>
> - Tunnel induced fragmented pieces of a packet will not be processed by any intermediate nodes other than forwarding. As all fragmented pieces have the Dest/Source, all the intermediate nodes can forward based on the Dst/Src.
>
> - NSH induced fragmented pieces of a packet will be processed by SF in the middle. Some of the SFs do need to inspect the whole packet or multiple fragmented pieces --> warrant partial or whole re-assembling.
>
>
> Therefore, I disagree with your statement of "NSH header induced fragmentation has nothing to do with NSH".
>
> Linda
>
>
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
> Sent: Tuesday, April 26, 2016 4:43 PM
> To: Linda Dunbar; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> The draft assumes that SFF are network elements.  Network elements do not normally reassemble packets not addressed to themselves.  As such, the assumption you refer to is the norm.
>
> Yes, some SF need to reassemble packets.  We presume that functions which need to do somethign will do so.  This is not something that changes by adding SFC or NSH to service chaining or even to non-chaining transparent in-line service delivery.
>
> I have trouble seeing how a sentence such as "Service Functions which require fully reassembled transport packets are responsible for such reassembly" would add value.  I also don't see how it could go in the NSH document, as it has nothing to do with NSH.
>
> Yours,
> Joel
>
> On 4/26/16 5:32 PM, Linda Dunbar wrote:
>> Joel,
>>
>> I agree that some SFs don't need to re-assemble fragmented packets. But I am also aware of SFs that need to process the whole packets.
>> It would be helpful to describe your assumptions in the draft
>>
>> Linda
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
>> Sent: Tuesday, April 26, 2016 3:53 PM
>> To: Linda Dunbar; sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> You second insertion below seems to assume that service functions require reassembled packets.  That is not generally true.  I am sure that there are some service functions that require that.  But most of them either:
>> 1) do not require reassembly at all;
>> 2) can get by with virtual reassembly where they preserve needed state
>> between fragments;
>> 3) or, even more rarely, can get by with reassembling the first and second packet, and then applying stateful processing thereafter.
>>
>> Yours,
>> Joel
>>
>> On 4/26/16 3:20 PM, Linda Dunbar wrote:
>>> Joel,
>>>
>>> Replies are inserted below:
>>>
>>>
>>>
>>> -----Original Message-----
>>> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
>>> Sent: Tuesday, April 26, 2016 12:18 PM
>>> To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri;
>>> sfc@ietf.org
>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> With regard to Transport tunnel fragementation, that seems an issue
>>> for the transport protocol.  I don't actually object to a sentence,
>>> but it does not seem that it will accomplish anything.
>>>
>>> [Linda] By having this description, you avoid a lot of future
>>> unnecessary debate about how fragmentation should be processed
>>> because some people are only thinking about Tunnel induced
>>> fragmentation where as some other people are thinking of Source induced fragmentation.
>>>
>>>
>>> With regard to packets fragmented by the source, I completely
>>> disagree with your assertion.  If an SFF were to reassemble the
>>> packets, that would be a violation of its job.  There is no reason
>>> for an SFF to reassemble a packet fragmented by the source.  The
>>> classifier may have to do some interesting things in order to
>>> properly classify succeeding fragments, but that is an implementation
>>> issue (most commonly addressed with virtual reassembly, which doe
>>> snot delay the
>>> fragments.)  We don't specity that.
>>>
>>> If an SF needs to reassemble fragments to do its job, that is up to
>>> the SF.  Some will need to actually reassemble.  Some will need to
>>> perform virtual reassembly, and some will happily process the
>>> fragments.  I can not see what the NSH document could possibly mandate.
>>>
>>> [Linda] I said "either SFF or SF" has to re-assemble the fragmented
>>> packets. I don't have strong opinion on who perform the re-assembling
>>> job (as long as one of them do). If a set of SFs attached to a SFF
>>> are not capable of performing the re-assembling and they need the
>>> whole packet to do inspection, then the SFF don't have any choice. I
>>> just think that it is necessary to add the description because it can
>>> be very messy (if not impossible) for SFs to process partial packets.
>>>
>>>
>>> Linda
>>>
>>>
>>>
>>>
>>> Yours,
>>> Joel
>>>
>>> On 4/26/16 11:47 AM, Linda Dunbar wrote:
>>>> Joel,
>>>>
>>>> I think the document should add the description on the following two
>>>> fragmentation scenarios:
>>>>
>>>> - Transport tunnel generated fragmentation: When a packet
>>>> fragmentation is caused by transport tunnel (i.e. various
>>>> encapsulations), the termination point of the transport tunnel is
>>>> responsible for re-assembling the fragmented pieces of the packet.
>>>> Since there won't be any SFF nodes in between the Transport Tunnel,
>>>> the tunnel generated fragmentation does not require any actions by
>>>> SFF nodes or SF nodes.
>>>>
>>>>
>>>> - Source node generated fragmentation (after adding on the NSH
>>>> header): When fragmentation has to be performed for a packet being
>>>> encapsulated with the NSH header, either the intermediate SFF nodes
>>>> or the SF nodes have to be able to reassemble the fragmented pieces.
>>>>
>>>>
>>>>
>>>>
>>>> Cheers,
>>>>
>>>>
>>>> Linda
>>>>
>>>> -----Original Message----- From: Joel M. Halpern
>>>> [mailto:jmh@joelhalpern.com] Sent: Tuesday, April 26, 2016 10:33 AM
>>>> To: Linda Dunbar; mohamed.boucadair@orange.com
>>>> <mailto:mohamed.boucadair@orange.com>;
>>> Elzur, Uri;
>>>> sfc@ietf.org <mailto:sfc@ietf.org> Subject: Re: [sfc] WG last call
>>>> for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Re-reading your note, it is possible that you are referring only to
>>>> the case of transport generated fragmentation of the outer packet.
>>>> I had assumed you were not talking about that, since the resulting
>>>> fragments will not all have NSH headers.  As with any tunnel
>>>> technology, if the tunnel chooses to fragment at its layer, then the
>>>> tunnel is responsible for reassembly.  That would be invisible to
>>>> the SFF.
>>>>
>>>> Yours, Joel
>>>>
>>>> On 4/26/16 11:10 AM, Linda Dunbar wrote:
>>>>> Agree with Med.
>>>>>
>>>>> Even if each fragment piece of a packet with NSH header carries the
>>>>> NSH header, the intermediate SFF nodes still need to put together
>>>>> all the fragments together before passing the whole data frame to the SF.
>>>>>
>>>>> Linda
>>>>>
>>>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]
>>>>> On Behalf Of mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> Sent:
>>> Monday, April 25,
>>>>> 2016 9:42 AM To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org <mailto:sfc@ietf.org> Subject:
>>>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Re-,
>>>>>
>>>>> How do you instruct the transport layer to ALWAYS prepend an NSH
>>>>> header even for fragments? Or you don't care about that?
>>>>>
>>>>> Thank you.
>>>>>
>>>>> Cheers, Med
>>>>>
>>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>> [mailto:uri.elzur@intel.com] Envoyé : lundi 25 avril 2016 16:26 À
>>>>>> : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; sfc@ietf.org
>>>>>> <mailto:sfc@ietf.org> Objet
>>>>>> : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Hi Med
>>>>>>
>>>>>> Not to repeat my position, but I'll do it anyhow :-) As NSH is
>>>>>> *NOT* a transport, dealing with fragmentation is left to the
>>>>>> Transport used.
>>>>>>
>>>>>> The model I use for NSH, is basically similar to VXLAN . It is an
>>>>>> overly.
>>>>>>
>>>>>> Thx
>>>>>>
>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>
>>>>>>
>>>>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]
>>>>>> On Behalf Of mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> Sent:
>>> Monday, April 25,
>>>>>> 2016 7:18 AM To: Joel M. Halpern <jmh@joelhalpern.com
>>>>>> <mailto:jmh@joelhalpern.com>>; sfc@ietf.org
>>> <mailto:sfc@ietf.org>
>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Hi Joel,
>>>>>>
>>>>>> Please see inline.
>>>>>>
>>>>>> Cheers, Med
>>>>>>
>>>>>>> -----Message d'origine----- De : Joel M. Halpern
>>>>>>> [mailto:jmh@joelhalpern.com] Envoyé : lundi 25 avril 2016 15:48 À :
>>>>>>> BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>>> Objet : Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> If I am understanding you correctly Med, you are asking that the
>>>>>>> NSH draft specify how service chaining should cope with packets
>>>>>>> that have been fragmented?
>>>>>>>
>>>>>>
>>>>>> [Med] To be accurate, I'm asking to assess whether there are
>>>>>> implications. If there are, then the draft should be updated
>>>>>> accordingly.
>>>>>>
>>>>>>> NSH, and the SFF functionality, does not care.
>>>>>>
>>>>>> [Med] I'm not that sure. Some typical implications are listed
>>>>>> below:
>>>>>>
>>>>>> * SFF: If the NSH header is present only in the a fragment but SFF
>>>>>> didn't maintained a state, subsequent fragments won't be
>>>>>> appropriately processed. * SFC-aware function: if prepending a
>>>>>> context information depends on the full packet, not only a fragment.
>>>>>>
>>>>>> It just does its job.
>>>>>>
>>>>>> [Med] which may be disturbed in some situations as listed in the
>>>>>> examples above.
>>>>>>
>>>>>>> Ingress and intermediate classifiers may cope with fragments in
>>>>>>> any number of ways.
>>>>>> Specifying such is clearly out of scope for this draft.
>>>>>>
>>>>>> [Med] The purpose is not to specify the internal implementation
>>>>>> details but the external behavior of the classifier function when
>>>>>> it comes to handle fragments. That behavior may have an incidence
>>>>>> on SFF, in particular. The purpose is not to recommend the maximum
>>>>>> resources to be dedicated to out of order fragments nor the
>>>>>> timeout to cache those; these considerations are of course out of scope.
>>>>>> Nevertheless, an implementation should offer a configurable
>>>>>> parameter so that an operator tweak those according to its context.
>>>>>>
>>>>>>> I suppose one could write an informational draft on possible ways
>>>>>>> of coping.  The IETF has not usually published such.
>>>>>>> Service functions have to cope with fragmented packets just as
>>>>>>> they had to before the advent of NSH, so describing that is
>>>>>>> clearly not needed here.
>>>>>>
>>>>>> [Med] The advent of NSH has the following implications: * it
>>>>>> exacerbates fragmentation. Handing over this issue to the
>>>>>> transport layer may lead to interoperability issues. * the
>>>>>> chaining may not be efficient if fragments are inappropriately handled.
>>>>>>
>>>>>> Introducing NSH should not degrade the overall service compared to
>>>>>> legacy service deployment schemes.
>>>>>>
>>>>>>>
>>>>>>> Yours, Joel
>>>>>>>
>>>>>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> wrote:
>>>>>>>> Re-,
>>>>>>>>
>>>>>>>> I hear you, but my comment is that we need, as a WG, to decide
>>>>>>>> what to
>>>>>>> put in the draft. FWIW, I'm discussing two fragmentation
>>>>>>> issues:
>>>>>>>>
>>>>>>>> (1) Fragmentation that is caused by prepending an SFC header.
>>>>>>>> (2) Handling fragments at the ingress of an SFC-enabled domain.
>>>>>>>>
>>>>>>>> Increasing the MTU is for sure a recommendation is to be
>>>>>>>> explicitly
>>>>>>> called out in the text (see my first message).
>>>>>>>>
>>>>>>>> There are other issues that need to be discussed, e.g., how to
>>>>>>>> deal with
>>>>>>> fragments in SFFs/Classifiers?
>>>>>>>>
>>>>>>>> It is also "prudent" to check that no issues will be experienced
>>>>>>>> in SFF
>>>>>>> to handle fragments. If an SFC header is prepended for all
>>>>>>> fragments, I'm not sure there
>>>>>>>> is any particular issue at the SFF level, except if
>>>>>>>> stripping/adding
>>>>>>> context TLVs depends on the full packet (not just fragment). It
>>>>>>> is warranted to consider a little bit this point before declaring
>>>>>>> there is no issue.
>>>>>>>>
>>>>>>>> For point (1), declaring fragmentation out of scope would be
>>>>>>>> meant that
>>>>>>> an implementation must be prepared to receive fragments with or
>>>>>>> without NSH header as this is a decision that is left to the
>>>>>>> transport encapsulation. This is a requirement per se!
>>>>>>>>
>>>>>>>> I won't reiterate all the comments I have about the current
>>>>>>>> wording of
>>>>>>> this section.
>>>>>>>>
>>>>>>>> Cheers, Med
>>>>>>>>
>>>>>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>>>>> [mailto:uri.elzur@intel.com] Envoyé : lundi 25 avril 2016
>>>>>>>>> 08:30 À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Objet : RE: [sfc] WG last
>>>>>>>>> call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> Hi Med
>>>>>>>>>
>>>>>>>>> My point is that Fragmentation is yet another transport related
>>>>>>>>> issue
>>>>>>> that
>>>>>>>>> is beyond the scope of NSH and beyond the charter of the WG, so
>>>>>>>>> it
>>>>>>> doesn't
>>>>>>>>> really belong in the draft. We are providing an advice as
>>>>>>>>> extending the size of the packet may lead to fragmentation, but
>>>>>>>>> as you check RFC 7348 VxLAN, which my create the same issue,
>>>>>>>>> you'll find it doesn't even
>>>>>>> relate
>>>>>>>>> to it.
>>>>>>>>>
>>>>>>>>> Thx
>>>>>>>>>
>>>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> -----Original Message----- From: sfc
>>>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>>>> mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> Sent:
>>> Sunday, April 24, 2016
>>>>>>>>> 10:32 PM To: Elzur, Uri <uri.elzur@intel.com
>>>>>>>>> <mailto:uri.elzur@intel.com>>; Thomas Narten
>>>>>>> <narten@us.ibm.com <mailto:narten@us.ibm.com>>;
>>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Subject: Re: [sfc] WG last
>>>>>>>>> call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> Hi Uri,
>>>>>>>>>
>>>>>>>>> That's another option that needs to be discussed/investigated.
>>>>>>>>> I'm
>>>>>>> afraid
>>>>>>>>> this is not the rationale adopted in -04 since it includes some
>>>>>>>>> text
>>>>>>> that
>>>>>>>>> is far to be sufficient to ensure interoperable implementations.
>>>>>>>>>
>>>>>>>>> BTW, saying that nsh does not need to deal with fragmentation
>>>>>>>>> because
>>>>>>> it
>>>>>>>>> is transport-independent is not IMHO a good strategy to adopt
>>>>>>>>> here
>>>>>>> because
>>>>>>>>> it opens the door for interoperable issues, it may lead to
>>>>>>>>> sub-optimal implementations if the sfc information is present
>>>>>>>>> only in one
>>>>>>> fragments,
>>>>>>>>> etc.
>>>>>>>>>
>>>>>>>>> My comments are related to the current text in the -04.
>>>>>>>>> This text needs
>>>>>>> to
>>>>>>>>> be fixed somehow.
>>>>>>>>>
>>>>>>>>> Cheers, Med
>>>>>>>>>
>>>>>>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>>>>>> [mailto:uri.elzur@intel.com] Envoyé : dimanche 24 avril
>>>>>>>>>> 2016 17:36 À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Objet : RE: [sfc] WG last
>>>>>>>>>> call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>
>>>>>>>>>> Hi Med
>>>>>>>>>>
>>>>>>>>>> I see no need to specify the exact behavior as NSH is
>>>>>>>>>> transport independent i.e. like NSH interaction with any other
>>>>>>>>>> Transport eh issue of Fragmentation is to be dealt in a way
>>>>>>>>>> that matches the mechanisms supported by the Transport used
>>>>>>>>>> and do not belong in the NSH draft
>>>>>>>>>>
>>>>>>>>>> Thx
>>>>>>>>>>
>>>>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> -----Original Message----- From: sfc
>>>>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>>>>> mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> Sent:
>>> Thursday, April 14,
>>>>>>>>>> 2016 12:43 AM To: Thomas Narten <narten@us.ibm.com
>>>>>>>>>> <mailto:narten@us.ibm.com>>; sfc@ietf.org
>>>>>>>>>> <mailto:sfc@ietf.org>
>>>>>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>
>>>>>>>>>> R-,
>>>>>>>>>>
>>>>>>>>>> In addition to other pending issues raised for this draft, I
>>>>>>>>>> would like to raise this additional one about Section 6.
>>>>>>>>>>
>>>>>>>>>> == 6.  Fragmentation Considerations
>>>>>>>>>>
>>>>>>>>>> NSH and the associated transport header are "added" to the
>>>>>>>>>> encapsulated packet/frame.  This additional information
>>>>>>>>>> increases
>>>>>>> the
>>>>>>>>>> size of the packet.  In order the ensure proper forwarding of
>>>>>>>>>> NSH data, several options for handling fragmentation and
>>>>>>>>>> re-assembly exist:
>>>>>>>>>>
>>>>>>>>>> 1.  Jumbo Frames, when supported, enable the transport of NSH
>>>>>>>>>> and associated transport packets without requiring
>>>>>>>>>> fragmentation.
>>>>>>>>>>
>>>>>>>>>> 2.  Path MTU Discovery [RFC1191]"describes a technique for
>>>>>>>>>> dynamically discovering the maximum transmission unit (MTU) of
>>>>>>> an
>>>>>>>>>> arbitrary internet path" and can be utilized to ensure the
>>>>>> the
>>>>>>>>>> required packet size is used.
>>>>>>>>>>
>>>>>>>>>> 3.  [RFC6830] describes two schemes for fragmentation and
>>>>>>>>>> re-
>>>>>>> assembly
>>>>>>>>>> in section 5.4. ==
>>>>>>>>>>
>>>>>>>>>> * The text is weak for a Standard track document that is
>>>>>>>>>> intended to solve the problem in
>>>>>>>>>> https://tools.ietf.org/html/rfc7498#section-
>>>>>> 2.12.
>>>>>>>>>> There should be a clear behavior to be followed by an
>>>>>> implementation.
>>>>>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>>>>>
>>>>>>>>>> * The text covers only fragmentation when it is induced by SFC
>>>>>>>>>> operations, it does not discuss the treatment of a fragment
>>>>>>>>>> when received in an SFC domain. IMHO, the draft should also
>>>>>>>>>> specify the behavior of the Classifier with regards to
>>>>>>>>>> fragments for the sake of proper SFC operation. Applying
>>>>>>>>>> classification policies may require the
>>>>>>>>> full packet, not only a fragment.
>>>>>>>>>> In particular, dedicated resources should dedicated for
>>>>>>>>>> handling out of order fragments. Of course, it is out of scope
>>>>>>>>>> of this document to describe how SFs handle fragments.
>>>>>>>>>>
>>>>>>>>>> * If an SFC header is prepended for all fragments, I'm not
>>>>>>>>>> sure there is any particular issue at the SFF level...except
>>>>>>>>>> if stripping/adding context TLVs depends on the full packet
>>>>>>>>>> (not just fragment). It is warranted to consider a little bit
>>>>>>>>>> this point before declaring there
>>>>>>> is
>>>>>>>>> no issue.
>>>>>>>>>>
>>>>>>>>>> * The text states "several options". This may be interpreted
>>>>>>>>>> as if implementing one of them is sufficient...which is not true.
>>>>>>>>>> The first two points contribute to minimize the fragmentation
>>>>>>>>>> risk, but fragmentation may still be experienced (e.g., other
>>>>>>>>>> shims are prepended by other nodes for some other purposes,
>>>>>>>>>> nested nsh, etc.)
>>>>>>>>>>
>>>>>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>>>>>
>>>>>>>>>> * The support of jumbo frames by a router/device does not mean
>>>>>>>>>> that it can make use of it. Appropriate MTU configuration
>>>>>>>>>> should be undertaken in a consistent manner within an SFC
>>>>>>>>>> domain. The text should be updated to make it is about
>>>>>>>>>> (consistent) MTU
>>>>>> configuration.
>>>>>>>>>>
>>>>>>>>>> * BTW, shouldn't the text be reworded to recommended to
>>>>>>>>>> increase the MTU of **all nodes** of an SFC-enabled domain by
>>>>>>>>>> at least the length of SFC header + transport header?
>>>>>>>>>>
>>>>>>>>>> * Bullet 2, how PMTU discovery is actually used in this context?
>>>>>>>>>> Do you assume that all SFC-aware nodes will issue such
>>>>>>>>>> messages towards other SFC-aware node, arbitrary destination, else?
>>>>>>>>>>
>>>>>>>>>> * Bullet 2, I would drop "describes a technique for
>>>>>>>>>> dynamically discovering the maximum transmission unit
>>>>>>>>>> (MTU) of an arbitrary internet path".
>>>>>>>>>>
>>>>>>>>>> * Bullet 2, s/ the the/the.
>>>>>>>>>>
>>>>>>>>>> * The reference to the LISP specification raises two concerns
>>>>>>>>>> and one comment:
>>>>>>>>>>
>>>>>>>>>> (1) I don't think it is a good approach that fragments induced
>>>>>>>>>> by the network are passed to their ultimate destinations as
>>>>>>>>>> such
>>>>>> (stateless).
>>>>>>>>>> IMO, reassembly should be done within the SFC domain
>>>>>>>>>> (responsible for fragmentation) not passed away. (2) Does the
>>>>>>>>>> stateful mode require all SFC data plane elements maintain a
>>>>>>>>>> full list of MTU for the any SFF/SF instance of the SFC
>>>>>>>>> domain?
>>>>>>>>>>
>>>>>>>>>> The current text suggests that [RFC6830] should be listed as
>>>>>>>>>> normative reference (not an informative one). I would
>>>>>>>>>> personally favor removing the reference to LISP (as it is an
>>>>>>>>>> Experimental RFC).
>>>>>>>>>>
>>>>>>>>>> * The security section of the draft may be augmented with
>>>>>>>>>> informational fragmentation-related pointers to:
>>>>>>>>>> e.g., RFC1858 (Security Considerations for IP Fragment
>>>>>>>>>> Filtering), RFC3128 (Protection Against a Variant of the Tiny
>>>>>>>>>> Fragment Attack), and RFC 4963 (IPv4 Reassembly Errors at High
>>>>>>>>>> Data Rates).
>>>>>>>>>>
>>>>>>>>>> Cheers, Med
>>>>>>>>>>
>>>>>>>>>>> -----Message d'origine----- De : sfc
>>>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de
>>>>>>>>>>> mohamed.boucadair@orange.com
>>>>>>>>>>> <mailto:mohamed.boucadair@orange.com>
>>> Envoyé : lundi 11 avril
>>>>>>>>>>> 2016 13:14 À : Thomas Narten; sfc@ietf.org <mailto:sfc@ietf.org> Objet : Re:
>>>>>>>>>>> [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>>
>>>>>>>>>>> Dear Thomas, all,
>>>>>>>>>>>
>>>>>>>>>>> As I mentioned during the meeting, there are several issues
>>>>>>>>>>> that are not covered in the last version of the draft. I
>>>>>>>>>>> already provided examples of the issues offline as requested
>>>>>>>>>>> by Martin.
>>>>>>>>>>>
>>>>>>>>>>> Cheers, Med
>>>>>>>>>>>
>>>>>>>>>>>> -----Message d'origine----- De : sfc
>>>>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten
>>>>>>>>>>>> Envoyé : jeudi 31 mars 2016 04:48 À :
>>>>>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org> Objet : [sfc] WG last
>>>>>>>>>>>> call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>>>
>>>>>>>>>>>> Dear WG:
>>>>>>>>>>>>
>>>>>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>> The editors of the NSH document have indicated that they have
>>>>>>>>>>>> addressed all known comments and that there are no open
>>>>>>>>>>>> issues with the current version of the document.
>>>>>>>>>>>>
>>>>>>>>>>>> Substantive comments to the list please, editorial comments
>>>>>>>>>>>> can go directly to the document editors.
>>>>>>>>>>>>
>>>>>>>>>>>> We'll also get a brief update from the editors at next
>>>>>>>>>>>> week's meeting. If there are any remaining issues with the
>>>>>>>>>>>> document, raising them before the meeting would be especially helpful.
>>>>>>>>>>>>
>>>>>>>>>>>> For the chairs, Thomas
>>>>>>>>>>>>
>>>>>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>>>>>> list sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>>>
>>>>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>>>>> list sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>>
>>>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>>>> list sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>
>>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>>> list sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>
>>>>>>>> _______________________________________________ sfc mailing list
>>>>>>>> sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>
>>>>>>
>>>>>> _______________________________________________ sfc mailing list
>>>>>> sfc@ietf.org <mailto:sfc@ietf.org>
>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>>> _______________________________________________ sfc mailing list
>>>>> sfc@ietf.org <mailto:sfc@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Tue Apr 26 21:29:16 2016
Return-Path: <mls.ietf@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A80E12D5DC for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 21:29:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HKVc0ubJvkGg for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 21:29:08 -0700 (PDT)
Received: from mail-wm0-x231.google.com (mail-wm0-x231.google.com [IPv6:2a00:1450:400c:c09::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3383A12D096 for <sfc@ietf.org>; Tue, 26 Apr 2016 21:29:08 -0700 (PDT)
Received: by mail-wm0-x231.google.com with SMTP id n129so9543439wmn.1 for <sfc@ietf.org>; Tue, 26 Apr 2016 21:29:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=to:from:subject:message-id:date:user-agent:mime-version :content-transfer-encoding; bh=iEf7Meb6XAoXGB2Jw8IaH36+dBA5c6KvnQDnJa1ATbU=; b=wpOhtQTMr/2VtcVJ8jVH1cERpZIDn8BRTqM912zIoBlqR4guePqpiLyjdlzASqlRJp HR6OC+iiZde/+wNaMmkPgcyspAah0yFPJFkxT/zidy2SotaVzNVLMvRlq3QK9BZgeZcK oT6ltsuXQfvobZhu6dKbmX5t3iD3o2325Uwcod5FXLwcVnDkFdOXTQ2oVdZeU+kmFYcN s3fDJDOqJ8JMsh4vLiQMHmw92zcO6wmEt8P9eEmZpMIAQ4GugECKMlGrki876xF3iTEl KW2KTOzSC8PeoCbf4fsH55FXjRLMsyR7c3WHwx4EdKG8ZeECJOrAZLGVgUdPEuGoMdrr 0Kjw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:to:from:subject:message-id:date:user-agent :mime-version:content-transfer-encoding; bh=iEf7Meb6XAoXGB2Jw8IaH36+dBA5c6KvnQDnJa1ATbU=; b=B5JFLAyGrSAD/Jl9X03aO4BLXMNpYNK39eQNo7eUwlB5f2Wcje5uynLnBfIhMAUuDA ZQwnisTZklfhJrSY+agm//YKs5Xtr6svOxh3P9hpor5BiHcHMV+gtHpwoeBheIrQjlaz HMEg7qzxw+CC/6z6LaELcsP3j0EcOS/dAVs4xmrQ4HRulZ7m+WTp7eNi/5WxfXuBa5kY Rsz9+soZsW38PUZg0l+G3dx+UEX35uA/nefwqgFTaIOh1PIwWKPQJQ0pEtn4/7+BgHNN wuqxqBKZVNeA7e5fi8hv2CSclbpNa0tG4COUEp0YNW4Xn1UNAuPS7me1hnhBRFcmCn6C 27gA==
X-Gm-Message-State: AOPr4FVJgFQ/t2RGa5m5DXv6DVtiPp8Ik4aojjmtom627xI6CSpa54TGF6IQaIV1WR/vEA==
X-Received: by 10.28.141.18 with SMTP id p18mr6953256wmd.57.1461731346717; Tue, 26 Apr 2016 21:29:06 -0700 (PDT)
Received: from ?IPv6:2003:74:cf63:d501:499d:101d:1b0f:302f? (p2003000611105301499D101D1B0F302F.dip0.t-ipconnect.de. [2003:6:1110:5301:499d:101d:1b0f:302f]) by smtp.googlemail.com with ESMTPSA id da5sm1819127wjb.25.2016.04.26.21.29.05 for <sfc@ietf.org> (version=TLSv1/SSLv3 cipher=OTHER); Tue, 26 Apr 2016 21:29:05 -0700 (PDT)
To: sfc@ietf.org
From: Martin Stiemerling <mls.ietf@gmail.com>
Message-ID: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com>
Date: Wed, 27 Apr 2016 06:29:04 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/vZgGmdNV5mcrdobZiPNmYu3DRpU>
Subject: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 04:29:11 -0000

Dear all,

This is the start of the Working Group Last Call (WGLC) for

draft-ietf-sfc-control-plane-04.txt

The WGLC lasts for 2 weeks and will end May 11th at 10 pm PDT.

Please send your comments and reviews to the sfc@ietf.org list.

Regards,

   Martin (SFC co-chair)


From nobody Tue Apr 26 22:39:58 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 542B912B02E for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 22:39:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.915
X-Spam-Level: 
X-Spam-Status: No, score=-2.915 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ss6d2GFRtFEC for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 22:39:54 -0700 (PDT)
Received: from relais-inet.orange.com (relais-nor36.orange.com [80.12.70.36]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F039F12B007 for <sfc@ietf.org>; Tue, 26 Apr 2016 22:39:53 -0700 (PDT)
Received: from opfednr02.francetelecom.fr (unknown [xx.xx.xx.66]) by opfednr26.francetelecom.fr (ESMTP service) with ESMTP id 39E03203C6; Wed, 27 Apr 2016 07:39:52 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.41]) by opfednr02.francetelecom.fr (ESMTP service) with ESMTP id 08DB212005B; Wed, 27 Apr 2016 07:39:52 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM31.corporate.adroot.infra.ftgroup ([fe80::2cc9:4bac:7b7d:229d%19]) with mapi id 14.03.0279.002; Wed, 27 Apr 2016 07:39:51 +0200
From: <mohamed.boucadair@orange.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Linda Dunbar <linda.dunbar@huawei.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRn9DlqSmT+mHDUEONqWoKbKSi95+cRNcAgAAZDICAAO7E4A==
Date: Wed, 27 Apr 2016 05:39:50 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com>
In-Reply-To: <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.5]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/cu64uQKytaRgdM9Vlmes4SkoD0s>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 05:39:57 -0000

Hi Joel, all,

Please see inline.=20

Cheers,
Med

> -----Message d'origine-----
> De=A0: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Envoy=E9=A0: mardi 26 avril 2016 19:18
> =C0=A0: Linda Dunbar; BOUCADAIR Mohamed IMT/OLN; Elzur, Uri; sfc@ietf.org
> Objet=A0: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> With regard to Transport tunnel fragementation, that seems an issue for
> the transport protocol.  I don't actually object to a sentence, but it
> does not seem that it will accomplish anything.

[Med] I would like to see some text added to the draft.

>=20
> With regard to packets fragmented by the source, I completely disagree
> with your assertion.  If an SFF were to reassemble the packets, that
> would be a violation of its job.

[Med] I agree with you.

  There is no reason for an SFF to
> reassemble a packet fragmented by the source.  The classifier may have
> to do some interesting things in order to properly classify succeeding
> fragments, but that is an implementation issue (most commonly addressed
> with virtual reassembly, which doe snot delay the fragments.)  We don't
> specity that.

[Med] Still, the external behavior of the classifier needs to be clear in t=
he document. I don't find any text in the draft saying for instance that an=
 NSH header must be present in all fragments. (There some processing that m=
ight be needed at the SFF to "do its job" with regards to fragments (receiv=
e out of order fragments + forwarding policy on the full packet).)

>=20
> If an SF needs to reassemble fragments to do its job, that is up to the
> SF.  Some will need to actually reassemble.  Some will need to perform
> virtual reassembly, and some will happily process the fragments.  I can
> not see what the NSH document could possibly mandate.

[Med] Fully agree.

>=20
> Yours,
> Joel
>=20
> On 4/26/16 11:47 AM, Linda Dunbar wrote:
> > Joel,
> >
> > I think the document should add the description on the following two
> > fragmentation scenarios:
> >
> > - Transport tunnel generated fragmentation: When a packet
> > fragmentation is caused by transport tunnel (i.e. various
> > encapsulations), the termination point of the transport tunnel is
> > responsible for re-assembling the fragmented pieces of the packet.
> > Since there won't be any SFF nodes in between the Transport Tunnel,
> > the tunnel generated fragmentation does not require any actions by
> > SFF nodes or SF nodes.
> >
> >
> > - Source node generated fragmentation (after adding on the NSH
> > header): When fragmentation has to be performed for a packet being
> > encapsulated with the NSH header, either the intermediate SFF nodes
> > or the SF nodes have to be able to reassemble the fragmented pieces.
> >
> >
> >
> >
> > Cheers,
> >
> >
> > Linda
> >
> > -----Original Message----- From: Joel M. Halpern
> > [mailto:jmh@joelhalpern.com] Sent: Tuesday, April 26, 2016 10:33 AM
> > To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri;
> > sfc@ietf.org Subject: Re: [sfc] WG last call for
> > draft-ietf-sfc-nsh-04.txt
> >
> > Re-reading your note, it is possible that you are referring only to
> > the case of transport generated fragmentation of the outer packet.  I
> > had assumed you were not talking about that, since the resulting
> > fragments will not all have NSH headers.  As with any tunnel
> > technology, if the tunnel chooses to fragment at its layer, then the
> > tunnel is responsible for reassembly.  That would be invisible to the
> > SFF.
> >
> > Yours, Joel
> >
> > On 4/26/16 11:10 AM, Linda Dunbar wrote:
> >> Agree with Med.
> >>
> >> Even if each fragment piece of a packet with NSH header carries the
> >> NSH header, the intermediate SFF nodes still need to put together
> >> all the fragments together before passing the whole data frame to
> >> the SF.
> >>
> >> Linda
> >>
> >> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]
> >> On Behalf Of mohamed.boucadair@orange.com Sent: Monday, April 25,
> >> 2016 9:42 AM To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org Subject:
> >> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>
> >> Re-,
> >>
> >> How do you instruct the transport layer to ALWAYS prepend an NSH
> >> header even for fragments? Or you don't care about that?
> >>
> >> Thank you.
> >>
> >> Cheers, Med
> >>
> >>> -----Message d'origine----- De : Elzur, Uri
> >>> [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril 2016 16:26 =C0
> >>> : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; sfc@ietf.org Objet
> >>> : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>
> >>> Hi Med
> >>>
> >>> Not to repeat my position, but I'll do it anyhow :-) As NSH is
> >>> *NOT* a transport, dealing with fragmentation is left to the
> >>> Transport used.
> >>>
> >>> The model I use for NSH, is basically similar to VXLAN . It is an
> >>> overly.
> >>>
> >>> Thx
> >>>
> >>> Uri ("Oo-Ree") C: 949-378-7568
> >>>
> >>>
> >>> -----Original Message----- From: sfc
> >>> [mailto:sfc-bounces@ietf.org] On Behalf Of
> >>> mohamed.boucadair@orange.com Sent: Monday, April 25, 2016 7:18
> >>> AM To: Joel M. Halpern <jmh@joelhalpern.com>; sfc@ietf.org
> >>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>
> >>> Hi Joel,
> >>>
> >>> Please see inline.
> >>>
> >>> Cheers, Med
> >>>
> >>>> -----Message d'origine----- De : Joel M. Halpern
> >>>> [mailto:jmh@joelhalpern.com] Envoy=E9 : lundi 25 avril 2016 15:48
> >>>> =C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet : Re: [sfc]
> >>>> WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>
> >>>> If I am understanding you correctly Med, you are asking that
> >>>> the NSH draft specify how service chaining should cope with
> >>>> packets that have been fragmented?
> >>>>
> >>>
> >>> [Med] To be accurate, I'm asking to assess whether there are
> >>> implications. If there are, then the draft should be updated
> >>> accordingly.
> >>>
> >>>> NSH, and the SFF functionality, does not care.
> >>>
> >>> [Med] I'm not that sure. Some typical implications are listed
> >>> below:
> >>>
> >>> * SFF: If the NSH header is present only in the a fragment but
> >>> SFF didn't maintained a state, subsequent fragments won't be
> >>> appropriately processed. * SFC-aware function: if prepending a
> >>> context information depends on the full packet, not only a
> >>> fragment.
> >>>
> >>> It just does its job.
> >>>
> >>> [Med] which may be disturbed in some situations as listed in the
> >>>  examples above.
> >>>
> >>>> Ingress and intermediate classifiers may cope with fragments in
> >>>> any number of ways.
> >>> Specifying such is clearly out of scope for this draft.
> >>>
> >>> [Med] The purpose is not to specify the internal implementation
> >>> details but the external behavior of the classifier function when
> >>> it comes to handle fragments. That behavior may have an incidence
> >>> on SFF, in particular. The purpose is not to recommend the
> >>> maximum resources to be dedicated to out of order fragments nor
> >>> the timeout to cache those; these considerations are of course
> >>> out of scope. Nevertheless, an implementation should offer a
> >>> configurable parameter so that an operator tweak those according
> >>> to its context.
> >>>
> >>>> I suppose one could write an informational draft on possible
> >>>> ways of coping.  The IETF has not usually published such.
> >>>> Service functions have to cope with fragmented packets just as
> >>>> they had to before the advent of NSH, so describing that is
> >>>> clearly not needed here.
> >>>
> >>> [Med] The advent of NSH has the following implications: * it
> >>> exacerbates fragmentation. Handing over this issue to the
> >>> transport layer may lead to interoperability issues. * the
> >>> chaining may not be efficient if fragments are inappropriately
> >>> handled.
> >>>
> >>> Introducing NSH should not degrade the overall service compared
> >>> to legacy service deployment schemes.
> >>>
> >>>>
> >>>> Yours, Joel
> >>>>
> >>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
> >>>>> Re-,
> >>>>>
> >>>>> I hear you, but my comment is that we need, as a WG, to
> >>>>> decide what to
> >>>> put in the draft. FWIW, I'm discussing two fragmentation
> >>>> issues:
> >>>>>
> >>>>> (1) Fragmentation that is caused by prepending an SFC
> >>>>> header. (2) Handling fragments at the ingress of an
> >>>>> SFC-enabled domain.
> >>>>>
> >>>>> Increasing the MTU is for sure a recommendation is to be
> >>>>> explicitly
> >>>> called out in the text (see my first message).
> >>>>>
> >>>>> There are other issues that need to be discussed, e.g., how
> >>>>> to deal with
> >>>> fragments in SFFs/Classifiers?
> >>>>>
> >>>>> It is also "prudent" to check that no issues will be
> >>>>> experienced in SFF
> >>>> to handle fragments. If an SFC header is prepended for all
> >>>> fragments, I'm not sure there
> >>>>> is any particular issue at the SFF level, except if
> >>>>> stripping/adding
> >>>> context TLVs depends on the full packet (not just fragment). It
> >>>> is warranted to consider a little bit this point before
> >>>> declaring there is no issue.
> >>>>>
> >>>>> For point (1), declaring fragmentation out of scope would be
> >>>>> meant that
> >>>> an implementation must be prepared to receive fragments with
> >>>> or without NSH header as this is a decision that is left to
> >>>> the transport encapsulation. This is a requirement per se!
> >>>>>
> >>>>> I won't reiterate all the comments I have about the current
> >>>>> wording of
> >>>> this section.
> >>>>>
> >>>>> Cheers, Med
> >>>>>
> >>>>>> -----Message d'origine----- De : Elzur, Uri
> >>>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril 2016
> >>>>>> 08:30 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
> >>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
> >>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>
> >>>>>> Hi Med
> >>>>>>
> >>>>>> My point is that Fragmentation is yet another transport
> >>>>>> related issue
> >>>> that
> >>>>>> is beyond the scope of NSH and beyond the charter of the
> >>>>>> WG, so it
> >>>> doesn't
> >>>>>> really belong in the draft. We are providing an advice as
> >>>>>> extending the size of the packet may lead to fragmentation,
> >>>>>> but as you check RFC 7348 VxLAN, which my create the same
> >>>>>> issue, you'll find it doesn't even
> >>>> relate
> >>>>>> to it.
> >>>>>>
> >>>>>> Thx
> >>>>>>
> >>>>>> Uri ("Oo-Ree") C: 949-378-7568
> >>>>>>
> >>>>>>
> >>>>>> -----Original Message----- From: sfc
> >>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
> >>>>>> mohamed.boucadair@orange.com Sent: Sunday, April 24, 2016
> >>>>>> 10:32 PM To: Elzur, Uri <uri.elzur@intel.com>; Thomas
> >>>>>> Narten
> >>>> <narten@us.ibm.com>;
> >>>>>> sfc@ietf.org Subject: Re: [sfc] WG last call for
> >>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>
> >>>>>> Hi Uri,
> >>>>>>
> >>>>>> That's another option that needs to be
> >>>>>> discussed/investigated. I'm
> >>>> afraid
> >>>>>> this is not the rationale adopted in -04 since it includes
> >>>>>> some text
> >>>> that
> >>>>>> is far to be sufficient to ensure interoperable
> >>>>>> implementations.
> >>>>>>
> >>>>>> BTW, saying that nsh does not need to deal with
> >>>>>> fragmentation because
> >>>> it
> >>>>>> is transport-independent is not IMHO a good strategy to
> >>>>>> adopt here
> >>>> because
> >>>>>> it opens the door for interoperable issues, it may lead to
> >>>>>> sub-optimal implementations if the sfc information is
> >>>>>> present only in one
> >>>> fragments,
> >>>>>> etc.
> >>>>>>
> >>>>>> My comments are related to the current text in the -04.
> >>>>>> This text needs
> >>>> to
> >>>>>> be fixed somehow.
> >>>>>>
> >>>>>> Cheers, Med
> >>>>>>
> >>>>>>> -----Message d'origine----- De : Elzur, Uri
> >>>>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche 24 avril
> >>>>>>> 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
> >>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
> >>>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>>
> >>>>>>> Hi Med
> >>>>>>>
> >>>>>>> I see no need to specify the exact behavior as NSH is
> >>>>>>> transport independent i.e. like NSH interaction with any
> >>>>>>> other Transport eh issue of Fragmentation is to be dealt
> >>>>>>> in a way that matches the mechanisms supported by the
> >>>>>>> Transport used and do not belong in the NSH draft
> >>>>>>>
> >>>>>>> Thx
> >>>>>>>
> >>>>>>> Uri ("Oo-Ree") C: 949-378-7568
> >>>>>>>
> >>>>>>>
> >>>>>>> -----Original Message----- From: sfc
> >>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
> >>>>>>> mohamed.boucadair@orange.com Sent: Thursday, April 14,
> >>>>>>> 2016 12:43 AM To: Thomas Narten <narten@us.ibm.com>;
> >>>>>>> sfc@ietf.org Subject: Re: [sfc] WG last call for
> >>>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>>
> >>>>>>> R-,
> >>>>>>>
> >>>>>>> In addition to other pending issues raised for this
> >>>>>>> draft, I would like to raise this additional one about
> >>>>>>> Section 6.
> >>>>>>>
> >>>>>>> =3D=3D 6.  Fragmentation Considerations
> >>>>>>>
> >>>>>>> NSH and the associated transport header are "added" to
> >>>>>>> the encapsulated packet/frame.  This additional
> >>>>>>> information increases
> >>>> the
> >>>>>>> size of the packet.  In order the ensure proper
> >>>>>>> forwarding of NSH data, several options for handling
> >>>>>>> fragmentation and re-assembly exist:
> >>>>>>>
> >>>>>>> 1.  Jumbo Frames, when supported, enable the transport of
> >>>>>>> NSH and associated transport packets without requiring
> >>>>>>> fragmentation.
> >>>>>>>
> >>>>>>> 2.  Path MTU Discovery [RFC1191]"describes a technique
> >>>>>>> for dynamically discovering the maximum transmission
> >>>>>>> unit (MTU) of
> >>>> an
> >>>>>>> arbitrary internet path" and can be utilized to ensure
> >>>>>>> the
> >>> the
> >>>>>>> required packet size is used.
> >>>>>>>
> >>>>>>> 3.  [RFC6830] describes two schemes for fragmentation and
> >>>>>>> re-
> >>>> assembly
> >>>>>>> in section 5.4. =3D=3D
> >>>>>>>
> >>>>>>> * The text is weak for a Standard track document that is
> >>>>>>> intended to solve the problem in
> >>>>>>> https://tools.ietf.org/html/rfc7498#section-
> >>> 2.12.
> >>>>>>> There should be a clear behavior to be followed by an
> >>> implementation.
> >>>>>>> Further, I would avoid the use of words such as "can".
> >>>>>>>
> >>>>>>> * The text covers only fragmentation when it is induced
> >>>>>>> by SFC operations, it does not discuss the treatment of a
> >>>>>>> fragment when received in an SFC domain. IMHO, the draft
> >>>>>>> should also specify the behavior of the Classifier with
> >>>>>>> regards to fragments for the sake of proper SFC
> >>>>>>> operation. Applying classification policies may require
> >>>>>>> the
> >>>>>> full packet, not only a fragment.
> >>>>>>> In particular, dedicated resources should dedicated for
> >>>>>>> handling out of order fragments. Of course, it is out of
> >>>>>>> scope of this document to describe how SFs handle
> >>>>>>> fragments.
> >>>>>>>
> >>>>>>> * If an SFC header is prepended for all fragments, I'm
> >>>>>>> not sure there is any particular issue at the SFF
> >>>>>>> level...except if stripping/adding context TLVs depends
> >>>>>>> on the full packet (not just fragment). It is warranted
> >>>>>>> to consider a little bit this point before declaring
> >>>>>>> there
> >>>> is
> >>>>>> no issue.
> >>>>>>>
> >>>>>>> * The text states "several options". This may be
> >>>>>>> interpreted as if implementing one of them is
> >>>>>>> sufficient...which is not true. The first two points
> >>>>>>> contribute to minimize the fragmentation risk, but
> >>>>>>> fragmentation may still be experienced (e.g., other shims
> >>>>>>> are prepended by other nodes for some other purposes,
> >>>>>>> nested nsh, etc.)
> >>>>>>>
> >>>>>>> * The first two points have nothing to do with
> >>>>>>> reassembly.
> >>>>>>>
> >>>>>>> * The support of jumbo frames by a router/device does not
> >>>>>>> mean that it can make use of it. Appropriate MTU
> >>>>>>> configuration should be undertaken in a consistent manner
> >>>>>>> within an SFC domain. The text should be updated to make
> >>>>>>> it is about (consistent) MTU
> >>> configuration.
> >>>>>>>
> >>>>>>> * BTW, shouldn't the text be reworded to recommended to
> >>>>>>> increase the MTU of **all nodes** of an SFC-enabled
> >>>>>>> domain by at least the length of SFC header + transport
> >>>>>>> header?
> >>>>>>>
> >>>>>>> * Bullet 2, how PMTU discovery is actually used in this
> >>>>>>> context? Do you assume that all SFC-aware nodes will
> >>>>>>> issue such messages towards other SFC-aware node,
> >>>>>>> arbitrary destination, else?
> >>>>>>>
> >>>>>>> * Bullet 2, I would drop "describes a technique for
> >>>>>>> dynamically discovering the maximum transmission unit
> >>>>>>> (MTU) of an arbitrary internet path".
> >>>>>>>
> >>>>>>> * Bullet 2, s/ the the/the.
> >>>>>>>
> >>>>>>> * The reference to the LISP specification raises two
> >>>>>>> concerns and one comment:
> >>>>>>>
> >>>>>>> (1) I don't think it is a good approach that fragments
> >>>>>>> induced by the network are passed to their ultimate
> >>>>>>> destinations as such
> >>> (stateless).
> >>>>>>> IMO, reassembly should be done within the SFC domain
> >>>>>>> (responsible for fragmentation) not passed away. (2) Does
> >>>>>>> the stateful mode require all SFC data plane elements
> >>>>>>> maintain a full list of MTU for the any SFF/SF instance
> >>>>>>> of the SFC
> >>>>>> domain?
> >>>>>>>
> >>>>>>> The current text suggests that [RFC6830] should be listed
> >>>>>>> as normative reference (not an informative one). I would
> >>>>>>> personally favor removing the reference to LISP (as it is
> >>>>>>> an Experimental RFC).
> >>>>>>>
> >>>>>>> * The security section of the draft may be augmented
> >>>>>>> with informational fragmentation-related pointers to:
> >>>>>>> e.g., RFC1858 (Security Considerations for IP Fragment
> >>>>>>> Filtering), RFC3128 (Protection Against a Variant of the
> >>>>>>> Tiny Fragment Attack), and RFC 4963 (IPv4 Reassembly
> >>>>>>> Errors at High Data Rates).
> >>>>>>>
> >>>>>>> Cheers, Med
> >>>>>>>
> >>>>>>>> -----Message d'origine----- De : sfc
> >>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de
> >>>>>>>> mohamed.boucadair@orange.com Envoy=E9 : lundi 11 avril
> >>>>>>>> 2016 13:14 =C0 : Thomas Narten; sfc@ietf.org Objet : Re:
> >>>>>>>> [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>>>>>
> >>>>>>>> Dear Thomas, all,
> >>>>>>>>
> >>>>>>>> As I mentioned during the meeting, there are several
> >>>>>>>> issues that are not covered in the last version of the
> >>>>>>>> draft. I already provided examples of the issues
> >>>>>>>> offline as requested by Martin.
> >>>>>>>>
> >>>>>>>> Cheers, Med
> >>>>>>>>
> >>>>>>>>> -----Message d'origine----- De : sfc
> >>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de Thomas
> >>>>>>>>> Narten Envoy=E9 : jeudi 31 mars 2016 04:48 =C0 :
> >>>>>>>>> sfc@ietf.org Objet : [sfc] WG last call for
> >>>>>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>>>>
> >>>>>>>>> Dear WG:
> >>>>>>>>>
> >>>>>>>>> This note begins a WG last call on
> >>>>>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> >>>>>>>>>
> >>>>>>>>>
> >>>>>>>>>
> The editors of the NSH document have indicated that they have
> >>>>>>>>> addressed all known comments and that there are no
> >>>>>>>>> open issues with the current version of the
> >>>>>>>>> document.
> >>>>>>>>>
> >>>>>>>>> Substantive comments to the list please, editorial
> >>>>>>>>> comments can go directly to the document editors.
> >>>>>>>>>
> >>>>>>>>> We'll also get a brief update from the editors at
> >>>>>>>>> next week's meeting. If there are any remaining
> >>>>>>>>> issues with the document, raising them before the
> >>>>>>>>> meeting would be especially helpful.
> >>>>>>>>>
> >>>>>>>>> For the chairs, Thomas
> >>>>>>>>>
> >>>>>>>>> _______________________________________________ sfc
> >>>>>>>>> mailing list sfc@ietf.org
> >>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>>>>>
> >>>>>>>> _______________________________________________ sfc
> >>>>>>>> mailing list sfc@ietf.org
> >>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>>>>
> >>>>>>> _______________________________________________ sfc
> >>>>>>> mailing list sfc@ietf.org
> >>>>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>>>
> >>>>>> _______________________________________________ sfc mailing
> >>>>>> list sfc@ietf.org
> >>>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>>
> >>>>> _______________________________________________ sfc mailing
> >>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >>>>>
> >>>
> >>> _______________________________________________ sfc mailing list
> >>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >>
> >> _______________________________________________ sfc mailing list
> >> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >>


From nobody Tue Apr 26 22:46:12 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ABDDE12D55F for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 22:46:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kIW66SBxMKNs for <sfc@ietfa.amsl.com>; Tue, 26 Apr 2016 22:46:09 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2CCB712B03D for <sfc@ietf.org>; Tue, 26 Apr 2016 22:46:08 -0700 (PDT)
Received: from omfedm07.si.francetelecom.fr (unknown [xx.xx.xx.3]) by omfedm09.si.francetelecom.fr (ESMTP service) with ESMTP id 42D882DC377; Wed, 27 Apr 2016 07:46:06 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.66]) by omfedm07.si.francetelecom.fr (ESMTP service) with ESMTP id 1BCCF4C06C; Wed, 27 Apr 2016 07:46:06 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILMA1.corporate.adroot.infra.ftgroup ([fe80::95e2:eb4b:3053:fabf%19]) with mapi id 14.03.0279.002; Wed, 27 Apr 2016 07:46:05 +0200
From: <mohamed.boucadair@orange.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Ron Parker <Ron_Parker@affirmednetworks.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRn9DlqSmT+mHDUEONqWoKbKSi95+cRNcAgAAC24CAABdVAIAA8A1Q
Date: Wed, 27 Apr 2016 05:46:05 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D604F7@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <CDF2F015F4429F458815ED2A6C2B6B0B6D786B8B@MBX021-W3-CA-2.exch021.domain.local> <0f0e8705-1ca4-6df0-81c3-93db0f94a99f@joelhalpern.com>
In-Reply-To: <0f0e8705-1ca4-6df0-81c3-93db0f94a99f@joelhalpern.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.5]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.27.50317
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/urNj5UHD35kA_5sFpJUjBBh-VCU>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 05:46:11 -0000

Re-,

Please see inline.

Cheers,
Med

> -----Message d'origine-----
> De=A0: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Envoy=E9=A0: mardi 26 avril 2016 19:22
> =C0=A0: Ron Parker; Joel M. Halpern; BOUCADAIR Mohamed IMT/OLN; Elzur, Ur=
i;
> sfc@ietf.org
> Objet=A0: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> At least so far, we have treated the communication between classifier
> and SFF (ingress or intermediate) as outside of the scope of our work.

[Med] I'm afraid I don't get this one. Isn't this what is depicted in https=
://tools.ietf.org/html/rfc7665#section-4?=20

> For SF <-> SFF communication we have ntoed the need for a proxy to
> handle the case when the SF can not accept and return the NSH header,
> since we assume that is preserved.  Other than that preservation,
> similar to the above, we have treated the details as outside of our
> scope. That is because they depend so heavily on the implementation
> technique used.  (Hypervisor ,_> application communication vs
> communication inside a user space or communication over an actual
> Ethernet are all very different.)

[Med] Specifying the external behavior of the interface between an SFF and =
an SFC-aware SF is completely in scope, imho.=20

>=20
> Trying to extend the NSH document to address these would be a major
> change, and would step into the issues related to transport selection,
> which are explicitly out of scope.
>=20
> Yours,
> Joel
>=20
> On 4/26/16 11:58 AM, Ron Parker wrote:
> > Linda,
> >
> > I like the first clause (transport tunnel based fragmentation).
> >
> > Regarding the second (source based), I think there are more subcases to
> consider:
> >
> > 1.  Propagation of NSH encapsulated packet from classifier to SFF
> > 2.  Propagation of NSH encapsulated packet from SFF to SF
> > 3.  Propagation of NSH encapsulated packet from SF to SFF (including
> possibility that NSH size increased at SF)
> > 4.  Propagation of NSH encapsulated packet from SFF to SFF
> >
> > In each of the 4 cases above,  there is the possibility that MTU will b=
e
> exceeded and therefore there are procedures to be defined in that
> eventuality.
> >
> > Thanks.
> >
> >     Ron
> >
> >
> > -----Original Message-----
> > From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Linda Dunbar
> > Sent: Tuesday, April 26, 2016 11:48 AM
> > To: Joel M. Halpern <jmh@joelhalpern.com>; mohamed.boucadair@orange.com=
;
> Elzur, Uri <uri.elzur@intel.com>; sfc@ietf.org
> > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >
> > Joel,
> >
> > I think the document should add the description on the following two
> fragmentation scenarios:
> >
> > - Transport tunnel generated fragmentation:
> >   When a packet fragmentation is caused by transport tunnel (i.e.
> various encapsulations), the termination point of the transport tunnel is
> responsible for re-assembling the fragmented pieces of the packet. Since
> there won't be any SFF nodes in between the Transport Tunnel, the tunnel
> generated fragmentation does not require any actions by SFF nodes or SF
> nodes.
> >
> >
> > - Source node generated fragmentation (after adding on the NSH header):
> >    When fragmentation has to be performed for a packet being
> encapsulated with the NSH header, either the intermediate SFF nodes or th=
e
> SF nodes have to be able to reassemble the fragmented pieces.
> >
> >
> >
> > Cheers,
> >
> >
> > Linda
> >
> > -----Original Message-----
> > From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> > Sent: Tuesday, April 26, 2016 10:33 AM
> > To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri; sfc@ietf.or=
g
> > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >
> > Re-reading your note, it is possible that you are referring only to the
> case of transport generated fragmentation of the outer packet.  I had
> assumed you were not talking about that, since the resulting fragments
> will not all have NSH headers.  As with any tunnel technology, if the
> tunnel chooses to fragment at its layer, then the tunnel is responsible
> for reassembly.  That would be invisible to the SFF.
> >
> > Yours,
> > Joel
> >
> > On 4/26/16 11:10 AM, Linda Dunbar wrote:
> >> Agree with Med.
> >>
> >> Even if each fragment piece of a packet with NSH header carries the NS=
H
> header, the intermediate SFF nodes still need to put together all the
> fragments together before passing the whole data frame to the SF.
> >>
> >> Linda
> >>
> >> -----Original Message-----
> >> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
> >> mohamed.boucadair@orange.com
> >> Sent: Monday, April 25, 2016 9:42 AM
> >> To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org
> >> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>
> >> Re-,
> >>
> >> How do you instruct the transport layer to ALWAYS prepend an NSH heade=
r
> even for fragments? Or you don't care about that?
> >>
> >> Thank you.
> >>
> >> Cheers,
> >> Med
> >>
> >>> -----Message d'origine-----
> >>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avri=
l
> >>> 2016 16:26 =C0 : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;
> >>> sfc@ietf.org Objet : RE: [sfc] WG last call for
> >>> draft-ietf-sfc-nsh-04.txt
> >>>
> >>> Hi Med
> >>>
> >>> Not to repeat my position, but I'll do it anyhow :-) As NSH is *NOT*
> >>> a transport, dealing with fragmentation is left to the Transport used=
.
> >>>
> >>> The model I use for NSH, is basically similar to VXLAN . It is an
> overly.
> >>>
> >>> Thx
> >>>
> >>> Uri ("Oo-Ree")
> >>> C: 949-378-7568
> >>>
> >>>
> >>> -----Original Message-----
> >>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
> >>> mohamed.boucadair@orange.com
> >>> Sent: Monday, April 25, 2016 7:18 AM
> >>> To: Joel M. Halpern <jmh@joelhalpern.com>; sfc@ietf.org
> >>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>
> >>> Hi Joel,
> >>>
> >>> Please see inline.
> >>>
> >>> Cheers,
> >>> Med
> >>>
> >>>> -----Message d'origine-----
> >>>> De : Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoy=E9 : lundi 2=
5
> >>>> avril 2016 15:48 =C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet=
 :
> >>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>
> >>>> If I am understanding you correctly Med, you are asking that the NSH
> >>>> draft specify how service chaining should cope with packets that
> >>>> have been fragmented?
> >>>>
> >>>
> >>> [Med] To be accurate, I'm asking to assess whether there are
> implications.
> >>> If there are, then the draft should be updated accordingly.
> >>>
> >>>> NSH, and the SFF functionality, does not care.
> >>>
> >>> [Med] I'm not that sure. Some typical implications are listed below:
> >>>
> >>> * SFF: If the NSH header is present only in the a fragment but SFF
> >>> didn't maintained a state, subsequent fragments won't be appropriatel=
y
> processed.
> >>> * SFC-aware function: if prepending a context information depends on
> >>> the full packet, not only a fragment.
> >>>
> >>>   It just does its job.
> >>>
> >>> [Med] which may be disturbed in some situations as listed in the
> >>> examples above.
> >>>
> >>>> Ingress and intermediate classifiers may cope with fragments in any
> >>>> number of ways.
> >>>   Specifying such is clearly out of scope for this draft.
> >>>
> >>> [Med] The purpose is not to specify the internal implementation
> >>> details but the external behavior of the classifier function when it
> >>> comes to handle fragments. That behavior may have an incidence on
> >>> SFF, in particular. The purpose is not to recommend the maximum
> >>> resources to be dedicated to out of order fragments nor the timeout
> >>> to cache those; these considerations are of course out of scope.
> >>> Nevertheless, an implementation should offer a configurable parameter
> >>> so that an operator tweak those according to its context.
> >>>
> >>>>   I suppose one could write an informational draft on possible ways
> >>>> of coping.  The IETF has not usually published such.
> >>>> Service functions have to cope with fragmented packets just as they
> >>>> had to before the advent of NSH, so describing that is clearly not
> >>>> needed here.
> >>>
> >>> [Med] The advent of NSH has the following implications:
> >>> * it exacerbates fragmentation. Handing over this issue to the
> >>> transport layer may lead to interoperability issues.
> >>> * the chaining may not be efficient if fragments are inappropriately
> >>> handled.
> >>>
> >>> Introducing NSH should not degrade the overall service compared to
> >>> legacy service deployment schemes.
> >>>
> >>>>
> >>>> Yours,
> >>>> Joel
> >>>>
> >>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
> >>>>> Re-,
> >>>>>
> >>>>> I hear you, but my comment is that we need, as a WG, to decide what
> >>>>> to
> >>>> put in the draft. FWIW, I'm discussing two fragmentation issues:
> >>>>>
> >>>>> (1) Fragmentation that is caused by prepending an SFC header.
> >>>>> (2) Handling fragments at the ingress of an SFC-enabled domain.
> >>>>>
> >>>>> Increasing the MTU is for sure a recommendation is to be explicitly
> >>>> called out in the text (see my first message).
> >>>>>
> >>>>> There are other issues that need to be discussed, e.g., how to deal
> >>>>> with
> >>>> fragments in SFFs/Classifiers?
> >>>>>
> >>>>> It is also "prudent" to check that no issues will be experienced in
> >>>>> SFF
> >>>> to handle fragments. If an SFC header is prepended for all
> >>>> fragments, I'm not sure there
> >>>>> is any particular issue at the SFF level, except if
> >>>>> stripping/adding
> >>>> context TLVs depends on the full packet (not just fragment). It is
> >>>> warranted to consider a little bit this point before declaring there
> >>>> is no issue.
> >>>>>
> >>>>> For point (1), declaring fragmentation out of scope would be meant
> >>>>> that
> >>>> an implementation must be prepared to receive fragments with or
> >>>> without NSH header as this is a decision that is left to the
> >>>> transport encapsulation. This is a requirement per se!
> >>>>>
> >>>>> I won't reiterate all the comments I have about the current wording
> >>>>> of
> >>>> this section.
> >>>>>
> >>>>> Cheers,
> >>>>> Med
> >>>>>
> >>>>>> -----Message d'origine-----
> >>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25
> >>>>>> avril 2016 08:30 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
> >>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
> >>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>
> >>>>>> Hi Med
> >>>>>>
> >>>>>> My point is that Fragmentation is yet another transport related
> >>>>>> issue
> >>>> that
> >>>>>> is beyond the scope of NSH and beyond the charter of the WG, so it
> >>>> doesn't
> >>>>>> really belong in the draft. We are providing an advice as
> >>>>>> extending the size of the packet may lead to fragmentation, but as
> >>>>>> you check RFC 7348 VxLAN, which my create the same issue, you'll
> >>>>>> find it doesn't even
> >>>> relate
> >>>>>> to it.
> >>>>>>
> >>>>>> Thx
> >>>>>>
> >>>>>> Uri ("Oo-Ree")
> >>>>>> C: 949-378-7568
> >>>>>>
> >>>>>>
> >>>>>> -----Original Message-----
> >>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
> >>>>>> mohamed.boucadair@orange.com
> >>>>>> Sent: Sunday, April 24, 2016 10:32 PM
> >>>>>> To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
> >>>> <narten@us.ibm.com>;
> >>>>>> sfc@ietf.org
> >>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>>>
> >>>>>> Hi Uri,
> >>>>>>
> >>>>>> That's another option that needs to be discussed/investigated.
> >>>>>> I'm
> >>>> afraid
> >>>>>> this is not the rationale adopted in -04 since it includes some
> >>>>>> text
> >>>> that
> >>>>>> is far to be sufficient to ensure interoperable implementations.
> >>>>>>
> >>>>>> BTW, saying that nsh does not need to deal with fragmentation
> >>>>>> because
> >>>> it
> >>>>>> is transport-independent is not IMHO a good strategy to adopt here
> >>>> because
> >>>>>> it opens the door for interoperable issues, it may lead to
> >>>>>> sub-optimal implementations if the sfc information is present only
> >>>>>> in one
> >>>> fragments,
> >>>>>> etc.
> >>>>>>
> >>>>>> My comments are related to the current text in the -04. This text
> >>>>>> needs
> >>>> to
> >>>>>> be fixed somehow.
> >>>>>>
> >>>>>> Cheers,
> >>>>>> Med
> >>>>>>
> >>>>>>> -----Message d'origine-----
> >>>>>>> De : Elzur, Uri [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche
> >>>>>>> 24 avril 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narte=
n;
> >>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
> >>>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>>
> >>>>>>> Hi Med
> >>>>>>>
> >>>>>>> I see no need to specify the exact behavior as NSH is transport
> >>>>>>> independent i.e. like NSH interaction with any other Transport eh
> >>>>>>> issue of Fragmentation is to be dealt in a way that matches the
> >>>>>>> mechanisms supported by the Transport used and do not belong in
> >>>>>>> the NSH draft
> >>>>>>>
> >>>>>>> Thx
> >>>>>>>
> >>>>>>> Uri ("Oo-Ree")
> >>>>>>> C: 949-378-7568
> >>>>>>>
> >>>>>>>
> >>>>>>> -----Original Message-----
> >>>>>>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of
> >>>>>>> mohamed.boucadair@orange.com
> >>>>>>> Sent: Thursday, April 14, 2016 12:43 AM
> >>>>>>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
> >>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>>>>
> >>>>>>> R-,
> >>>>>>>
> >>>>>>> In addition to other pending issues raised for this draft, I
> >>>>>>> would like to raise this additional one about Section 6.
> >>>>>>>
> >>>>>>> =3D=3D
> >>>>>>> 6.  Fragmentation Considerations
> >>>>>>>
> >>>>>>>    NSH and the associated transport header are "added" to the
> >>>>>>>    encapsulated packet/frame.  This additional information
> >>>>>>> increases
> >>>> the
> >>>>>>>    size of the packet.  In order the ensure proper forwarding of
> NSH
> >>>>>>>    data, several options for handling fragmentation and re-
> assembly
> >>>>>>>    exist:
> >>>>>>>
> >>>>>>>    1.  Jumbo Frames, when supported, enable the transport of NSH
> and
> >>>>>>>        associated transport packets without requiring
> fragmentation.
> >>>>>>>
> >>>>>>>    2.  Path MTU Discovery [RFC1191]"describes a technique for
> >>>>>>>        dynamically discovering the maximum transmission unit
> >>>>>>> (MTU) of
> >>>> an
> >>>>>>>        arbitrary internet path" and can be utilized to ensure the
> >>> the
> >>>>>>>        required packet size is used.
> >>>>>>>
> >>>>>>>    3.  [RFC6830] describes two schemes for fragmentation and re-
> >>>> assembly
> >>>>>>>        in section 5.4.
> >>>>>>> =3D=3D
> >>>>>>>
> >>>>>>> * The text is weak for a Standard track document that is intended
> >>>>>>> to solve the problem in
> >>>>>>> https://tools.ietf.org/html/rfc7498#section-
> >>> 2.12.
> >>>>>>> There should be a clear behavior to be followed by an
> >>> implementation.
> >>>>>>> Further, I would avoid the use of words such as "can".
> >>>>>>>
> >>>>>>> * The text covers only fragmentation when it is induced by SFC
> >>>>>>> operations, it does not discuss the treatment of a fragment when
> >>>>>>> received in an SFC domain. IMHO, the draft should also specify
> >>>>>>> the behavior of the Classifier with regards to fragments for the
> >>>>>>> sake of proper SFC operation. Applying classification policies
> >>>>>>> may require the
> >>>>>> full packet, not only a fragment.
> >>>>>>> In particular, dedicated resources should dedicated for handling
> >>>>>>> out of order fragments. Of course, it is out of scope of this
> >>>>>>> document to describe how SFs handle fragments.
> >>>>>>>
> >>>>>>> * If an SFC header is prepended for all fragments, I'm not sure
> >>>>>>> there is any particular issue at the SFF level...except if
> >>>>>>> stripping/adding context TLVs depends on the full packet (not
> >>>>>>> just fragment). It is warranted to consider a little bit this
> >>>>>>> point before declaring there
> >>>> is
> >>>>>> no issue.
> >>>>>>>
> >>>>>>> * The text states "several options". This may be interpreted as
> >>>>>>> if implementing one of them is sufficient...which is not true.
> >>>>>>> The first two points contribute to minimize the fragmentation
> >>>>>>> risk, but fragmentation may still be experienced (e.g., other
> >>>>>>> shims are prepended by other nodes for some other purposes,
> >>>>>>> nested nsh,
> >>>>>>> etc.)
> >>>>>>>
> >>>>>>> * The first two points have nothing to do with reassembly.
> >>>>>>>
> >>>>>>> * The support of jumbo frames by a router/device does not mean
> >>>>>>> that it can make use of it. Appropriate MTU configuration should
> >>>>>>> be undertaken in a consistent manner within an SFC domain. The
> >>>>>>> text should be updated to make it is about (consistent) MTU
> >>> configuration.
> >>>>>>>
> >>>>>>> * BTW, shouldn't the text be reworded to recommended to increase
> >>>>>>> the MTU of **all nodes** of an SFC-enabled domain by at least the
> >>>>>>> length of SFC header + transport header?
> >>>>>>>
> >>>>>>> * Bullet 2, how PMTU discovery is actually used in this context?
> >>>>>>> Do you assume that all SFC-aware nodes will issue such messages
> >>>>>>> towards other SFC-aware node, arbitrary destination, else?
> >>>>>>>
> >>>>>>> * Bullet 2, I would drop "describes a technique for dynamically
> >>>>>>> discovering the maximum transmission unit (MTU) of an arbitrary
> >>>>>>> internet path".
> >>>>>>>
> >>>>>>> * Bullet 2, s/ the the/the.
> >>>>>>>
> >>>>>>> * The reference to the LISP specification raises two concerns and
> >>>>>>> one
> >>>>>>> comment:
> >>>>>>>
> >>>>>>> (1) I don't think it is a good approach that fragments induced by
> >>>>>>> the network are passed to their ultimate destinations as such
> >>> (stateless).
> >>>>>>> IMO, reassembly should be done within the SFC domain (responsible
> >>>>>>> for
> >>>>>>> fragmentation) not passed away.
> >>>>>>> (2) Does the stateful mode require all SFC data plane elements
> >>>>>>> maintain a full list of MTU for the any SFF/SF instance of the
> >>>>>>> SFC
> >>>>>> domain?
> >>>>>>>
> >>>>>>> The current text suggests that [RFC6830] should be listed as
> >>>>>>> normative reference (not an informative one). I would personally
> >>>>>>> favor removing the reference to LISP (as it is an Experimental
> RFC).
> >>>>>>>
> >>>>>>> * The security section of the draft may be augmented with
> >>>>>>> informational fragmentation-related pointers to: e.g., RFC1858
> >>>>>>> (Security Considerations for IP Fragment Filtering), RFC3128
> >>>>>>> (Protection Against a Variant of the Tiny Fragment Attack), and
> >>>>>>> RFC
> >>>>>>> 4963 (IPv4 Reassembly Errors at High Data Rates).
> >>>>>>>
> >>>>>>> Cheers,
> >>>>>>> Med
> >>>>>>>
> >>>>>>>> -----Message d'origine-----
> >>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de
> >>>>>>>> mohamed.boucadair@orange.com Envoy=E9 : lundi 11 avril 2016 13:1=
4 =C0
> :
> >>>>>>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG last call for
> >>>>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>>>
> >>>>>>>> Dear Thomas, all,
> >>>>>>>>
> >>>>>>>> As I mentioned during the meeting, there are several issues that
> >>>>>>>> are not covered in the last version of the draft. I already
> >>>>>>>> provided examples of the issues offline as requested by Martin.
> >>>>>>>>
> >>>>>>>> Cheers,
> >>>>>>>> Med
> >>>>>>>>
> >>>>>>>>> -----Message d'origine-----
> >>>>>>>>> De : sfc [mailto:sfc-bounces@ietf.org] De la part de Thomas
> >>>>>>>>> Narten Envoy=E9 : jeudi 31 mars 2016 04:48 =C0 : sfc@ietf.org O=
bjet
> >>>>>>>>> : [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>>>>>>
> >>>>>>>>> Dear WG:
> >>>>>>>>>
> >>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> >>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> >>>>>>>>>
> >>>>>>>>> The editors of the NSH document have indicated that they have
> >>>>>>>>> addressed all known comments and that there are no open issues
> >>>>>>>>> with the current version of the document.
> >>>>>>>>>
> >>>>>>>>> Substantive comments to the list please, editorial comments can
> >>>>>>>>> go directly to the document editors.
> >>>>>>>>>
> >>>>>>>>> We'll also get a brief update from the editors at next week's
> >>>>>>>>> meeting. If there are any remaining issues with the document,
> >>>>>>>>> raising them before the meeting would be especially helpful.
> >>>>>>>>>
> >>>>>>>>> For the chairs,
> >>>>>>>>> Thomas
> >>>>>>>>>
> >>>>>>>>> _______________________________________________
> >>>>>>>>> sfc mailing list
> >>>>>>>>> sfc@ietf.org
> >>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>>>>>
> >>>>>>>> _______________________________________________
> >>>>>>>> sfc mailing list
> >>>>>>>> sfc@ietf.org
> >>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>>>>
> >>>>>>> _______________________________________________
> >>>>>>> sfc mailing list
> >>>>>>> sfc@ietf.org
> >>>>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>>>
> >>>>>> _______________________________________________
> >>>>>> sfc mailing list
> >>>>>> sfc@ietf.org
> >>>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>>
> >>>>> _______________________________________________
> >>>>> sfc mailing list
> >>>>> sfc@ietf.org
> >>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>>
> >>>
> >>> _______________________________________________
> >>> sfc mailing list
> >>> sfc@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/sfc
> >>
> >> _______________________________________________
> >> sfc mailing list
> >> sfc@ietf.org
> >> https://www.ietf.org/mailman/listinfo/sfc
> >>
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
> >


From nobody Wed Apr 27 04:45:50 2016
Return-Path: <agmalis@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65F7512D7A2 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 04:45:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3GR1Ry29jmfg for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 04:45:44 -0700 (PDT)
Received: from mail-oi0-x234.google.com (mail-oi0-x234.google.com [IPv6:2607:f8b0:4003:c06::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4F7CB12D7B0 for <sfc@ietf.org>; Wed, 27 Apr 2016 04:45:44 -0700 (PDT)
Received: by mail-oi0-x234.google.com with SMTP id x201so45794351oif.3 for <sfc@ietf.org>; Wed, 27 Apr 2016 04:45:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=ejByNfqCAzeJGe78+o/7qy71q6WVEeFneyiBXlREkzw=; b=g0NAzi4trbqSoQ1+98sVCYLnPtcpDrpleD2LZX9TyoR51+eKPprVaJxhvQQds/W5HF yuJhhDyW+RQUWlDz0cL+eFTE8DlXmXxJpqkLj0vH5oV6WYFSooH6NJi4F/ai7AKmLfJ0 oReVnVCTxLX4ky11+E6RWrLMDoPSwruXeAY684c+LDS7Xv53wCFS9hQPlqNbMu9o5OuB QmCmVpG1hrQSt/z/0uughJHNO1WOrR5FlgYkcGTnCJr+8SpeSLoaupCvCyxQLsRBIRiE rlC7uVeht99hm73UuXdaMijaOIcv8+MZFeuo2Jv9YSJNsBHdM6/qFNJSQTSQtu/Cy85n jbgA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=ejByNfqCAzeJGe78+o/7qy71q6WVEeFneyiBXlREkzw=; b=lYu6/6J5piAh7xjIvO00Azh4M7BoX7xkdLo2g+LMJIqYFI2cJ+Bj0G5Kxdj0jQTs6Q xOGZBcWyftLkH1NAbObKsS4U8kkC/Z1RwTmzzX1JM+BEbDPhi8cyyk1gSUHVsu90o2rQ UyzHr9tlZzMgSAPloH5Wgpem8oquk0MG8r7Qj9N7WXM26VzG+nVyYj0J4a69kkppe8id X3Rut/4EABaFgUG5S70u/cboeonPwVet9vT6Se9StSRXurnw4QeEebFgOgmn2p1QU72i 5h5ea5AOKZ06zmRVsxn2l1Rl7T/rUVmxvPs16EXB78noBcg/hdn3ofNOgg3JLkdqm8DX e4XA==
X-Gm-Message-State: AOPr4FWgDNbf6Ah6KVBxTV9P3ZaciyAFJm7W+mrZ8GL8bfDtT7qTzMOjhrfd14doaMrw7dHhSX4eleiM8qNTgw==
X-Received: by 10.202.184.6 with SMTP id i6mr3412741oif.76.1461757543595; Wed, 27 Apr 2016 04:45:43 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.182.231.106 with HTTP; Wed, 27 Apr 2016 04:45:24 -0700 (PDT)
In-Reply-To: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com>
References: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com>
From: "Andrew G. Malis" <agmalis@gmail.com>
Date: Wed, 27 Apr 2016 07:45:24 -0400
Message-ID: <CAA=duU1YmhPpzs+LZNRFLqw+BemxRXKrxnhrdqQYbu356N5o8g@mail.gmail.com>
To: Martin Stiemerling <mls.ietf@gmail.com>
Content-Type: multipart/alternative; boundary=001a113cd19022435a053175f341
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/nTalyL_rzlEU0E4f4SkJJNDoMmc>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 11:45:49 -0000

--001a113cd19022435a053175f341
Content-Type: text/plain; charset=UTF-8

Martin,

As a contributor, I support publication of this draft.

Thanks,
Andy

On Wed, Apr 27, 2016 at 12:29 AM, Martin Stiemerling <mls.ietf@gmail.com>
wrote:

> Dear all,
>
> This is the start of the Working Group Last Call (WGLC) for
>
> draft-ietf-sfc-control-plane-04.txt
>
> The WGLC lasts for 2 weeks and will end May 11th at 10 pm PDT.
>
> Please send your comments and reviews to the sfc@ietf.org list.
>
> Regards,
>
>   Martin (SFC co-chair)
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>

--001a113cd19022435a053175f341
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Martin,<div><br></div><div>As a contributor, I support pub=
lication of this draft.</div><div><br></div><div>Thanks,</div><div>Andy</di=
v></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Wed, A=
pr 27, 2016 at 12:29 AM, Martin Stiemerling <span dir=3D"ltr">&lt;<a href=
=3D"mailto:mls.ietf@gmail.com" target=3D"_blank">mls.ietf@gmail.com</a>&gt;=
</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex">Dear all,<br>
<br>
This is the start of the Working Group Last Call (WGLC) for<br>
<br>
draft-ietf-sfc-control-plane-04.txt<br>
<br>
The WGLC lasts for 2 weeks and will end May 11th at 10 pm PDT.<br>
<br>
Please send your comments and reviews to the <a href=3D"mailto:sfc@ietf.org=
" target=3D"_blank">sfc@ietf.org</a> list.<br>
<br>
Regards,<br>
<br>
=C2=A0 Martin (SFC co-chair)<br>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
</blockquote></div><br></div>

--001a113cd19022435a053175f341--


From nobody Wed Apr 27 04:57:35 2016
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D38812D7BA for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 04:57:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RlXKXrychJ8h for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 04:57:33 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F8B512D7CF for <sfc@ietf.org>; Wed, 27 Apr 2016 04:57:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4923; q=dns/txt; s=iport; t=1461758253; x=1462967853; h=from:to:subject:date:message-id:mime-version; bh=74Pvlnc21RNplHGkXjxqenlKbOWQ9ou8Qk3A3u5gJdY=; b=OhJKHKXDJrxyb5sj4nCp30D8nYr3CsZgI4AYdWccf7wKtLCKJDCqQaZP yNcIrqPtYAOzWuJyhsdnuCPSjp3+651MsSVkPWOKSzqYwi8iuLygAYXcP JryFdLjgD4geMkfHYF8VxpVkZL/AKc8vOgaicW8/aTV6bZvF4qoNsSmhg I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0D2AQDvpyBX/5tdJa1egmxMgVa0coRzA?= =?us-ascii?q?Q2BdYdMOBQBAQEBAQEBZRwLhEiBCwEMdCcEJweID6J4oQ4BAQgCHoYhjl4Fjgy?= =?us-ascii?q?KBAGOFo8Rjy8BHgEBQoNriRt/AQEB?=
X-IronPort-AV: E=Sophos;i="5.24,541,1454976000";  d="scan'208,217";a="266754999"
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 27 Apr 2016 11:57:31 +0000
Received: from XCH-ALN-006.cisco.com (xch-aln-006.cisco.com [173.36.7.16]) by rcdn-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id u3RBvULM030854 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL) for <sfc@ietf.org>; Wed, 27 Apr 2016 11:57:31 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-006.cisco.com (173.36.7.16) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 27 Apr 2016 06:57:30 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Wed, 27 Apr 2016 06:57:30 -0500
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: draft-ietf-sfc-nsh "first nibble" issue
Thread-Index: AQHRoHv5jA1HvFPCM0yMnvW+PmvYjg==
Date: Wed, 27 Apr 2016 11:57:30 +0000
Message-ID: <D3462168.4C3B2%jguichar@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.98.43.179]
Content-Type: multipart/alternative; boundary="_000_D34621684C3B2jguicharciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/-Ee7OivCbzejwiccQ18JBxfVlEw>
Subject: [sfc] draft-ietf-sfc-nsh "first nibble" issue
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 11:57:35 -0000

--_000_D34621684C3B2jguicharciscocom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Dear WG:

The infamous "MPLS first nibble" issue was raised as part of the WGLC for d=
raft-ietf-sfc-nsh-04. While this issue has been known for some time, and wo=
rk has been done by the community to try and mitigate (for example RFC4928)=
 or remove it (for example RFC6790), given the widespread implementation of=
 existing hardware that uses the first nibble for ECMP decision processing,=
 it seems prudent for us as a WG to address it in terms of how it affects o=
ur SFC protocol and make it clear within the draft the conclusion of the WG=
.

While it is true that we could rearrange our encapsulation header such that=
 it avoids this issue (by simply making the first nibble correspond to a va=
lue that is neither 0x4 or 0x6), given multiple industry and open source im=
plementations of the SFC encapsulation header, that is not a desired outcom=
e, especially as multiple other transport encapsulations do not exhibit thi=
s behavior when coupled with the SFC encapsulation.

If we consider the current definition of the SFC encapsulation base header,=
 we can see that the first two bits are used as a version field. This means=
 that if we ever produce a version 01 for NSH it could result in a value of=
 0x4 or 0x6 being present within the first nibble. To avoid such a result t=
he simplest solution would be to reserve within the SFC encapsulation speci=
fication version 01 and make it clear within the text that this is reserved=
 and should not be used in future versions of the protocol. If we ever chan=
ge the version, which incidentally should be a rare thing, we would therefo=
re jump from version=3D00 to version=3D02 (i.e. making version 1 'reserved'=
) thereby avoiding any clash in the first nibble.

IMHO this seems like a reasonable approach to the problem but I would like =
to hear opinions from the WG as to whether this is an acceptable solution a=
nd if we can reach consensus, ask the editors of draft-ietf-sfc-nsh to add =
text to reflect it.

Jim

--_000_D34621684C3B2jguicharciscocom_
Content-Type: text/html; charset="iso-8859-1"
Content-ID: <D357DE22FAA72F47A036987E631939B3@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif;">
<div>Dear WG:</div>
<div><br>
</div>
<div>The infamous &#8220;MPLS first nibble&#8221; issue was raised as part =
of the WGLC for draft-ietf-sfc-nsh-04. While this issue has been known for =
some time, and work has been done by the community to try and mitigate (for=
 example RFC4928) or remove it (for example
 RFC6790), given the widespread implementation of existing hardware that us=
es the first nibble for ECMP decision processing, it seems prudent for us a=
s a WG to address it in terms of how it affects our SFC protocol and make i=
t clear within the draft the conclusion
 of the WG.</div>
<div><br>
</div>
<div>While it is true that we could rearrange our encapsulation header such=
 that it avoids this issue (by simply making the first nibble correspond to=
 a value that is neither 0x4 or 0x6), given multiple industry and open sour=
ce implementations of the SFC encapsulation
 header, that is not a desired outcome, especially as multiple other transp=
ort encapsulations do not exhibit this behavior when coupled with the SFC e=
ncapsulation.</div>
<div><br>
</div>
<div>If we consider the current definition of the SFC encapsulation base he=
ader, we can see that the first two bits are used as a version field. This =
means that if we ever produce a version 01 for NSH it could result in a val=
ue of 0x4 or 0x6 being present within
 the first nibble. To avoid such a result the simplest solution would be to=
 reserve within the SFC encapsulation specification version 01 and make it =
clear within the text that this is reserved and should not be used in futur=
e versions of the protocol. If we
 ever change the version, which incidentally should be a rare thing, we wou=
ld therefore jump from version=3D00 to version=3D02 (i.e. making version 1 =
&#8216;reserved&#8217;) thereby avoiding any clash in the first nibble.&nbs=
p;</div>
<div><br>
</div>
<div>IMHO this seems like a reasonable approach to the problem but I would =
like to hear opinions from the WG as to whether this is an acceptable solut=
ion and if we can reach consensus, ask the editors of draft-ietf-sfc-nsh to=
 add text to reflect it.</div>
<div><br>
</div>
<div>Jim</div>
</body>
</html>

--_000_D34621684C3B2jguicharciscocom_--


From nobody Wed Apr 27 05:19:39 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF2BF12D0DF for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 05:19:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.914
X-Spam-Level: 
X-Spam-Status: No, score=-2.914 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mbqEzyA10Qhg for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 05:19:36 -0700 (PDT)
Received: from relais-inet.orange.com (relais-nor35.orange.com [80.12.70.35]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8EE2E12D5B2 for <sfc@ietf.org>; Wed, 27 Apr 2016 05:19:36 -0700 (PDT)
Received: from opfednr03.francetelecom.fr (unknown [xx.xx.xx.67]) by opfednr25.francetelecom.fr (ESMTP service) with ESMTP id 71014180173; Wed, 27 Apr 2016 14:19:34 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.27]) by opfednr03.francetelecom.fr (ESMTP service) with ESMTP id 45D441A0059; Wed, 27 Apr 2016 14:19:34 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7C.corporate.adroot.infra.ftgroup ([fe80::8007:17b:c3b4:d68b%19]) with mapi id 14.03.0279.002; Wed, 27 Apr 2016 14:19:34 +0200
From: <mohamed.boucadair@orange.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: draft-ietf-sfc-nsh "first nibble" issue
Thread-Index: AQHRoHv5jA1HvFPCM0yMnvW+PmvYjp+dvNLg
Date: Wed, 27 Apr 2016 12:19:33 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D6079C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <D3462168.4C3B2%jguichar@cisco.com>
In-Reply-To: <D3462168.4C3B2%jguichar@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.5]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B933008D6079COPEXCLILMA3corp_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/JODgDB-wqujs4U9VYja94isCWlU>
Subject: Re: [sfc] draft-ietf-sfc-nsh "first nibble" issue
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 12:19:39 -0000

--_000_787AE7BB302AE849A7480A190F8B933008D6079COPEXCLILMA3corp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Jim,

Looks like a good plan.

Thanks.

Cheers,
Med

De : sfc [mailto:sfc-bounces@ietf.org] De la part de Jim Guichard (jguichar=
)
Envoy=E9 : mercredi 27 avril 2016 13:58
=C0 : sfc@ietf.org
Objet : [sfc] draft-ietf-sfc-nsh "first nibble" issue

Dear WG:

The infamous "MPLS first nibble" issue was raised as part of the WGLC for d=
raft-ietf-sfc-nsh-04. While this issue has been known for some time, and wo=
rk has been done by the community to try and mitigate (for example RFC4928)=
 or remove it (for example RFC6790), given the widespread implementation of=
 existing hardware that uses the first nibble for ECMP decision processing,=
 it seems prudent for us as a WG to address it in terms of how it affects o=
ur SFC protocol and make it clear within the draft the conclusion of the WG=
.

While it is true that we could rearrange our encapsulation header such that=
 it avoids this issue (by simply making the first nibble correspond to a va=
lue that is neither 0x4 or 0x6), given multiple industry and open source im=
plementations of the SFC encapsulation header, that is not a desired outcom=
e, especially as multiple other transport encapsulations do not exhibit thi=
s behavior when coupled with the SFC encapsulation.

If we consider the current definition of the SFC encapsulation base header,=
 we can see that the first two bits are used as a version field. This means=
 that if we ever produce a version 01 for NSH it could result in a value of=
 0x4 or 0x6 being present within the first nibble. To avoid such a result t=
he simplest solution would be to reserve within the SFC encapsulation speci=
fication version 01 and make it clear within the text that this is reserved=
 and should not be used in future versions of the protocol. If we ever chan=
ge the version, which incidentally should be a rare thing, we would therefo=
re jump from version=3D00 to version=3D02 (i.e. making version 1 'reserved'=
) thereby avoiding any clash in the first nibble.

IMHO this seems like a reasonable approach to the problem but I would like =
to hear opinions from the WG as to whether this is an acceptable solution a=
nd if we can reach consensus, ask the editors of draft-ietf-sfc-nsh to add =
text to reflect it.

Jim

--_000_787AE7BB302AE849A7480A190F8B933008D6079COPEXCLILMA3corp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:70.85pt 70.85pt 70.85pt 70.85pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Hi Jim,
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Looks like a good plan.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Thanks.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc =
[mailto:sfc-bounces@ietf.org]
<b>De la part de</b> Jim Guichard (jguichar)<br>
<b>Envoy=E9&nbsp;:</b> mercredi 27 avril 2016 13:58<br>
<b>=C0&nbsp;:</b> sfc@ietf.org<br>
<b>Objet&nbsp;:</b> [sfc] draft-ietf-sfc-nsh &quot;first nibble&quot; issue=
<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Dear WG:<o:p></o:p></span><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">The infamous &#8220;MPLS fi=
rst nibble&#8221; issue was raised as part of the WGLC for draft-ietf-sfc-n=
sh-04. While this issue has been known for some time, and work has been
 done by the community to try and mitigate (for example RFC4928) or remove =
it (for example RFC6790), given the widespread implementation of existing h=
ardware that uses the first nibble for ECMP decision processing, it seems p=
rudent for us as a WG to address
 it in terms of how it affects our SFC protocol and make it clear within th=
e draft the conclusion of the WG.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">While it is true that we co=
uld rearrange our encapsulation header such that it avoids this issue (by s=
imply making the first nibble correspond to a value that
 is neither 0x4 or 0x6), given multiple industry and open source implementa=
tions of the SFC encapsulation header, that is not a desired outcome, espec=
ially as multiple other transport encapsulations do not exhibit this behavi=
or when coupled with the SFC encapsulation.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">If we consider the current =
definition of the SFC encapsulation base header, we can see that the first =
two bits are used as a version field. This means that if
 we ever produce a version 01 for NSH it could result in a value of 0x4 or =
0x6 being present within the first nibble. To avoid such a result the simpl=
est solution would be to reserve within the SFC encapsulation specification=
 version 01 and make it clear within
 the text that this is reserved and should not be used in future versions o=
f the protocol. If we ever change the version, which incidentally should be=
 a rare thing, we would therefore jump from version=3D00 to version=3D02 (i=
.e. making version 1 &#8216;reserved&#8217;) thereby
 avoiding any clash in the first nibble.&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">IMHO this seems like a reas=
onable approach to the problem but I would like to hear opinions from the W=
G as to whether this is an acceptable solution and if we
 can reach consensus, ask the editors of draft-ietf-sfc-nsh to add text to =
reflect it.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Jim<o:p></o:p></span></p>
</div>
</div>
</div>
</body>
</html>

--_000_787AE7BB302AE849A7480A190F8B933008D6079COPEXCLILMA3corp_--


From nobody Wed Apr 27 06:06:31 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A52A912D169 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 06:06:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.895
X-Spam-Level: 
X-Spam-Status: No, score=-2.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LW5EN8OzIe8E for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 06:06:27 -0700 (PDT)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) by ietfa.amsl.com (Postfix) with ESMTP id C989B12D14B for <sfc@ietf.org>; Wed, 27 Apr 2016 06:06:26 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by wtl-exchp-1.sandvine.com ([::1]) with mapi id 14.03.0195.001; Wed, 27 Apr 2016 09:06:25 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: draft-ietf-sfc-nsh "first nibble" issue
Thread-Index: AQHRoHv5jA1HvFPCM0yMnvW+PmvYjp+dvNLggAANY8A=
Date: Wed, 27 Apr 2016 13:06:25 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F3EE64@wtl-exchp-2.sandvine.com>
References: <D3462168.4C3B2%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008D6079C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D6079C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830F3EE64wtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/CC7RmZ0dNsId6rHqerHPrbl4Y7o>
Subject: Re: [sfc] draft-ietf-sfc-nsh "first nibble" issue
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 13:06:29 -0000

--_000_E8355113905631478EFF04F5AA706E9830F3EE64wtlexchp2sandvi_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

+1

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of mohamed.boucadair@oran=
ge.com
Sent: Wednesday, April 27, 2016 8:20 AM
To: Jim Guichard (jguichar); sfc@ietf.org
Subject: Re: [sfc] draft-ietf-sfc-nsh "first nibble" issue

Hi Jim,

Looks like a good plan.

Thanks.

Cheers,
Med

De : sfc [mailto:sfc-bounces@ietf.org] De la part de Jim Guichard (jguichar=
)
Envoy=E9 : mercredi 27 avril 2016 13:58
=C0 : sfc@ietf.org<mailto:sfc@ietf.org>
Objet : [sfc] draft-ietf-sfc-nsh "first nibble" issue

Dear WG:

The infamous "MPLS first nibble" issue was raised as part of the WGLC for d=
raft-ietf-sfc-nsh-04. While this issue has been known for some time, and wo=
rk has been done by the community to try and mitigate (for example RFC4928)=
 or remove it (for example RFC6790), given the widespread implementation of=
 existing hardware that uses the first nibble for ECMP decision processing,=
 it seems prudent for us as a WG to address it in terms of how it affects o=
ur SFC protocol and make it clear within the draft the conclusion of the WG=
.

While it is true that we could rearrange our encapsulation header such that=
 it avoids this issue (by simply making the first nibble correspond to a va=
lue that is neither 0x4 or 0x6), given multiple industry and open source im=
plementations of the SFC encapsulation header, that is not a desired outcom=
e, especially as multiple other transport encapsulations do not exhibit thi=
s behavior when coupled with the SFC encapsulation.

If we consider the current definition of the SFC encapsulation base header,=
 we can see that the first two bits are used as a version field. This means=
 that if we ever produce a version 01 for NSH it could result in a value of=
 0x4 or 0x6 being present within the first nibble. To avoid such a result t=
he simplest solution would be to reserve within the SFC encapsulation speci=
fication version 01 and make it clear within the text that this is reserved=
 and should not be used in future versions of the protocol. If we ever chan=
ge the version, which incidentally should be a rare thing, we would therefo=
re jump from version=3D00 to version=3D02 (i.e. making version 1 'reserved'=
) thereby avoiding any clash in the first nibble.

IMHO this seems like a reasonable approach to the problem but I would like =
to hear opinions from the WG as to whether this is an acceptable solution a=
nd if we can reach consensus, ask the editors of draft-ietf-sfc-nsh to add =
text to reflect it.

Jim

--_000_E8355113905631478EFF04F5AA706E9830F3EE64wtlexchp2sandvi_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:70.85pt 70.85pt 70.85pt 70.85pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&#43;1<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc [mai=
lto:sfc-bounces@ietf.org]
<b>On Behalf Of </b>mohamed.boucadair@orange.com<br>
<b>Sent:</b> Wednesday, April 27, 2016 8:20 AM<br>
<b>To:</b> Jim Guichard (jguichar); sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] draft-ietf-sfc-nsh &quot;first nibble&quot; issue=
<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black">Hi Jim,
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Looks like a good plan.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Thanks.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span=
 lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot=
;sans-serif&quot;"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto:sfc=
-bounces@ietf.org</a>]
<b>De la part de</b> Jim Guichard (jguichar)<br>
<b>Envoy=E9&nbsp;:</b> mercredi 27 avril 2016 13:58<br>
<b>=C0&nbsp;:</b> <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<b>Objet&nbsp;:</b> [sfc] draft-ietf-sfc-nsh &quot;first nibble&quot; issue=
<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"FR"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.5pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Dear WG:<o:p></=
o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.5pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:=
p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.5pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">The infamous &#=
8220;MPLS first nibble&#8221; issue was raised as part of the WGLC for draf=
t-ietf-sfc-nsh-04. While this issue has been known for some time, and
 work has been done by the community to try and mitigate (for example RFC49=
28) or remove it (for example RFC6790), given the widespread implementation=
 of existing hardware that uses the first nibble for ECMP decision processi=
ng, it seems prudent for us as a
 WG to address it in terms of how it affects our SFC protocol and make it c=
lear within the draft the conclusion of the WG.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.5pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:=
p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.5pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">While it is tru=
e that we could rearrange our encapsulation header such that it avoids this=
 issue (by simply making the first nibble correspond to a
 value that is neither 0x4 or 0x6), given multiple industry and open source=
 implementations of the SFC encapsulation header, that is not a desired out=
come, especially as multiple other transport encapsulations do not exhibit =
this behavior when coupled with
 the SFC encapsulation.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.5pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:=
p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.5pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">If we consider =
the current definition of the SFC encapsulation base header, we can see tha=
t the first two bits are used as a version field. This means
 that if we ever produce a version 01 for NSH it could result in a value of=
 0x4 or 0x6 being present within the first nibble. To avoid such a result t=
he simplest solution would be to reserve within the SFC encapsulation speci=
fication version 01 and make it
 clear within the text that this is reserved and should not be used in futu=
re versions of the protocol. If we ever change the version, which incidenta=
lly should be a rare thing, we would therefore jump from version=3D00 to ve=
rsion=3D02 (i.e. making version 1 &#8216;reserved&#8217;)
 thereby avoiding any clash in the first nibble.&nbsp;<o:p></o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.5pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:=
p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.5pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">IMHO this seems=
 like a reasonable approach to the problem but I would like to hear opinion=
s from the WG as to whether this is an acceptable solution
 and if we can reach consensus, ask the editors of draft-ietf-sfc-nsh to ad=
d text to reflect it.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.5pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:=
p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.5pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Jim<o:p></o:p><=
/span></p>
</div>
</div>
</div>
</body>
</html>

--_000_E8355113905631478EFF04F5AA706E9830F3EE64wtlexchp2sandvi_--


From nobody Wed Apr 27 06:52:16 2016
Return-Path: <daniel.bernier@bell.ca>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4F4B912D820 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 06:52:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.922
X-Spam-Level: 
X-Spam-Status: No, score=-1.922 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nuviM-QijbkH for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 06:52:07 -0700 (PDT)
Received: from mail1.bemta5.messagelabs.com (mail1.bemta5.messagelabs.com [195.245.231.139]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5066B12D5AC for <sfc@ietf.org>; Wed, 27 Apr 2016 06:51:45 -0700 (PDT)
Received: from [85.158.139.3] by server-3.bemta-5.messagelabs.com id CE/C9-14148-FE3C0275; Wed, 27 Apr 2016 13:51:43 +0000
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrBKsWRWlGSWpSXmKPExsVybg1jku77wwr hBvf61SyWzlO3ePJgK7sDk8eU3xtZPZYs+ckUwBTFmpmXlF+RwJpxb0JkwVaJijez3rI0MPZI dDFyckgI+Enc3zSJvYuRi0NIYD+jxORLb9hAEkICNxgldjcFQyROMkp8u3eVHSTBJmApsWLzb FYQW0QgSKK7eSJYg7CAlcT3bXcYIeLWEvtOQtSLCOhJ/Fn/kwnEZhFQlZi0vpEZxOYFqu+8NQ mshlFATOL7qTVgNcwC4hK3nsxngrhOQGLJnvPMELaoxMvH/8D2igLN7P2+kx0iriNx9voTRgj bQGLr0n0sELa8xM0JILdxAM3UlFi/Sx9ivL3ErvUdzBC2osSU7ofsEOcISpyc+QSqVVLi4Iob LJBwUJb4tX8PIyQcFjJKbO6cxwwyUwJo0Pte7wmM0rOQXD0LYdssJNtmIdk2C8m2BYysqxjVi 1OLylKLdE31kooy0zNKchMzc3QNDUz1clOLixPTU3MSk4r1kvNzNzECY5wBCHYwful3PsQoyc GkJMrLuUIhXIgvKT+lMiOxOCO+qDQntfgQowwHh5IE75RDQDnBotT01Iq0zBxgsoFJS3DwKIn wHgdJ8xYXJOYWZ6ZDpE4xKkqJ804GSQiAJDJK8+DaYAnuEqOslDAvI9AhQjwFqUW5mSWo8q8Y xTkYlYR5uYDpUognM68EbvoroMVMQIsvH5IFWVySiJCSamDUZXj5mYHBTS5kx+EDjsXs82dUb Ols+/Zgd8ruO20i69oX/izeXXVv84LTe17/9eqz2bzqi9LtS8H6c+9UuWbHxUdvj80/xvAlK4 tPqX/71E2pvIr3jFujix6vDb154fsHTouH/db60/8f3LOwmu96VsKp71+1LFyZZL9dDjh978C x8y///z/0RYmlOCPRUIu5qDgRAKpC1DdrAwAA
X-Env-Sender: daniel.bernier@bell.ca
X-Msg-Ref: server-3.tower-90.messagelabs.com!1461765102!35411202!1
X-Originating-IP: [206.172.1.98]
X-StarScan-Received: 
X-StarScan-Version: 8.34; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 32503 invoked from network); 27 Apr 2016 13:51:43 -0000
Received: from tls.exchange.bell.ca (HELO Tls.exchange.bell.ca) (206.172.1.98) by server-3.tower-90.messagelabs.com with DHE-RSA-AES256-GCM-SHA384 encrypted SMTP; 27 Apr 2016 13:51:43 -0000
X-CrossPremisesHeadersFilteredBySendConnector: EX13EDGE01-DOR.bell.corp.bce.ca
Received: from DG3MBX02-WYN.bell.corp.bce.ca (198.235.121.230) by EX13EDGE01-DOR.bell.corp.bce.ca (198.235.121.54) with Microsoft SMTP Server id 15.0.1076.9; Wed, 27 Apr 2016 09:46:28 -0400
Received: from DG3MBX04-WYN.bell.corp.bce.ca (2002:8eb6:121a::8eb6:121a) by DG3MBX02-WYN.bell.corp.bce.ca (2002:8eb6:1218::8eb6:1218) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 27 Apr 2016 09:51:41 -0400
Received: from DG3MBX04-WYN.bell.corp.bce.ca ([fe80::442:b9b4:718c:9736]) by DG3MBX04-WYN.bell.corp.bce.ca ([fe80::442:b9b4:718c:9736%22]) with mapi id 15.00.1104.000; Wed, 27 Apr 2016 09:51:42 -0400
From: "Bernier, Daniel (520165)" <daniel.bernier@bell.ca>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] draft-ietf-sfc-nsh "first nibble" issue
Thread-Index: AQHRoIvtAP2rM7kGNU6DrnZCeYW/VQ==
Date: Wed, 27 Apr 2016 13:51:41 +0000
Message-ID: <420F91E3-0580-4FA2-B5C6-3343EE0F41AB@bell.ca>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/f.15.1.160411
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [172.24.25.8]
Content-Type: text/plain; charset="utf-8"
Content-ID: <08A68CB2F5E8F34292AD8AE10F1FB654@exchange.bell.ca>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Received-SPF: SoftFail (EX13EDGE01-DOR.bell.corp.bce.ca: domain of transitioning daniel.bernier@bell.ca discourages use of 198.235.121.230 as permitted sender)
X-OrganizationHeadersPreserved: EX13EDGE01-DOR.bell.corp.bce.ca
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/gQEapOg1QdWShzf1hwwjXIDnjvk>
Subject: Re: [sfc] draft-ietf-sfc-nsh "first nibble" issue
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 13:52:14 -0000
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From nobody Wed Apr 27 07:04:16 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 97ED212D80E for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 07:04:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W6tLBlSZ7dqE for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 07:04:10 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E99F012D1D3 for <sfc@ietf.org>; Wed, 27 Apr 2016 07:04:09 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id B39C2240E6E; Wed, 27 Apr 2016 07:04:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461765849; bh=O1M1Z8RRSzFj2UgyatgmUtVBeGL3d+j6A3HrzMN2XMU=; h=Subject:To:References:From:Date:In-Reply-To:From; b=E3fl53uuTz3I+0ITJEsIzHOFv4gtRMpHGMg1EZRxQASkvDj67Cp76RBM3SX5iGdCC 8CySWDm82PALQ4gaQQ5pMBZZ+IfTzXzQcOObinIH6t2bZjdFMqOJbV5VMllcX6gYUs GoYfEPzsIdkbpiqYT+vI0PtRTgjY82U8hBKPcnhs=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 3240E240828; Wed, 27 Apr 2016 07:04:08 -0700 (PDT)
To: mohamed.boucadair@orange.com, Ron Parker <Ron_Parker@affirmednetworks.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <CDF2F015F4429F458815ED2A6C2B6B0B6D786B8B@MBX021-W3-CA-2.exch021.domain.local> <0f0e8705-1ca4-6df0-81c3-93db0f94a99f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604F7@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <f9aac050-9c8f-d7de-d57e-ff23dbd9b8e4@joelhalpern.com>
Date: Wed, 27 Apr 2016 10:03:57 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D604F7@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/91lrlMie7Uc0w-kpIpQdK2K9KAk>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 14:04:12 -0000

On the Classifier<->SFF communication, you have a fiar point.  My
personal model is off in that regard.  My apologies.

I believe that the assumption there is that just as with an SFF, it will
use a local means to couple to a transport encapsulator.  I tend to
think of this as putting an SFF co-located with the classifier, and then
using SFF functionality, but that is not required by the architecture.

The external behavior of the SFF,_>SF interface, where the SF speaks 
NSH, is that an NSH encapsulated frame is communicated between the two. 
The transport mechanism (which may need to fragment) is out of scope.

Yours,
Joel

On 4/27/16 1:46 AM, mohamed.boucadair@orange.com wrote:
> Re-,
>
> Please see inline.
>
> Cheers, Med
>
>> -----Message d'origine----- De : Joel M. Halpern
>> [mailto:jmh@joelhalpern.com] Envoyé : mardi 26 avril 2016 19:22 À :
>> Ron Parker; Joel M. Halpern; BOUCADAIR Mohamed IMT/OLN; Elzur,
>> Uri; sfc@ietf.org Objet : Re: [sfc] WG last call for
>> draft-ietf-sfc-nsh-04.txt
>>
>> At least so far, we have treated the communication between
>> classifier and SFF (ingress or intermediate) as outside of the
>> scope of our work.
>
> [Med] I'm afraid I don't get this one. Isn't this what is depicted in
> https://tools.ietf.org/html/rfc7665#section-4?
>
>> For SF <-> SFF communication we have ntoed the need for a proxy to
>> handle the case when the SF can not accept and return the NSH
>> header, since we assume that is preserved.  Other than that
>> preservation, similar to the above, we have treated the details as
>> outside of our scope. That is because they depend so heavily on the
>> implementation technique used.  (Hypervisor ,_> application
>> communication vs communication inside a user space or communication
>> over an actual Ethernet are all very different.)
>
> [Med] Specifying the external behavior of the interface between an
> SFF and an SFC-aware SF is completely in scope, imho.
>
>>
>> Trying to extend the NSH document to address these would be a
>> major change, and would step into the issues related to transport
>> selection, which are explicitly out of scope.
>>
>> Yours, Joel
>>
>> On 4/26/16 11:58 AM, Ron Parker wrote:
>>> Linda,
>>>
>>> I like the first clause (transport tunnel based fragmentation).
>>>
>>> Regarding the second (source based), I think there are more
>>> subcases to
>> consider:
>>>
>>> 1.  Propagation of NSH encapsulated packet from classifier to
>>> SFF 2.  Propagation of NSH encapsulated packet from SFF to SF 3.
>>> Propagation of NSH encapsulated packet from SF to SFF (including
>> possibility that NSH size increased at SF)
>>> 4.  Propagation of NSH encapsulated packet from SFF to SFF
>>>
>>> In each of the 4 cases above,  there is the possibility that MTU
>>> will be
>> exceeded and therefore there are procedures to be defined in that
>> eventuality.
>>>
>>> Thanks.
>>>
>>> Ron
>>>
>>>
>>> -----Original Message----- From: sfc
>>> [mailto:sfc-bounces@ietf.org] On Behalf Of Linda Dunbar Sent:
>>> Tuesday, April 26, 2016 11:48 AM To: Joel M. Halpern
>>> <jmh@joelhalpern.com>; mohamed.boucadair@orange.com;
>> Elzur, Uri <uri.elzur@intel.com>; sfc@ietf.org
>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>> Joel,
>>>
>>> I think the document should add the description on the following
>>> two
>> fragmentation scenarios:
>>>
>>> - Transport tunnel generated fragmentation: When a packet
>>> fragmentation is caused by transport tunnel (i.e.
>> various encapsulations), the termination point of the transport
>> tunnel is responsible for re-assembling the fragmented pieces of
>> the packet. Since there won't be any SFF nodes in between the
>> Transport Tunnel, the tunnel generated fragmentation does not
>> require any actions by SFF nodes or SF nodes.
>>>
>>>
>>> - Source node generated fragmentation (after adding on the NSH
>>> header): When fragmentation has to be performed for a packet
>>> being
>> encapsulated with the NSH header, either the intermediate SFF nodes
>> or the SF nodes have to be able to reassemble the fragmented
>> pieces.
>>>
>>>
>>>
>>> Cheers,
>>>
>>>
>>> Linda
>>>
>>> -----Original Message----- From: Joel M. Halpern
>>> [mailto:jmh@joelhalpern.com] Sent: Tuesday, April 26, 2016 10:33
>>> AM To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri;
>>> sfc@ietf.org Subject: Re: [sfc] WG last call for
>>> draft-ietf-sfc-nsh-04.txt
>>>
>>> Re-reading your note, it is possible that you are referring only
>>> to the
>> case of transport generated fragmentation of the outer packet.  I
>> had assumed you were not talking about that, since the resulting
>> fragments will not all have NSH headers.  As with any tunnel
>> technology, if the tunnel chooses to fragment at its layer, then
>> the tunnel is responsible for reassembly.  That would be invisible
>> to the SFF.
>>>
>>> Yours, Joel
>>>
>>> On 4/26/16 11:10 AM, Linda Dunbar wrote:
>>>> Agree with Med.
>>>>
>>>> Even if each fragment piece of a packet with NSH header carries
>>>> the NSH
>> header, the intermediate SFF nodes still need to put together all
>> the fragments together before passing the whole data frame to the
>> SF.
>>>>
>>>> Linda
>>>>
>>>> -----Original Message----- From: sfc
>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>> mohamed.boucadair@orange.com Sent: Monday, April 25, 2016 9:42
>>>> AM To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org Subject: Re:
>>>> [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Re-,
>>>>
>>>> How do you instruct the transport layer to ALWAYS prepend an
>>>> NSH header
>> even for fragments? Or you don't care about that?
>>>>
>>>> Thank you.
>>>>
>>>> Cheers, Med
>>>>
>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>> [mailto:uri.elzur@intel.com] Envoyé : lundi 25 avril 2016
>>>>> 16:26 À : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;
>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Med
>>>>>
>>>>> Not to repeat my position, but I'll do it anyhow :-) As NSH
>>>>> is *NOT* a transport, dealing with fragmentation is left to
>>>>> the Transport used.
>>>>>
>>>>> The model I use for NSH, is basically similar to VXLAN . It
>>>>> is an
>> overly.
>>>>>
>>>>> Thx
>>>>>
>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>
>>>>>
>>>>> -----Original Message----- From: sfc
>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>> mohamed.boucadair@orange.com Sent: Monday, April 25, 2016
>>>>> 7:18 AM To: Joel M. Halpern <jmh@joelhalpern.com>;
>>>>> sfc@ietf.org Subject: Re: [sfc] WG last call for
>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Joel,
>>>>>
>>>>> Please see inline.
>>>>>
>>>>> Cheers, Med
>>>>>
>>>>>> -----Message d'origine----- De : Joel M. Halpern
>>>>>> [mailto:jmh@joelhalpern.com] Envoyé : lundi 25 avril 2016
>>>>>> 15:48 À : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet :
>>>>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> If I am understanding you correctly Med, you are asking
>>>>>> that the NSH draft specify how service chaining should cope
>>>>>> with packets that have been fragmented?
>>>>>>
>>>>>
>>>>> [Med] To be accurate, I'm asking to assess whether there are
>> implications.
>>>>> If there are, then the draft should be updated accordingly.
>>>>>
>>>>>> NSH, and the SFF functionality, does not care.
>>>>>
>>>>> [Med] I'm not that sure. Some typical implications are listed
>>>>> below:
>>>>>
>>>>> * SFF: If the NSH header is present only in the a fragment
>>>>> but SFF didn't maintained a state, subsequent fragments won't
>>>>> be appropriately
>> processed.
>>>>> * SFC-aware function: if prepending a context information
>>>>> depends on the full packet, not only a fragment.
>>>>>
>>>>> It just does its job.
>>>>>
>>>>> [Med] which may be disturbed in some situations as listed in
>>>>> the examples above.
>>>>>
>>>>>> Ingress and intermediate classifiers may cope with
>>>>>> fragments in any number of ways.
>>>>> Specifying such is clearly out of scope for this draft.
>>>>>
>>>>> [Med] The purpose is not to specify the internal
>>>>> implementation details but the external behavior of the
>>>>> classifier function when it comes to handle fragments. That
>>>>> behavior may have an incidence on SFF, in particular. The
>>>>> purpose is not to recommend the maximum resources to be
>>>>> dedicated to out of order fragments nor the timeout to cache
>>>>> those; these considerations are of course out of scope.
>>>>> Nevertheless, an implementation should offer a configurable
>>>>> parameter so that an operator tweak those according to its
>>>>> context.
>>>>>
>>>>>> I suppose one could write an informational draft on
>>>>>> possible ways of coping.  The IETF has not usually
>>>>>> published such. Service functions have to cope with
>>>>>> fragmented packets just as they had to before the advent of
>>>>>> NSH, so describing that is clearly not needed here.
>>>>>
>>>>> [Med] The advent of NSH has the following implications: * it
>>>>> exacerbates fragmentation. Handing over this issue to the
>>>>> transport layer may lead to interoperability issues. * the
>>>>> chaining may not be efficient if fragments are
>>>>> inappropriately handled.
>>>>>
>>>>> Introducing NSH should not degrade the overall service
>>>>> compared to legacy service deployment schemes.
>>>>>
>>>>>>
>>>>>> Yours, Joel
>>>>>>
>>>>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
>>>>>>> Re-,
>>>>>>>
>>>>>>> I hear you, but my comment is that we need, as a WG, to
>>>>>>> decide what to
>>>>>> put in the draft. FWIW, I'm discussing two fragmentation
>>>>>> issues:
>>>>>>>
>>>>>>> (1) Fragmentation that is caused by prepending an SFC
>>>>>>> header. (2) Handling fragments at the ingress of an
>>>>>>> SFC-enabled domain.
>>>>>>>
>>>>>>> Increasing the MTU is for sure a recommendation is to be
>>>>>>> explicitly
>>>>>> called out in the text (see my first message).
>>>>>>>
>>>>>>> There are other issues that need to be discussed, e.g.,
>>>>>>> how to deal with
>>>>>> fragments in SFFs/Classifiers?
>>>>>>>
>>>>>>> It is also "prudent" to check that no issues will be
>>>>>>> experienced in SFF
>>>>>> to handle fragments. If an SFC header is prepended for all
>>>>>> fragments, I'm not sure there
>>>>>>> is any particular issue at the SFF level, except if
>>>>>>> stripping/adding
>>>>>> context TLVs depends on the full packet (not just
>>>>>> fragment). It is warranted to consider a little bit this
>>>>>> point before declaring there is no issue.
>>>>>>>
>>>>>>> For point (1), declaring fragmentation out of scope would
>>>>>>> be meant that
>>>>>> an implementation must be prepared to receive fragments
>>>>>> with or without NSH header as this is a decision that is
>>>>>> left to the transport encapsulation. This is a requirement
>>>>>> per se!
>>>>>>>
>>>>>>> I won't reiterate all the comments I have about the
>>>>>>> current wording of
>>>>>> this section.
>>>>>>>
>>>>>>> Cheers, Med
>>>>>>>
>>>>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>>>> [mailto:uri.elzur@intel.com] Envoyé : lundi 25 avril
>>>>>>>> 2016 08:30 À : BOUCADAIR Mohamed IMT/OLN; Thomas
>>>>>>>> Narten; sfc@ietf.org Objet : RE: [sfc] WG last call
>>>>>>>> for draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Hi Med
>>>>>>>>
>>>>>>>> My point is that Fragmentation is yet another transport
>>>>>>>> related issue
>>>>>> that
>>>>>>>> is beyond the scope of NSH and beyond the charter of
>>>>>>>> the WG, so it
>>>>>> doesn't
>>>>>>>> really belong in the draft. We are providing an advice
>>>>>>>> as extending the size of the packet may lead to
>>>>>>>> fragmentation, but as you check RFC 7348 VxLAN, which
>>>>>>>> my create the same issue, you'll find it doesn't even
>>>>>> relate
>>>>>>>> to it.
>>>>>>>>
>>>>>>>> Thx
>>>>>>>>
>>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>>
>>>>>>>>
>>>>>>>> -----Original Message----- From: sfc
>>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>>> mohamed.boucadair@orange.com Sent: Sunday, April 24,
>>>>>>>> 2016 10:32 PM To: Elzur, Uri <uri.elzur@intel.com>;
>>>>>>>> Thomas Narten
>>>>>> <narten@us.ibm.com>;
>>>>>>>> sfc@ietf.org Subject: Re: [sfc] WG last call for
>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Hi Uri,
>>>>>>>>
>>>>>>>> That's another option that needs to be
>>>>>>>> discussed/investigated. I'm
>>>>>> afraid
>>>>>>>> this is not the rationale adopted in -04 since it
>>>>>>>> includes some text
>>>>>> that
>>>>>>>> is far to be sufficient to ensure interoperable
>>>>>>>> implementations.
>>>>>>>>
>>>>>>>> BTW, saying that nsh does not need to deal with
>>>>>>>> fragmentation because
>>>>>> it
>>>>>>>> is transport-independent is not IMHO a good strategy to
>>>>>>>> adopt here
>>>>>> because
>>>>>>>> it opens the door for interoperable issues, it may lead
>>>>>>>> to sub-optimal implementations if the sfc information
>>>>>>>> is present only in one
>>>>>> fragments,
>>>>>>>> etc.
>>>>>>>>
>>>>>>>> My comments are related to the current text in the -04.
>>>>>>>> This text needs
>>>>>> to
>>>>>>>> be fixed somehow.
>>>>>>>>
>>>>>>>> Cheers, Med
>>>>>>>>
>>>>>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>>>>> [mailto:uri.elzur@intel.com] Envoyé : dimanche 24
>>>>>>>>> avril 2016 17:36 À : BOUCADAIR Mohamed IMT/OLN;
>>>>>>>>> Thomas Narten; sfc@ietf.org Objet : RE: [sfc] WG last
>>>>>>>>> call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> Hi Med
>>>>>>>>>
>>>>>>>>> I see no need to specify the exact behavior as NSH is
>>>>>>>>> transport independent i.e. like NSH interaction with
>>>>>>>>> any other Transport eh issue of Fragmentation is to
>>>>>>>>> be dealt in a way that matches the mechanisms
>>>>>>>>> supported by the Transport used and do not belong in
>>>>>>>>> the NSH draft
>>>>>>>>>
>>>>>>>>> Thx
>>>>>>>>>
>>>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> -----Original Message----- From: sfc
>>>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>>>> mohamed.boucadair@orange.com Sent: Thursday, April
>>>>>>>>> 14, 2016 12:43 AM To: Thomas Narten
>>>>>>>>> <narten@us.ibm.com>; sfc@ietf.org Subject: Re: [sfc]
>>>>>>>>> WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> R-,
>>>>>>>>>
>>>>>>>>> In addition to other pending issues raised for this
>>>>>>>>> draft, I would like to raise this additional one
>>>>>>>>> about Section 6.
>>>>>>>>>
>>>>>>>>> == 6.  Fragmentation Considerations
>>>>>>>>>
>>>>>>>>> NSH and the associated transport header are "added"
>>>>>>>>> to the encapsulated packet/frame.  This additional
>>>>>>>>> information increases
>>>>>> the
>>>>>>>>> size of the packet.  In order the ensure proper
>>>>>>>>> forwarding of
>> NSH
>>>>>>>>> data, several options for handling fragmentation and
>>>>>>>>> re-
>> assembly
>>>>>>>>> exist:
>>>>>>>>>
>>>>>>>>> 1.  Jumbo Frames, when supported, enable the
>>>>>>>>> transport of NSH
>> and
>>>>>>>>> associated transport packets without requiring
>> fragmentation.
>>>>>>>>>
>>>>>>>>> 2.  Path MTU Discovery [RFC1191]"describes a
>>>>>>>>> technique for dynamically discovering the maximum
>>>>>>>>> transmission unit (MTU) of
>>>>>> an
>>>>>>>>> arbitrary internet path" and can be utilized to
>>>>>>>>> ensure the
>>>>> the
>>>>>>>>> required packet size is used.
>>>>>>>>>
>>>>>>>>> 3.  [RFC6830] describes two schemes for fragmentation
>>>>>>>>> and re-
>>>>>> assembly
>>>>>>>>> in section 5.4. ==
>>>>>>>>>
>>>>>>>>> * The text is weak for a Standard track document that
>>>>>>>>> is intended to solve the problem in
>>>>>>>>> https://tools.ietf.org/html/rfc7498#section-
>>>>> 2.12.
>>>>>>>>> There should be a clear behavior to be followed by
>>>>>>>>> an
>>>>> implementation.
>>>>>>>>> Further, I would avoid the use of words such as
>>>>>>>>> "can".
>>>>>>>>>
>>>>>>>>> * The text covers only fragmentation when it is
>>>>>>>>> induced by SFC operations, it does not discuss the
>>>>>>>>> treatment of a fragment when received in an SFC
>>>>>>>>> domain. IMHO, the draft should also specify the
>>>>>>>>> behavior of the Classifier with regards to fragments
>>>>>>>>> for the sake of proper SFC operation. Applying
>>>>>>>>> classification policies may require the
>>>>>>>> full packet, not only a fragment.
>>>>>>>>> In particular, dedicated resources should dedicated
>>>>>>>>> for handling out of order fragments. Of course, it is
>>>>>>>>> out of scope of this document to describe how SFs
>>>>>>>>> handle fragments.
>>>>>>>>>
>>>>>>>>> * If an SFC header is prepended for all fragments,
>>>>>>>>> I'm not sure there is any particular issue at the SFF
>>>>>>>>> level...except if stripping/adding context TLVs
>>>>>>>>> depends on the full packet (not just fragment). It is
>>>>>>>>> warranted to consider a little bit this point before
>>>>>>>>> declaring there
>>>>>> is
>>>>>>>> no issue.
>>>>>>>>>
>>>>>>>>> * The text states "several options". This may be
>>>>>>>>> interpreted as if implementing one of them is
>>>>>>>>> sufficient...which is not true. The first two points
>>>>>>>>> contribute to minimize the fragmentation risk, but
>>>>>>>>> fragmentation may still be experienced (e.g., other
>>>>>>>>> shims are prepended by other nodes for some other
>>>>>>>>> purposes, nested nsh, etc.)
>>>>>>>>>
>>>>>>>>> * The first two points have nothing to do with
>>>>>>>>> reassembly.
>>>>>>>>>
>>>>>>>>> * The support of jumbo frames by a router/device does
>>>>>>>>> not mean that it can make use of it. Appropriate MTU
>>>>>>>>> configuration should be undertaken in a consistent
>>>>>>>>> manner within an SFC domain. The text should be
>>>>>>>>> updated to make it is about (consistent) MTU
>>>>> configuration.
>>>>>>>>>
>>>>>>>>> * BTW, shouldn't the text be reworded to recommended
>>>>>>>>> to increase the MTU of **all nodes** of an
>>>>>>>>> SFC-enabled domain by at least the length of SFC
>>>>>>>>> header + transport header?
>>>>>>>>>
>>>>>>>>> * Bullet 2, how PMTU discovery is actually used in
>>>>>>>>> this context? Do you assume that all SFC-aware nodes
>>>>>>>>> will issue such messages towards other SFC-aware
>>>>>>>>> node, arbitrary destination, else?
>>>>>>>>>
>>>>>>>>> * Bullet 2, I would drop "describes a technique for
>>>>>>>>> dynamically discovering the maximum transmission unit
>>>>>>>>> (MTU) of an arbitrary internet path".
>>>>>>>>>
>>>>>>>>> * Bullet 2, s/ the the/the.
>>>>>>>>>
>>>>>>>>> * The reference to the LISP specification raises two
>>>>>>>>> concerns and one comment:
>>>>>>>>>
>>>>>>>>> (1) I don't think it is a good approach that
>>>>>>>>> fragments induced by the network are passed to their
>>>>>>>>> ultimate destinations as such
>>>>> (stateless).
>>>>>>>>> IMO, reassembly should be done within the SFC domain
>>>>>>>>> (responsible for fragmentation) not passed away. (2)
>>>>>>>>> Does the stateful mode require all SFC data plane
>>>>>>>>> elements maintain a full list of MTU for the any
>>>>>>>>> SFF/SF instance of the SFC
>>>>>>>> domain?
>>>>>>>>>
>>>>>>>>> The current text suggests that [RFC6830] should be
>>>>>>>>> listed as normative reference (not an informative
>>>>>>>>> one). I would personally favor removing the reference
>>>>>>>>> to LISP (as it is an Experimental
>> RFC).
>>>>>>>>>
>>>>>>>>> * The security section of the draft may be augmented
>>>>>>>>> with informational fragmentation-related pointers to:
>>>>>>>>> e.g., RFC1858 (Security Considerations for IP
>>>>>>>>> Fragment Filtering), RFC3128 (Protection Against a
>>>>>>>>> Variant of the Tiny Fragment Attack), and RFC 4963
>>>>>>>>> (IPv4 Reassembly Errors at High Data Rates).
>>>>>>>>>
>>>>>>>>> Cheers, Med
>>>>>>>>>
>>>>>>>>>> -----Message d'origine----- De : sfc
>>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de
>>>>>>>>>> mohamed.boucadair@orange.com Envoyé : lundi 11
>>>>>>>>>> avril 2016 13:14 À
>> :
>>>>>>>>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG
>>>>>>>>>> last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>
>>>>>>>>>> Dear Thomas, all,
>>>>>>>>>>
>>>>>>>>>> As I mentioned during the meeting, there are
>>>>>>>>>> several issues that are not covered in the last
>>>>>>>>>> version of the draft. I already provided examples
>>>>>>>>>> of the issues offline as requested by Martin.
>>>>>>>>>>
>>>>>>>>>> Cheers, Med
>>>>>>>>>>
>>>>>>>>>>> -----Message d'origine----- De : sfc
>>>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de
>>>>>>>>>>> Thomas Narten Envoyé : jeudi 31 mars 2016 04:48 À
>>>>>>>>>>> : sfc@ietf.org Objet : [sfc] WG last call for
>>>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>>
>>>>>>>>>>> Dear WG:
>>>>>>>>>>>
>>>>>>>>>>> This note begins a WG last call on
>>>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
The editors of the NSH document have indicated that they have
>>>>>>>>>>> addressed all known comments and that there are
>>>>>>>>>>> no open issues with the current version of the
>>>>>>>>>>> document.
>>>>>>>>>>>
>>>>>>>>>>> Substantive comments to the list please,
>>>>>>>>>>> editorial comments can go directly to the
>>>>>>>>>>> document editors.
>>>>>>>>>>>
>>>>>>>>>>> We'll also get a brief update from the editors at
>>>>>>>>>>> next week's meeting. If there are any remaining
>>>>>>>>>>> issues with the document, raising them before the
>>>>>>>>>>> meeting would be especially helpful.
>>>>>>>>>>>
>>>>>>>>>>> For the chairs, Thomas
>>>>>>>>>>>
>>>>>>>>>>> _______________________________________________
>>>>>>>>>>> sfc mailing list sfc@ietf.org
>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>>
>>>>>>>>>> _______________________________________________ sfc
>>>>>>>>>> mailing list sfc@ietf.org
>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>
>>>>>>>>> _______________________________________________ sfc
>>>>>>>>> mailing list sfc@ietf.org
>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>
>>>>>>>> _______________________________________________ sfc
>>>>>>>> mailing list sfc@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________ sfc
>>>>>>> mailing list sfc@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>
>>>>> _______________________________________________ sfc mailing
>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>>> _______________________________________________ sfc mailing
>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>>
>>> _______________________________________________ sfc mailing list
>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>
>


From nobody Wed Apr 27 07:16:26 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8634D12D1C2 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 07:16:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4dI3fVTziy7F for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 07:16:22 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E2C6812D80B for <sfc@ietf.org>; Wed, 27 Apr 2016 07:16:22 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id B7EBC240EFB for <sfc@ietf.org>; Wed, 27 Apr 2016 07:16:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461766582; bh=gSKc7U+Uea+/OsXTmbYvf3CheDa001KLDcRiIKWMcxg=; h=Subject:To:References:From:Date:In-Reply-To:From; b=VuHW//xHUqNIAI7FGkmcSIqkLok1HtTx2BrtKS/JzXQlVvrpS828k3QvL+sM6aEK4 gnUbJkZQqkhaFWW+3Ua3h6bbiPXlcoJJcb/KLBAAR+IImJ8DervhFN4sKamOkyoVte Ex1ENz1bZBOJIdMqz4yylvDNT7TPxmo57mUqtKmc=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 55EB2240828 for <sfc@ietf.org>; Wed, 27 Apr 2016 07:16:22 -0700 (PDT)
To: "sfc@ietf.org" <sfc@ietf.org>
References: <D3462168.4C3B2%jguichar@cisco.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <5e632481-0ea6-7974-e05f-b35c2fce82a6@joelhalpern.com>
Date: Wed, 27 Apr 2016 10:16:11 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <D3462168.4C3B2%jguichar@cisco.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/LjjIv86u0kKQnq553kw6cb87Hrw>
Subject: Re: [sfc] draft-ietf-sfc-nsh "first nibble" issue
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 14:16:25 -0000

This seems to be the best of the available choices.

I will note that in the absence of widespread support of RFC 6790, the 
best we can get is avoiding mistakes.  NSH will not be handled well by 
MPLS based ECMP or LAG.

The good news is that if 6790 support becomes wide-spread, we can reuse 
the version number if we then needed it.

And of course we can always use the 11 version as an escape to use some 
other bits for further versions in the unlikely event that such becomes 
necessary.

Yours,
Joel

On 4/27/16 7:57 AM, Jim Guichard (jguichar) wrote:
> Dear WG:
>
> The infamous “MPLS first nibble” issue was raised as part of the WGLC
> for draft-ietf-sfc-nsh-04. While this issue has been known for some
> time, and work has been done by the community to try and mitigate (for
> example RFC4928) or remove it (for example RFC6790), given the
> widespread implementation of existing hardware that uses the first
> nibble for ECMP decision processing, it seems prudent for us as a WG to
> address it in terms of how it affects our SFC protocol and make it clear
> within the draft the conclusion of the WG.
>
> While it is true that we could rearrange our encapsulation header such
> that it avoids this issue (by simply making the first nibble correspond
> to a value that is neither 0x4 or 0x6), given multiple industry and open
> source implementations of the SFC encapsulation header, that is not a
> desired outcome, especially as multiple other transport encapsulations
> do not exhibit this behavior when coupled with the SFC encapsulation.
>
> If we consider the current definition of the SFC encapsulation base
> header, we can see that the first two bits are used as a version field.
> This means that if we ever produce a version 01 for NSH it could result
> in a value of 0x4 or 0x6 being present within the first nibble. To avoid
> such a result the simplest solution would be to reserve within the SFC
> encapsulation specification version 01 and make it clear within the text
> that this is reserved and should not be used in future versions of the
> protocol. If we ever change the version, which incidentally should be a
> rare thing, we would therefore jump from version=00 to version=02 (i.e.
> making version 1 ‘reserved’) thereby avoiding any clash in the first
> nibble.
>
> IMHO this seems like a reasonable approach to the problem but I would
> like to hear opinions from the WG as to whether this is an acceptable
> solution and if we can reach consensus, ask the editors of
> draft-ietf-sfc-nsh to add text to reflect it.
>
> Jim
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Wed Apr 27 07:17:42 2016
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6940012D80B for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 07:17:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uJk5LIBhF9N6 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 07:17:38 -0700 (PDT)
Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7D3EF12D129 for <sfc@ietf.org>; Wed, 27 Apr 2016 07:17:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=12870; q=dns/txt; s=iport; t=1461766658; x=1462976258; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=mvlaC+dvlKtMxwo+7NWE4H0P1rgfMpq9oCr3Sb3g0uE=; b=fyc8oLpTXAn72wQhAbraUri1enCt76MIdjb0JmPlFTir+PF5JgFbkNBx kbBkzqqBSS+Z5ZB3+IksN+tuVRarQhZC1ibcXzxMSkM2r4C23u5LJyjVd 0VIDvolzjSL1WjTcl0+2x1n5QOBUxPBTZEJds6Y0E/qQ9vHTfOuxqRc/3 o=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0D7AQA3ySBX/4UNJK1egmxMU30GhB+BI?= =?us-ascii?q?qhIhmqEcwENgXUXAQqEFoFXAoEsOBQBAQEBAQEBZSeEQgEBBAEBASRHBBcCAQg?= =?us-ascii?q?OBC0HIQYLFAMOAgQBEogVAxIOvzsNhGEBAQEBAQEEAQEBAQEBARUEhiGES4JBg?= =?us-ascii?q?jKFIAWODIUAhFMxAYwggXaBZ4RNgyl7hDmHUYdeAR4BAUKBTIIfbIgvfwEBAQ?=
X-IronPort-AV: E=Sophos; i="5.24,541,1454976000"; d="scan'208,217"; a="98292474"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by rcdn-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 27 Apr 2016 14:17:36 +0000
Received: from XCH-RCD-009.cisco.com (xch-rcd-009.cisco.com [173.37.102.19]) by alln-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id u3REHaXn026251 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 27 Apr 2016 14:17:36 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-009.cisco.com (173.37.102.19) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 27 Apr 2016 09:17:36 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Wed, 27 Apr 2016 09:17:36 -0500
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: Martin Stiemerling <mls.ietf@gmail.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
Thread-Index: AQHRoD1hgqCe3Pkr6EKnc83IMsxhI5+d714A
Date: Wed, 27 Apr 2016 14:17:35 +0000
Message-ID: <D3462926.4C3CA%jguichar@cisco.com>
References: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com>
In-Reply-To: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.98.43.179]
Content-Type: multipart/alternative; boundary="_000_D34629264C3CAjguicharciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/DVmS8ISgHoRdEf3V4sJR6Q0QgHA>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 14:17:41 -0000

--_000_D34629264C3CAjguicharciscocom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Martin & WG:

A few comments that I would like to see addressed in the document before it=
 can move forward to the next step.

  *   Section 2.2 SFC Control Plane Bootstrapping.

This section is too wishy washy. It makes the statement "this document assu=
mes the SFC control plane is provided with a set of information that is req=
uired for proper SFC operation" but then goes on to list bullets that are l=
ikely to be provided or may be provided. It does not actually provide any i=
nformation on what is required for proper SFC operation. In the list of lik=
ely information there is no indication of whether this information must exi=
st in the network prior to bootstrapping the SFC control plane element; thi=
s is true also for the list of may information. Surely we should provide gu=
idelines on what must be available before the SFC control plane element can=
 actually function although it is reasonable to assume that it can bootstra=
p without any information (albeit it can't actually do anything). On this p=
oint I would argue that several of the may elements are actually required s=
uch as SFF, SF, SFC-proxy locators and may exist prior to bootstrapping the=
 SFC control plane element, or may be added later through some control inte=
rface.

Minor point -> typo in bullet point 6 - SFP proxy should read SFC proxy

  *   Section 2.3 Coherent Setup of an SFC-enabled Domain

What does the sentence "various transport encapsulation schemes and/or vari=
ations of SFC header implementations may be supported" actually mean ? Are =
we referring to the fact that the SFC header may carry type-1 or type-2 met=
adata or something else ? Note that there is only one SFC header implementa=
tion based on the WG charter so if we are referring to different SFC format=
s (meaning metadata) then please make this clear in the text, and if not, p=
lease remove this sentence.

  *   Section 3.1 Reference Architecture

Second bullet point "mapping between service function chains and SFPs" - th=
is is a general comment for the entire document but applies here also. Ther=
e is no mention of mapping SFPs -> RSPs - in fact RSP is mentioned only onc=
e in the entire document. The architecture is explicit in that the SFP when=
 rendered into the network is an RSP and therefore the SFC control plane el=
ement needs to have information on currently deployed RSPs.

Additionally there is no interface specified for communication between the =
SFC Control Plane Element and SF management systems. This is an important a=
spect as many SF's may require that SFC information be communicated to thei=
r management systems that will be responsible for communicating directly wi=
th their respective SF's.

  *   Section 3.1.1. C1: Interface between SFC Control Plane & SFC Classifi=
er

The sentence "The control plane may instruct the classifier about the initi=
al values of the Service Index (SI)" should be changed to say MUST as other=
wise if a classifier chooses whatever value it wants then that may not alig=
n with what is programmed into the SFFs by the SFC Control Plane element.

  *   Section 4.10.4. Encoding the Exact SFF/SF Sequence in Data Packets

This section does not actually provide any meaning or indication of relatio=
nship with the SFC Control Plane element. Furthermore,  there has been no W=
G consensus to carry source routes within the SFC encapsulation. Therefore =
this entire section should be removed from the document.

  *   Section 4.10.5. Fully Controlled SFF/SF Sequence for a SFP

Figure 2 lists 3 different SFP-id's whereas the text mentions only SFP-id #=
1. Is this simply a typo or are you trying to convey something else ?

Further you state that "the steering policies to a SFF node for service fun=
ction chain depends on if the packet comes from previous SFF or comes from =
a specific SF i.e., the SFP Forwarding Table entries have to be ingress por=
t specific" -  this is an inaccurate statement as the combination of the SF=
P-id and service-index determines the forwarding behavior (as specified in =
section 3.3 & section 7 of draft-ietf-sfc-nsh-04).  This sentence should be=
 removed from the text.

Jim



On 4/27/16, 12:29 AM, "sfc on behalf of Martin Stiemerling" <sfc-bounces@ie=
tf.org<mailto:sfc-bounces@ietf.org> on behalf of mls.ietf@gmail.com<mailto:=
mls.ietf@gmail.com>> wrote:

Dear all,

This is the start of the Working Group Last Call (WGLC) for

draft-ietf-sfc-control-plane-04.txt

The WGLC lasts for 2 weeks and will end May 11th at 10 pm PDT.

Please send your comments and reviews to the sfc@ietf.org<mailto:sfc@ietf.o=
rg> list.

Regards,

   Martin (SFC co-chair)

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_D34629264C3CAjguicharciscocom_
Content-Type: text/html; charset="iso-8859-1"
Content-ID: <9A56D69232795A46A0CA82CB3FDCF6BC@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; font-size: 14px; color: rgb(0, 0, 0); font-fami=
ly: Calibri, sans-serif;">
<div style=3D"font-family: Calibri, sans-serif;">Hi Martin &amp; WG:</div>
<div style=3D"font-family: Calibri, sans-serif;"><br>
</div>
<div style=3D"font-family: Calibri, sans-serif;">A few comments that I woul=
d like to see addressed in the document before it can move forward to the n=
ext step.</div>
<ul style=3D"font-family: Calibri, sans-serif;">
<li>Section 2.2 SFC Control Plane Bootstrapping.</li></ul>
<div style=3D"font-family: Calibri, sans-serif;">This section is too wishy =
washy. It makes the statement &#8220;this document assumes the SFC control =
plane is provided with a set of information that is
<u>required</u> for proper SFC operation&#8221; but then goes on to list bu=
llets that are
<u>likely</u>&nbsp;to be provided or <u>may</u>&nbsp;be provided. It does n=
ot actually provide any information on what
<u>is required for proper SFC operation</u>. In the list of <u>likely</u>&n=
bsp;information there is no indication of whether this information must exi=
st in the network prior to bootstrapping the SFC control plane element; thi=
s is true also for the list of
<u>may</u>&nbsp;information. Surely we should provide guidelines on what <u=
>must</u>&nbsp;be available before the SFC control plane element can actual=
ly function although it is reasonable to assume that it can bootstrap witho=
ut any information (albeit it can&#8217;t actually
 do anything). On this point I would argue that several of the <u>may</u>&n=
bsp;elements are actually required such as SFF, SF, SFC-proxy locators and =
may exist prior to bootstrapping the SFC control plane element, or may be a=
dded later through some control interface.&nbsp;</div>
<div style=3D"font-family: Calibri, sans-serif;"><br>
</div>
<div style=3D"font-family: Calibri, sans-serif;">Minor point -&gt; typo in =
bullet point 6 &#8211; SFP proxy should read
<b>SFC</b>&nbsp;proxy</div>
<ul style=3D"font-family: Calibri, sans-serif;">
<li>Section 2.3 Coherent Setup of an SFC-enabled Domain</li></ul>
<div style=3D"font-family: Calibri, sans-serif;">What does the sentence &#8=
220;various transport encapsulation schemes and/or variations of SFC header=
 implementations may be supported&#8221; actually mean ? Are we referring t=
o the fact that the SFC header may carry type-1
 or type-2 metadata or something else ? Note that there is only <b>one </b>=
SFC header implementation based on the WG charter so if we are referring to=
 different SFC formats (meaning metadata) then please make this clear in th=
e text, and if not, please remove
 this sentence.&nbsp;</div>
<ul style=3D"font-family: Calibri, sans-serif;">
<li>Section 3.1 Reference Architecture</li></ul>
<div style=3D"font-family: Calibri, sans-serif;">Second bullet point &#8220=
;mapping between service function chains and SFPs&#8221; - this is a genera=
l comment for the entire document but applies here also. There is no mentio=
n of mapping SFPs -&gt; RSPs &#8211; in fact RSP is mentioned
 only once in the entire document. The architecture is explicit in that the=
 SFP when rendered into the network is an RSP and therefore the SFC control=
 plane element needs to have information on currently deployed RSPs.</div>
<div style=3D"font-family: Calibri, sans-serif;"><br>
</div>
<div style=3D"font-family: Calibri, sans-serif;">Additionally there is no i=
nterface specified for communication between the SFC Control Plane Element =
and SF management systems. This is an important aspect as many SF&#8217;s m=
ay require that SFC information be communicated
 to their management systems that will be responsible for communicating dir=
ectly with their respective SF&#8217;s.&nbsp;</div>
<ul style=3D"font-family: Calibri, sans-serif;">
<li>Section 3.1.1. C1: Interface between SFC Control Plane &amp; SFC Classi=
fier</li></ul>
<div style=3D"widows: 1;"><font face=3D"Calibri,sans-serif">The sentence &#=
8220;The control plane may instruct the classifier about the initial values=
 of the Service Index (SI)&#8221; should be changed to say
<b>MUST</b>&nbsp;as otherwise if a classifier chooses whatever value it wan=
ts then that may not align with what is programmed into the SFFs by the SFC=
 Control Plane element.</font><font face=3D"PT Mono,Monaco,monospace"><span=
 style=3D"background-color: rgb(255, 253, 245);">&nbsp;</span></font></div>
<ul style=3D"font-family: Calibri, sans-serif;">
<li>Section 4.10.4. Encoding the Exact SFF/SF Sequence in Data Packets</li>=
</ul>
<div>This section does not actually provide any meaning or indication of re=
lationship with the SFC Control Plane element. Furthermore, &nbsp;there has=
 been no WG consensus to carry source routes within the SFC encapsulation. =
Therefore this entire section should
 be removed from the document.</div>
<ul style=3D"font-family: Calibri, sans-serif;">
<li>Section 4.10.5. Fully Controlled SFF/SF Sequence for a SFP</li></ul>
<div>Figure 2 lists 3 different SFP-id&#8217;s whereas the text mentions on=
ly SFP-id #1. Is this simply a typo or are you trying to convey something e=
lse ?</div>
<div><br>
</div>
<div>Further you state that &#8220;the steering policies to a SFF node for =
service function chain depends on if the packet comes from previous SFF or =
comes from a specific SF i.e., the SFP Forwarding Table entries have to be =
ingress port specific&#8221; - &nbsp;this is an inaccurate
 statement as the combination of the SFP-id and service-index determines th=
e forwarding behavior (as specified in section 3.3 &amp; section 7 of draft=
-ietf-sfc-nsh-04). &nbsp;This sentence should be removed from the text.</di=
v>
<div><br>
</div>
<div>Jim</div>
<div><br>
</div>
<div style=3D"font-family: Calibri, sans-serif;"><br>
</div>
<div style=3D"font-family: Calibri, sans-serif;"><br>
</div>
<div style=3D"font-family: Calibri, sans-serif;">On 4/27/16, 12:29 AM, &quo=
t;sfc on behalf of Martin Stiemerling&quot; &lt;<a href=3D"mailto:sfc-bounc=
es@ietf.org">sfc-bounces@ietf.org</a> on behalf of
<a href=3D"mailto:mls.ietf@gmail.com">mls.ietf@gmail.com</a>&gt; wrote:</di=
v>
<div style=3D"font-family: Calibri, sans-serif;"><br>
</div>
<blockquote id=3D"MAC_OUTLOOK_ATTRIBUTION_BLOCKQUOTE" style=3D"font-family:=
 Calibri, sans-serif; border-left-color: rgb(181, 196, 223); border-left-wi=
dth: 5px; border-left-style: solid; padding: 0px 0px 0px 5px; margin: 0px 0=
px 0px 5px;">
<div>Dear all,</div>
<div><br>
</div>
<div>This is the start of the Working Group Last Call (WGLC) for</div>
<div><br>
</div>
<div>draft-ietf-sfc-control-plane-04.txt</div>
<div><br>
</div>
<div>The WGLC lasts for 2 weeks and will end May 11th at 10 pm PDT.</div>
<div><br>
</div>
<div>Please send your comments and reviews to the <a href=3D"mailto:sfc@iet=
f.org">sfc@ietf.org</a> list.</div>
<div><br>
</div>
<div>Regards,</div>
<div><br>
</div>
<div>&nbsp;&nbsp; Martin (SFC co-chair)</div>
<div><br>
</div>
<div>_______________________________________________</div>
<div>sfc mailing list</div>
<div><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a></div>
<div><a href=3D"https://www.ietf.org/mailman/listinfo/sfc">https://www.ietf=
.org/mailman/listinfo/sfc</a></div>
<div><br>
</div>
</blockquote>
</body>
</html>

--_000_D34629264C3CAjguicharciscocom_--


From nobody Wed Apr 27 07:42:34 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD7FB12D163 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 07:42:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wVTzFEGIlQHS for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 07:42:31 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0485212D840 for <sfc@ietf.org>; Wed, 27 Apr 2016 07:42:31 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id C2794240828; Wed, 27 Apr 2016 07:42:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461768150; bh=01oBRivmeQp3kvfJr+FxJh0Vp8R/TYknaBDi3Xl+cqI=; h=Subject:To:References:From:Date:In-Reply-To:From; b=d3zCCRhL8svOUNqgbHQfAypANZLit7dyllveeSZuDy/6naynpDETuOzxeJgETa80b tbQQMI5yyvhXZgYY16iHJ4927IvyKCRGj4yt73YJ1oxAn47TlRdMhhxgws5LPhFjZV O61BAur7iaaOcdNR3XRPReEiZM0AvVZjoJCu0+nA=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 785DD24032B; Wed, 27 Apr 2016 07:42:29 -0700 (PDT)
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>, Martin Stiemerling <mls.ietf@gmail.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com> <D3462926.4C3CA%jguichar@cisco.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <0d8fde59-52b4-507a-46e6-d8fb12489f0c@joelhalpern.com>
Date: Wed, 27 Apr 2016 10:42:18 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <D3462926.4C3CA%jguichar@cisco.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/z2Y6Eyovku5WKSMHrMu3v-er9uM>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 14:42:34 -0000

Jim, I agree with most of your comments below.  However, I think your 
comment regarding RSP is incorrect.  Given the way teh architecture is 
written, the control plane is not required to know the RSP, and in fact 
the architecture and the NSH header allow for implementations in which 
the control plane knows the possible paths, but not the RSP that a given 
flow takes.

As such, regarding RSP I believe the document is correct, and the fact 
that there are almost no reference to RSP is a feature, not a bug.

Yours,
Joel

On 4/27/16 10:17 AM, Jim Guichard (jguichar) wrote:
> Hi Martin & WG:
>
> A few comments that I would like to see addressed in the document before
> it can move forward to the next step.
>
>   * Section 2.2 SFC Control Plane Bootstrapping.
>
> This section is too wishy washy. It makes the statement “this document
> assumes the SFC control plane is provided with a set of information that
> is _required_ for proper SFC operation” but then goes on to list bullets
> that are _likely_ to be provided or _may_ be provided. It does not
> actually provide any information on what _is required for proper SFC
> operation_. In the list of _likely_ information there is no indication
> of whether this information must exist in the network prior to
> bootstrapping the SFC control plane element; this is true also for the
> list of _may_ information. Surely we should provide guidelines on what
> _must_ be available before the SFC control plane element can actually
> function although it is reasonable to assume that it can bootstrap
> without any information (albeit it can’t actually do anything). On this
> point I would argue that several of the _may_ elements are actually
> required such as SFF, SF, SFC-proxy locators and may exist prior to
> bootstrapping the SFC control plane element, or may be added later
> through some control interface.
>
> Minor point -> typo in bullet point 6 – SFP proxy should read *SFC* proxy
>
>   * Section 2.3 Coherent Setup of an SFC-enabled Domain
>
> What does the sentence “various transport encapsulation schemes and/or
> variations of SFC header implementations may be supported” actually mean
> ? Are we referring to the fact that the SFC header may carry type-1 or
> type-2 metadata or something else ? Note that there is only *one *SFC
> header implementation based on the WG charter so if we are referring to
> different SFC formats (meaning metadata) then please make this clear in
> the text, and if not, please remove this sentence.
>
>   * Section 3.1 Reference Architecture
>
> Second bullet point “mapping between service function chains and SFPs” -
> this is a general comment for the entire document but applies here also.
> There is no mention of mapping SFPs -> RSPs – in fact RSP is mentioned
> only once in the entire document. The architecture is explicit in that
> the SFP when rendered into the network is an RSP and therefore the SFC
> control plane element needs to have information on currently deployed RSPs.
>
> Additionally there is no interface specified for communication between
> the SFC Control Plane Element and SF management systems. This is an
> important aspect as many SF’s may require that SFC information be
> communicated to their management systems that will be responsible for
> communicating directly with their respective SF’s.
>
>   * Section 3.1.1. C1: Interface between SFC Control Plane & SFC Classifier
>
> The sentence “The control plane may instruct the classifier about the
> initial values of the Service Index (SI)” should be changed to say
> *MUST* as otherwise if a classifier chooses whatever value it wants then
> that may not align with what is programmed into the SFFs by the SFC
> Control Plane element.
>
>   * Section 4.10.4. Encoding the Exact SFF/SF Sequence in Data Packets
>
> This section does not actually provide any meaning or indication of
> relationship with the SFC Control Plane element. Furthermore,  there has
> been no WG consensus to carry source routes within the SFC
> encapsulation. Therefore this entire section should be removed from the
> document.
>
>   * Section 4.10.5. Fully Controlled SFF/SF Sequence for a SFP
>
> Figure 2 lists 3 different SFP-id’s whereas the text mentions only
> SFP-id #1. Is this simply a typo or are you trying to convey something
> else ?
>
> Further you state that “the steering policies to a SFF node for service
> function chain depends on if the packet comes from previous SFF or comes
> from a specific SF i.e., the SFP Forwarding Table entries have to be
> ingress port specific” -  this is an inaccurate statement as the
> combination of the SFP-id and service-index determines the forwarding
> behavior (as specified in section 3.3 & section 7 of
> draft-ietf-sfc-nsh-04).  This sentence should be removed from the text.
>
> Jim
>
>
>
> On 4/27/16, 12:29 AM, "sfc on behalf of Martin Stiemerling"
> <sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org> on behalf of
> mls.ietf@gmail.com <mailto:mls.ietf@gmail.com>> wrote:
>
>     Dear all,
>
>     This is the start of the Working Group Last Call (WGLC) for
>
>     draft-ietf-sfc-control-plane-04.txt
>
>     The WGLC lasts for 2 weeks and will end May 11th at 10 pm PDT.
>
>     Please send your comments and reviews to the sfc@ietf.org
>     <mailto:sfc@ietf.org> list.
>
>     Regards,
>
>        Martin (SFC co-chair)
>
>     _______________________________________________
>     sfc mailing list
>     sfc@ietf.org <mailto:sfc@ietf.org>
>     https://www.ietf.org/mailman/listinfo/sfc
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Wed Apr 27 09:02:38 2016
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 858F212B00C for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 09:02:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.216
X-Spam-Level: 
X-Spam-Status: No, score=-5.216 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8BgAEZYvsNhP for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 09:02:34 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E1D0512B006 for <sfc@ietf.org>; Wed, 27 Apr 2016 09:02:33 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml707-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CNK37639; Wed, 27 Apr 2016 16:02:30 +0000 (GMT)
Received: from DFWEML701-CAH.china.huawei.com (10.193.5.175) by lhreml707-cah.china.huawei.com (10.201.5.199) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 27 Apr 2016 17:02:29 +0100
Received: from DFWEML501-MBB.china.huawei.com ([10.193.5.179]) by dfweml701-cah.china.huawei.com ([10.193.5.175]) with mapi id 14.03.0235.001; Wed, 27 Apr 2016 09:02:26 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: Martin Stiemerling <mls.ietf@gmail.com>
Thread-Topic: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
Thread-Index: AQHRoD1w03Th2ZpF0U6s9T50CcQVUp+eKW8A///SX+A=
Date: Wed, 27 Apr 2016 16:02:26 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657E7D84D@dfweml501-mbb>
References: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com> <CAA=duU1YmhPpzs+LZNRFLqw+BemxRXKrxnhrdqQYbu356N5o8g@mail.gmail.com>
In-Reply-To: <CAA=duU1YmhPpzs+LZNRFLqw+BemxRXKrxnhrdqQYbu356N5o8g@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.182]
Content-Type: multipart/alternative; boundary="_000_4A95BA014132FF49AE685FAB4B9F17F657E7D84Ddfweml501mbb_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020205.5720E297.010D, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 7df78501b731d5c76ed13dd5288eb113
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/DtKoPR8NA-eir8avAe_dFhci140>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 16:02:37 -0000

--_000_4A95BA014132FF49AE685FAB4B9F17F657E7D84Ddfweml501mbb_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_4A95BA014132FF49AE685FAB4B9F17F657E7D84Ddfweml501mbb_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTIgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl
PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6
U2ltU3VuOw0KCXBhbm9zZS0xOjIgMSA2IDAgMyAxIDEgMSAxIDE7fQ0KQGZvbnQtZmFjZQ0KCXtm
b250LWZhbWlseToiQ2FtYnJpYSBNYXRoIjsNCglwYW5vc2UtMToyIDQgNSAzIDUgNCA2IDMgMiA0
O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglwYW5vc2UtMToyIDE1IDUg
MiAyIDIgNCAzIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OiJcQFNpbVN1biI7DQoJ
cGFub3NlLTE6MiAxIDYgMCAzIDEgMSAxIDEgMTt9DQovKiBTdHlsZSBEZWZpbml0aW9ucyAqLw0K
cC5Nc29Ob3JtYWwsIGxpLk1zb05vcm1hbCwgZGl2Lk1zb05vcm1hbA0KCXttYXJnaW46MGluOw0K
CW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTIuMHB0Ow0KCWZvbnQtZmFtaWx5
OiJUaW1lcyBOZXcgUm9tYW4iLCJzZXJpZiI7fQ0KYTpsaW5rLCBzcGFuLk1zb0h5cGVybGluaw0K
CXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6Ymx1ZTsNCgl0ZXh0LWRlY29yYXRpb246
dW5kZXJsaW5lO30NCmE6dmlzaXRlZCwgc3Bhbi5Nc29IeXBlcmxpbmtGb2xsb3dlZA0KCXttc28t
c3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6cHVycGxlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRl
cmxpbmU7fQ0Kc3Bhbi5FbWFpbFN0eWxlMTcNCgl7bXNvLXN0eWxlLXR5cGU6cGVyc29uYWwtcmVw
bHk7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5zLXNlcmlmIjsNCgljb2xvcjojMUY0OTdE
O30NCi5Nc29DaHBEZWZhdWx0DQoJe21zby1zdHlsZS10eXBlOmV4cG9ydC1vbmx5O30NCkBwYWdl
IFdvcmRTZWN0aW9uMQ0KCXtzaXplOjguNWluIDExLjBpbjsNCgltYXJnaW46MS4waW4gMS4waW4g
MS4waW4gMS4waW47fQ0KZGl2LldvcmRTZWN0aW9uMQ0KCXtwYWdlOldvcmRTZWN0aW9uMTt9DQot
LT48L3N0eWxlPjwhLS1baWYgZ3RlIG1zbyA5XT48eG1sPg0KPG86c2hhcGVkZWZhdWx0cyB2OmV4
dD0iZWRpdCIgc3BpZG1heD0iMTAyNiIgLz4NCjwveG1sPjwhW2VuZGlmXS0tPjwhLS1baWYgZ3Rl
IG1zbyA5XT48eG1sPg0KPG86c2hhcGVsYXlvdXQgdjpleHQ9ImVkaXQiPg0KPG86aWRtYXAgdjpl
eHQ9ImVkaXQiIGRhdGE9IjEiIC8+DQo8L286c2hhcGVsYXlvdXQ+PC94bWw+PCFbZW5kaWZdLS0+
DQo8L2hlYWQ+DQo8Ym9keSBsYW5nPSJFTi1VUyIgbGluaz0iYmx1ZSIgdmxpbms9InB1cnBsZSI+
DQo8ZGl2IGNsYXNzPSJXb3JkU2VjdGlvbjEiPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
Pk1hcnRpbiw8bzpwPjwvbzpwPjwvcD4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpw
PiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPkFz
IGEgY29udHJpYnV0b3IsIEkgc3VwcG9ydCBwdWJsaWNhdGlvbiBvZiB0aGlzIGRyYWZ0LjxvOnA+
PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJz
cDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5UaGFua3Ms
PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5MaW5k
YSA8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250
LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1z
ZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8
L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9v
OnA+PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPk9uIFdlZCwgQXByIDI3LCAyMDE2
IGF0IDEyOjI5IEFNLCBNYXJ0aW4gU3RpZW1lcmxpbmcgJmx0OzxhIGhyZWY9Im1haWx0bzptbHMu
aWV0ZkBnbWFpbC5jb20iIHRhcmdldD0iX2JsYW5rIj5tbHMuaWV0ZkBnbWFpbC5jb208L2E+Jmd0
OyB3cm90ZTo8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPkRlYXIgYWxsLDxi
cj4NCjxicj4NClRoaXMgaXMgdGhlIHN0YXJ0IG9mIHRoZSBXb3JraW5nIEdyb3VwIExhc3QgQ2Fs
bCAoV0dMQykgZm9yPGJyPg0KPGJyPg0KZHJhZnQtaWV0Zi1zZmMtY29udHJvbC1wbGFuZS0wNC50
eHQ8YnI+DQo8YnI+DQpUaGUgV0dMQyBsYXN0cyBmb3IgMiB3ZWVrcyBhbmQgd2lsbCBlbmQgTWF5
IDExdGggYXQgMTAgcG0gUERULjxicj4NCjxicj4NClBsZWFzZSBzZW5kIHlvdXIgY29tbWVudHMg
YW5kIHJldmlld3MgdG8gdGhlIDxhIGhyZWY9Im1haWx0bzpzZmNAaWV0Zi5vcmciIHRhcmdldD0i
X2JsYW5rIj4NCnNmY0BpZXRmLm9yZzwvYT4gbGlzdC48YnI+DQo8YnI+DQpSZWdhcmRzLDxicj4N
Cjxicj4NCiZuYnNwOyBNYXJ0aW4gKFNGQyBjby1jaGFpcik8YnI+DQo8YnI+DQpfX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXzxicj4NCnNmYyBtYWlsaW5nIGxp
c3Q8YnI+DQo8YSBocmVmPSJtYWlsdG86c2ZjQGlldGYub3JnIiB0YXJnZXQ9Il9ibGFuayI+c2Zj
QGlldGYub3JnPC9hPjxicj4NCjxhIGhyZWY9Imh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4v
bGlzdGluZm8vc2ZjIiB0YXJnZXQ9Il9ibGFuayI+aHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1h
bi9saXN0aW5mby9zZmM8L2E+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjwvYm9keT4NCjwv
aHRtbD4NCg==

--_000_4A95BA014132FF49AE685FAB4B9F17F657E7D84Ddfweml501mbb_--


From nobody Wed Apr 27 09:05:48 2016
Return-Path: <Ron_Parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 572A012D8AB for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 09:05:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.62
X-Spam-Level: 
X-Spam-Status: No, score=-2.62 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d5tF3f6PrqAs for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 09:05:44 -0700 (PDT)
Received: from hub021-ca-3.exch021.serverdata.net (hub021-ca-3.exch021.serverdata.net [64.78.22.170]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E97E412D89A for <sfc@ietf.org>; Wed, 27 Apr 2016 09:05:44 -0700 (PDT)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-3.exch021.domain.local ([10.254.4.36]) with mapi id 14.03.0266.001;  Wed, 27 Apr 2016 09:05:44 -0700
From: Ron Parker <Ron_Parker@affirmednetworks.com>
To: Linda Dunbar <linda.dunbar@huawei.com>, Martin Stiemerling <mls.ietf@gmail.com>
Thread-Topic: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
Thread-Index: AQHRoHpZsovTIzEGyUKuSOuYMz6Tep+ecMYA//+LjNA=
Date: Wed, 27 Apr 2016 16:05:43 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B6D787A6D@MBX021-W3-CA-2.exch021.domain.local>
References: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com> <CAA=duU1YmhPpzs+LZNRFLqw+BemxRXKrxnhrdqQYbu356N5o8g@mail.gmail.com> <4A95BA014132FF49AE685FAB4B9F17F657E7D84D@dfweml501-mbb>
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657E7D84D@dfweml501-mbb>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.205.79.154]
Content-Type: multipart/alternative; boundary="_000_CDF2F015F4429F458815ED2A6C2B6B0B6D787A6DMBX021W3CA2exch_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/tyOKI7vfqGjdeo_UUhu-DysZJjs>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 16:05:46 -0000

--_000_CDF2F015F4429F458815ED2A6C2B6B0B6D787A6DMBX021W3CA2exch_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_CDF2F015F4429F458815ED2A6C2B6B0B6D787A6DMBX021W3CA2exch_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_CDF2F015F4429F458815ED2A6C2B6B0B6D787A6DMBX021W3CA2exch_--


From nobody Wed Apr 27 09:14:47 2016
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DF46012D1E2 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 09:14:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gGjSS43Ix5c5 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 09:14:44 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4196612D1BC for <sfc@ietf.org>; Wed, 27 Apr 2016 09:14:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6097; q=dns/txt; s=iport; t=1461773684; x=1462983284; h=from:to:subject:date:message-id:references:in-reply-to: content-id:content-transfer-encoding:mime-version; bh=Iw6xoTsGZHQzNkBpQeUArSL6eRqmJBy5alpudFG2cw8=; b=gXevnJMvbb8RDsjs0ZkgnX3Mu9PMrT3fCDSIshbcIvSfDa9hKy8p3hpd /Au16LCA9ALU5H0+KRhZr5xKPclCLMsvWZ0Vo29t+ShqJmAFGt1iddgv1 PnNcCu4vqsQ6gxVIzw+vbF0YSio7J5ooj4FlRo7LZ2xqJ6NfYikAPkhCP c=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AQAgDc5CBX/5xdJa1egzhTfQauCItdA?= =?us-ascii?q?Q2BdRcLhW0CgS84FAEBAQEBAQFlJ4RBAQEBAwEBAQEkRwQXAgEIEgYnByEGCxQ?= =?us-ascii?q?DDgIEARKIFQMKCA6/JA2EYQEBAQEBAQEBAgEBAQEBAQEVBIYhhEuCQYF8hVYFj?= =?us-ascii?q?gyFAIRTMQGMIIF2gWeETYMpe4Q5h1GHXgEeAQFCg2tsiC9/AQEB?=
X-IronPort-AV: E=Sophos;i="5.24,542,1454976000"; d="scan'208";a="264971480"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 27 Apr 2016 16:14:43 +0000
Received: from XCH-ALN-007.cisco.com (xch-aln-007.cisco.com [173.36.7.17]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id u3RGEhWd003260 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 27 Apr 2016 16:14:43 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-007.cisco.com (173.36.7.17) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 27 Apr 2016 11:14:42 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Wed, 27 Apr 2016 11:14:42 -0500
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Martin Stiemerling <mls.ietf@gmail.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
Thread-Index: AQHRoD1hgqCe3Pkr6EKnc83IMsxhI5+d714AgABJ9wD//9a+AA==
Date: Wed, 27 Apr 2016 16:14:42 +0000
Message-ID: <D3465D96.4C51E%jguichar@cisco.com>
References: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com> <D3462926.4C3CA%jguichar@cisco.com> <0d8fde59-52b4-507a-46e6-d8fb12489f0c@joelhalpern.com>
In-Reply-To: <0d8fde59-52b4-507a-46e6-d8fb12489f0c@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.74.152]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <ED64FB142BA7CC468ACD03C139496C53@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/nu5W7YGgh5F47gZBLGZfjC6N6tE>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 16:14:46 -0000

Yes you make a good point and I agree.

Jim

On 4/27/16, 10:42 AM, "Joel M. Halpern" <jmh@joelhalpern.com> wrote:

>Jim, I agree with most of your comments below.  However, I think your
>comment regarding RSP is incorrect.  Given the way teh architecture is
>written, the control plane is not required to know the RSP, and in fact
>the architecture and the NSH header allow for implementations in which
>the control plane knows the possible paths, but not the RSP that a given
>flow takes.
>
>As such, regarding RSP I believe the document is correct, and the fact
>that there are almost no reference to RSP is a feature, not a bug.
>
>Yours,
>Joel
>
>On 4/27/16 10:17 AM, Jim Guichard (jguichar) wrote:
>> Hi Martin & WG:
>>
>> A few comments that I would like to see addressed in the document before
>> it can move forward to the next step.
>>
>>   * Section 2.2 SFC Control Plane Bootstrapping.
>>
>> This section is too wishy washy. It makes the statement =B3this document
>> assumes the SFC control plane is provided with a set of information that
>> is _required_ for proper SFC operation=B2 but then goes on to list bulle=
ts
>> that are _likely_ to be provided or _may_ be provided. It does not
>> actually provide any information on what _is required for proper SFC
>> operation_. In the list of _likely_ information there is no indication
>> of whether this information must exist in the network prior to
>> bootstrapping the SFC control plane element; this is true also for the
>> list of _may_ information. Surely we should provide guidelines on what
>> _must_ be available before the SFC control plane element can actually
>> function although it is reasonable to assume that it can bootstrap
>> without any information (albeit it can=B9t actually do anything). On thi=
s
>> point I would argue that several of the _may_ elements are actually
>> required such as SFF, SF, SFC-proxy locators and may exist prior to
>> bootstrapping the SFC control plane element, or may be added later
>> through some control interface.
>>
>> Minor point -> typo in bullet point 6 =AD SFP proxy should read *SFC*
>>proxy
>>
>>   * Section 2.3 Coherent Setup of an SFC-enabled Domain
>>
>> What does the sentence =B3various transport encapsulation schemes and/or
>> variations of SFC header implementations may be supported=B2 actually me=
an
>> ? Are we referring to the fact that the SFC header may carry type-1 or
>> type-2 metadata or something else ? Note that there is only *one *SFC
>> header implementation based on the WG charter so if we are referring to
>> different SFC formats (meaning metadata) then please make this clear in
>> the text, and if not, please remove this sentence.
>>
>>   * Section 3.1 Reference Architecture
>>
>> Second bullet point =B3mapping between service function chains and SFPs=
=B2 -
>> this is a general comment for the entire document but applies here also.
>> There is no mention of mapping SFPs -> RSPs =AD in fact RSP is mentioned
>> only once in the entire document. The architecture is explicit in that
>> the SFP when rendered into the network is an RSP and therefore the SFC
>> control plane element needs to have information on currently deployed
>>RSPs.
>>
>> Additionally there is no interface specified for communication between
>> the SFC Control Plane Element and SF management systems. This is an
>> important aspect as many SF=B9s may require that SFC information be
>> communicated to their management systems that will be responsible for
>> communicating directly with their respective SF=B9s.
>>
>>   * Section 3.1.1. C1: Interface between SFC Control Plane & SFC
>>Classifier
>>
>> The sentence =B3The control plane may instruct the classifier about the
>> initial values of the Service Index (SI)=B2 should be changed to say
>> *MUST* as otherwise if a classifier chooses whatever value it wants then
>> that may not align with what is programmed into the SFFs by the SFC
>> Control Plane element.
>>
>>   * Section 4.10.4. Encoding the Exact SFF/SF Sequence in Data Packets
>>
>> This section does not actually provide any meaning or indication of
>> relationship with the SFC Control Plane element. Furthermore,  there has
>> been no WG consensus to carry source routes within the SFC
>> encapsulation. Therefore this entire section should be removed from the
>> document.
>>
>>   * Section 4.10.5. Fully Controlled SFF/SF Sequence for a SFP
>>
>> Figure 2 lists 3 different SFP-id=B9s whereas the text mentions only
>> SFP-id #1. Is this simply a typo or are you trying to convey something
>> else ?
>>
>> Further you state that =B3the steering policies to a SFF node for servic=
e
>> function chain depends on if the packet comes from previous SFF or comes
>> from a specific SF i.e., the SFP Forwarding Table entries have to be
>> ingress port specific=B2 -  this is an inaccurate statement as the
>> combination of the SFP-id and service-index determines the forwarding
>> behavior (as specified in section 3.3 & section 7 of
>> draft-ietf-sfc-nsh-04).  This sentence should be removed from the text.
>>
>> Jim
>>
>>
>>
>> On 4/27/16, 12:29 AM, "sfc on behalf of Martin Stiemerling"
>> <sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org> on behalf of
>> mls.ietf@gmail.com <mailto:mls.ietf@gmail.com>> wrote:
>>
>>     Dear all,
>>
>>     This is the start of the Working Group Last Call (WGLC) for
>>
>>     draft-ietf-sfc-control-plane-04.txt
>>
>>     The WGLC lasts for 2 weeks and will end May 11th at 10 pm PDT.
>>
>>     Please send your comments and reviews to the sfc@ietf.org
>>     <mailto:sfc@ietf.org> list.
>>
>>     Regards,
>>
>>        Martin (SFC co-chair)
>>
>>     _______________________________________________
>>     sfc mailing list
>>     sfc@ietf.org <mailto:sfc@ietf.org>
>>     https://www.ietf.org/mailman/listinfo/sfc
>>
>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>


From nobody Wed Apr 27 10:05:11 2016
Return-Path: <gregory.mirsky@ericsson.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ABB8A12D9F3; Wed, 27 Apr 2016 10:05:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.22
X-Spam-Level: 
X-Spam-Status: No, score=-4.22 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gi7lTXzrcmKr; Wed, 27 Apr 2016 10:05:02 -0700 (PDT)
Received: from usplmg20.ericsson.net (usplmg20.ericsson.net [198.24.6.45]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AEE0912D9EF; Wed, 27 Apr 2016 10:05:01 -0700 (PDT)
X-AuditID: c618062d-f79886d000002334-f1-5720ea026bc0
Received: from EUSAAHC002.ericsson.se (Unknown_Domain [147.117.188.78]) by usplmg20.ericsson.net (Symantec Mail Security) with SMTP id 24.0C.09012.20AE0275; Wed, 27 Apr 2016 18:34:10 +0200 (CEST)
Received: from EUSAAMB103.ericsson.se ([147.117.188.120]) by EUSAAHC002.ericsson.se ([147.117.188.78]) with mapi id 14.03.0248.002; Wed, 27 Apr 2016 13:05:00 -0400
From: Gregory Mirsky <gregory.mirsky@ericsson.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>, "mpls@ietf.org" <mpls@ietf.org>, "pals@ietf.org" <pals@ietf.org>
Thread-Topic: draft-ietf-sfc-nsh "first nibble" issue
Thread-Index: AQHRoHv5jA1HvFPCM0yMnvW+PmvYjp+eC04w
Date: Wed, 27 Apr 2016 17:04:59 +0000
Message-ID: <7347100B5761DC41A166AC17F22DF11221A60FA3@eusaamb103.ericsson.se>
References: <D3462168.4C3B2%jguichar@cisco.com>
In-Reply-To: <D3462168.4C3B2%jguichar@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [147.117.188.9]
Content-Type: multipart/alternative; boundary="_000_7347100B5761DC41A166AC17F22DF11221A60FA3eusaamb103erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFuplkeLIzCtJLcpLzFFi42KZXLrHT5fplUK4wembMhZL56lb3Fq6ktVi zb91TBZPHmxld2DxmPJ7I6vHkiU/mQKYorhsUlJzMstSi/TtErgyVi4OLjgcVrF7z3vWBsav Xl2MnBwSAiYSu272sELYYhIX7q1n62Lk4hASOMoosalzHxtIQkhgOaPE3ZO2IDabgJHEi409 7CBFIgLTGSWWrdvMApIQBpr0/+E5ZhBbRMBUovvuFCCbA8g2ktjUbQVisgioSrz4zwJi8gr4 Srw/VAgxXV9i15sV7CA2p4CBRPeCE2DnMAKd8/3UGiYQm1lAXOLWk/lMEGcKSCzZc54ZwhaV ePn4H9T5ihL7+qezQ9TnSzxp3gdWzysgKHFy5hOWCYwis5CMmoWkbBaSMoi4jsSC3Z/YIGxt iWULXzPD2GcOPGZCFl/AyL6KkaO0uCAnN93IYBMjMJKOSbDp7mC8P93zEKMAB6MSD6+CrEK4 EGtiWXFl7iFGCQ5mJRHe6W+AQrwpiZVVqUX58UWlOanFhxilOViUxHkbg/+FCQmkJ5akZqem FqQWwWSZODilGhgVFVyUXjWf8zGqttz19erq+3fCDu5+mC+V+HPKbhupM/8SE/jXcovad1tu mRTF+lu50Y3befor3TR+AQs++8UJi8x3njtv8Xi5Qq71Iil551ev/N84SjnX5gU5WMnOWxio NKH5xKSZppltr1+WhmTciX774kaDoEwq7+OPW18t7gue7Lr1AYcSS3FGoqEWc1FxIgBdF7zS oAIAAA==
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/mnMifxrFwdiY9mDwCxEEQaww4-E>
Subject: Re: [sfc] draft-ietf-sfc-nsh "first nibble" issue
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 17:05:07 -0000

--_000_7347100B5761DC41A166AC17F22DF11221A60FA3eusaamb103erics_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Jim,
as this issue is related to MPLS and MPLS PWs shall we extend the audience =
and invite MPLS and PALS WGs to the discussion?
Personally, I prefer solution that avoids not only 0x04 and 0x06 in the fir=
st nibble but 0x00 and 0x01 as well by using Non-of-the-Above value, e.g. 0=
x05 as in BIER over MPLS encapsulation<https://tools.ietf.org/html/draft-ie=
tf-bier-mpls-encapsulation-04>.

                Regards,
                                Greg

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Jim Guichard (jguichar=
)
Sent: Wednesday, April 27, 2016 4:58 AM
To: sfc@ietf.org
Subject: [sfc] draft-ietf-sfc-nsh "first nibble" issue

Dear WG:

The infamous "MPLS first nibble" issue was raised as part of the WGLC for d=
raft-ietf-sfc-nsh-04. While this issue has been known for some time, and wo=
rk has been done by the community to try and mitigate (for example RFC4928)=
 or remove it (for example RFC6790), given the widespread implementation of=
 existing hardware that uses the first nibble for ECMP decision processing,=
 it seems prudent for us as a WG to address it in terms of how it affects o=
ur SFC protocol and make it clear within the draft the conclusion of the WG=
.

While it is true that we could rearrange our encapsulation header such that=
 it avoids this issue (by simply making the first nibble correspond to a va=
lue that is neither 0x4 or 0x6), given multiple industry and open source im=
plementations of the SFC encapsulation header, that is not a desired outcom=
e, especially as multiple other transport encapsulations do not exhibit thi=
s behavior when coupled with the SFC encapsulation.

If we consider the current definition of the SFC encapsulation base header,=
 we can see that the first two bits are used as a version field. This means=
 that if we ever produce a version 01 for NSH it could result in a value of=
 0x4 or 0x6 being present within the first nibble. To avoid such a result t=
he simplest solution would be to reserve within the SFC encapsulation speci=
fication version 01 and make it clear within the text that this is reserved=
 and should not be used in future versions of the protocol. If we ever chan=
ge the version, which incidentally should be a rare thing, we would therefo=
re jump from version=3D00 to version=3D02 (i.e. making version 1 'reserved'=
) thereby avoiding any clash in the first nibble.

IMHO this seems like a reasonable approach to the problem but I would like =
to hear opinions from the WG as to whether this is an acceptable solution a=
nd if we can reach consensus, ask the editors of draft-ietf-sfc-nsh to add =
text to reflect it.

Jim

--_000_7347100B5761DC41A166AC17F22DF11221A60FA3eusaamb103erics_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Hi Jim,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">as this issue is related =
to MPLS and MPLS PWs shall we extend the audience and invite MPLS and PALS =
WGs to the discussion?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Personally, I prefer solu=
tion that avoids not only 0x04 and 0x06 in the first nibble but 0x00 and 0x=
01 as well by using Non-of-the-Above value, e.g. 0x05 as
 in <a href=3D"https://tools.ietf.org/html/draft-ietf-bier-mpls-encapsulati=
on-04">BIER over MPLS encapsulation</a>.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Regards,<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp; Greg
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc [mai=
lto:sfc-bounces@ietf.org]
<b>On Behalf Of </b>Jim Guichard (jguichar)<br>
<b>Sent:</b> Wednesday, April 27, 2016 4:58 AM<br>
<b>To:</b> sfc@ietf.org<br>
<b>Subject:</b> [sfc] draft-ietf-sfc-nsh &quot;first nibble&quot; issue<o:p=
></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Dear WG:<o:p></o:p></span><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">The infamous &#8220;MPLS fi=
rst nibble&#8221; issue was raised as part of the WGLC for draft-ietf-sfc-n=
sh-04. While this issue has been known for some time, and work has been
 done by the community to try and mitigate (for example RFC4928) or remove =
it (for example RFC6790), given the widespread implementation of existing h=
ardware that uses the first nibble for ECMP decision processing, it seems p=
rudent for us as a WG to address
 it in terms of how it affects our SFC protocol and make it clear within th=
e draft the conclusion of the WG.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">While it is true that we co=
uld rearrange our encapsulation header such that it avoids this issue (by s=
imply making the first nibble correspond to a value that
 is neither 0x4 or 0x6), given multiple industry and open source implementa=
tions of the SFC encapsulation header, that is not a desired outcome, espec=
ially as multiple other transport encapsulations do not exhibit this behavi=
or when coupled with the SFC encapsulation.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">If we consider the current =
definition of the SFC encapsulation base header, we can see that the first =
two bits are used as a version field. This means that if
 we ever produce a version 01 for NSH it could result in a value of 0x4 or =
0x6 being present within the first nibble. To avoid such a result the simpl=
est solution would be to reserve within the SFC encapsulation specification=
 version 01 and make it clear within
 the text that this is reserved and should not be used in future versions o=
f the protocol. If we ever change the version, which incidentally should be=
 a rare thing, we would therefore jump from version=3D00 to version=3D02 (i=
.e. making version 1 &#8216;reserved&#8217;) thereby
 avoiding any clash in the first nibble.&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">IMHO this seems like a reas=
onable approach to the problem but I would like to hear opinions from the W=
G as to whether this is an acceptable solution and if we
 can reach consensus, ask the editors of draft-ietf-sfc-nsh to add text to =
reflect it.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Jim<o:p></o:p></span></p>
</div>
</div>
</body>
</html>

--_000_7347100B5761DC41A166AC17F22DF11221A60FA3eusaamb103erics_--


From nobody Wed Apr 27 12:40:48 2016
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69BE812DB55 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 12:40:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.217
X-Spam-Level: 
X-Spam-Status: No, score=-5.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3v7bQLoIVQu3 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 12:40:44 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 301A312D79E for <sfc@ietf.org>; Wed, 27 Apr 2016 12:40:43 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml706-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CNK66049; Wed, 27 Apr 2016 19:40:39 +0000 (GMT)
Received: from DFWEML702-CAH.china.huawei.com (10.193.5.176) by lhreml706-cah.china.huawei.com (10.201.5.182) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 27 Apr 2016 20:40:38 +0100
Received: from DFWEML501-MBB.china.huawei.com ([10.193.5.179]) by dfweml702-cah.china.huawei.com ([10.193.5.176]) with mapi id 14.03.0235.001; Wed, 27 Apr 2016 12:40:35 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRoLyqrLBdZa9hMkm7UAhBhKf8Ww==
Date: Wed, 27 Apr 2016 19:40:35 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D582DD@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589371EF5@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.182]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020205.572115B8.0065, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 07dfb8d4ded86ffbf6be80e2d25368da
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/J_k5bXi8u96axKGUCafJNZiXleI>
Subject: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 19:40:47 -0000

I suggest adding the following paragraphs after the Bullet 3 of the Section=
 6 Fragmentation Consideration to make the process more clear and less cont=
roversial:


--------------------------------

RFC6830 describes the fragmentation method of breaking the original packet =
into two equal sub-frames and encapsulating [LISP Header + Transport header=
] to each sub-frame.=20

If LISP fragmentation [RFC6830 Section 5.4] is used, the [SFC Header + Tran=
sport Header] will be added to each half frame (or the original data frame)=
. As the Transport Header is terminated by the next SFF node's tunnel trans=
port layer, the combined two sub-frames will have two SFC Headers.=20

Therefore, the fragmentation for NSH encapsulated data frame should be done=
 completely by the node tunnel transport layer, which should break the [SFC=
 + original packet] into two equal sub-frames and each sub-frame being enca=
psulated with its respective tunnel header.  The next SFF node's tunnel tra=
nsport layer should combine the two sub-frames before sending to the next n=
ode.  =20

------------------------------------------------------


By the way, there are to typo in the Section 6:=20
3rd line: "In order the" =3D=3D> "In order to"
Last line of Bullet 2: extra "the" in the "utilized to ensure the the requi=
red packet".=20


Hope it helps.=20

Linda



-----Original Message-----
From: mohamed.boucadair@orange.com [mailto:mohamed.boucadair@orange.com]=20
Sent: Wednesday, April 27, 2016 12:40 AM
To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; sfc@ietf.org
Subject: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Hi Joel, all,

Please see inline.=20

Cheers,
Med

> -----Message d'origine-----
> De=A0: Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoy=E9=A0: mardi 26=
=20
> avril 2016 19:18 =C0=A0: Linda Dunbar; BOUCADAIR Mohamed IMT/OLN; Elzur,=
=20
> Uri; sfc@ietf.org Objet=A0: Re: [sfc] WG last call for=20
> draft-ietf-sfc-nsh-04.txt
>=20
> With regard to Transport tunnel fragementation, that seems an issue=20
> for the transport protocol.  I don't actually object to a sentence,=20
> but it does not seem that it will accomplish anything.

[Med] I would like to see some text added to the draft.

>=20
> With regard to packets fragmented by the source, I completely disagree=20
> with your assertion.  If an SFF were to reassemble the packets, that=20
> would be a violation of its job.

[Med] I agree with you.

  There is no reason for an SFF to
> reassemble a packet fragmented by the source.  The classifier may have=20
> to do some interesting things in order to properly classify succeeding=20
> fragments, but that is an implementation issue (most commonly=20
> addressed with virtual reassembly, which doe snot delay the=20
> fragments.)  We don't specity that.

[Med] Still, the external behavior of the classifier needs to be clear in t=
he document. I don't find any text in the draft saying for instance that an=
 NSH header must be present in all fragments. (There some processing that m=
ight be needed at the SFF to "do its job" with regards to fragments (receiv=
e out of order fragments + forwarding policy on the full packet).)

>=20
> If an SF needs to reassemble fragments to do its job, that is up to=20
> the SF.  Some will need to actually reassemble.  Some will need to=20
> perform virtual reassembly, and some will happily process the=20
> fragments.  I can not see what the NSH document could possibly mandate.

[Med] Fully agree.

>=20
> Yours,
> Joel
>=20
> On 4/26/16 11:47 AM, Linda Dunbar wrote:
> > Joel,
> >
> > I think the document should add the description on the following two=20
> > fragmentation scenarios:
> >
> > - Transport tunnel generated fragmentation: When a packet=20
> > fragmentation is caused by transport tunnel (i.e. various=20
> > encapsulations), the termination point of the transport tunnel is=20
> > responsible for re-assembling the fragmented pieces of the packet.
> > Since there won't be any SFF nodes in between the Transport Tunnel,=20
> > the tunnel generated fragmentation does not require any actions by=20
> > SFF nodes or SF nodes.
> >
> >
> > - Source node generated fragmentation (after adding on the NSH
> > header): When fragmentation has to be performed for a packet being=20
> > encapsulated with the NSH header, either the intermediate SFF nodes=20
> > or the SF nodes have to be able to reassemble the fragmented pieces.
> >
> >
> >
> >
> > Cheers,
> >
> >
> > Linda
> >
> > -----Original Message----- From: Joel M. Halpern=20
> > [mailto:jmh@joelhalpern.com] Sent: Tuesday, April 26, 2016 10:33 AM
> > To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri;=20
> > sfc@ietf.org Subject: Re: [sfc] WG last call for=20
> > draft-ietf-sfc-nsh-04.txt
> >
> > Re-reading your note, it is possible that you are referring only to=20
> > the case of transport generated fragmentation of the outer packet. =20
> > I had assumed you were not talking about that, since the resulting=20
> > fragments will not all have NSH headers.  As with any tunnel=20
> > technology, if the tunnel chooses to fragment at its layer, then the=20
> > tunnel is responsible for reassembly.  That would be invisible to=20
> > the SFF.
> >
> > Yours, Joel
> >
> > On 4/26/16 11:10 AM, Linda Dunbar wrote:
> >> Agree with Med.
> >>
> >> Even if each fragment piece of a packet with NSH header carries the=20
> >> NSH header, the intermediate SFF nodes still need to put together=20
> >> all the fragments together before passing the whole data frame to=20
> >> the SF.
> >>
> >> Linda
> >>
> >> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]=20
> >> On Behalf Of mohamed.boucadair@orange.com Sent: Monday, April 25,
> >> 2016 9:42 AM To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org Subject:
> >> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>
> >> Re-,
> >>
> >> How do you instruct the transport layer to ALWAYS prepend an NSH=20
> >> header even for fragments? Or you don't care about that?
> >>
> >> Thank you.
> >>
> >> Cheers, Med
> >>
> >>> -----Message d'origine----- De : Elzur, Uri=20
> >>> [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril 2016 16:26 =C0
> >>> : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; sfc@ietf.org Objet
> >>> : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>
> >>> Hi Med
> >>>
> >>> Not to repeat my position, but I'll do it anyhow :-) As NSH is
> >>> *NOT* a transport, dealing with fragmentation is left to the=20
> >>> Transport used.
> >>>
> >>> The model I use for NSH, is basically similar to VXLAN . It is an=20
> >>> overly.
> >>>
> >>> Thx
> >>>
> >>> Uri ("Oo-Ree") C: 949-378-7568
> >>>
> >>>
> >>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]=20
> >>> On Behalf Of mohamed.boucadair@orange.com Sent: Monday, April 25,=20
> >>> 2016 7:18 AM To: Joel M. Halpern <jmh@joelhalpern.com>;=20
> >>> sfc@ietf.org
> >>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>
> >>> Hi Joel,
> >>>
> >>> Please see inline.
> >>>
> >>> Cheers, Med
> >>>
> >>>> -----Message d'origine----- De : Joel M. Halpern=20
> >>>> [mailto:jmh@joelhalpern.com] Envoy=E9 : lundi 25 avril 2016 15:48 =
=C0=20
> >>>> : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet : Re: [sfc] WG=20
> >>>> last call for draft-ietf-sfc-nsh-04.txt
> >>>>
> >>>> If I am understanding you correctly Med, you are asking that the=20
> >>>> NSH draft specify how service chaining should cope with packets=20
> >>>> that have been fragmented?
> >>>>
> >>>
> >>> [Med] To be accurate, I'm asking to assess whether there are=20
> >>> implications. If there are, then the draft should be updated=20
> >>> accordingly.
> >>>
> >>>> NSH, and the SFF functionality, does not care.
> >>>
> >>> [Med] I'm not that sure. Some typical implications are listed
> >>> below:
> >>>
> >>> * SFF: If the NSH header is present only in the a fragment but SFF=20
> >>> didn't maintained a state, subsequent fragments won't be=20
> >>> appropriately processed. * SFC-aware function: if prepending a=20
> >>> context information depends on the full packet, not only a=20
> >>> fragment.
> >>>
> >>> It just does its job.
> >>>
> >>> [Med] which may be disturbed in some situations as listed in the =20
> >>> examples above.
> >>>
> >>>> Ingress and intermediate classifiers may cope with fragments in=20
> >>>> any number of ways.
> >>> Specifying such is clearly out of scope for this draft.
> >>>
> >>> [Med] The purpose is not to specify the internal implementation=20
> >>> details but the external behavior of the classifier function when=20
> >>> it comes to handle fragments. That behavior may have an incidence=20
> >>> on SFF, in particular. The purpose is not to recommend the maximum=20
> >>> resources to be dedicated to out of order fragments nor the=20
> >>> timeout to cache those; these considerations are of course out of=20
> >>> scope. Nevertheless, an implementation should offer a configurable=20
> >>> parameter so that an operator tweak those according to its=20
> >>> context.
> >>>
> >>>> I suppose one could write an informational draft on possible ways=20
> >>>> of coping.  The IETF has not usually published such.
> >>>> Service functions have to cope with fragmented packets just as=20
> >>>> they had to before the advent of NSH, so describing that is=20
> >>>> clearly not needed here.
> >>>
> >>> [Med] The advent of NSH has the following implications: * it=20
> >>> exacerbates fragmentation. Handing over this issue to the=20
> >>> transport layer may lead to interoperability issues. * the=20
> >>> chaining may not be efficient if fragments are inappropriately=20
> >>> handled.
> >>>
> >>> Introducing NSH should not degrade the overall service compared to=20
> >>> legacy service deployment schemes.
> >>>
> >>>>
> >>>> Yours, Joel
> >>>>
> >>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
> >>>>> Re-,
> >>>>>
> >>>>> I hear you, but my comment is that we need, as a WG, to decide=20
> >>>>> what to
> >>>> put in the draft. FWIW, I'm discussing two fragmentation
> >>>> issues:
> >>>>>
> >>>>> (1) Fragmentation that is caused by prepending an SFC header.=20
> >>>>> (2) Handling fragments at the ingress of an SFC-enabled domain.
> >>>>>
> >>>>> Increasing the MTU is for sure a recommendation is to be=20
> >>>>> explicitly
> >>>> called out in the text (see my first message).
> >>>>>
> >>>>> There are other issues that need to be discussed, e.g., how to=20
> >>>>> deal with
> >>>> fragments in SFFs/Classifiers?
> >>>>>
> >>>>> It is also "prudent" to check that no issues will be experienced=20
> >>>>> in SFF
> >>>> to handle fragments. If an SFC header is prepended for all=20
> >>>> fragments, I'm not sure there
> >>>>> is any particular issue at the SFF level, except if=20
> >>>>> stripping/adding
> >>>> context TLVs depends on the full packet (not just fragment). It=20
> >>>> is warranted to consider a little bit this point before declaring=20
> >>>> there is no issue.
> >>>>>
> >>>>> For point (1), declaring fragmentation out of scope would be=20
> >>>>> meant that
> >>>> an implementation must be prepared to receive fragments with or=20
> >>>> without NSH header as this is a decision that is left to the=20
> >>>> transport encapsulation. This is a requirement per se!
> >>>>>
> >>>>> I won't reiterate all the comments I have about the current=20
> >>>>> wording of
> >>>> this section.
> >>>>>
> >>>>> Cheers, Med
> >>>>>
> >>>>>> -----Message d'origine----- De : Elzur, Uri=20
> >>>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril 2016
> >>>>>> 08:30 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;=20
> >>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for=20
> >>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>
> >>>>>> Hi Med
> >>>>>>
> >>>>>> My point is that Fragmentation is yet another transport related=20
> >>>>>> issue
> >>>> that
> >>>>>> is beyond the scope of NSH and beyond the charter of the WG, so=20
> >>>>>> it
> >>>> doesn't
> >>>>>> really belong in the draft. We are providing an advice as=20
> >>>>>> extending the size of the packet may lead to fragmentation, but=20
> >>>>>> as you check RFC 7348 VxLAN, which my create the same issue,=20
> >>>>>> you'll find it doesn't even
> >>>> relate
> >>>>>> to it.
> >>>>>>
> >>>>>> Thx
> >>>>>>
> >>>>>> Uri ("Oo-Ree") C: 949-378-7568
> >>>>>>
> >>>>>>
> >>>>>> -----Original Message----- From: sfc=20
> >>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of=20
> >>>>>> mohamed.boucadair@orange.com Sent: Sunday, April 24, 2016
> >>>>>> 10:32 PM To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
> >>>> <narten@us.ibm.com>;
> >>>>>> sfc@ietf.org Subject: Re: [sfc] WG last call for=20
> >>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>
> >>>>>> Hi Uri,
> >>>>>>
> >>>>>> That's another option that needs to be discussed/investigated.=20
> >>>>>> I'm
> >>>> afraid
> >>>>>> this is not the rationale adopted in -04 since it includes some=20
> >>>>>> text
> >>>> that
> >>>>>> is far to be sufficient to ensure interoperable=20
> >>>>>> implementations.
> >>>>>>
> >>>>>> BTW, saying that nsh does not need to deal with fragmentation=20
> >>>>>> because
> >>>> it
> >>>>>> is transport-independent is not IMHO a good strategy to adopt=20
> >>>>>> here
> >>>> because
> >>>>>> it opens the door for interoperable issues, it may lead to=20
> >>>>>> sub-optimal implementations if the sfc information is present=20
> >>>>>> only in one
> >>>> fragments,
> >>>>>> etc.
> >>>>>>
> >>>>>> My comments are related to the current text in the -04.
> >>>>>> This text needs
> >>>> to
> >>>>>> be fixed somehow.
> >>>>>>
> >>>>>> Cheers, Med
> >>>>>>
> >>>>>>> -----Message d'origine----- De : Elzur, Uri=20
> >>>>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche 24 avril
> >>>>>>> 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;=20
> >>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for=20
> >>>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>>
> >>>>>>> Hi Med
> >>>>>>>
> >>>>>>> I see no need to specify the exact behavior as NSH is=20
> >>>>>>> transport independent i.e. like NSH interaction with any other=20
> >>>>>>> Transport eh issue of Fragmentation is to be dealt in a way=20
> >>>>>>> that matches the mechanisms supported by the Transport used=20
> >>>>>>> and do not belong in the NSH draft
> >>>>>>>
> >>>>>>> Thx
> >>>>>>>
> >>>>>>> Uri ("Oo-Ree") C: 949-378-7568
> >>>>>>>
> >>>>>>>
> >>>>>>> -----Original Message----- From: sfc=20
> >>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of=20
> >>>>>>> mohamed.boucadair@orange.com Sent: Thursday, April 14,
> >>>>>>> 2016 12:43 AM To: Thomas Narten <narten@us.ibm.com>;=20
> >>>>>>> sfc@ietf.org Subject: Re: [sfc] WG last call for=20
> >>>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>>
> >>>>>>> R-,
> >>>>>>>
> >>>>>>> In addition to other pending issues raised for this draft, I=20
> >>>>>>> would like to raise this additional one about Section 6.
> >>>>>>>
> >>>>>>> =3D=3D 6.  Fragmentation Considerations
> >>>>>>>
> >>>>>>> NSH and the associated transport header are "added" to the=20
> >>>>>>> encapsulated packet/frame.  This additional information=20
> >>>>>>> increases
> >>>> the
> >>>>>>> size of the packet.  In order the ensure proper forwarding of=20
> >>>>>>> NSH data, several options for handling fragmentation and=20
> >>>>>>> re-assembly exist:
> >>>>>>>
> >>>>>>> 1.  Jumbo Frames, when supported, enable the transport of NSH=20
> >>>>>>> and associated transport packets without requiring=20
> >>>>>>> fragmentation.
> >>>>>>>
> >>>>>>> 2.  Path MTU Discovery [RFC1191]"describes a technique for=20
> >>>>>>> dynamically discovering the maximum transmission unit (MTU) of
> >>>> an
> >>>>>>> arbitrary internet path" and can be utilized to ensure the
> >>> the
> >>>>>>> required packet size is used.
> >>>>>>>
> >>>>>>> 3.  [RFC6830] describes two schemes for fragmentation and
> >>>>>>> re-
> >>>> assembly
> >>>>>>> in section 5.4. =3D=3D
> >>>>>>>
> >>>>>>> * The text is weak for a Standard track document that is=20
> >>>>>>> intended to solve the problem in
> >>>>>>> https://tools.ietf.org/html/rfc7498#section-
> >>> 2.12.
> >>>>>>> There should be a clear behavior to be followed by an
> >>> implementation.
> >>>>>>> Further, I would avoid the use of words such as "can".
> >>>>>>>
> >>>>>>> * The text covers only fragmentation when it is induced by SFC=20
> >>>>>>> operations, it does not discuss the treatment of a fragment=20
> >>>>>>> when received in an SFC domain. IMHO, the draft should also=20
> >>>>>>> specify the behavior of the Classifier with regards to=20
> >>>>>>> fragments for the sake of proper SFC operation. Applying=20
> >>>>>>> classification policies may require the
> >>>>>> full packet, not only a fragment.
> >>>>>>> In particular, dedicated resources should dedicated for=20
> >>>>>>> handling out of order fragments. Of course, it is out of scope=20
> >>>>>>> of this document to describe how SFs handle fragments.
> >>>>>>>
> >>>>>>> * If an SFC header is prepended for all fragments, I'm not=20
> >>>>>>> sure there is any particular issue at the SFF level...except=20
> >>>>>>> if stripping/adding context TLVs depends on the full packet=20
> >>>>>>> (not just fragment). It is warranted to consider a little bit=20
> >>>>>>> this point before declaring there
> >>>> is
> >>>>>> no issue.
> >>>>>>>
> >>>>>>> * The text states "several options". This may be interpreted=20
> >>>>>>> as if implementing one of them is sufficient...which is not=20
> >>>>>>> true. The first two points contribute to minimize the=20
> >>>>>>> fragmentation risk, but fragmentation may still be experienced=20
> >>>>>>> (e.g., other shims are prepended by other nodes for some other=20
> >>>>>>> purposes, nested nsh, etc.)
> >>>>>>>
> >>>>>>> * The first two points have nothing to do with reassembly.
> >>>>>>>
> >>>>>>> * The support of jumbo frames by a router/device does not mean=20
> >>>>>>> that it can make use of it. Appropriate MTU configuration=20
> >>>>>>> should be undertaken in a consistent manner within an SFC=20
> >>>>>>> domain. The text should be updated to make it is about=20
> >>>>>>> (consistent) MTU
> >>> configuration.
> >>>>>>>
> >>>>>>> * BTW, shouldn't the text be reworded to recommended to=20
> >>>>>>> increase the MTU of **all nodes** of an SFC-enabled domain by=20
> >>>>>>> at least the length of SFC header + transport header?
> >>>>>>>
> >>>>>>> * Bullet 2, how PMTU discovery is actually used in this=20
> >>>>>>> context? Do you assume that all SFC-aware nodes will issue=20
> >>>>>>> such messages towards other SFC-aware node, arbitrary=20
> >>>>>>> destination, else?
> >>>>>>>
> >>>>>>> * Bullet 2, I would drop "describes a technique for=20
> >>>>>>> dynamically discovering the maximum transmission unit
> >>>>>>> (MTU) of an arbitrary internet path".
> >>>>>>>
> >>>>>>> * Bullet 2, s/ the the/the.
> >>>>>>>
> >>>>>>> * The reference to the LISP specification raises two concerns=20
> >>>>>>> and one comment:
> >>>>>>>
> >>>>>>> (1) I don't think it is a good approach that fragments induced=20
> >>>>>>> by the network are passed to their ultimate destinations as=20
> >>>>>>> such
> >>> (stateless).
> >>>>>>> IMO, reassembly should be done within the SFC domain=20
> >>>>>>> (responsible for fragmentation) not passed away. (2) Does the=20
> >>>>>>> stateful mode require all SFC data plane elements maintain a=20
> >>>>>>> full list of MTU for the any SFF/SF instance of the SFC
> >>>>>> domain?
> >>>>>>>
> >>>>>>> The current text suggests that [RFC6830] should be listed as=20
> >>>>>>> normative reference (not an informative one). I would=20
> >>>>>>> personally favor removing the reference to LISP (as it is an=20
> >>>>>>> Experimental RFC).
> >>>>>>>
> >>>>>>> * The security section of the draft may be augmented with=20
> >>>>>>> informational fragmentation-related pointers to:
> >>>>>>> e.g., RFC1858 (Security Considerations for IP Fragment=20
> >>>>>>> Filtering), RFC3128 (Protection Against a Variant of the Tiny=20
> >>>>>>> Fragment Attack), and RFC 4963 (IPv4 Reassembly Errors at High=20
> >>>>>>> Data Rates).
> >>>>>>>
> >>>>>>> Cheers, Med
> >>>>>>>
> >>>>>>>> -----Message d'origine----- De : sfc=20
> >>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de=20
> >>>>>>>> mohamed.boucadair@orange.com Envoy=E9 : lundi 11 avril
> >>>>>>>> 2016 13:14 =C0 : Thomas Narten; sfc@ietf.org Objet : Re:
> >>>>>>>> [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>>>>>
> >>>>>>>> Dear Thomas, all,
> >>>>>>>>
> >>>>>>>> As I mentioned during the meeting, there are several issues=20
> >>>>>>>> that are not covered in the last version of the draft. I=20
> >>>>>>>> already provided examples of the issues offline as requested=20
> >>>>>>>> by Martin.
> >>>>>>>>
> >>>>>>>> Cheers, Med
> >>>>>>>>
> >>>>>>>>> -----Message d'origine----- De : sfc=20
> >>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten=20
> >>>>>>>>> Envoy=E9 : jeudi 31 mars 2016 04:48 =C0 :
> >>>>>>>>> sfc@ietf.org Objet : [sfc] WG last call for=20
> >>>>>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>>>>
> >>>>>>>>> Dear WG:
> >>>>>>>>>
> >>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt=20
> >>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> >>>>>>>>>
> >>>>>>>>>
> >>>>>>>>>
> The editors of the NSH document have indicated that they have
> >>>>>>>>> addressed all known comments and that there are no open=20
> >>>>>>>>> issues with the current version of the document.
> >>>>>>>>>
> >>>>>>>>> Substantive comments to the list please, editorial comments=20
> >>>>>>>>> can go directly to the document editors.
> >>>>>>>>>
> >>>>>>>>> We'll also get a brief update from the editors at next=20
> >>>>>>>>> week's meeting. If there are any remaining issues with the=20
> >>>>>>>>> document, raising them before the meeting would be=20
> >>>>>>>>> especially helpful.
> >>>>>>>>>
> >>>>>>>>> For the chairs, Thomas
> >>>>>>>>>
> >>>>>>>>> _______________________________________________ sfc mailing=20
> >>>>>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >>>>>>>>
> >>>>>>>> _______________________________________________ sfc mailing=20
> >>>>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >>>>>>>
> >>>>>>> _______________________________________________ sfc mailing=20
> >>>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >>>>>>
> >>>>>> _______________________________________________ sfc mailing=20
> >>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >>>>>
> >>>>> _______________________________________________ sfc mailing list=20
> >>>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >>>>>
> >>>
> >>> _______________________________________________ sfc mailing list=20
> >>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >>
> >> _______________________________________________ sfc mailing list=20
> >> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >>


From nobody Wed Apr 27 13:19:33 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5DA8D12D567 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 13:19:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NvdIcbeUQ1e9 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 13:19:29 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3B36E12D1C8 for <sfc@ietf.org>; Wed, 27 Apr 2016 13:19:29 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id EB99F240207; Wed, 27 Apr 2016 13:19:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461788368; bh=P0cYqw0l07OWmCD/zKZldM1GUrYbHZDGCn7E2xZCe4c=; h=Subject:To:References:From:Date:In-Reply-To:From; b=bIdf/QoDBoqvPqm37YTpKd5p3lf//o7FuGPZOsw77RtqraGD8M0cMGy3kw8AKBbFa 8YtyOKZ38ZCFCLQn+NwgO45A5pig0sEaTPmtMSSv4uEuiQZkun6ZojAt6m0j/AjEax FFn2F17xcs07g5O7tlH1R0fDvFZvHAkslXpQN7Ys=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id EC919240EFB; Wed, 27 Apr 2016 13:19:27 -0700 (PDT)
To: Linda Dunbar <linda.dunbar@huawei.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com>
Date: Wed, 27 Apr 2016 16:19:16 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/PjvCzFUHfsXg-W7nVMK4GIjI9kc>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 20:19:32 -0000

Both methods are valid, and both depend upon details of the underlying 
packet and the transport.  As such, I don't see why this document 
benefits from describing them, much less why it should mark one method 
as a "should".  Implementation details are likely to be more significant 
than any bit consumption difference between the two alternatives.

Yours,
Joel

On 4/27/16 3:40 PM, Linda Dunbar wrote:
> I suggest adding the following paragraphs after the Bullet 3 of the Section 6 Fragmentation Consideration to make the process more clear and less controversial:
>
>
> --------------------------------
>
> RFC6830 describes the fragmentation method of breaking the original packet into two equal sub-frames and encapsulating [LISP Header + Transport header] to each sub-frame.
>
> If LISP fragmentation [RFC6830 Section 5.4] is used, the [SFC Header + Transport Header] will be added to each half frame (or the original data frame). As the Transport Header is terminated by the next SFF node's tunnel transport layer, the combined two sub-frames will have two SFC Headers.
>
> Therefore, the fragmentation for NSH encapsulated data frame should be done completely by the node tunnel transport layer, which should break the [SFC + original packet] into two equal sub-frames and each sub-frame being encapsulated with its respective tunnel header.  The next SFF node's tunnel transport layer should combine the two sub-frames before sending to the next node.
>
> ------------------------------------------------------
>
>
> By the way, there are to typo in the Section 6:
> 3rd line: "In order the" ==> "In order to"
> Last line of Bullet 2: extra "the" in the "utilized to ensure the the required packet".
>
>
> Hope it helps.
>
> Linda
>
>
>
> -----Original Message-----
> From: mohamed.boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
> Sent: Wednesday, April 27, 2016 12:40 AM
> To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; sfc@ietf.org
> Subject: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> Hi Joel, all,
>
> Please see inline.
>
> Cheers,
> Med
>
>> -----Message d'origine-----
>> De : Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoyé : mardi 26
>> avril 2016 19:18 À : Linda Dunbar; BOUCADAIR Mohamed IMT/OLN; Elzur,
>> Uri; sfc@ietf.org Objet : Re: [sfc] WG last call for
>> draft-ietf-sfc-nsh-04.txt
>>
>> With regard to Transport tunnel fragementation, that seems an issue
>> for the transport protocol.  I don't actually object to a sentence,
>> but it does not seem that it will accomplish anything.
>
> [Med] I would like to see some text added to the draft.
>
>>
>> With regard to packets fragmented by the source, I completely disagree
>> with your assertion.  If an SFF were to reassemble the packets, that
>> would be a violation of its job.
>
> [Med] I agree with you.
>
>   There is no reason for an SFF to
>> reassemble a packet fragmented by the source.  The classifier may have
>> to do some interesting things in order to properly classify succeeding
>> fragments, but that is an implementation issue (most commonly
>> addressed with virtual reassembly, which doe snot delay the
>> fragments.)  We don't specity that.
>
> [Med] Still, the external behavior of the classifier needs to be clear in the document. I don't find any text in the draft saying for instance that an NSH header must be present in all fragments. (There some processing that might be needed at the SFF to "do its job" with regards to fragments (receive out of order fragments + forwarding policy on the full packet).)
>
>>
>> If an SF needs to reassemble fragments to do its job, that is up to
>> the SF.  Some will need to actually reassemble.  Some will need to
>> perform virtual reassembly, and some will happily process the
>> fragments.  I can not see what the NSH document could possibly mandate.
>
> [Med] Fully agree.
>
>>
>> Yours,
>> Joel
>>
>> On 4/26/16 11:47 AM, Linda Dunbar wrote:
>>> Joel,
>>>
>>> I think the document should add the description on the following two
>>> fragmentation scenarios:
>>>
>>> - Transport tunnel generated fragmentation: When a packet
>>> fragmentation is caused by transport tunnel (i.e. various
>>> encapsulations), the termination point of the transport tunnel is
>>> responsible for re-assembling the fragmented pieces of the packet.
>>> Since there won't be any SFF nodes in between the Transport Tunnel,
>>> the tunnel generated fragmentation does not require any actions by
>>> SFF nodes or SF nodes.
>>>
>>>
>>> - Source node generated fragmentation (after adding on the NSH
>>> header): When fragmentation has to be performed for a packet being
>>> encapsulated with the NSH header, either the intermediate SFF nodes
>>> or the SF nodes have to be able to reassemble the fragmented pieces.
>>>
>>>
>>>
>>>
>>> Cheers,
>>>
>>>
>>> Linda
>>>
>>> -----Original Message----- From: Joel M. Halpern
>>> [mailto:jmh@joelhalpern.com] Sent: Tuesday, April 26, 2016 10:33 AM
>>> To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri;
>>> sfc@ietf.org Subject: Re: [sfc] WG last call for
>>> draft-ietf-sfc-nsh-04.txt
>>>
>>> Re-reading your note, it is possible that you are referring only to
>>> the case of transport generated fragmentation of the outer packet.
>>> I had assumed you were not talking about that, since the resulting
>>> fragments will not all have NSH headers.  As with any tunnel
>>> technology, if the tunnel chooses to fragment at its layer, then the
>>> tunnel is responsible for reassembly.  That would be invisible to
>>> the SFF.
>>>
>>> Yours, Joel
>>>
>>> On 4/26/16 11:10 AM, Linda Dunbar wrote:
>>>> Agree with Med.
>>>>
>>>> Even if each fragment piece of a packet with NSH header carries the
>>>> NSH header, the intermediate SFF nodes still need to put together
>>>> all the fragments together before passing the whole data frame to
>>>> the SF.
>>>>
>>>> Linda
>>>>
>>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]
>>>> On Behalf Of mohamed.boucadair@orange.com Sent: Monday, April 25,
>>>> 2016 9:42 AM To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org Subject:
>>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Re-,
>>>>
>>>> How do you instruct the transport layer to ALWAYS prepend an NSH
>>>> header even for fragments? Or you don't care about that?
>>>>
>>>> Thank you.
>>>>
>>>> Cheers, Med
>>>>
>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>> [mailto:uri.elzur@intel.com] Envoyé : lundi 25 avril 2016 16:26 À
>>>>> : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; sfc@ietf.org Objet
>>>>> : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Med
>>>>>
>>>>> Not to repeat my position, but I'll do it anyhow :-) As NSH is
>>>>> *NOT* a transport, dealing with fragmentation is left to the
>>>>> Transport used.
>>>>>
>>>>> The model I use for NSH, is basically similar to VXLAN . It is an
>>>>> overly.
>>>>>
>>>>> Thx
>>>>>
>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>
>>>>>
>>>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]
>>>>> On Behalf Of mohamed.boucadair@orange.com Sent: Monday, April 25,
>>>>> 2016 7:18 AM To: Joel M. Halpern <jmh@joelhalpern.com>;
>>>>> sfc@ietf.org
>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Joel,
>>>>>
>>>>> Please see inline.
>>>>>
>>>>> Cheers, Med
>>>>>
>>>>>> -----Message d'origine----- De : Joel M. Halpern
>>>>>> [mailto:jmh@joelhalpern.com] Envoyé : lundi 25 avril 2016 15:48 À
>>>>>> : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet : Re: [sfc] WG
>>>>>> last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> If I am understanding you correctly Med, you are asking that the
>>>>>> NSH draft specify how service chaining should cope with packets
>>>>>> that have been fragmented?
>>>>>>
>>>>>
>>>>> [Med] To be accurate, I'm asking to assess whether there are
>>>>> implications. If there are, then the draft should be updated
>>>>> accordingly.
>>>>>
>>>>>> NSH, and the SFF functionality, does not care.
>>>>>
>>>>> [Med] I'm not that sure. Some typical implications are listed
>>>>> below:
>>>>>
>>>>> * SFF: If the NSH header is present only in the a fragment but SFF
>>>>> didn't maintained a state, subsequent fragments won't be
>>>>> appropriately processed. * SFC-aware function: if prepending a
>>>>> context information depends on the full packet, not only a
>>>>> fragment.
>>>>>
>>>>> It just does its job.
>>>>>
>>>>> [Med] which may be disturbed in some situations as listed in the
>>>>> examples above.
>>>>>
>>>>>> Ingress and intermediate classifiers may cope with fragments in
>>>>>> any number of ways.
>>>>> Specifying such is clearly out of scope for this draft.
>>>>>
>>>>> [Med] The purpose is not to specify the internal implementation
>>>>> details but the external behavior of the classifier function when
>>>>> it comes to handle fragments. That behavior may have an incidence
>>>>> on SFF, in particular. The purpose is not to recommend the maximum
>>>>> resources to be dedicated to out of order fragments nor the
>>>>> timeout to cache those; these considerations are of course out of
>>>>> scope. Nevertheless, an implementation should offer a configurable
>>>>> parameter so that an operator tweak those according to its
>>>>> context.
>>>>>
>>>>>> I suppose one could write an informational draft on possible ways
>>>>>> of coping.  The IETF has not usually published such.
>>>>>> Service functions have to cope with fragmented packets just as
>>>>>> they had to before the advent of NSH, so describing that is
>>>>>> clearly not needed here.
>>>>>
>>>>> [Med] The advent of NSH has the following implications: * it
>>>>> exacerbates fragmentation. Handing over this issue to the
>>>>> transport layer may lead to interoperability issues. * the
>>>>> chaining may not be efficient if fragments are inappropriately
>>>>> handled.
>>>>>
>>>>> Introducing NSH should not degrade the overall service compared to
>>>>> legacy service deployment schemes.
>>>>>
>>>>>>
>>>>>> Yours, Joel
>>>>>>
>>>>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
>>>>>>> Re-,
>>>>>>>
>>>>>>> I hear you, but my comment is that we need, as a WG, to decide
>>>>>>> what to
>>>>>> put in the draft. FWIW, I'm discussing two fragmentation
>>>>>> issues:
>>>>>>>
>>>>>>> (1) Fragmentation that is caused by prepending an SFC header.
>>>>>>> (2) Handling fragments at the ingress of an SFC-enabled domain.
>>>>>>>
>>>>>>> Increasing the MTU is for sure a recommendation is to be
>>>>>>> explicitly
>>>>>> called out in the text (see my first message).
>>>>>>>
>>>>>>> There are other issues that need to be discussed, e.g., how to
>>>>>>> deal with
>>>>>> fragments in SFFs/Classifiers?
>>>>>>>
>>>>>>> It is also "prudent" to check that no issues will be experienced
>>>>>>> in SFF
>>>>>> to handle fragments. If an SFC header is prepended for all
>>>>>> fragments, I'm not sure there
>>>>>>> is any particular issue at the SFF level, except if
>>>>>>> stripping/adding
>>>>>> context TLVs depends on the full packet (not just fragment). It
>>>>>> is warranted to consider a little bit this point before declaring
>>>>>> there is no issue.
>>>>>>>
>>>>>>> For point (1), declaring fragmentation out of scope would be
>>>>>>> meant that
>>>>>> an implementation must be prepared to receive fragments with or
>>>>>> without NSH header as this is a decision that is left to the
>>>>>> transport encapsulation. This is a requirement per se!
>>>>>>>
>>>>>>> I won't reiterate all the comments I have about the current
>>>>>>> wording of
>>>>>> this section.
>>>>>>>
>>>>>>> Cheers, Med
>>>>>>>
>>>>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>>>> [mailto:uri.elzur@intel.com] Envoyé : lundi 25 avril 2016
>>>>>>>> 08:30 À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Hi Med
>>>>>>>>
>>>>>>>> My point is that Fragmentation is yet another transport related
>>>>>>>> issue
>>>>>> that
>>>>>>>> is beyond the scope of NSH and beyond the charter of the WG, so
>>>>>>>> it
>>>>>> doesn't
>>>>>>>> really belong in the draft. We are providing an advice as
>>>>>>>> extending the size of the packet may lead to fragmentation, but
>>>>>>>> as you check RFC 7348 VxLAN, which my create the same issue,
>>>>>>>> you'll find it doesn't even
>>>>>> relate
>>>>>>>> to it.
>>>>>>>>
>>>>>>>> Thx
>>>>>>>>
>>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>>
>>>>>>>>
>>>>>>>> -----Original Message----- From: sfc
>>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>>> mohamed.boucadair@orange.com Sent: Sunday, April 24, 2016
>>>>>>>> 10:32 PM To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
>>>>>> <narten@us.ibm.com>;
>>>>>>>> sfc@ietf.org Subject: Re: [sfc] WG last call for
>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Hi Uri,
>>>>>>>>
>>>>>>>> That's another option that needs to be discussed/investigated.
>>>>>>>> I'm
>>>>>> afraid
>>>>>>>> this is not the rationale adopted in -04 since it includes some
>>>>>>>> text
>>>>>> that
>>>>>>>> is far to be sufficient to ensure interoperable
>>>>>>>> implementations.
>>>>>>>>
>>>>>>>> BTW, saying that nsh does not need to deal with fragmentation
>>>>>>>> because
>>>>>> it
>>>>>>>> is transport-independent is not IMHO a good strategy to adopt
>>>>>>>> here
>>>>>> because
>>>>>>>> it opens the door for interoperable issues, it may lead to
>>>>>>>> sub-optimal implementations if the sfc information is present
>>>>>>>> only in one
>>>>>> fragments,
>>>>>>>> etc.
>>>>>>>>
>>>>>>>> My comments are related to the current text in the -04.
>>>>>>>> This text needs
>>>>>> to
>>>>>>>> be fixed somehow.
>>>>>>>>
>>>>>>>> Cheers, Med
>>>>>>>>
>>>>>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>>>>> [mailto:uri.elzur@intel.com] Envoyé : dimanche 24 avril
>>>>>>>>> 2016 17:36 À : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> Hi Med
>>>>>>>>>
>>>>>>>>> I see no need to specify the exact behavior as NSH is
>>>>>>>>> transport independent i.e. like NSH interaction with any other
>>>>>>>>> Transport eh issue of Fragmentation is to be dealt in a way
>>>>>>>>> that matches the mechanisms supported by the Transport used
>>>>>>>>> and do not belong in the NSH draft
>>>>>>>>>
>>>>>>>>> Thx
>>>>>>>>>
>>>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> -----Original Message----- From: sfc
>>>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>>>> mohamed.boucadair@orange.com Sent: Thursday, April 14,
>>>>>>>>> 2016 12:43 AM To: Thomas Narten <narten@us.ibm.com>;
>>>>>>>>> sfc@ietf.org Subject: Re: [sfc] WG last call for
>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> R-,
>>>>>>>>>
>>>>>>>>> In addition to other pending issues raised for this draft, I
>>>>>>>>> would like to raise this additional one about Section 6.
>>>>>>>>>
>>>>>>>>> == 6.  Fragmentation Considerations
>>>>>>>>>
>>>>>>>>> NSH and the associated transport header are "added" to the
>>>>>>>>> encapsulated packet/frame.  This additional information
>>>>>>>>> increases
>>>>>> the
>>>>>>>>> size of the packet.  In order the ensure proper forwarding of
>>>>>>>>> NSH data, several options for handling fragmentation and
>>>>>>>>> re-assembly exist:
>>>>>>>>>
>>>>>>>>> 1.  Jumbo Frames, when supported, enable the transport of NSH
>>>>>>>>> and associated transport packets without requiring
>>>>>>>>> fragmentation.
>>>>>>>>>
>>>>>>>>> 2.  Path MTU Discovery [RFC1191]"describes a technique for
>>>>>>>>> dynamically discovering the maximum transmission unit (MTU) of
>>>>>> an
>>>>>>>>> arbitrary internet path" and can be utilized to ensure the
>>>>> the
>>>>>>>>> required packet size is used.
>>>>>>>>>
>>>>>>>>> 3.  [RFC6830] describes two schemes for fragmentation and
>>>>>>>>> re-
>>>>>> assembly
>>>>>>>>> in section 5.4. ==
>>>>>>>>>
>>>>>>>>> * The text is weak for a Standard track document that is
>>>>>>>>> intended to solve the problem in
>>>>>>>>> https://tools.ietf.org/html/rfc7498#section-
>>>>> 2.12.
>>>>>>>>> There should be a clear behavior to be followed by an
>>>>> implementation.
>>>>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>>>>
>>>>>>>>> * The text covers only fragmentation when it is induced by SFC
>>>>>>>>> operations, it does not discuss the treatment of a fragment
>>>>>>>>> when received in an SFC domain. IMHO, the draft should also
>>>>>>>>> specify the behavior of the Classifier with regards to
>>>>>>>>> fragments for the sake of proper SFC operation. Applying
>>>>>>>>> classification policies may require the
>>>>>>>> full packet, not only a fragment.
>>>>>>>>> In particular, dedicated resources should dedicated for
>>>>>>>>> handling out of order fragments. Of course, it is out of scope
>>>>>>>>> of this document to describe how SFs handle fragments.
>>>>>>>>>
>>>>>>>>> * If an SFC header is prepended for all fragments, I'm not
>>>>>>>>> sure there is any particular issue at the SFF level...except
>>>>>>>>> if stripping/adding context TLVs depends on the full packet
>>>>>>>>> (not just fragment). It is warranted to consider a little bit
>>>>>>>>> this point before declaring there
>>>>>> is
>>>>>>>> no issue.
>>>>>>>>>
>>>>>>>>> * The text states "several options". This may be interpreted
>>>>>>>>> as if implementing one of them is sufficient...which is not
>>>>>>>>> true. The first two points contribute to minimize the
>>>>>>>>> fragmentation risk, but fragmentation may still be experienced
>>>>>>>>> (e.g., other shims are prepended by other nodes for some other
>>>>>>>>> purposes, nested nsh, etc.)
>>>>>>>>>
>>>>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>>>>
>>>>>>>>> * The support of jumbo frames by a router/device does not mean
>>>>>>>>> that it can make use of it. Appropriate MTU configuration
>>>>>>>>> should be undertaken in a consistent manner within an SFC
>>>>>>>>> domain. The text should be updated to make it is about
>>>>>>>>> (consistent) MTU
>>>>> configuration.
>>>>>>>>>
>>>>>>>>> * BTW, shouldn't the text be reworded to recommended to
>>>>>>>>> increase the MTU of **all nodes** of an SFC-enabled domain by
>>>>>>>>> at least the length of SFC header + transport header?
>>>>>>>>>
>>>>>>>>> * Bullet 2, how PMTU discovery is actually used in this
>>>>>>>>> context? Do you assume that all SFC-aware nodes will issue
>>>>>>>>> such messages towards other SFC-aware node, arbitrary
>>>>>>>>> destination, else?
>>>>>>>>>
>>>>>>>>> * Bullet 2, I would drop "describes a technique for
>>>>>>>>> dynamically discovering the maximum transmission unit
>>>>>>>>> (MTU) of an arbitrary internet path".
>>>>>>>>>
>>>>>>>>> * Bullet 2, s/ the the/the.
>>>>>>>>>
>>>>>>>>> * The reference to the LISP specification raises two concerns
>>>>>>>>> and one comment:
>>>>>>>>>
>>>>>>>>> (1) I don't think it is a good approach that fragments induced
>>>>>>>>> by the network are passed to their ultimate destinations as
>>>>>>>>> such
>>>>> (stateless).
>>>>>>>>> IMO, reassembly should be done within the SFC domain
>>>>>>>>> (responsible for fragmentation) not passed away. (2) Does the
>>>>>>>>> stateful mode require all SFC data plane elements maintain a
>>>>>>>>> full list of MTU for the any SFF/SF instance of the SFC
>>>>>>>> domain?
>>>>>>>>>
>>>>>>>>> The current text suggests that [RFC6830] should be listed as
>>>>>>>>> normative reference (not an informative one). I would
>>>>>>>>> personally favor removing the reference to LISP (as it is an
>>>>>>>>> Experimental RFC).
>>>>>>>>>
>>>>>>>>> * The security section of the draft may be augmented with
>>>>>>>>> informational fragmentation-related pointers to:
>>>>>>>>> e.g., RFC1858 (Security Considerations for IP Fragment
>>>>>>>>> Filtering), RFC3128 (Protection Against a Variant of the Tiny
>>>>>>>>> Fragment Attack), and RFC 4963 (IPv4 Reassembly Errors at High
>>>>>>>>> Data Rates).
>>>>>>>>>
>>>>>>>>> Cheers, Med
>>>>>>>>>
>>>>>>>>>> -----Message d'origine----- De : sfc
>>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de
>>>>>>>>>> mohamed.boucadair@orange.com Envoyé : lundi 11 avril
>>>>>>>>>> 2016 13:14 À : Thomas Narten; sfc@ietf.org Objet : Re:
>>>>>>>>>> [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>
>>>>>>>>>> Dear Thomas, all,
>>>>>>>>>>
>>>>>>>>>> As I mentioned during the meeting, there are several issues
>>>>>>>>>> that are not covered in the last version of the draft. I
>>>>>>>>>> already provided examples of the issues offline as requested
>>>>>>>>>> by Martin.
>>>>>>>>>>
>>>>>>>>>> Cheers, Med
>>>>>>>>>>
>>>>>>>>>>> -----Message d'origine----- De : sfc
>>>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten
>>>>>>>>>>> Envoyé : jeudi 31 mars 2016 04:48 À :
>>>>>>>>>>> sfc@ietf.org Objet : [sfc] WG last call for
>>>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>>
>>>>>>>>>>> Dear WG:
>>>>>>>>>>>
>>>>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>> The editors of the NSH document have indicated that they have
>>>>>>>>>>> addressed all known comments and that there are no open
>>>>>>>>>>> issues with the current version of the document.
>>>>>>>>>>>
>>>>>>>>>>> Substantive comments to the list please, editorial comments
>>>>>>>>>>> can go directly to the document editors.
>>>>>>>>>>>
>>>>>>>>>>> We'll also get a brief update from the editors at next
>>>>>>>>>>> week's meeting. If there are any remaining issues with the
>>>>>>>>>>> document, raising them before the meeting would be
>>>>>>>>>>> especially helpful.
>>>>>>>>>>>
>>>>>>>>>>> For the chairs, Thomas
>>>>>>>>>>>
>>>>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>>
>>>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>
>>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>
>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________ sfc mailing list
>>>>>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>
>>>>> _______________________________________________ sfc mailing list
>>>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>>> _______________________________________________ sfc mailing list
>>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>
>


From nobody Wed Apr 27 13:33:43 2016
Return-Path: <linda.dunbar@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E463A12D1C8 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 13:33:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.217
X-Spam-Level: 
X-Spam-Status: No, score=-5.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YeYF9GwMdTas for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 13:33:39 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7DD5B12B02F for <sfc@ietf.org>; Wed, 27 Apr 2016 13:33:37 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml708-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CIQ68050; Wed, 27 Apr 2016 20:33:31 +0000 (GMT)
Received: from DFWEML702-CAH.china.huawei.com (10.193.5.176) by lhreml708-cah.china.huawei.com (10.201.5.202) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 27 Apr 2016 21:33:30 +0100
Received: from DFWEML501-MBB.china.huawei.com ([10.193.5.179]) by dfweml702-cah.china.huawei.com ([10.193.5.176]) with mapi id 14.03.0235.001; Wed, 27 Apr 2016 13:33:26 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRoLyqrLBdZa9hMkm7UAhBhKf8W5+euAMA//+Nf/A=
Date: Wed, 27 Apr 2016 20:33:25 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657E7D9B4@dfweml501-mbb>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb> <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com>
In-Reply-To: <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.182]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020206.5721221C.025B, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 432587ec47f2b36095e7ed9394d938f6
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/CNvWcaigVjwBQ0CqZDNLGA9Ne-w>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 20:33:43 -0000

Joel,=20

If you think "both methods are valid", then the implication of both methods=
 should be included in the document.

I don't believe the current description in the Section 6 is adequate enough=
. Otherwise, there won't be so much debate on the list.=20


Linda=20


-----Original Message-----
From: Joel M. Halpern [mailto:jmh@joelhalpern.com]=20
Sent: Wednesday, April 27, 2016 3:19 PM
To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri; sfc@ietf.org
Subject: Re: Suggested wording addtion to the Section 6 (Fragmentation Cons=
ideration) of the draft-ietf-sfc-nsh-04.txt

Both methods are valid, and both depend upon details of the underlying pack=
et and the transport.  As such, I don't see why this document benefits from=
 describing them, much less why it should mark one method as a "should".  I=
mplementation details are likely to be more significant than any bit consum=
ption difference between the two alternatives.

Yours,
Joel

On 4/27/16 3:40 PM, Linda Dunbar wrote:
> I suggest adding the following paragraphs after the Bullet 3 of the Secti=
on 6 Fragmentation Consideration to make the process more clear and less co=
ntroversial:
>
>
> --------------------------------
>
> RFC6830 describes the fragmentation method of breaking the original packe=
t into two equal sub-frames and encapsulating [LISP Header + Transport head=
er] to each sub-frame.
>
> If LISP fragmentation [RFC6830 Section 5.4] is used, the [SFC Header + Tr=
ansport Header] will be added to each half frame (or the original data fram=
e). As the Transport Header is terminated by the next SFF node's tunnel tra=
nsport layer, the combined two sub-frames will have two SFC Headers.
>
> Therefore, the fragmentation for NSH encapsulated data frame should be do=
ne completely by the node tunnel transport layer, which should break the [S=
FC + original packet] into two equal sub-frames and each sub-frame being en=
capsulated with its respective tunnel header.  The next SFF node's tunnel t=
ransport layer should combine the two sub-frames before sending to the next=
 node.
>
> ------------------------------------------------------
>
>
> By the way, there are to typo in the Section 6:
> 3rd line: "In order the" =3D=3D> "In order to"
> Last line of Bullet 2: extra "the" in the "utilized to ensure the the req=
uired packet".
>
>
> Hope it helps.
>
> Linda
>
>
>
> -----Original Message-----
> From: mohamed.boucadair@orange.com=20
> [mailto:mohamed.boucadair@orange.com]
> Sent: Wednesday, April 27, 2016 12:40 AM
> To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; sfc@ietf.org
> Subject: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> Hi Joel, all,
>
> Please see inline.
>
> Cheers,
> Med
>
>> -----Message d'origine-----
>> De : Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoy=E9 : mardi 26=20
>> avril 2016 19:18 =C0 : Linda Dunbar; BOUCADAIR Mohamed IMT/OLN; Elzur,=20
>> Uri; sfc@ietf.org Objet : Re: [sfc] WG last call for=20
>> draft-ietf-sfc-nsh-04.txt
>>
>> With regard to Transport tunnel fragementation, that seems an issue=20
>> for the transport protocol.  I don't actually object to a sentence,=20
>> but it does not seem that it will accomplish anything.
>
> [Med] I would like to see some text added to the draft.
>
>>
>> With regard to packets fragmented by the source, I completely=20
>> disagree with your assertion.  If an SFF were to reassemble the=20
>> packets, that would be a violation of its job.
>
> [Med] I agree with you.
>
>   There is no reason for an SFF to
>> reassemble a packet fragmented by the source.  The classifier may=20
>> have to do some interesting things in order to properly classify=20
>> succeeding fragments, but that is an implementation issue (most=20
>> commonly addressed with virtual reassembly, which doe snot delay the
>> fragments.)  We don't specity that.
>
> [Med] Still, the external behavior of the classifier needs to be clear=20
> in the document. I don't find any text in the draft saying for=20
> instance that an NSH header must be present in all fragments. (There=20
> some processing that might be needed at the SFF to "do its job" with=20
> regards to fragments (receive out of order fragments + forwarding=20
> policy on the full packet).)
>
>>
>> If an SF needs to reassemble fragments to do its job, that is up to=20
>> the SF.  Some will need to actually reassemble.  Some will need to=20
>> perform virtual reassembly, and some will happily process the=20
>> fragments.  I can not see what the NSH document could possibly mandate.
>
> [Med] Fully agree.
>
>>
>> Yours,
>> Joel
>>
>> On 4/26/16 11:47 AM, Linda Dunbar wrote:
>>> Joel,
>>>
>>> I think the document should add the description on the following two=20
>>> fragmentation scenarios:
>>>
>>> - Transport tunnel generated fragmentation: When a packet=20
>>> fragmentation is caused by transport tunnel (i.e. various=20
>>> encapsulations), the termination point of the transport tunnel is=20
>>> responsible for re-assembling the fragmented pieces of the packet.
>>> Since there won't be any SFF nodes in between the Transport Tunnel,=20
>>> the tunnel generated fragmentation does not require any actions by=20
>>> SFF nodes or SF nodes.
>>>
>>>
>>> - Source node generated fragmentation (after adding on the NSH
>>> header): When fragmentation has to be performed for a packet being=20
>>> encapsulated with the NSH header, either the intermediate SFF nodes=20
>>> or the SF nodes have to be able to reassemble the fragmented pieces.
>>>
>>>
>>>
>>>
>>> Cheers,
>>>
>>>
>>> Linda
>>>
>>> -----Original Message----- From: Joel M. Halpern=20
>>> [mailto:jmh@joelhalpern.com] Sent: Tuesday, April 26, 2016 10:33 AM
>>> To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri;=20
>>> sfc@ietf.org Subject: Re: [sfc] WG last call for=20
>>> draft-ietf-sfc-nsh-04.txt
>>>
>>> Re-reading your note, it is possible that you are referring only to=20
>>> the case of transport generated fragmentation of the outer packet.
>>> I had assumed you were not talking about that, since the resulting=20
>>> fragments will not all have NSH headers.  As with any tunnel=20
>>> technology, if the tunnel chooses to fragment at its layer, then the=20
>>> tunnel is responsible for reassembly.  That would be invisible to=20
>>> the SFF.
>>>
>>> Yours, Joel
>>>
>>> On 4/26/16 11:10 AM, Linda Dunbar wrote:
>>>> Agree with Med.
>>>>
>>>> Even if each fragment piece of a packet with NSH header carries the=20
>>>> NSH header, the intermediate SFF nodes still need to put together=20
>>>> all the fragments together before passing the whole data frame to=20
>>>> the SF.
>>>>
>>>> Linda
>>>>
>>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]=20
>>>> On Behalf Of mohamed.boucadair@orange.com Sent: Monday, April 25,
>>>> 2016 9:42 AM To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org Subject:
>>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Re-,
>>>>
>>>> How do you instruct the transport layer to ALWAYS prepend an NSH=20
>>>> header even for fragments? Or you don't care about that?
>>>>
>>>> Thank you.
>>>>
>>>> Cheers, Med
>>>>
>>>>> -----Message d'origine----- De : Elzur, Uri=20
>>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril 2016 16:26 =C0
>>>>> : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; sfc@ietf.org Objet
>>>>> : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Med
>>>>>
>>>>> Not to repeat my position, but I'll do it anyhow :-) As NSH is
>>>>> *NOT* a transport, dealing with fragmentation is left to the=20
>>>>> Transport used.
>>>>>
>>>>> The model I use for NSH, is basically similar to VXLAN . It is an=20
>>>>> overly.
>>>>>
>>>>> Thx
>>>>>
>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>
>>>>>
>>>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]=20
>>>>> On Behalf Of mohamed.boucadair@orange.com Sent: Monday, April 25,
>>>>> 2016 7:18 AM To: Joel M. Halpern <jmh@joelhalpern.com>;=20
>>>>> sfc@ietf.org
>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Hi Joel,
>>>>>
>>>>> Please see inline.
>>>>>
>>>>> Cheers, Med
>>>>>
>>>>>> -----Message d'origine----- De : Joel M. Halpern=20
>>>>>> [mailto:jmh@joelhalpern.com] Envoy=E9 : lundi 25 avril 2016 15:48 =
=C0
>>>>>> : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet : Re: [sfc] WG=20
>>>>>> last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> If I am understanding you correctly Med, you are asking that the=20
>>>>>> NSH draft specify how service chaining should cope with packets=20
>>>>>> that have been fragmented?
>>>>>>
>>>>>
>>>>> [Med] To be accurate, I'm asking to assess whether there are=20
>>>>> implications. If there are, then the draft should be updated=20
>>>>> accordingly.
>>>>>
>>>>>> NSH, and the SFF functionality, does not care.
>>>>>
>>>>> [Med] I'm not that sure. Some typical implications are listed
>>>>> below:
>>>>>
>>>>> * SFF: If the NSH header is present only in the a fragment but SFF=20
>>>>> didn't maintained a state, subsequent fragments won't be=20
>>>>> appropriately processed. * SFC-aware function: if prepending a=20
>>>>> context information depends on the full packet, not only a=20
>>>>> fragment.
>>>>>
>>>>> It just does its job.
>>>>>
>>>>> [Med] which may be disturbed in some situations as listed in the=20
>>>>> examples above.
>>>>>
>>>>>> Ingress and intermediate classifiers may cope with fragments in=20
>>>>>> any number of ways.
>>>>> Specifying such is clearly out of scope for this draft.
>>>>>
>>>>> [Med] The purpose is not to specify the internal implementation=20
>>>>> details but the external behavior of the classifier function when=20
>>>>> it comes to handle fragments. That behavior may have an incidence=20
>>>>> on SFF, in particular. The purpose is not to recommend the maximum=20
>>>>> resources to be dedicated to out of order fragments nor the=20
>>>>> timeout to cache those; these considerations are of course out of=20
>>>>> scope. Nevertheless, an implementation should offer a configurable=20
>>>>> parameter so that an operator tweak those according to its=20
>>>>> context.
>>>>>
>>>>>> I suppose one could write an informational draft on possible ways=20
>>>>>> of coping.  The IETF has not usually published such.
>>>>>> Service functions have to cope with fragmented packets just as=20
>>>>>> they had to before the advent of NSH, so describing that is=20
>>>>>> clearly not needed here.
>>>>>
>>>>> [Med] The advent of NSH has the following implications: * it=20
>>>>> exacerbates fragmentation. Handing over this issue to the=20
>>>>> transport layer may lead to interoperability issues. * the=20
>>>>> chaining may not be efficient if fragments are inappropriately=20
>>>>> handled.
>>>>>
>>>>> Introducing NSH should not degrade the overall service compared to=20
>>>>> legacy service deployment schemes.
>>>>>
>>>>>>
>>>>>> Yours, Joel
>>>>>>
>>>>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
>>>>>>> Re-,
>>>>>>>
>>>>>>> I hear you, but my comment is that we need, as a WG, to decide=20
>>>>>>> what to
>>>>>> put in the draft. FWIW, I'm discussing two fragmentation
>>>>>> issues:
>>>>>>>
>>>>>>> (1) Fragmentation that is caused by prepending an SFC header.
>>>>>>> (2) Handling fragments at the ingress of an SFC-enabled domain.
>>>>>>>
>>>>>>> Increasing the MTU is for sure a recommendation is to be=20
>>>>>>> explicitly
>>>>>> called out in the text (see my first message).
>>>>>>>
>>>>>>> There are other issues that need to be discussed, e.g., how to=20
>>>>>>> deal with
>>>>>> fragments in SFFs/Classifiers?
>>>>>>>
>>>>>>> It is also "prudent" to check that no issues will be experienced=20
>>>>>>> in SFF
>>>>>> to handle fragments. If an SFC header is prepended for all=20
>>>>>> fragments, I'm not sure there
>>>>>>> is any particular issue at the SFF level, except if=20
>>>>>>> stripping/adding
>>>>>> context TLVs depends on the full packet (not just fragment). It=20
>>>>>> is warranted to consider a little bit this point before declaring=20
>>>>>> there is no issue.
>>>>>>>
>>>>>>> For point (1), declaring fragmentation out of scope would be=20
>>>>>>> meant that
>>>>>> an implementation must be prepared to receive fragments with or=20
>>>>>> without NSH header as this is a decision that is left to the=20
>>>>>> transport encapsulation. This is a requirement per se!
>>>>>>>
>>>>>>> I won't reiterate all the comments I have about the current=20
>>>>>>> wording of
>>>>>> this section.
>>>>>>>
>>>>>>> Cheers, Med
>>>>>>>
>>>>>>>> -----Message d'origine----- De : Elzur, Uri=20
>>>>>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril 2016
>>>>>>>> 08:30 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;=20
>>>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for=20
>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Hi Med
>>>>>>>>
>>>>>>>> My point is that Fragmentation is yet another transport related=20
>>>>>>>> issue
>>>>>> that
>>>>>>>> is beyond the scope of NSH and beyond the charter of the WG, so=20
>>>>>>>> it
>>>>>> doesn't
>>>>>>>> really belong in the draft. We are providing an advice as=20
>>>>>>>> extending the size of the packet may lead to fragmentation, but=20
>>>>>>>> as you check RFC 7348 VxLAN, which my create the same issue,=20
>>>>>>>> you'll find it doesn't even
>>>>>> relate
>>>>>>>> to it.
>>>>>>>>
>>>>>>>> Thx
>>>>>>>>
>>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>>
>>>>>>>>
>>>>>>>> -----Original Message----- From: sfc=20
>>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of=20
>>>>>>>> mohamed.boucadair@orange.com Sent: Sunday, April 24, 2016
>>>>>>>> 10:32 PM To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
>>>>>> <narten@us.ibm.com>;
>>>>>>>> sfc@ietf.org Subject: Re: [sfc] WG last call for=20
>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>
>>>>>>>> Hi Uri,
>>>>>>>>
>>>>>>>> That's another option that needs to be discussed/investigated.
>>>>>>>> I'm
>>>>>> afraid
>>>>>>>> this is not the rationale adopted in -04 since it includes some=20
>>>>>>>> text
>>>>>> that
>>>>>>>> is far to be sufficient to ensure interoperable=20
>>>>>>>> implementations.
>>>>>>>>
>>>>>>>> BTW, saying that nsh does not need to deal with fragmentation=20
>>>>>>>> because
>>>>>> it
>>>>>>>> is transport-independent is not IMHO a good strategy to adopt=20
>>>>>>>> here
>>>>>> because
>>>>>>>> it opens the door for interoperable issues, it may lead to=20
>>>>>>>> sub-optimal implementations if the sfc information is present=20
>>>>>>>> only in one
>>>>>> fragments,
>>>>>>>> etc.
>>>>>>>>
>>>>>>>> My comments are related to the current text in the -04.
>>>>>>>> This text needs
>>>>>> to
>>>>>>>> be fixed somehow.
>>>>>>>>
>>>>>>>> Cheers, Med
>>>>>>>>
>>>>>>>>> -----Message d'origine----- De : Elzur, Uri=20
>>>>>>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche 24 avril
>>>>>>>>> 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;=20
>>>>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for=20
>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> Hi Med
>>>>>>>>>
>>>>>>>>> I see no need to specify the exact behavior as NSH is=20
>>>>>>>>> transport independent i.e. like NSH interaction with any other=20
>>>>>>>>> Transport eh issue of Fragmentation is to be dealt in a way=20
>>>>>>>>> that matches the mechanisms supported by the Transport used=20
>>>>>>>>> and do not belong in the NSH draft
>>>>>>>>>
>>>>>>>>> Thx
>>>>>>>>>
>>>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> -----Original Message----- From: sfc=20
>>>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of=20
>>>>>>>>> mohamed.boucadair@orange.com Sent: Thursday, April 14,
>>>>>>>>> 2016 12:43 AM To: Thomas Narten <narten@us.ibm.com>;=20
>>>>>>>>> sfc@ietf.org Subject: Re: [sfc] WG last call for=20
>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> R-,
>>>>>>>>>
>>>>>>>>> In addition to other pending issues raised for this draft, I=20
>>>>>>>>> would like to raise this additional one about Section 6.
>>>>>>>>>
>>>>>>>>> =3D=3D 6.  Fragmentation Considerations
>>>>>>>>>
>>>>>>>>> NSH and the associated transport header are "added" to the=20
>>>>>>>>> encapsulated packet/frame.  This additional information=20
>>>>>>>>> increases
>>>>>> the
>>>>>>>>> size of the packet.  In order the ensure proper forwarding of=20
>>>>>>>>> NSH data, several options for handling fragmentation and=20
>>>>>>>>> re-assembly exist:
>>>>>>>>>
>>>>>>>>> 1.  Jumbo Frames, when supported, enable the transport of NSH=20
>>>>>>>>> and associated transport packets without requiring=20
>>>>>>>>> fragmentation.
>>>>>>>>>
>>>>>>>>> 2.  Path MTU Discovery [RFC1191]"describes a technique for=20
>>>>>>>>> dynamically discovering the maximum transmission unit (MTU) of
>>>>>> an
>>>>>>>>> arbitrary internet path" and can be utilized to ensure the
>>>>> the
>>>>>>>>> required packet size is used.
>>>>>>>>>
>>>>>>>>> 3.  [RFC6830] describes two schemes for fragmentation and
>>>>>>>>> re-
>>>>>> assembly
>>>>>>>>> in section 5.4. =3D=3D
>>>>>>>>>
>>>>>>>>> * The text is weak for a Standard track document that is=20
>>>>>>>>> intended to solve the problem in
>>>>>>>>> https://tools.ietf.org/html/rfc7498#section-
>>>>> 2.12.
>>>>>>>>> There should be a clear behavior to be followed by an
>>>>> implementation.
>>>>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>>>>
>>>>>>>>> * The text covers only fragmentation when it is induced by SFC=20
>>>>>>>>> operations, it does not discuss the treatment of a fragment=20
>>>>>>>>> when received in an SFC domain. IMHO, the draft should also=20
>>>>>>>>> specify the behavior of the Classifier with regards to=20
>>>>>>>>> fragments for the sake of proper SFC operation. Applying=20
>>>>>>>>> classification policies may require the
>>>>>>>> full packet, not only a fragment.
>>>>>>>>> In particular, dedicated resources should dedicated for=20
>>>>>>>>> handling out of order fragments. Of course, it is out of scope=20
>>>>>>>>> of this document to describe how SFs handle fragments.
>>>>>>>>>
>>>>>>>>> * If an SFC header is prepended for all fragments, I'm not=20
>>>>>>>>> sure there is any particular issue at the SFF level...except=20
>>>>>>>>> if stripping/adding context TLVs depends on the full packet=20
>>>>>>>>> (not just fragment). It is warranted to consider a little bit=20
>>>>>>>>> this point before declaring there
>>>>>> is
>>>>>>>> no issue.
>>>>>>>>>
>>>>>>>>> * The text states "several options". This may be interpreted=20
>>>>>>>>> as if implementing one of them is sufficient...which is not=20
>>>>>>>>> true. The first two points contribute to minimize the=20
>>>>>>>>> fragmentation risk, but fragmentation may still be experienced=20
>>>>>>>>> (e.g., other shims are prepended by other nodes for some other=20
>>>>>>>>> purposes, nested nsh, etc.)
>>>>>>>>>
>>>>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>>>>
>>>>>>>>> * The support of jumbo frames by a router/device does not mean=20
>>>>>>>>> that it can make use of it. Appropriate MTU configuration=20
>>>>>>>>> should be undertaken in a consistent manner within an SFC=20
>>>>>>>>> domain. The text should be updated to make it is about
>>>>>>>>> (consistent) MTU
>>>>> configuration.
>>>>>>>>>
>>>>>>>>> * BTW, shouldn't the text be reworded to recommended to=20
>>>>>>>>> increase the MTU of **all nodes** of an SFC-enabled domain by=20
>>>>>>>>> at least the length of SFC header + transport header?
>>>>>>>>>
>>>>>>>>> * Bullet 2, how PMTU discovery is actually used in this=20
>>>>>>>>> context? Do you assume that all SFC-aware nodes will issue=20
>>>>>>>>> such messages towards other SFC-aware node, arbitrary=20
>>>>>>>>> destination, else?
>>>>>>>>>
>>>>>>>>> * Bullet 2, I would drop "describes a technique for=20
>>>>>>>>> dynamically discovering the maximum transmission unit
>>>>>>>>> (MTU) of an arbitrary internet path".
>>>>>>>>>
>>>>>>>>> * Bullet 2, s/ the the/the.
>>>>>>>>>
>>>>>>>>> * The reference to the LISP specification raises two concerns=20
>>>>>>>>> and one comment:
>>>>>>>>>
>>>>>>>>> (1) I don't think it is a good approach that fragments induced=20
>>>>>>>>> by the network are passed to their ultimate destinations as=20
>>>>>>>>> such
>>>>> (stateless).
>>>>>>>>> IMO, reassembly should be done within the SFC domain=20
>>>>>>>>> (responsible for fragmentation) not passed away. (2) Does the=20
>>>>>>>>> stateful mode require all SFC data plane elements maintain a=20
>>>>>>>>> full list of MTU for the any SFF/SF instance of the SFC
>>>>>>>> domain?
>>>>>>>>>
>>>>>>>>> The current text suggests that [RFC6830] should be listed as=20
>>>>>>>>> normative reference (not an informative one). I would=20
>>>>>>>>> personally favor removing the reference to LISP (as it is an=20
>>>>>>>>> Experimental RFC).
>>>>>>>>>
>>>>>>>>> * The security section of the draft may be augmented with=20
>>>>>>>>> informational fragmentation-related pointers to:
>>>>>>>>> e.g., RFC1858 (Security Considerations for IP Fragment=20
>>>>>>>>> Filtering), RFC3128 (Protection Against a Variant of the Tiny=20
>>>>>>>>> Fragment Attack), and RFC 4963 (IPv4 Reassembly Errors at High=20
>>>>>>>>> Data Rates).
>>>>>>>>>
>>>>>>>>> Cheers, Med
>>>>>>>>>
>>>>>>>>>> -----Message d'origine----- De : sfc=20
>>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de=20
>>>>>>>>>> mohamed.boucadair@orange.com Envoy=E9 : lundi 11 avril
>>>>>>>>>> 2016 13:14 =C0 : Thomas Narten; sfc@ietf.org Objet : Re:
>>>>>>>>>> [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>
>>>>>>>>>> Dear Thomas, all,
>>>>>>>>>>
>>>>>>>>>> As I mentioned during the meeting, there are several issues=20
>>>>>>>>>> that are not covered in the last version of the draft. I=20
>>>>>>>>>> already provided examples of the issues offline as requested=20
>>>>>>>>>> by Martin.
>>>>>>>>>>
>>>>>>>>>> Cheers, Med
>>>>>>>>>>
>>>>>>>>>>> -----Message d'origine----- De : sfc=20
>>>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten=20
>>>>>>>>>>> Envoy=E9 : jeudi 31 mars 2016 04:48 =C0 :
>>>>>>>>>>> sfc@ietf.org Objet : [sfc] WG last call for=20
>>>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>>
>>>>>>>>>>> Dear WG:
>>>>>>>>>>>
>>>>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt=20
>>>>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>> The editors of the NSH document have indicated that they have
>>>>>>>>>>> addressed all known comments and that there are no open=20
>>>>>>>>>>> issues with the current version of the document.
>>>>>>>>>>>
>>>>>>>>>>> Substantive comments to the list please, editorial comments=20
>>>>>>>>>>> can go directly to the document editors.
>>>>>>>>>>>
>>>>>>>>>>> We'll also get a brief update from the editors at next=20
>>>>>>>>>>> week's meeting. If there are any remaining issues with the=20
>>>>>>>>>>> document, raising them before the meeting would be=20
>>>>>>>>>>> especially helpful.
>>>>>>>>>>>
>>>>>>>>>>> For the chairs, Thomas
>>>>>>>>>>>
>>>>>>>>>>> _______________________________________________ sfc mailing=20
>>>>>>>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>>
>>>>>>>>>> _______________________________________________ sfc mailing=20
>>>>>>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>
>>>>>>>>> _______________________________________________ sfc mailing=20
>>>>>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>
>>>>>>>> _______________________________________________ sfc mailing=20
>>>>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>>> _______________________________________________ sfc mailing list=20
>>>>>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>
>>>>>
>>>>> _______________________________________________ sfc mailing list=20
>>>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>
>>>> _______________________________________________ sfc mailing list=20
>>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>
>


From nobody Wed Apr 27 16:03:12 2016
Return-Path: <agmalis@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4951912B048 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 16:03:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9CANkdsvUGvp for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 16:03:06 -0700 (PDT)
Received: from mail-oi0-x22b.google.com (mail-oi0-x22b.google.com [IPv6:2607:f8b0:4003:c06::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6466812D19B for <sfc@ietf.org>; Wed, 27 Apr 2016 16:03:04 -0700 (PDT)
Received: by mail-oi0-x22b.google.com with SMTP id v145so32591906oie.0 for <sfc@ietf.org>; Wed, 27 Apr 2016 16:03:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=qu00wJRBT3vSKsKZddz1E1Bw/pYOn4dTtRsp2GRPwoE=; b=07appwoHtvJ4ovkrOhcAtE9YBMWiEAntfIYIKkZGtEeWiu8Dy0gJXIg6jsoMP4DSnx 4QlBtqv6DJW/SaitWHS+Awy9c/YYqQDksc82bj1qH00hjBxB/ncEFvLUMslGwsmAhMKE aA8X/VsWP098TWhucrA4YZj0LsCDjfmNGd8CFrCdqgubuJd46cw2j9baxYCNR7PUrP0f yiugEDxM3qVY38VxGnjjcTvgDfIdpspVvCpidkwg4jQzMslc0txp1zX54AjetzkljRzC yWi5ci9TYXgT4G/PlFao0zo4OvZyn/Rf/f0M/CjrEwjV2w0m/pZzzsHgpjRhI9QvxSqQ lNfA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=qu00wJRBT3vSKsKZddz1E1Bw/pYOn4dTtRsp2GRPwoE=; b=R7+xsFCE7J2IvQwNIBXUASYka0u5lUeMh5BsbYH13R98uOvtyDZBsrJVliN1SpjsuG sMN8hOOk8vePhmdlMM3p4X/22bnL8m1RdSbFyzn2X3HPM7dGpBoFj66svDr9XucZHg4L n9lNnSf0MaW+qy1lg55qD5TfiTwG8P7nGKw1Ti+YFXGnXZ62zNayu/RT7FX7uYipEoJw pzk8nneEcm7sf5ySran9m4TLgKVr+BrEBDEFkvo+Atpl0hxY9g4pKHqCe70zdtNvjHCl 2wRZBKT0TiBhl+tc9djjjKqcV38mFxdmHmmDDyHPTcSoc9CoJaxie4uR1a3U+pZ8XNRR x0Ew==
X-Gm-Message-State: AOPr4FX0GBdEaCQgvcCgCRMjXvf3hAMAMIHC8yRSgG9YkFtQ0Y0/p+2icF3D+WQLF0iP9jH2DHeVGQedNW19OQ==
X-Received: by 10.157.48.98 with SMTP id w31mr4681377otd.61.1461798183556; Wed, 27 Apr 2016 16:03:03 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.182.231.106 with HTTP; Wed, 27 Apr 2016 16:02:44 -0700 (PDT)
In-Reply-To: <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb> <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com>
From: "Andrew G. Malis" <agmalis@gmail.com>
Date: Wed, 27 Apr 2016 19:02:44 -0400
Message-ID: <CAA=duU0cjXbTxTCqaRetajxFaJVfq8Y-HySPDrR-0AN38Wq3Zw@mail.gmail.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Content-Type: multipart/alternative; boundary=001a114187be76da1e05317f696d
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/oIk2RC1ys743R_2lVqGDvrCrqQ8>
Cc: "Elzur, Uri" <uri.elzur@intel.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 23:03:11 -0000

--001a114187be76da1e05317f696d
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Joel et al,

All this talk about fragmentation prompted me to re-read section 6 of the
draft, which recommends (as option 3) using the procedures in section 5.4
of RFC 6830 (presumably with the =E2=80=9CNSH header=E2=80=9D replacing the=
 =E2=80=9CLISP header=E2=80=9D
in the description of the procedures in that section).

So that led me to read that section (and the LISP header definition in
section 5.1), and I see that LISP does fragmentation and reassembly
identically to IPv4, using the Fragment Offset field so that fragments can
be correctly reassembled in the proper order.

However, the NSH Header doesn=E2=80=99t have a Fragment Offset field or any=
 other
way to order the fragments.

So how can the procedures in Section 5.4 of 6830 be used?

Thanks,
Andy

On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern <jmh@joelhalpern.com>
wrote:

> Both methods are valid, and both depend upon details of the underlying
> packet and the transport.  As such, I don't see why this document benefit=
s
> from describing them, much less why it should mark one method as a
> "should".  Implementation details are likely to be more significant than
> any bit consumption difference between the two alternatives.
>
> Yours,
> Joel
>
>
> On 4/27/16 3:40 PM, Linda Dunbar wrote:
>
>> I suggest adding the following paragraphs after the Bullet 3 of the
>> Section 6 Fragmentation Consideration to make the process more clear and
>> less controversial:
>>
>>
>> --------------------------------
>>
>> RFC6830 describes the fragmentation method of breaking the original
>> packet into two equal sub-frames and encapsulating [LISP Header + Transp=
ort
>> header] to each sub-frame.
>>
>> If LISP fragmentation [RFC6830 Section 5.4] is used, the [SFC Header +
>> Transport Header] will be added to each half frame (or the original data
>> frame). As the Transport Header is terminated by the next SFF node's tun=
nel
>> transport layer, the combined two sub-frames will have two SFC Headers.
>>
>> Therefore, the fragmentation for NSH encapsulated data frame should be
>> done completely by the node tunnel transport layer, which should break t=
he
>> [SFC + original packet] into two equal sub-frames and each sub-frame bei=
ng
>> encapsulated with its respective tunnel header.  The next SFF node's tun=
nel
>> transport layer should combine the two sub-frames before sending to the
>> next node.
>>
>> ------------------------------------------------------
>>
>>
>> By the way, there are to typo in the Section 6:
>> 3rd line: "In order the" =3D=3D> "In order to"
>> Last line of Bullet 2: extra "the" in the "utilized to ensure the the
>> required packet".
>>
>>
>> Hope it helps.
>>
>> Linda
>>
>>
>>
>> -----Original Message-----
>> From: mohamed.boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
>> Sent: Wednesday, April 27, 2016 12:40 AM
>> To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; sfc@ietf.org
>> Subject: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Hi Joel, all,
>>
>> Please see inline.
>>
>> Cheers,
>> Med
>>
>> -----Message d'origine-----
>>> De : Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoy=C3=A9 : mardi 2=
6
>>> avril 2016 19:18 =C3=80 : Linda Dunbar; BOUCADAIR Mohamed IMT/OLN; Elzu=
r,
>>> Uri; sfc@ietf.org Objet : Re: [sfc] WG last call for
>>> draft-ietf-sfc-nsh-04.txt
>>>
>>> With regard to Transport tunnel fragementation, that seems an issue
>>> for the transport protocol.  I don't actually object to a sentence,
>>> but it does not seem that it will accomplish anything.
>>>
>>
>> [Med] I would like to see some text added to the draft.
>>
>>
>>> With regard to packets fragmented by the source, I completely disagree
>>> with your assertion.  If an SFF were to reassemble the packets, that
>>> would be a violation of its job.
>>>
>>
>> [Med] I agree with you.
>>
>>   There is no reason for an SFF to
>>
>>> reassemble a packet fragmented by the source.  The classifier may have
>>> to do some interesting things in order to properly classify succeeding
>>> fragments, but that is an implementation issue (most commonly
>>> addressed with virtual reassembly, which doe snot delay the
>>> fragments.)  We don't specity that.
>>>
>>
>> [Med] Still, the external behavior of the classifier needs to be clear i=
n
>> the document. I don't find any text in the draft saying for instance tha=
t
>> an NSH header must be present in all fragments. (There some processing t=
hat
>> might be needed at the SFF to "do its job" with regards to fragments
>> (receive out of order fragments + forwarding policy on the full packet).=
)
>>
>>
>>> If an SF needs to reassemble fragments to do its job, that is up to
>>> the SF.  Some will need to actually reassemble.  Some will need to
>>> perform virtual reassembly, and some will happily process the
>>> fragments.  I can not see what the NSH document could possibly mandate.
>>>
>>
>> [Med] Fully agree.
>>
>>
>>> Yours,
>>> Joel
>>>
>>> On 4/26/16 11:47 AM, Linda Dunbar wrote:
>>>
>>>> Joel,
>>>>
>>>> I think the document should add the description on the following two
>>>> fragmentation scenarios:
>>>>
>>>> - Transport tunnel generated fragmentation: When a packet
>>>> fragmentation is caused by transport tunnel (i.e. various
>>>> encapsulations), the termination point of the transport tunnel is
>>>> responsible for re-assembling the fragmented pieces of the packet.
>>>> Since there won't be any SFF nodes in between the Transport Tunnel,
>>>> the tunnel generated fragmentation does not require any actions by
>>>> SFF nodes or SF nodes.
>>>>
>>>>
>>>> - Source node generated fragmentation (after adding on the NSH
>>>> header): When fragmentation has to be performed for a packet being
>>>> encapsulated with the NSH header, either the intermediate SFF nodes
>>>> or the SF nodes have to be able to reassemble the fragmented pieces.
>>>>
>>>>
>>>>
>>>>
>>>> Cheers,
>>>>
>>>>
>>>> Linda
>>>>
>>>> -----Original Message----- From: Joel M. Halpern
>>>> [mailto:jmh@joelhalpern.com] Sent: Tuesday, April 26, 2016 10:33 AM
>>>> To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri;
>>>> sfc@ietf.org Subject: Re: [sfc] WG last call for
>>>> draft-ietf-sfc-nsh-04.txt
>>>>
>>>> Re-reading your note, it is possible that you are referring only to
>>>> the case of transport generated fragmentation of the outer packet.
>>>> I had assumed you were not talking about that, since the resulting
>>>> fragments will not all have NSH headers.  As with any tunnel
>>>> technology, if the tunnel chooses to fragment at its layer, then the
>>>> tunnel is responsible for reassembly.  That would be invisible to
>>>> the SFF.
>>>>
>>>> Yours, Joel
>>>>
>>>> On 4/26/16 11:10 AM, Linda Dunbar wrote:
>>>>
>>>>> Agree with Med.
>>>>>
>>>>> Even if each fragment piece of a packet with NSH header carries the
>>>>> NSH header, the intermediate SFF nodes still need to put together
>>>>> all the fragments together before passing the whole data frame to
>>>>> the SF.
>>>>>
>>>>> Linda
>>>>>
>>>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]
>>>>> On Behalf Of mohamed.boucadair@orange.com Sent: Monday, April 25,
>>>>> 2016 9:42 AM To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org Subject:
>>>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>
>>>>> Re-,
>>>>>
>>>>> How do you instruct the transport layer to ALWAYS prepend an NSH
>>>>> header even for fragments? Or you don't care about that?
>>>>>
>>>>> Thank you.
>>>>>
>>>>> Cheers, Med
>>>>>
>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>> [mailto:uri.elzur@intel.com] Envoy=C3=A9 : lundi 25 avril 2016 16:26=
 =C3=80
>>>>>> : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; sfc@ietf.org Objet
>>>>>> : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Hi Med
>>>>>>
>>>>>> Not to repeat my position, but I'll do it anyhow :-) As NSH is
>>>>>> *NOT* a transport, dealing with fragmentation is left to the
>>>>>> Transport used.
>>>>>>
>>>>>> The model I use for NSH, is basically similar to VXLAN . It is an
>>>>>> overly.
>>>>>>
>>>>>> Thx
>>>>>>
>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>
>>>>>>
>>>>>> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]
>>>>>> On Behalf Of mohamed.boucadair@orange.com Sent: Monday, April 25,
>>>>>> 2016 7:18 AM To: Joel M. Halpern <jmh@joelhalpern.com>;
>>>>>> sfc@ietf.org
>>>>>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>
>>>>>> Hi Joel,
>>>>>>
>>>>>> Please see inline.
>>>>>>
>>>>>> Cheers, Med
>>>>>>
>>>>>> -----Message d'origine----- De : Joel M. Halpern
>>>>>>> [mailto:jmh@joelhalpern.com] Envoy=C3=A9 : lundi 25 avril 2016 15:4=
8 =C3=80
>>>>>>> : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet : Re: [sfc] WG
>>>>>>> last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>
>>>>>>> If I am understanding you correctly Med, you are asking that the
>>>>>>> NSH draft specify how service chaining should cope with packets
>>>>>>> that have been fragmented?
>>>>>>>
>>>>>>>
>>>>>> [Med] To be accurate, I'm asking to assess whether there are
>>>>>> implications. If there are, then the draft should be updated
>>>>>> accordingly.
>>>>>>
>>>>>> NSH, and the SFF functionality, does not care.
>>>>>>>
>>>>>>
>>>>>> [Med] I'm not that sure. Some typical implications are listed
>>>>>> below:
>>>>>>
>>>>>> * SFF: If the NSH header is present only in the a fragment but SFF
>>>>>> didn't maintained a state, subsequent fragments won't be
>>>>>> appropriately processed. * SFC-aware function: if prepending a
>>>>>> context information depends on the full packet, not only a
>>>>>> fragment.
>>>>>>
>>>>>> It just does its job.
>>>>>>
>>>>>> [Med] which may be disturbed in some situations as listed in the
>>>>>> examples above.
>>>>>>
>>>>>> Ingress and intermediate classifiers may cope with fragments in
>>>>>>> any number of ways.
>>>>>>>
>>>>>> Specifying such is clearly out of scope for this draft.
>>>>>>
>>>>>> [Med] The purpose is not to specify the internal implementation
>>>>>> details but the external behavior of the classifier function when
>>>>>> it comes to handle fragments. That behavior may have an incidence
>>>>>> on SFF, in particular. The purpose is not to recommend the maximum
>>>>>> resources to be dedicated to out of order fragments nor the
>>>>>> timeout to cache those; these considerations are of course out of
>>>>>> scope. Nevertheless, an implementation should offer a configurable
>>>>>> parameter so that an operator tweak those according to its
>>>>>> context.
>>>>>>
>>>>>> I suppose one could write an informational draft on possible ways
>>>>>>> of coping.  The IETF has not usually published such.
>>>>>>> Service functions have to cope with fragmented packets just as
>>>>>>> they had to before the advent of NSH, so describing that is
>>>>>>> clearly not needed here.
>>>>>>>
>>>>>>
>>>>>> [Med] The advent of NSH has the following implications: * it
>>>>>> exacerbates fragmentation. Handing over this issue to the
>>>>>> transport layer may lead to interoperability issues. * the
>>>>>> chaining may not be efficient if fragments are inappropriately
>>>>>> handled.
>>>>>>
>>>>>> Introducing NSH should not degrade the overall service compared to
>>>>>> legacy service deployment schemes.
>>>>>>
>>>>>>
>>>>>>> Yours, Joel
>>>>>>>
>>>>>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
>>>>>>>
>>>>>>>> Re-,
>>>>>>>>
>>>>>>>> I hear you, but my comment is that we need, as a WG, to decide
>>>>>>>> what to
>>>>>>>>
>>>>>>> put in the draft. FWIW, I'm discussing two fragmentation
>>>>>>> issues:
>>>>>>>
>>>>>>>>
>>>>>>>> (1) Fragmentation that is caused by prepending an SFC header.
>>>>>>>> (2) Handling fragments at the ingress of an SFC-enabled domain.
>>>>>>>>
>>>>>>>> Increasing the MTU is for sure a recommendation is to be
>>>>>>>> explicitly
>>>>>>>>
>>>>>>> called out in the text (see my first message).
>>>>>>>
>>>>>>>>
>>>>>>>> There are other issues that need to be discussed, e.g., how to
>>>>>>>> deal with
>>>>>>>>
>>>>>>> fragments in SFFs/Classifiers?
>>>>>>>
>>>>>>>>
>>>>>>>> It is also "prudent" to check that no issues will be experienced
>>>>>>>> in SFF
>>>>>>>>
>>>>>>> to handle fragments. If an SFC header is prepended for all
>>>>>>> fragments, I'm not sure there
>>>>>>>
>>>>>>>> is any particular issue at the SFF level, except if
>>>>>>>> stripping/adding
>>>>>>>>
>>>>>>> context TLVs depends on the full packet (not just fragment). It
>>>>>>> is warranted to consider a little bit this point before declaring
>>>>>>> there is no issue.
>>>>>>>
>>>>>>>>
>>>>>>>> For point (1), declaring fragmentation out of scope would be
>>>>>>>> meant that
>>>>>>>>
>>>>>>> an implementation must be prepared to receive fragments with or
>>>>>>> without NSH header as this is a decision that is left to the
>>>>>>> transport encapsulation. This is a requirement per se!
>>>>>>>
>>>>>>>>
>>>>>>>> I won't reiterate all the comments I have about the current
>>>>>>>> wording of
>>>>>>>>
>>>>>>> this section.
>>>>>>>
>>>>>>>>
>>>>>>>> Cheers, Med
>>>>>>>>
>>>>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>>>>> [mailto:uri.elzur@intel.com] Envoy=C3=A9 : lundi 25 avril 2016
>>>>>>>>> 08:30 =C3=80 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> Hi Med
>>>>>>>>>
>>>>>>>>> My point is that Fragmentation is yet another transport related
>>>>>>>>> issue
>>>>>>>>>
>>>>>>>> that
>>>>>>>
>>>>>>>> is beyond the scope of NSH and beyond the charter of the WG, so
>>>>>>>>> it
>>>>>>>>>
>>>>>>>> doesn't
>>>>>>>
>>>>>>>> really belong in the draft. We are providing an advice as
>>>>>>>>> extending the size of the packet may lead to fragmentation, but
>>>>>>>>> as you check RFC 7348 VxLAN, which my create the same issue,
>>>>>>>>> you'll find it doesn't even
>>>>>>>>>
>>>>>>>> relate
>>>>>>>
>>>>>>>> to it.
>>>>>>>>>
>>>>>>>>> Thx
>>>>>>>>>
>>>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> -----Original Message----- From: sfc
>>>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>>>> mohamed.boucadair@orange.com Sent: Sunday, April 24, 2016
>>>>>>>>> 10:32 PM To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
>>>>>>>>>
>>>>>>>> <narten@us.ibm.com>;
>>>>>>>
>>>>>>>> sfc@ietf.org Subject: Re: [sfc] WG last call for
>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>
>>>>>>>>> Hi Uri,
>>>>>>>>>
>>>>>>>>> That's another option that needs to be discussed/investigated.
>>>>>>>>> I'm
>>>>>>>>>
>>>>>>>> afraid
>>>>>>>
>>>>>>>> this is not the rationale adopted in -04 since it includes some
>>>>>>>>> text
>>>>>>>>>
>>>>>>>> that
>>>>>>>
>>>>>>>> is far to be sufficient to ensure interoperable
>>>>>>>>> implementations.
>>>>>>>>>
>>>>>>>>> BTW, saying that nsh does not need to deal with fragmentation
>>>>>>>>> because
>>>>>>>>>
>>>>>>>> it
>>>>>>>
>>>>>>>> is transport-independent is not IMHO a good strategy to adopt
>>>>>>>>> here
>>>>>>>>>
>>>>>>>> because
>>>>>>>
>>>>>>>> it opens the door for interoperable issues, it may lead to
>>>>>>>>> sub-optimal implementations if the sfc information is present
>>>>>>>>> only in one
>>>>>>>>>
>>>>>>>> fragments,
>>>>>>>
>>>>>>>> etc.
>>>>>>>>>
>>>>>>>>> My comments are related to the current text in the -04.
>>>>>>>>> This text needs
>>>>>>>>>
>>>>>>>> to
>>>>>>>
>>>>>>>> be fixed somehow.
>>>>>>>>>
>>>>>>>>> Cheers, Med
>>>>>>>>>
>>>>>>>>> -----Message d'origine----- De : Elzur, Uri
>>>>>>>>>> [mailto:uri.elzur@intel.com] Envoy=C3=A9 : dimanche 24 avril
>>>>>>>>>> 2016 17:36 =C3=80 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
>>>>>>>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
>>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>
>>>>>>>>>> Hi Med
>>>>>>>>>>
>>>>>>>>>> I see no need to specify the exact behavior as NSH is
>>>>>>>>>> transport independent i.e. like NSH interaction with any other
>>>>>>>>>> Transport eh issue of Fragmentation is to be dealt in a way
>>>>>>>>>> that matches the mechanisms supported by the Transport used
>>>>>>>>>> and do not belong in the NSH draft
>>>>>>>>>>
>>>>>>>>>> Thx
>>>>>>>>>>
>>>>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> -----Original Message----- From: sfc
>>>>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
>>>>>>>>>> mohamed.boucadair@orange.com Sent: Thursday, April 14,
>>>>>>>>>> 2016 12:43 AM To: Thomas Narten <narten@us.ibm.com>;
>>>>>>>>>> sfc@ietf.org Subject: Re: [sfc] WG last call for
>>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>
>>>>>>>>>> R-,
>>>>>>>>>>
>>>>>>>>>> In addition to other pending issues raised for this draft, I
>>>>>>>>>> would like to raise this additional one about Section 6.
>>>>>>>>>>
>>>>>>>>>> =3D=3D 6.  Fragmentation Considerations
>>>>>>>>>>
>>>>>>>>>> NSH and the associated transport header are "added" to the
>>>>>>>>>> encapsulated packet/frame.  This additional information
>>>>>>>>>> increases
>>>>>>>>>>
>>>>>>>>> the
>>>>>>>
>>>>>>>> size of the packet.  In order the ensure proper forwarding of
>>>>>>>>>> NSH data, several options for handling fragmentation and
>>>>>>>>>> re-assembly exist:
>>>>>>>>>>
>>>>>>>>>> 1.  Jumbo Frames, when supported, enable the transport of NSH
>>>>>>>>>> and associated transport packets without requiring
>>>>>>>>>> fragmentation.
>>>>>>>>>>
>>>>>>>>>> 2.  Path MTU Discovery [RFC1191]"describes a technique for
>>>>>>>>>> dynamically discovering the maximum transmission unit (MTU) of
>>>>>>>>>>
>>>>>>>>> an
>>>>>>>
>>>>>>>> arbitrary internet path" and can be utilized to ensure the
>>>>>>>>>>
>>>>>>>>> the
>>>>>>
>>>>>>> required packet size is used.
>>>>>>>>>>
>>>>>>>>>> 3.  [RFC6830] describes two schemes for fragmentation and
>>>>>>>>>> re-
>>>>>>>>>>
>>>>>>>>> assembly
>>>>>>>
>>>>>>>> in section 5.4. =3D=3D
>>>>>>>>>>
>>>>>>>>>> * The text is weak for a Standard track document that is
>>>>>>>>>> intended to solve the problem in
>>>>>>>>>> https://tools.ietf.org/html/rfc7498#section-
>>>>>>>>>>
>>>>>>>>> 2.12.
>>>>>>
>>>>>>> There should be a clear behavior to be followed by an
>>>>>>>>>>
>>>>>>>>> implementation.
>>>>>>
>>>>>>> Further, I would avoid the use of words such as "can".
>>>>>>>>>>
>>>>>>>>>> * The text covers only fragmentation when it is induced by SFC
>>>>>>>>>> operations, it does not discuss the treatment of a fragment
>>>>>>>>>> when received in an SFC domain. IMHO, the draft should also
>>>>>>>>>> specify the behavior of the Classifier with regards to
>>>>>>>>>> fragments for the sake of proper SFC operation. Applying
>>>>>>>>>> classification policies may require the
>>>>>>>>>>
>>>>>>>>> full packet, not only a fragment.
>>>>>>>>>
>>>>>>>>>> In particular, dedicated resources should dedicated for
>>>>>>>>>> handling out of order fragments. Of course, it is out of scope
>>>>>>>>>> of this document to describe how SFs handle fragments.
>>>>>>>>>>
>>>>>>>>>> * If an SFC header is prepended for all fragments, I'm not
>>>>>>>>>> sure there is any particular issue at the SFF level...except
>>>>>>>>>> if stripping/adding context TLVs depends on the full packet
>>>>>>>>>> (not just fragment). It is warranted to consider a little bit
>>>>>>>>>> this point before declaring there
>>>>>>>>>>
>>>>>>>>> is
>>>>>>>
>>>>>>>> no issue.
>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> * The text states "several options". This may be interpreted
>>>>>>>>>> as if implementing one of them is sufficient...which is not
>>>>>>>>>> true. The first two points contribute to minimize the
>>>>>>>>>> fragmentation risk, but fragmentation may still be experienced
>>>>>>>>>> (e.g., other shims are prepended by other nodes for some other
>>>>>>>>>> purposes, nested nsh, etc.)
>>>>>>>>>>
>>>>>>>>>> * The first two points have nothing to do with reassembly.
>>>>>>>>>>
>>>>>>>>>> * The support of jumbo frames by a router/device does not mean
>>>>>>>>>> that it can make use of it. Appropriate MTU configuration
>>>>>>>>>> should be undertaken in a consistent manner within an SFC
>>>>>>>>>> domain. The text should be updated to make it is about
>>>>>>>>>> (consistent) MTU
>>>>>>>>>>
>>>>>>>>> configuration.
>>>>>>
>>>>>>>
>>>>>>>>>> * BTW, shouldn't the text be reworded to recommended to
>>>>>>>>>> increase the MTU of **all nodes** of an SFC-enabled domain by
>>>>>>>>>> at least the length of SFC header + transport header?
>>>>>>>>>>
>>>>>>>>>> * Bullet 2, how PMTU discovery is actually used in this
>>>>>>>>>> context? Do you assume that all SFC-aware nodes will issue
>>>>>>>>>> such messages towards other SFC-aware node, arbitrary
>>>>>>>>>> destination, else?
>>>>>>>>>>
>>>>>>>>>> * Bullet 2, I would drop "describes a technique for
>>>>>>>>>> dynamically discovering the maximum transmission unit
>>>>>>>>>> (MTU) of an arbitrary internet path".
>>>>>>>>>>
>>>>>>>>>> * Bullet 2, s/ the the/the.
>>>>>>>>>>
>>>>>>>>>> * The reference to the LISP specification raises two concerns
>>>>>>>>>> and one comment:
>>>>>>>>>>
>>>>>>>>>> (1) I don't think it is a good approach that fragments induced
>>>>>>>>>> by the network are passed to their ultimate destinations as
>>>>>>>>>> such
>>>>>>>>>>
>>>>>>>>> (stateless).
>>>>>>
>>>>>>> IMO, reassembly should be done within the SFC domain
>>>>>>>>>> (responsible for fragmentation) not passed away. (2) Does the
>>>>>>>>>> stateful mode require all SFC data plane elements maintain a
>>>>>>>>>> full list of MTU for the any SFF/SF instance of the SFC
>>>>>>>>>>
>>>>>>>>> domain?
>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> The current text suggests that [RFC6830] should be listed as
>>>>>>>>>> normative reference (not an informative one). I would
>>>>>>>>>> personally favor removing the reference to LISP (as it is an
>>>>>>>>>> Experimental RFC).
>>>>>>>>>>
>>>>>>>>>> * The security section of the draft may be augmented with
>>>>>>>>>> informational fragmentation-related pointers to:
>>>>>>>>>> e.g., RFC1858 (Security Considerations for IP Fragment
>>>>>>>>>> Filtering), RFC3128 (Protection Against a Variant of the Tiny
>>>>>>>>>> Fragment Attack), and RFC 4963 (IPv4 Reassembly Errors at High
>>>>>>>>>> Data Rates).
>>>>>>>>>>
>>>>>>>>>> Cheers, Med
>>>>>>>>>>
>>>>>>>>>> -----Message d'origine----- De : sfc
>>>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de
>>>>>>>>>>> mohamed.boucadair@orange.com Envoy=C3=A9 : lundi 11 avril
>>>>>>>>>>> 2016 13:14 =C3=80 : Thomas Narten; sfc@ietf.org Objet : Re:
>>>>>>>>>>> [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>>
>>>>>>>>>>> Dear Thomas, all,
>>>>>>>>>>>
>>>>>>>>>>> As I mentioned during the meeting, there are several issues
>>>>>>>>>>> that are not covered in the last version of the draft. I
>>>>>>>>>>> already provided examples of the issues offline as requested
>>>>>>>>>>> by Martin.
>>>>>>>>>>>
>>>>>>>>>>> Cheers, Med
>>>>>>>>>>>
>>>>>>>>>>> -----Message d'origine----- De : sfc
>>>>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten
>>>>>>>>>>>> Envoy=C3=A9 : jeudi 31 mars 2016 04:48 =C3=80 :
>>>>>>>>>>>> sfc@ietf.org Objet : [sfc] WG last call for
>>>>>>>>>>>> draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>>>
>>>>>>>>>>>> Dear WG:
>>>>>>>>>>>>
>>>>>>>>>>>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
>>>>>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> The editors of the NSH document have indicated that they have
>>>
>>>> addressed all known comments and that there are no open
>>>>>>>>>>>> issues with the current version of the document.
>>>>>>>>>>>>
>>>>>>>>>>>> Substantive comments to the list please, editorial comments
>>>>>>>>>>>> can go directly to the document editors.
>>>>>>>>>>>>
>>>>>>>>>>>> We'll also get a brief update from the editors at next
>>>>>>>>>>>> week's meeting. If there are any remaining issues with the
>>>>>>>>>>>> document, raising them before the meeting would be
>>>>>>>>>>>> especially helpful.
>>>>>>>>>>>>
>>>>>>>>>>>> For the chairs, Thomas
>>>>>>>>>>>>
>>>>>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>> _______________________________________________ sfc mailing
>>>>>>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>>
>>>>>>>>
>>>>>>>> _______________________________________________ sfc mailing list
>>>>>>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>>>>
>>>>>>>>
>>>>>> _______________________________________________ sfc mailing list
>>>>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>>
>>>>>
>>>>> _______________________________________________ sfc mailing list
>>>>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>>>>>
>>>>>
>>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>

--001a114187be76da1e05317f696d
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Joel et al,<div><br></div><div>All this talk about fragmen=
tation prompted me to re-read section 6 of the draft, which recommends (as =
option 3) using the procedures in section 5.4 of RFC 6830 (presumably with =
the =E2=80=9CNSH header=E2=80=9D replacing the =E2=80=9CLISP header=E2=80=
=9D in the description of the procedures in that section).</div><div><br></=
div><div>So that led me to read that section (and the LISP header definitio=
n in section 5.1), and I see that LISP does fragmentation and reassembly id=
entically to IPv4, using the Fragment Offset field so that fragments can be=
 correctly reassembled in the proper order.</div><div><br></div><div>Howeve=
r, the NSH Header doesn=E2=80=99t have a Fragment Offset field or any other=
 way to order the fragments.</div><div><br></div><div>So how can the proced=
ures in Section 5.4 of 6830 be used?</div><div><br></div><div>Thanks,</div>=
<div>Andy</div></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quo=
te">On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern <span dir=3D"ltr">&lt;=
<a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelhalpern.co=
m</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margi=
n:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Both methods are =
valid, and both depend upon details of the underlying packet and the transp=
ort.=C2=A0 As such, I don&#39;t see why this document benefits from describ=
ing them, much less why it should mark one method as a &quot;should&quot;.=
=C2=A0 Implementation details are likely to be more significant than any bi=
t consumption difference between the two alternatives.<br>
<br>
Yours,<br>
Joel<div class=3D"HOEnZb"><div class=3D"h5"><br>
<br>
On 4/27/16 3:40 PM, Linda Dunbar wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
I suggest adding the following paragraphs after the Bullet 3 of the Section=
 6 Fragmentation Consideration to make the process more clear and less cont=
roversial:<br>
<br>
<br>
--------------------------------<br>
<br>
RFC6830 describes the fragmentation method of breaking the original packet =
into two equal sub-frames and encapsulating [LISP Header + Transport header=
] to each sub-frame.<br>
<br>
If LISP fragmentation [RFC6830 Section 5.4] is used, the [SFC Header + Tran=
sport Header] will be added to each half frame (or the original data frame)=
. As the Transport Header is terminated by the next SFF node&#39;s tunnel t=
ransport layer, the combined two sub-frames will have two SFC Headers.<br>
<br>
Therefore, the fragmentation for NSH encapsulated data frame should be done=
 completely by the node tunnel transport layer, which should break the [SFC=
 + original packet] into two equal sub-frames and each sub-frame being enca=
psulated with its respective tunnel header.=C2=A0 The next SFF node&#39;s t=
unnel transport layer should combine the two sub-frames before sending to t=
he next node.<br>
<br>
------------------------------------------------------<br>
<br>
<br>
By the way, there are to typo in the Section 6:<br>
3rd line: &quot;In order the&quot; =3D=3D&gt; &quot;In order to&quot;<br>
Last line of Bullet 2: extra &quot;the&quot; in the &quot;utilized to ensur=
e the the required packet&quot;.<br>
<br>
<br>
Hope it helps.<br>
<br>
Linda<br>
<br>
<br>
<br>
-----Original Message-----<br>
From: <a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">moh=
amed.boucadair@orange.com</a> [mailto:<a href=3D"mailto:mohamed.boucadair@o=
range.com" target=3D"_blank">mohamed.boucadair@orange.com</a>]<br>
Sent: Wednesday, April 27, 2016 12:40 AM<br>
To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; <a href=3D"mailto:sfc@ietf.o=
rg" target=3D"_blank">sfc@ietf.org</a><br>
Subject: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
<br>
Hi Joel, all,<br>
<br>
Please see inline.<br>
<br>
Cheers,<br>
Med<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
-----Message d&#39;origine-----<br>
De : Joel M. Halpern [mailto:<a href=3D"mailto:jmh@joelhalpern.com" target=
=3D"_blank">jmh@joelhalpern.com</a>] Envoy=C3=A9 : mardi 26<br>
avril 2016 19:18 =C3=80 : Linda Dunbar; BOUCADAIR Mohamed IMT/OLN; Elzur,<b=
r>
Uri; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> Obj=
et : Re: [sfc] WG last call for<br>
draft-ietf-sfc-nsh-04.txt<br>
<br>
With regard to Transport tunnel fragementation, that seems an issue<br>
for the transport protocol.=C2=A0 I don&#39;t actually object to a sentence=
,<br>
but it does not seem that it will accomplish anything.<br>
</blockquote>
<br>
[Med] I would like to see some text added to the draft.<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
With regard to packets fragmented by the source, I completely disagree<br>
with your assertion.=C2=A0 If an SFF were to reassemble the packets, that<b=
r>
would be a violation of its job.<br>
</blockquote>
<br>
[Med] I agree with you.<br>
<br>
=C2=A0 There is no reason for an SFF to<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
reassemble a packet fragmented by the source.=C2=A0 The classifier may have=
<br>
to do some interesting things in order to properly classify succeeding<br>
fragments, but that is an implementation issue (most commonly<br>
addressed with virtual reassembly, which doe snot delay the<br>
fragments.)=C2=A0 We don&#39;t specity that.<br>
</blockquote>
<br>
[Med] Still, the external behavior of the classifier needs to be clear in t=
he document. I don&#39;t find any text in the draft saying for instance tha=
t an NSH header must be present in all fragments. (There some processing th=
at might be needed at the SFF to &quot;do its job&quot; with regards to fra=
gments (receive out of order fragments + forwarding policy on the full pack=
et).)<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
If an SF needs to reassemble fragments to do its job, that is up to<br>
the SF.=C2=A0 Some will need to actually reassemble.=C2=A0 Some will need t=
o<br>
perform virtual reassembly, and some will happily process the<br>
fragments.=C2=A0 I can not see what the NSH document could possibly mandate=
.<br>
</blockquote>
<br>
[Med] Fully agree.<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
Yours,<br>
Joel<br>
<br>
On 4/26/16 11:47 AM, Linda Dunbar wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
Joel,<br>
<br>
I think the document should add the description on the following two<br>
fragmentation scenarios:<br>
<br>
- Transport tunnel generated fragmentation: When a packet<br>
fragmentation is caused by transport tunnel (i.e. various<br>
encapsulations), the termination point of the transport tunnel is<br>
responsible for re-assembling the fragmented pieces of the packet.<br>
Since there won&#39;t be any SFF nodes in between the Transport Tunnel,<br>
the tunnel generated fragmentation does not require any actions by<br>
SFF nodes or SF nodes.<br>
<br>
<br>
- Source node generated fragmentation (after adding on the NSH<br>
header): When fragmentation has to be performed for a packet being<br>
encapsulated with the NSH header, either the intermediate SFF nodes<br>
or the SF nodes have to be able to reassemble the fragmented pieces.<br>
<br>
<br>
<br>
<br>
Cheers,<br>
<br>
<br>
Linda<br>
<br>
-----Original Message----- From: Joel M. Halpern<br>
[mailto:<a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelha=
lpern.com</a>] Sent: Tuesday, April 26, 2016 10:33 AM<br>
To: Linda Dunbar; <a href=3D"mailto:mohamed.boucadair@orange.com" target=3D=
"_blank">mohamed.boucadair@orange.com</a>; Elzur, Uri;<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> Subject:=
 Re: [sfc] WG last call for<br>
draft-ietf-sfc-nsh-04.txt<br>
<br>
Re-reading your note, it is possible that you are referring only to<br>
the case of transport generated fragmentation of the outer packet.<br>
I had assumed you were not talking about that, since the resulting<br>
fragments will not all have NSH headers.=C2=A0 As with any tunnel<br>
technology, if the tunnel chooses to fragment at its layer, then the<br>
tunnel is responsible for reassembly.=C2=A0 That would be invisible to<br>
the SFF.<br>
<br>
Yours, Joel<br>
<br>
On 4/26/16 11:10 AM, Linda Dunbar wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
Agree with Med.<br>
<br>
Even if each fragment piece of a packet with NSH header carries the<br>
NSH header, the intermediate SFF nodes still need to put together<br>
all the fragments together before passing the whole data frame to<br>
the SF.<br>
<br>
Linda<br>
<br>
-----Original Message----- From: sfc [mailto:<a href=3D"mailto:sfc-bounces@=
ietf.org" target=3D"_blank">sfc-bounces@ietf.org</a>]<br>
On Behalf Of <a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_bla=
nk">mohamed.boucadair@orange.com</a> Sent: Monday, April 25,<br>
2016 9:42 AM To: Elzur, Uri; Joel M. Halpern; <a href=3D"mailto:sfc@ietf.or=
g" target=3D"_blank">sfc@ietf.org</a> Subject:<br>
Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
<br>
Re-,<br>
<br>
How do you instruct the transport layer to ALWAYS prepend an NSH<br>
header even for fragments? Or you don&#39;t care about that?<br>
<br>
Thank you.<br>
<br>
Cheers, Med<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
-----Message d&#39;origine----- De : Elzur, Uri<br>
[mailto:<a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@=
intel.com</a>] Envoy=C3=A9 : lundi 25 avril 2016 16:26 =C3=80<br>
: BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; <a href=3D"mailto:sfc@ietf.or=
g" target=3D"_blank">sfc@ietf.org</a> Objet<br>
: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
<br>
Hi Med<br>
<br>
Not to repeat my position, but I&#39;ll do it anyhow :-) As NSH is<br>
*NOT* a transport, dealing with fragmentation is left to the<br>
Transport used.<br>
<br>
The model I use for NSH, is basically similar to VXLAN . It is an<br>
overly.<br>
<br>
Thx<br>
<br>
Uri (&quot;Oo-Ree&quot;) C: <a href=3D"tel:949-378-7568" value=3D"+19493787=
568" target=3D"_blank">949-378-7568</a><br>
<br>
<br>
-----Original Message----- From: sfc [mailto:<a href=3D"mailto:sfc-bounces@=
ietf.org" target=3D"_blank">sfc-bounces@ietf.org</a>]<br>
On Behalf Of <a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_bla=
nk">mohamed.boucadair@orange.com</a> Sent: Monday, April 25,<br>
2016 7:18 AM To: Joel M. Halpern &lt;<a href=3D"mailto:jmh@joelhalpern.com"=
 target=3D"_blank">jmh@joelhalpern.com</a>&gt;;<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
<br>
Hi Joel,<br>
<br>
Please see inline.<br>
<br>
Cheers, Med<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
-----Message d&#39;origine----- De : Joel M. Halpern<br>
[mailto:<a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelha=
lpern.com</a>] Envoy=C3=A9 : lundi 25 avril 2016 15:48 =C3=80<br>
: BOUCADAIR Mohamed IMT/OLN; <a href=3D"mailto:sfc@ietf.org" target=3D"_bla=
nk">sfc@ietf.org</a> Objet : Re: [sfc] WG<br>
last call for draft-ietf-sfc-nsh-04.txt<br>
<br>
If I am understanding you correctly Med, you are asking that the<br>
NSH draft specify how service chaining should cope with packets<br>
that have been fragmented?<br>
<br>
</blockquote>
<br>
[Med] To be accurate, I&#39;m asking to assess whether there are<br>
implications. If there are, then the draft should be updated<br>
accordingly.<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
NSH, and the SFF functionality, does not care.<br>
</blockquote>
<br>
[Med] I&#39;m not that sure. Some typical implications are listed<br>
below:<br>
<br>
* SFF: If the NSH header is present only in the a fragment but SFF<br>
didn&#39;t maintained a state, subsequent fragments won&#39;t be<br>
appropriately processed. * SFC-aware function: if prepending a<br>
context information depends on the full packet, not only a<br>
fragment.<br>
<br>
It just does its job.<br>
<br>
[Med] which may be disturbed in some situations as listed in the<br>
examples above.<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
Ingress and intermediate classifiers may cope with fragments in<br>
any number of ways.<br>
</blockquote>
Specifying such is clearly out of scope for this draft.<br>
<br>
[Med] The purpose is not to specify the internal implementation<br>
details but the external behavior of the classifier function when<br>
it comes to handle fragments. That behavior may have an incidence<br>
on SFF, in particular. The purpose is not to recommend the maximum<br>
resources to be dedicated to out of order fragments nor the<br>
timeout to cache those; these considerations are of course out of<br>
scope. Nevertheless, an implementation should offer a configurable<br>
parameter so that an operator tweak those according to its<br>
context.<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
I suppose one could write an informational draft on possible ways<br>
of coping.=C2=A0 The IETF has not usually published such.<br>
Service functions have to cope with fragmented packets just as<br>
they had to before the advent of NSH, so describing that is<br>
clearly not needed here.<br>
</blockquote>
<br>
[Med] The advent of NSH has the following implications: * it<br>
exacerbates fragmentation. Handing over this issue to the<br>
transport layer may lead to interoperability issues. * the<br>
chaining may not be efficient if fragments are inappropriately<br>
handled.<br>
<br>
Introducing NSH should not degrade the overall service compared to<br>
legacy service deployment schemes.<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
Yours, Joel<br>
<br>
On 4/25/16 3:00 AM, <a href=3D"mailto:mohamed.boucadair@orange.com" target=
=3D"_blank">mohamed.boucadair@orange.com</a> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
Re-,<br>
<br>
I hear you, but my comment is that we need, as a WG, to decide<br>
what to<br>
</blockquote>
put in the draft. FWIW, I&#39;m discussing two fragmentation<br>
issues:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
(1) Fragmentation that is caused by prepending an SFC header.<br>
(2) Handling fragments at the ingress of an SFC-enabled domain.<br>
<br>
Increasing the MTU is for sure a recommendation is to be<br>
explicitly<br>
</blockquote>
called out in the text (see my first message).<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
There are other issues that need to be discussed, e.g., how to<br>
deal with<br>
</blockquote>
fragments in SFFs/Classifiers?<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
It is also &quot;prudent&quot; to check that no issues will be experienced<=
br>
in SFF<br>
</blockquote>
to handle fragments. If an SFC header is prepended for all<br>
fragments, I&#39;m not sure there<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
is any particular issue at the SFF level, except if<br>
stripping/adding<br>
</blockquote>
context TLVs depends on the full packet (not just fragment). It<br>
is warranted to consider a little bit this point before declaring<br>
there is no issue.<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
For point (1), declaring fragmentation out of scope would be<br>
meant that<br>
</blockquote>
an implementation must be prepared to receive fragments with or<br>
without NSH header as this is a decision that is left to the<br>
transport encapsulation. This is a requirement per se!<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
I won&#39;t reiterate all the comments I have about the current<br>
wording of<br>
</blockquote>
this section.<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
Cheers, Med<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
-----Message d&#39;origine----- De : Elzur, Uri<br>
[mailto:<a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@=
intel.com</a>] Envoy=C3=A9 : lundi 25 avril 2016<br>
08:30 =C3=80 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> Objet : =
RE: [sfc] WG last call for<br>
draft-ietf-sfc-nsh-04.txt<br>
<br>
Hi Med<br>
<br>
My point is that Fragmentation is yet another transport related<br>
issue<br>
</blockquote></blockquote>
that<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
is beyond the scope of NSH and beyond the charter of the WG, so<br>
it<br>
</blockquote></blockquote>
doesn&#39;t<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
really belong in the draft. We are providing an advice as<br>
extending the size of the packet may lead to fragmentation, but<br>
as you check RFC 7348 VxLAN, which my create the same issue,<br>
you&#39;ll find it doesn&#39;t even<br>
</blockquote></blockquote>
relate<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
to it.<br>
<br>
Thx<br>
<br>
Uri (&quot;Oo-Ree&quot;) C: <a href=3D"tel:949-378-7568" value=3D"+19493787=
568" target=3D"_blank">949-378-7568</a><br>
<br>
<br>
-----Original Message----- From: sfc<br>
[mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounc=
es@ietf.org</a>] On Behalf Of<br>
<a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">mohamed.b=
oucadair@orange.com</a> Sent: Sunday, April 24, 2016<br>
10:32 PM To: Elzur, Uri &lt;<a href=3D"mailto:uri.elzur@intel.com" target=
=3D"_blank">uri.elzur@intel.com</a>&gt;; Thomas Narten<br>
</blockquote></blockquote>
&lt;<a href=3D"mailto:narten@us.ibm.com" target=3D"_blank">narten@us.ibm.co=
m</a>&gt;;<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> Subject:=
 Re: [sfc] WG last call for<br>
draft-ietf-sfc-nsh-04.txt<br>
<br>
Hi Uri,<br>
<br>
That&#39;s another option that needs to be discussed/investigated.<br>
I&#39;m<br>
</blockquote></blockquote>
afraid<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
this is not the rationale adopted in -04 since it includes some<br>
text<br>
</blockquote></blockquote>
that<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
is far to be sufficient to ensure interoperable<br>
implementations.<br>
<br>
BTW, saying that nsh does not need to deal with fragmentation<br>
because<br>
</blockquote></blockquote>
it<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
is transport-independent is not IMHO a good strategy to adopt<br>
here<br>
</blockquote></blockquote>
because<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
it opens the door for interoperable issues, it may lead to<br>
sub-optimal implementations if the sfc information is present<br>
only in one<br>
</blockquote></blockquote>
fragments,<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
etc.<br>
<br>
My comments are related to the current text in the -04.<br>
This text needs<br>
</blockquote></blockquote>
to<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
be fixed somehow.<br>
<br>
Cheers, Med<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
-----Message d&#39;origine----- De : Elzur, Uri<br>
[mailto:<a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@=
intel.com</a>] Envoy=C3=A9 : dimanche 24 avril<br>
2016 17:36 =C3=80 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> Objet : =
RE: [sfc] WG last call for<br>
draft-ietf-sfc-nsh-04.txt<br>
<br>
Hi Med<br>
<br>
I see no need to specify the exact behavior as NSH is<br>
transport independent i.e. like NSH interaction with any other<br>
Transport eh issue of Fragmentation is to be dealt in a way<br>
that matches the mechanisms supported by the Transport used<br>
and do not belong in the NSH draft<br>
<br>
Thx<br>
<br>
Uri (&quot;Oo-Ree&quot;) C: <a href=3D"tel:949-378-7568" value=3D"+19493787=
568" target=3D"_blank">949-378-7568</a><br>
<br>
<br>
-----Original Message----- From: sfc<br>
[mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounc=
es@ietf.org</a>] On Behalf Of<br>
<a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">mohamed.b=
oucadair@orange.com</a> Sent: Thursday, April 14,<br>
2016 12:43 AM To: Thomas Narten &lt;<a href=3D"mailto:narten@us.ibm.com" ta=
rget=3D"_blank">narten@us.ibm.com</a>&gt;;<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> Subject:=
 Re: [sfc] WG last call for<br>
draft-ietf-sfc-nsh-04.txt<br>
<br>
R-,<br>
<br>
In addition to other pending issues raised for this draft, I<br>
would like to raise this additional one about Section 6.<br>
<br>
=3D=3D 6.=C2=A0 Fragmentation Considerations<br>
<br>
NSH and the associated transport header are &quot;added&quot; to the<br>
encapsulated packet/frame.=C2=A0 This additional information<br>
increases<br>
</blockquote></blockquote></blockquote>
the<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex">
size of the packet.=C2=A0 In order the ensure proper forwarding of<br>
NSH data, several options for handling fragmentation and<br>
re-assembly exist:<br>
<br>
1.=C2=A0 Jumbo Frames, when supported, enable the transport of NSH<br>
and associated transport packets without requiring<br>
fragmentation.<br>
<br>
2.=C2=A0 Path MTU Discovery [RFC1191]&quot;describes a technique for<br>
dynamically discovering the maximum transmission unit (MTU) of<br>
</blockquote></blockquote></blockquote>
an<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex">
arbitrary internet path&quot; and can be utilized to ensure the<br>
</blockquote></blockquote></blockquote></blockquote>
the<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex">
required packet size is used.<br>
<br>
3.=C2=A0 [RFC6830] describes two schemes for fragmentation and<br>
re-<br>
</blockquote></blockquote></blockquote>
assembly<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex">
in section 5.4. =3D=3D<br>
<br>
* The text is weak for a Standard track document that is<br>
intended to solve the problem in<br>
<a href=3D"https://tools.ietf.org/html/rfc7498#section-" rel=3D"noreferrer"=
 target=3D"_blank">https://tools.ietf.org/html/rfc7498#section-</a><br>
</blockquote></blockquote></blockquote></blockquote>
2.12.<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex">
There should be a clear behavior to be followed by an<br>
</blockquote></blockquote></blockquote></blockquote>
implementation.<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex">
Further, I would avoid the use of words such as &quot;can&quot;.<br>
<br>
* The text covers only fragmentation when it is induced by SFC<br>
operations, it does not discuss the treatment of a fragment<br>
when received in an SFC domain. IMHO, the draft should also<br>
specify the behavior of the Classifier with regards to<br>
fragments for the sake of proper SFC operation. Applying<br>
classification policies may require the<br>
</blockquote>
full packet, not only a fragment.<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
In particular, dedicated resources should dedicated for<br>
handling out of order fragments. Of course, it is out of scope<br>
of this document to describe how SFs handle fragments.<br>
<br>
* If an SFC header is prepended for all fragments, I&#39;m not<br>
sure there is any particular issue at the SFF level...except<br>
if stripping/adding context TLVs depends on the full packet<br>
(not just fragment). It is warranted to consider a little bit<br>
this point before declaring there<br>
</blockquote></blockquote></blockquote>
is<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
no issue.<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
* The text states &quot;several options&quot;. This may be interpreted<br>
as if implementing one of them is sufficient...which is not<br>
true. The first two points contribute to minimize the<br>
fragmentation risk, but fragmentation may still be experienced<br>
(e.g., other shims are prepended by other nodes for some other<br>
purposes, nested nsh, etc.)<br>
<br>
* The first two points have nothing to do with reassembly.<br>
<br>
* The support of jumbo frames by a router/device does not mean<br>
that it can make use of it. Appropriate MTU configuration<br>
should be undertaken in a consistent manner within an SFC<br>
domain. The text should be updated to make it is about<br>
(consistent) MTU<br>
</blockquote></blockquote></blockquote></blockquote>
configuration.<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex">
<br>
* BTW, shouldn&#39;t the text be reworded to recommended to<br>
increase the MTU of **all nodes** of an SFC-enabled domain by<br>
at least the length of SFC header + transport header?<br>
<br>
* Bullet 2, how PMTU discovery is actually used in this<br>
context? Do you assume that all SFC-aware nodes will issue<br>
such messages towards other SFC-aware node, arbitrary<br>
destination, else?<br>
<br>
* Bullet 2, I would drop &quot;describes a technique for<br>
dynamically discovering the maximum transmission unit<br>
(MTU) of an arbitrary internet path&quot;.<br>
<br>
* Bullet 2, s/ the the/the.<br>
<br>
* The reference to the LISP specification raises two concerns<br>
and one comment:<br>
<br>
(1) I don&#39;t think it is a good approach that fragments induced<br>
by the network are passed to their ultimate destinations as<br>
such<br>
</blockquote></blockquote></blockquote></blockquote>
(stateless).<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex">
IMO, reassembly should be done within the SFC domain<br>
(responsible for fragmentation) not passed away. (2) Does the<br>
stateful mode require all SFC data plane elements maintain a<br>
full list of MTU for the any SFF/SF instance of the SFC<br>
</blockquote>
domain?<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
The current text suggests that [RFC6830] should be listed as<br>
normative reference (not an informative one). I would<br>
personally favor removing the reference to LISP (as it is an<br>
Experimental RFC).<br>
<br>
* The security section of the draft may be augmented with<br>
informational fragmentation-related pointers to:<br>
e.g., RFC1858 (Security Considerations for IP Fragment<br>
Filtering), RFC3128 (Protection Against a Variant of the Tiny<br>
Fragment Attack), and RFC 4963 (IPv4 Reassembly Errors at High<br>
Data Rates).<br>
<br>
Cheers, Med<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
-----Message d&#39;origine----- De : sfc<br>
[mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounc=
es@ietf.org</a>] De la part de<br>
<a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">mohamed.b=
oucadair@orange.com</a> Envoy=C3=A9 : lundi 11 avril<br>
2016 13:14 =C3=80 : Thomas Narten; <a href=3D"mailto:sfc@ietf.org" target=
=3D"_blank">sfc@ietf.org</a> Objet : Re:<br>
[sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
<br>
Dear Thomas, all,<br>
<br>
As I mentioned during the meeting, there are several issues<br>
that are not covered in the last version of the draft. I<br>
already provided examples of the issues offline as requested<br>
by Martin.<br>
<br>
Cheers, Med<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
-----Message d&#39;origine----- De : sfc<br>
[mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounc=
es@ietf.org</a>] De la part de Thomas Narten<br>
Envoy=C3=A9 : jeudi 31 mars 2016 04:48 =C3=80 :<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> Objet : =
[sfc] WG last call for<br>
draft-ietf-sfc-nsh-04.txt<br>
<br>
Dear WG:<br>
<br>
This note begins a WG last call on draft-ietf-sfc-nsh-04.txt<br>
(<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/" rel=3D"no=
referrer" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-sfc=
-nsh/</a>).<br>
<br>
<br>
<br>
</blockquote></blockquote></blockquote></blockquote></blockquote></blockquo=
te></blockquote></blockquote></blockquote>
The editors of the NSH document have indicated that they have<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex"><blockquote class=3D"gmail=
_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:=
1ex"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-le=
ft:1px #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><blockqu=
ote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc s=
olid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"margin:0 =
0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
addressed all known comments and that there are no open<br>
issues with the current version of the document.<br>
<br>
Substantive comments to the list please, editorial comments<br>
can go directly to the document editors.<br>
<br>
We&#39;ll also get a brief update from the editors at next<br>
week&#39;s meeting. If there are any remaining issues with the<br>
document, raising them before the meeting would be<br>
especially helpful.<br>
<br>
For the chairs, Thomas<br>
<br>
_______________________________________________ sfc mailing<br>
list <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> <a =
href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" targe=
t=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
</blockquote>
<br>
_______________________________________________ sfc mailing<br>
list <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> <a =
href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" targe=
t=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
</blockquote>
<br>
_______________________________________________ sfc mailing<br>
list <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> <a =
href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" targe=
t=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
</blockquote>
<br>
_______________________________________________ sfc mailing<br>
list <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> <a =
href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" targe=
t=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
</blockquote>
<br>
_______________________________________________ sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> <a href=
=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" target=3D=
"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
</blockquote></blockquote>
<br>
_______________________________________________ sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> <a href=
=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" target=3D=
"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
</blockquote>
<br>
_______________________________________________ sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> <a href=
=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" target=3D=
"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
</blockquote></blockquote></blockquote>
<br>
</blockquote>
<br>
_______________________________________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
</div></div></blockquote></div><br></div>

--001a114187be76da1e05317f696d--


From nobody Wed Apr 27 16:10:45 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F24B712D1E3 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 16:10:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dQC1ywm71W5D for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 16:10:41 -0700 (PDT)
Received: from mail-pa0-x230.google.com (mail-pa0-x230.google.com [IPv6:2607:f8b0:400e:c03::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0FAF312B02B for <sfc@ietf.org>; Wed, 27 Apr 2016 16:10:41 -0700 (PDT)
Received: by mail-pa0-x230.google.com with SMTP id r5so25072529pag.1 for <sfc@ietf.org>; Wed, 27 Apr 2016 16:10:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=CBEFAYervPnRIZnu+axHdm+esJplUDTkS2AdtaIOR1U=; b=Kwf4Gr9mCSeoedr4bVEwC8BuStrlSWdfRc4plINmaqnH4Jbb/usSUp4dBHw2zJq73h u+HrDCOwQaW8q6EZ6BGTuWw3wH5nCfIaanIs1fOkZHr5t/ZLc+bMq+nDUCbxoIQmiZx9 0Z54LzBav1eOvIiV5UtWc2LjisXVydN2b8qT9KxnF6J1+f1DENr7ffeT46CmW9DYyJDG 7fgdrZ7TC0fEUgnMC9Ft8ah4CO0Xff3Q7jFqpRLQGgSCfh8wGQC6cyHzps3XlEDLydIV 0ohLtOuqCMb1bZMk7V5WbOt89f46z6hVMtggj2NhE/R+Xc9iSXMrd5XQhMSXgxVhXS/U Y2CQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=CBEFAYervPnRIZnu+axHdm+esJplUDTkS2AdtaIOR1U=; b=HFgVfltgJ4TUXl5lSouVqOZvOUCuy8Sb0urhAwmr4Cw/xik3m808s8feTOXxljb7vf ShFGBX+8mydJYo7b6gBpl9yTS79TU+E6EdrvwjZXe9bX44Oj6gDn3orduxK4YT8SA5nJ zkzU+Qxe6eNyTb1ujZwXFVGLkV+poenz0wHOoeUY7RzK1gJbSHFxSHBkFx4ruSs9bRPq i0XDeN92kI1MB8L+NNyp5w2Adu+rh/FpM1fFUk9NuCFbcceHHEhBIPG81RFx30FX+haA 92YQkssRJjWTRF61FWkq1S+j8Nvn1NDrdgw+PNJHzuQPI+wiA+/2DaguunIu+BfsTXWx SwRg==
X-Gm-Message-State: AOPr4FXaL2YvIf18GEf61sDFTLHmFEGY9P2CFzlJDLjWLeF2545OLIZZEJV80mBwySrs6A==
X-Received: by 10.66.21.102 with SMTP id u6mr12471947pae.118.1461798640650; Wed, 27 Apr 2016 16:10:40 -0700 (PDT)
Received: from ?IPv6:2601:646:8d00:25f0:1d30:818b:fd9f:29bb? ([2601:646:8d00:25f0:1d30:818b:fd9f:29bb]) by smtp.gmail.com with ESMTPSA id 17sm9267721pfp.96.2016.04.27.16.10.37 (version=TLSv1/SSLv3 cipher=OTHER); Wed, 27 Apr 2016 16:10:39 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.2 \(3112\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <CAA=duU0cjXbTxTCqaRetajxFaJVfq8Y-HySPDrR-0AN38Wq3Zw@mail.gmail.com>
Date: Wed, 27 Apr 2016 16:10:37 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <3B6F7441-A67B-4577-A842-6FDCF7D85C13@gmail.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb> <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com> <CAA=duU0cjXbTxTCqaRetajxFaJVfq8Y-HySPDrR-0AN38Wq3Zw@mail.gmail.com>
To: "Andrew G. Malis" <agmalis@gmail.com>
X-Mailer: Apple Mail (2.3112)
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/q36hbtysobnBP-TrebivzNzOcaI>
Cc: "Elzur, Uri" <uri.elzur@intel.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 23:10:44 -0000

Andy, there is a difference though. RFC6830 says an ITR can fragment but =
an ETR does not reassemble. That is, an arrived packet at the ITR causes =
the =E2=80=9Cuser=E2=80=99s header=E2=80=9D to be fragmented and then =
each fragment is encapsulated. So the fragment reassembly is done at the =
destination host.

For NSH, I think you want the reassembly to happen at the end of the =
SFF. But I=E2=80=99m not sure, so for you all to comment on.

Dino

> On Apr 27, 2016, at 4:02 PM, Andrew G. Malis <agmalis@gmail.com> =
wrote:
>=20
> Joel et al,
>=20
> All this talk about fragmentation prompted me to re-read section 6 of =
the draft, which recommends (as option 3) using the procedures in =
section 5.4 of RFC 6830 (presumably with the =E2=80=9CNSH header=E2=80=9D =
replacing the =E2=80=9CLISP header=E2=80=9D in the description of the =
procedures in that section).
>=20
> So that led me to read that section (and the LISP header definition in =
section 5.1), and I see that LISP does fragmentation and reassembly =
identically to IPv4, using the Fragment Offset field so that fragments =
can be correctly reassembled in the proper order.
>=20
> However, the NSH Header doesn=E2=80=99t have a Fragment Offset field =
or any other way to order the fragments.
>=20
> So how can the procedures in Section 5.4 of 6830 be used?
>=20
> Thanks,
> Andy
>=20
> On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern <jmh@joelhalpern.com> =
wrote:
> Both methods are valid, and both depend upon details of the underlying =
packet and the transport.  As such, I don't see why this document =
benefits from describing them, much less why it should mark one method =
as a "should".  Implementation details are likely to be more significant =
than any bit consumption difference between the two alternatives.
>=20
> Yours,
> Joel
>=20
>=20
> On 4/27/16 3:40 PM, Linda Dunbar wrote:
> I suggest adding the following paragraphs after the Bullet 3 of the =
Section 6 Fragmentation Consideration to make the process more clear and =
less controversial:
>=20
>=20
> --------------------------------
>=20
> RFC6830 describes the fragmentation method of breaking the original =
packet into two equal sub-frames and encapsulating [LISP Header + =
Transport header] to each sub-frame.
>=20
> If LISP fragmentation [RFC6830 Section 5.4] is used, the [SFC Header + =
Transport Header] will be added to each half frame (or the original data =
frame). As the Transport Header is terminated by the next SFF node's =
tunnel transport layer, the combined two sub-frames will have two SFC =
Headers.
>=20
> Therefore, the fragmentation for NSH encapsulated data frame should be =
done completely by the node tunnel transport layer, which should break =
the [SFC + original packet] into two equal sub-frames and each sub-frame =
being encapsulated with its respective tunnel header.  The next SFF =
node's tunnel transport layer should combine the two sub-frames before =
sending to the next node.
>=20
> ------------------------------------------------------
>=20
>=20
> By the way, there are to typo in the Section 6:
> 3rd line: "In order the" =3D=3D> "In order to"
> Last line of Bullet 2: extra "the" in the "utilized to ensure the the =
required packet".
>=20
>=20
> Hope it helps.
>=20
> Linda
>=20
>=20
>=20
> -----Original Message-----
> From: mohamed.boucadair@orange.com =
[mailto:mohamed.boucadair@orange.com]
> Sent: Wednesday, April 27, 2016 12:40 AM
> To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; sfc@ietf.org
> Subject: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Hi Joel, all,
>=20
> Please see inline.
>=20
> Cheers,
> Med
>=20
> -----Message d'origine-----
> De : Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoy=C3=A9 : mardi =
26
> avril 2016 19:18 =C3=80 : Linda Dunbar; BOUCADAIR Mohamed IMT/OLN; =
Elzur,
> Uri; sfc@ietf.org Objet : Re: [sfc] WG last call for
> draft-ietf-sfc-nsh-04.txt
>=20
> With regard to Transport tunnel fragementation, that seems an issue
> for the transport protocol.  I don't actually object to a sentence,
> but it does not seem that it will accomplish anything.
>=20
> [Med] I would like to see some text added to the draft.
>=20
>=20
> With regard to packets fragmented by the source, I completely disagree
> with your assertion.  If an SFF were to reassemble the packets, that
> would be a violation of its job.
>=20
> [Med] I agree with you.
>=20
>   There is no reason for an SFF to
> reassemble a packet fragmented by the source.  The classifier may have
> to do some interesting things in order to properly classify succeeding
> fragments, but that is an implementation issue (most commonly
> addressed with virtual reassembly, which doe snot delay the
> fragments.)  We don't specity that.
>=20
> [Med] Still, the external behavior of the classifier needs to be clear =
in the document. I don't find any text in the draft saying for instance =
that an NSH header must be present in all fragments. (There some =
processing that might be needed at the SFF to "do its job" with regards =
to fragments (receive out of order fragments + forwarding policy on the =
full packet).)
>=20
>=20
> If an SF needs to reassemble fragments to do its job, that is up to
> the SF.  Some will need to actually reassemble.  Some will need to
> perform virtual reassembly, and some will happily process the
> fragments.  I can not see what the NSH document could possibly =
mandate.
>=20
> [Med] Fully agree.
>=20
>=20
> Yours,
> Joel
>=20
> On 4/26/16 11:47 AM, Linda Dunbar wrote:
> Joel,
>=20
> I think the document should add the description on the following two
> fragmentation scenarios:
>=20
> - Transport tunnel generated fragmentation: When a packet
> fragmentation is caused by transport tunnel (i.e. various
> encapsulations), the termination point of the transport tunnel is
> responsible for re-assembling the fragmented pieces of the packet.
> Since there won't be any SFF nodes in between the Transport Tunnel,
> the tunnel generated fragmentation does not require any actions by
> SFF nodes or SF nodes.
>=20
>=20
> - Source node generated fragmentation (after adding on the NSH
> header): When fragmentation has to be performed for a packet being
> encapsulated with the NSH header, either the intermediate SFF nodes
> or the SF nodes have to be able to reassemble the fragmented pieces.
>=20
>=20
>=20
>=20
> Cheers,
>=20
>=20
> Linda
>=20
> -----Original Message----- From: Joel M. Halpern
> [mailto:jmh@joelhalpern.com] Sent: Tuesday, April 26, 2016 10:33 AM
> To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri;
> sfc@ietf.org Subject: Re: [sfc] WG last call for
> draft-ietf-sfc-nsh-04.txt
>=20
> Re-reading your note, it is possible that you are referring only to
> the case of transport generated fragmentation of the outer packet.
> I had assumed you were not talking about that, since the resulting
> fragments will not all have NSH headers.  As with any tunnel
> technology, if the tunnel chooses to fragment at its layer, then the
> tunnel is responsible for reassembly.  That would be invisible to
> the SFF.
>=20
> Yours, Joel
>=20
> On 4/26/16 11:10 AM, Linda Dunbar wrote:
> Agree with Med.
>=20
> Even if each fragment piece of a packet with NSH header carries the
> NSH header, the intermediate SFF nodes still need to put together
> all the fragments together before passing the whole data frame to
> the SF.
>=20
> Linda
>=20
> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]
> On Behalf Of mohamed.boucadair@orange.com Sent: Monday, April 25,
> 2016 9:42 AM To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org Subject:
> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Re-,
>=20
> How do you instruct the transport layer to ALWAYS prepend an NSH
> header even for fragments? Or you don't care about that?
>=20
> Thank you.
>=20
> Cheers, Med
>=20
> -----Message d'origine----- De : Elzur, Uri
> [mailto:uri.elzur@intel.com] Envoy=C3=A9 : lundi 25 avril 2016 16:26 =
=C3=80
> : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; sfc@ietf.org Objet
> : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Hi Med
>=20
> Not to repeat my position, but I'll do it anyhow :-) As NSH is
> *NOT* a transport, dealing with fragmentation is left to the
> Transport used.
>=20
> The model I use for NSH, is basically similar to VXLAN . It is an
> overly.
>=20
> Thx
>=20
> Uri ("Oo-Ree") C: 949-378-7568
>=20
>=20
> -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]
> On Behalf Of mohamed.boucadair@orange.com Sent: Monday, April 25,
> 2016 7:18 AM To: Joel M. Halpern <jmh@joelhalpern.com>;
> sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Hi Joel,
>=20
> Please see inline.
>=20
> Cheers, Med
>=20
> -----Message d'origine----- De : Joel M. Halpern
> [mailto:jmh@joelhalpern.com] Envoy=C3=A9 : lundi 25 avril 2016 15:48 =
=C3=80
> : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet : Re: [sfc] WG
> last call for draft-ietf-sfc-nsh-04.txt
>=20
> If I am understanding you correctly Med, you are asking that the
> NSH draft specify how service chaining should cope with packets
> that have been fragmented?
>=20
>=20
> [Med] To be accurate, I'm asking to assess whether there are
> implications. If there are, then the draft should be updated
> accordingly.
>=20
> NSH, and the SFF functionality, does not care.
>=20
> [Med] I'm not that sure. Some typical implications are listed
> below:
>=20
> * SFF: If the NSH header is present only in the a fragment but SFF
> didn't maintained a state, subsequent fragments won't be
> appropriately processed. * SFC-aware function: if prepending a
> context information depends on the full packet, not only a
> fragment.
>=20
> It just does its job.
>=20
> [Med] which may be disturbed in some situations as listed in the
> examples above.
>=20
> Ingress and intermediate classifiers may cope with fragments in
> any number of ways.
> Specifying such is clearly out of scope for this draft.
>=20
> [Med] The purpose is not to specify the internal implementation
> details but the external behavior of the classifier function when
> it comes to handle fragments. That behavior may have an incidence
> on SFF, in particular. The purpose is not to recommend the maximum
> resources to be dedicated to out of order fragments nor the
> timeout to cache those; these considerations are of course out of
> scope. Nevertheless, an implementation should offer a configurable
> parameter so that an operator tweak those according to its
> context.
>=20
> I suppose one could write an informational draft on possible ways
> of coping.  The IETF has not usually published such.
> Service functions have to cope with fragmented packets just as
> they had to before the advent of NSH, so describing that is
> clearly not needed here.
>=20
> [Med] The advent of NSH has the following implications: * it
> exacerbates fragmentation. Handing over this issue to the
> transport layer may lead to interoperability issues. * the
> chaining may not be efficient if fragments are inappropriately
> handled.
>=20
> Introducing NSH should not degrade the overall service compared to
> legacy service deployment schemes.
>=20
>=20
> Yours, Joel
>=20
> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
> Re-,
>=20
> I hear you, but my comment is that we need, as a WG, to decide
> what to
> put in the draft. FWIW, I'm discussing two fragmentation
> issues:
>=20
> (1) Fragmentation that is caused by prepending an SFC header.
> (2) Handling fragments at the ingress of an SFC-enabled domain.
>=20
> Increasing the MTU is for sure a recommendation is to be
> explicitly
> called out in the text (see my first message).
>=20
> There are other issues that need to be discussed, e.g., how to
> deal with
> fragments in SFFs/Classifiers?
>=20
> It is also "prudent" to check that no issues will be experienced
> in SFF
> to handle fragments. If an SFC header is prepended for all
> fragments, I'm not sure there
> is any particular issue at the SFF level, except if
> stripping/adding
> context TLVs depends on the full packet (not just fragment). It
> is warranted to consider a little bit this point before declaring
> there is no issue.
>=20
> For point (1), declaring fragmentation out of scope would be
> meant that
> an implementation must be prepared to receive fragments with or
> without NSH header as this is a decision that is left to the
> transport encapsulation. This is a requirement per se!
>=20
> I won't reiterate all the comments I have about the current
> wording of
> this section.
>=20
> Cheers, Med
>=20
> -----Message d'origine----- De : Elzur, Uri
> [mailto:uri.elzur@intel.com] Envoy=C3=A9 : lundi 25 avril 2016
> 08:30 =C3=80 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
> sfc@ietf.org Objet : RE: [sfc] WG last call for
> draft-ietf-sfc-nsh-04.txt
>=20
> Hi Med
>=20
> My point is that Fragmentation is yet another transport related
> issue
> that
> is beyond the scope of NSH and beyond the charter of the WG, so
> it
> doesn't
> really belong in the draft. We are providing an advice as
> extending the size of the packet may lead to fragmentation, but
> as you check RFC 7348 VxLAN, which my create the same issue,
> you'll find it doesn't even
> relate
> to it.
>=20
> Thx
>=20
> Uri ("Oo-Ree") C: 949-378-7568
>=20
>=20
> -----Original Message----- From: sfc
> [mailto:sfc-bounces@ietf.org] On Behalf Of
> mohamed.boucadair@orange.com Sent: Sunday, April 24, 2016
> 10:32 PM To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
> <narten@us.ibm.com>;
> sfc@ietf.org Subject: Re: [sfc] WG last call for
> draft-ietf-sfc-nsh-04.txt
>=20
> Hi Uri,
>=20
> That's another option that needs to be discussed/investigated.
> I'm
> afraid
> this is not the rationale adopted in -04 since it includes some
> text
> that
> is far to be sufficient to ensure interoperable
> implementations.
>=20
> BTW, saying that nsh does not need to deal with fragmentation
> because
> it
> is transport-independent is not IMHO a good strategy to adopt
> here
> because
> it opens the door for interoperable issues, it may lead to
> sub-optimal implementations if the sfc information is present
> only in one
> fragments,
> etc.
>=20
> My comments are related to the current text in the -04.
> This text needs
> to
> be fixed somehow.
>=20
> Cheers, Med
>=20
> -----Message d'origine----- De : Elzur, Uri
> [mailto:uri.elzur@intel.com] Envoy=C3=A9 : dimanche 24 avril
> 2016 17:36 =C3=80 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
> sfc@ietf.org Objet : RE: [sfc] WG last call for
> draft-ietf-sfc-nsh-04.txt
>=20
> Hi Med
>=20
> I see no need to specify the exact behavior as NSH is
> transport independent i.e. like NSH interaction with any other
> Transport eh issue of Fragmentation is to be dealt in a way
> that matches the mechanisms supported by the Transport used
> and do not belong in the NSH draft
>=20
> Thx
>=20
> Uri ("Oo-Ree") C: 949-378-7568
>=20
>=20
> -----Original Message----- From: sfc
> [mailto:sfc-bounces@ietf.org] On Behalf Of
> mohamed.boucadair@orange.com Sent: Thursday, April 14,
> 2016 12:43 AM To: Thomas Narten <narten@us.ibm.com>;
> sfc@ietf.org Subject: Re: [sfc] WG last call for
> draft-ietf-sfc-nsh-04.txt
>=20
> R-,
>=20
> In addition to other pending issues raised for this draft, I
> would like to raise this additional one about Section 6.
>=20
> =3D=3D 6.  Fragmentation Considerations
>=20
> NSH and the associated transport header are "added" to the
> encapsulated packet/frame.  This additional information
> increases
> the
> size of the packet.  In order the ensure proper forwarding of
> NSH data, several options for handling fragmentation and
> re-assembly exist:
>=20
> 1.  Jumbo Frames, when supported, enable the transport of NSH
> and associated transport packets without requiring
> fragmentation.
>=20
> 2.  Path MTU Discovery [RFC1191]"describes a technique for
> dynamically discovering the maximum transmission unit (MTU) of
> an
> arbitrary internet path" and can be utilized to ensure the
> the
> required packet size is used.
>=20
> 3.  [RFC6830] describes two schemes for fragmentation and
> re-
> assembly
> in section 5.4. =3D=3D
>=20
> * The text is weak for a Standard track document that is
> intended to solve the problem in
> https://tools.ietf.org/html/rfc7498#section-
> 2.12.
> There should be a clear behavior to be followed by an
> implementation.
> Further, I would avoid the use of words such as "can".
>=20
> * The text covers only fragmentation when it is induced by SFC
> operations, it does not discuss the treatment of a fragment
> when received in an SFC domain. IMHO, the draft should also
> specify the behavior of the Classifier with regards to
> fragments for the sake of proper SFC operation. Applying
> classification policies may require the
> full packet, not only a fragment.
> In particular, dedicated resources should dedicated for
> handling out of order fragments. Of course, it is out of scope
> of this document to describe how SFs handle fragments.
>=20
> * If an SFC header is prepended for all fragments, I'm not
> sure there is any particular issue at the SFF level...except
> if stripping/adding context TLVs depends on the full packet
> (not just fragment). It is warranted to consider a little bit
> this point before declaring there
> is
> no issue.
>=20
> * The text states "several options". This may be interpreted
> as if implementing one of them is sufficient...which is not
> true. The first two points contribute to minimize the
> fragmentation risk, but fragmentation may still be experienced
> (e.g., other shims are prepended by other nodes for some other
> purposes, nested nsh, etc.)
>=20
> * The first two points have nothing to do with reassembly.
>=20
> * The support of jumbo frames by a router/device does not mean
> that it can make use of it. Appropriate MTU configuration
> should be undertaken in a consistent manner within an SFC
> domain. The text should be updated to make it is about
> (consistent) MTU
> configuration.
>=20
> * BTW, shouldn't the text be reworded to recommended to
> increase the MTU of **all nodes** of an SFC-enabled domain by
> at least the length of SFC header + transport header?
>=20
> * Bullet 2, how PMTU discovery is actually used in this
> context? Do you assume that all SFC-aware nodes will issue
> such messages towards other SFC-aware node, arbitrary
> destination, else?
>=20
> * Bullet 2, I would drop "describes a technique for
> dynamically discovering the maximum transmission unit
> (MTU) of an arbitrary internet path".
>=20
> * Bullet 2, s/ the the/the.
>=20
> * The reference to the LISP specification raises two concerns
> and one comment:
>=20
> (1) I don't think it is a good approach that fragments induced
> by the network are passed to their ultimate destinations as
> such
> (stateless).
> IMO, reassembly should be done within the SFC domain
> (responsible for fragmentation) not passed away. (2) Does the
> stateful mode require all SFC data plane elements maintain a
> full list of MTU for the any SFF/SF instance of the SFC
> domain?
>=20
> The current text suggests that [RFC6830] should be listed as
> normative reference (not an informative one). I would
> personally favor removing the reference to LISP (as it is an
> Experimental RFC).
>=20
> * The security section of the draft may be augmented with
> informational fragmentation-related pointers to:
> e.g., RFC1858 (Security Considerations for IP Fragment
> Filtering), RFC3128 (Protection Against a Variant of the Tiny
> Fragment Attack), and RFC 4963 (IPv4 Reassembly Errors at High
> Data Rates).
>=20
> Cheers, Med
>=20
> -----Message d'origine----- De : sfc
> [mailto:sfc-bounces@ietf.org] De la part de
> mohamed.boucadair@orange.com Envoy=C3=A9 : lundi 11 avril
> 2016 13:14 =C3=80 : Thomas Narten; sfc@ietf.org Objet : Re:
> [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Dear Thomas, all,
>=20
> As I mentioned during the meeting, there are several issues
> that are not covered in the last version of the draft. I
> already provided examples of the issues offline as requested
> by Martin.
>=20
> Cheers, Med
>=20
> -----Message d'origine----- De : sfc
> [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten
> Envoy=C3=A9 : jeudi 31 mars 2016 04:48 =C3=80 :
> sfc@ietf.org Objet : [sfc] WG last call for
> draft-ietf-sfc-nsh-04.txt
>=20
> Dear WG:
>=20
> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>=20
>=20
>=20
> The editors of the NSH document have indicated that they have
> addressed all known comments and that there are no open
> issues with the current version of the document.
>=20
> Substantive comments to the list please, editorial comments
> can go directly to the document editors.
>=20
> We'll also get a brief update from the editors at next
> week's meeting. If there are any remaining issues with the
> document, raising them before the meeting would be
> especially helpful.
>=20
> For the chairs, Thomas
>=20
> _______________________________________________ sfc mailing
> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________ sfc mailing
> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________ sfc mailing
> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________ sfc mailing
> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________ sfc mailing list
> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>=20
>=20
> _______________________________________________ sfc mailing list
> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________ sfc mailing list
> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
>=20
>=20
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Apr 27 16:16:59 2016
Return-Path: <agmalis@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A2CC12D0F1 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 16:16:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J6jAqTtR3uGL for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 16:16:52 -0700 (PDT)
Received: from mail-ob0-x22f.google.com (mail-ob0-x22f.google.com [IPv6:2607:f8b0:4003:c01::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3BAD712B020 for <sfc@ietf.org>; Wed, 27 Apr 2016 16:16:52 -0700 (PDT)
Received: by mail-ob0-x22f.google.com with SMTP id x1so11359942obt.0 for <sfc@ietf.org>; Wed, 27 Apr 2016 16:16:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=Oc8YgbbVw6Ef//4EdOXOxTz6CLzMPjG/Ruew2wvM3HE=; b=faCMT8Yvt6GfRN1aC4YMva7AmE3/8XG3P25vKLAnX4dtv4z2AHgDG1+SFQRysHrY0N bcOpDsmIqi6mbUk0G7rOPpxGUEn7aHFeMmohrBE+Bzf1zr7TqKqItSs+v2SKfwgKmaEV bspR8K8XaT5RgND+ue5nkdyg57kaAR/WhyS7OL4JtTS9l25Mao57pU9ve8P4D+IOU7He WIKggnlD00VfsQbDCRv0kWKuS88kCZrO+1IG0LqPyN7JK44a0CTJKEJNfB59pJ5m/Xay VGhlpmii+yfHom29z8GO+7rwkkc4UFnVG/CSkd+dRV/MqSMPbgtnwVDQAZ738IV3o6Y1 CobA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=Oc8YgbbVw6Ef//4EdOXOxTz6CLzMPjG/Ruew2wvM3HE=; b=KoSMT2/RG9MI3ZWz5GLColrStEfIDGcAXFqqGlgGf60YnLYilw+9ywmjMYswZKrbti ncNlC1iqPtS91noYLcklZ32w+TQFgtG7UcKoNZPngGCI3OEwE+oGaTdLYM0LyLPBj7uu zQKr8j8ZXkRjneOUwgY80FNzgwLTZ7K+4iUnRx9coLskMmYvplDlBQ4d5lt8wqPfSH/w eumvqWPWY8U71wIkTOJZE2MoaWiMk1ZkUENMR4kA1AnsJC+sSxs8UGPyLfhag6nG9k+m dQVNAaqGNyC3NHaEmSUVvdeZRnSwCUVKdJ0zYwAtMF6SR8virx4KxO7T471UsHjmeBlE NoiA==
X-Gm-Message-State: AOPr4FUun8rS0tEsDuH8peEzAOP5xInFIi2IaLHKbYKqikl+u/FgXzK/geXqe/hxTmGvONnF6ogB6oC3S+qaAQ==
X-Received: by 10.60.173.210 with SMTP id bm18mr4937984oec.30.1461799011433; Wed, 27 Apr 2016 16:16:51 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.182.231.106 with HTTP; Wed, 27 Apr 2016 16:16:31 -0700 (PDT)
In-Reply-To: <3B6F7441-A67B-4577-A842-6FDCF7D85C13@gmail.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb> <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com> <CAA=duU0cjXbTxTCqaRetajxFaJVfq8Y-HySPDrR-0AN38Wq3Zw@mail.gmail.com> <3B6F7441-A67B-4577-A842-6FDCF7D85C13@gmail.com>
From: "Andrew G. Malis" <agmalis@gmail.com>
Date: Wed, 27 Apr 2016 19:16:31 -0400
Message-ID: <CAA=duU0hYMXWmJFiBrUNvyidjCFTrNFmA_7zFDavrHb90F55-g@mail.gmail.com>
To: Dino Farinacci <farinacci@gmail.com>
Content-Type: multipart/alternative; boundary=089e011826a4cf44c805317f9aab
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/zqzkKouWNfPRVczxuLM-7OU1Hbo>
Cc: "Elzur, Uri" <uri.elzur@intel.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 23:16:56 -0000

--089e011826a4cf44c805317f9aab
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hey, Dino!

Regardless of where the reassembly is done, it needs to be done correctly.
I=E2=80=99m just wondering how that can happen without the necessary header=
 fields.

Cheers,
Andy

On Wed, Apr 27, 2016 at 7:10 PM, Dino Farinacci <farinacci@gmail.com> wrote=
:

> Andy, there is a difference though. RFC6830 says an ITR can fragment but
> an ETR does not reassemble. That is, an arrived packet at the ITR causes
> the =E2=80=9Cuser=E2=80=99s header=E2=80=9D to be fragmented and then eac=
h fragment is
> encapsulated. So the fragment reassembly is done at the destination host.
>
> For NSH, I think you want the reassembly to happen at the end of the SFF.
> But I=E2=80=99m not sure, so for you all to comment on.
>
> Dino
>
> > On Apr 27, 2016, at 4:02 PM, Andrew G. Malis <agmalis@gmail.com> wrote:
> >
> > Joel et al,
> >
> > All this talk about fragmentation prompted me to re-read section 6 of
> the draft, which recommends (as option 3) using the procedures in section
> 5.4 of RFC 6830 (presumably with the =E2=80=9CNSH header=E2=80=9D replaci=
ng the =E2=80=9CLISP
> header=E2=80=9D in the description of the procedures in that section).
> >
> > So that led me to read that section (and the LISP header definition in
> section 5.1), and I see that LISP does fragmentation and reassembly
> identically to IPv4, using the Fragment Offset field so that fragments ca=
n
> be correctly reassembled in the proper order.
> >
> > However, the NSH Header doesn=E2=80=99t have a Fragment Offset field or=
 any
> other way to order the fragments.
> >
> > So how can the procedures in Section 5.4 of 6830 be used?
> >
> > Thanks,
> > Andy
> >
> > On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern <jmh@joelhalpern.com>
> wrote:
> > Both methods are valid, and both depend upon details of the underlying
> packet and the transport.  As such, I don't see why this document benefit=
s
> from describing them, much less why it should mark one method as a
> "should".  Implementation details are likely to be more significant than
> any bit consumption difference between the two alternatives.
> >
> > Yours,
> > Joel
> >
> >
> > On 4/27/16 3:40 PM, Linda Dunbar wrote:
> > I suggest adding the following paragraphs after the Bullet 3 of the
> Section 6 Fragmentation Consideration to make the process more clear and
> less controversial:
> >
> >
> > --------------------------------
> >
> > RFC6830 describes the fragmentation method of breaking the original
> packet into two equal sub-frames and encapsulating [LISP Header + Transpo=
rt
> header] to each sub-frame.
> >
> > If LISP fragmentation [RFC6830 Section 5.4] is used, the [SFC Header +
> Transport Header] will be added to each half frame (or the original data
> frame). As the Transport Header is terminated by the next SFF node's tunn=
el
> transport layer, the combined two sub-frames will have two SFC Headers.
> >
> > Therefore, the fragmentation for NSH encapsulated data frame should be
> done completely by the node tunnel transport layer, which should break th=
e
> [SFC + original packet] into two equal sub-frames and each sub-frame bein=
g
> encapsulated with its respective tunnel header.  The next SFF node's tunn=
el
> transport layer should combine the two sub-frames before sending to the
> next node.
> >
> > ------------------------------------------------------
> >
> >
> > By the way, there are to typo in the Section 6:
> > 3rd line: "In order the" =3D=3D> "In order to"
> > Last line of Bullet 2: extra "the" in the "utilized to ensure the the
> required packet".
> >
> >
> > Hope it helps.
> >
> > Linda
> >
> >
> >
> > -----Original Message-----
> > From: mohamed.boucadair@orange.com [mailto:mohamed.boucadair@orange.com=
]
> > Sent: Wednesday, April 27, 2016 12:40 AM
> > To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; sfc@ietf.org
> > Subject: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >
> > Hi Joel, all,
> >
> > Please see inline.
> >
> > Cheers,
> > Med
> >
> > -----Message d'origine-----
> > De : Joel M. Halpern [mailto:jmh@joelhalpern.com] Envoy=C3=A9 : mardi 2=
6
> > avril 2016 19:18 =C3=80 : Linda Dunbar; BOUCADAIR Mohamed IMT/OLN; Elzu=
r,
> > Uri; sfc@ietf.org Objet : Re: [sfc] WG last call for
> > draft-ietf-sfc-nsh-04.txt
> >
> > With regard to Transport tunnel fragementation, that seems an issue
> > for the transport protocol.  I don't actually object to a sentence,
> > but it does not seem that it will accomplish anything.
> >
> > [Med] I would like to see some text added to the draft.
> >
> >
> > With regard to packets fragmented by the source, I completely disagree
> > with your assertion.  If an SFF were to reassemble the packets, that
> > would be a violation of its job.
> >
> > [Med] I agree with you.
> >
> >   There is no reason for an SFF to
> > reassemble a packet fragmented by the source.  The classifier may have
> > to do some interesting things in order to properly classify succeeding
> > fragments, but that is an implementation issue (most commonly
> > addressed with virtual reassembly, which doe snot delay the
> > fragments.)  We don't specity that.
> >
> > [Med] Still, the external behavior of the classifier needs to be clear
> in the document. I don't find any text in the draft saying for instance
> that an NSH header must be present in all fragments. (There some processi=
ng
> that might be needed at the SFF to "do its job" with regards to fragments
> (receive out of order fragments + forwarding policy on the full packet).)
> >
> >
> > If an SF needs to reassemble fragments to do its job, that is up to
> > the SF.  Some will need to actually reassemble.  Some will need to
> > perform virtual reassembly, and some will happily process the
> > fragments.  I can not see what the NSH document could possibly mandate.
> >
> > [Med] Fully agree.
> >
> >
> > Yours,
> > Joel
> >
> > On 4/26/16 11:47 AM, Linda Dunbar wrote:
> > Joel,
> >
> > I think the document should add the description on the following two
> > fragmentation scenarios:
> >
> > - Transport tunnel generated fragmentation: When a packet
> > fragmentation is caused by transport tunnel (i.e. various
> > encapsulations), the termination point of the transport tunnel is
> > responsible for re-assembling the fragmented pieces of the packet.
> > Since there won't be any SFF nodes in between the Transport Tunnel,
> > the tunnel generated fragmentation does not require any actions by
> > SFF nodes or SF nodes.
> >
> >
> > - Source node generated fragmentation (after adding on the NSH
> > header): When fragmentation has to be performed for a packet being
> > encapsulated with the NSH header, either the intermediate SFF nodes
> > or the SF nodes have to be able to reassemble the fragmented pieces.
> >
> >
> >
> >
> > Cheers,
> >
> >
> > Linda
> >
> > -----Original Message----- From: Joel M. Halpern
> > [mailto:jmh@joelhalpern.com] Sent: Tuesday, April 26, 2016 10:33 AM
> > To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri;
> > sfc@ietf.org Subject: Re: [sfc] WG last call for
> > draft-ietf-sfc-nsh-04.txt
> >
> > Re-reading your note, it is possible that you are referring only to
> > the case of transport generated fragmentation of the outer packet.
> > I had assumed you were not talking about that, since the resulting
> > fragments will not all have NSH headers.  As with any tunnel
> > technology, if the tunnel chooses to fragment at its layer, then the
> > tunnel is responsible for reassembly.  That would be invisible to
> > the SFF.
> >
> > Yours, Joel
> >
> > On 4/26/16 11:10 AM, Linda Dunbar wrote:
> > Agree with Med.
> >
> > Even if each fragment piece of a packet with NSH header carries the
> > NSH header, the intermediate SFF nodes still need to put together
> > all the fragments together before passing the whole data frame to
> > the SF.
> >
> > Linda
> >
> > -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]
> > On Behalf Of mohamed.boucadair@orange.com Sent: Monday, April 25,
> > 2016 9:42 AM To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org Subject:
> > Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >
> > Re-,
> >
> > How do you instruct the transport layer to ALWAYS prepend an NSH
> > header even for fragments? Or you don't care about that?
> >
> > Thank you.
> >
> > Cheers, Med
> >
> > -----Message d'origine----- De : Elzur, Uri
> > [mailto:uri.elzur@intel.com] Envoy=C3=A9 : lundi 25 avril 2016 16:26 =
=C3=80
> > : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; sfc@ietf.org Objet
> > : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >
> > Hi Med
> >
> > Not to repeat my position, but I'll do it anyhow :-) As NSH is
> > *NOT* a transport, dealing with fragmentation is left to the
> > Transport used.
> >
> > The model I use for NSH, is basically similar to VXLAN . It is an
> > overly.
> >
> > Thx
> >
> > Uri ("Oo-Ree") C: 949-378-7568
> >
> >
> > -----Original Message----- From: sfc [mailto:sfc-bounces@ietf.org]
> > On Behalf Of mohamed.boucadair@orange.com Sent: Monday, April 25,
> > 2016 7:18 AM To: Joel M. Halpern <jmh@joelhalpern.com>;
> > sfc@ietf.org
> > Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >
> > Hi Joel,
> >
> > Please see inline.
> >
> > Cheers, Med
> >
> > -----Message d'origine----- De : Joel M. Halpern
> > [mailto:jmh@joelhalpern.com] Envoy=C3=A9 : lundi 25 avril 2016 15:48 =
=C3=80
> > : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet : Re: [sfc] WG
> > last call for draft-ietf-sfc-nsh-04.txt
> >
> > If I am understanding you correctly Med, you are asking that the
> > NSH draft specify how service chaining should cope with packets
> > that have been fragmented?
> >
> >
> > [Med] To be accurate, I'm asking to assess whether there are
> > implications. If there are, then the draft should be updated
> > accordingly.
> >
> > NSH, and the SFF functionality, does not care.
> >
> > [Med] I'm not that sure. Some typical implications are listed
> > below:
> >
> > * SFF: If the NSH header is present only in the a fragment but SFF
> > didn't maintained a state, subsequent fragments won't be
> > appropriately processed. * SFC-aware function: if prepending a
> > context information depends on the full packet, not only a
> > fragment.
> >
> > It just does its job.
> >
> > [Med] which may be disturbed in some situations as listed in the
> > examples above.
> >
> > Ingress and intermediate classifiers may cope with fragments in
> > any number of ways.
> > Specifying such is clearly out of scope for this draft.
> >
> > [Med] The purpose is not to specify the internal implementation
> > details but the external behavior of the classifier function when
> > it comes to handle fragments. That behavior may have an incidence
> > on SFF, in particular. The purpose is not to recommend the maximum
> > resources to be dedicated to out of order fragments nor the
> > timeout to cache those; these considerations are of course out of
> > scope. Nevertheless, an implementation should offer a configurable
> > parameter so that an operator tweak those according to its
> > context.
> >
> > I suppose one could write an informational draft on possible ways
> > of coping.  The IETF has not usually published such.
> > Service functions have to cope with fragmented packets just as
> > they had to before the advent of NSH, so describing that is
> > clearly not needed here.
> >
> > [Med] The advent of NSH has the following implications: * it
> > exacerbates fragmentation. Handing over this issue to the
> > transport layer may lead to interoperability issues. * the
> > chaining may not be efficient if fragments are inappropriately
> > handled.
> >
> > Introducing NSH should not degrade the overall service compared to
> > legacy service deployment schemes.
> >
> >
> > Yours, Joel
> >
> > On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
> > Re-,
> >
> > I hear you, but my comment is that we need, as a WG, to decide
> > what to
> > put in the draft. FWIW, I'm discussing two fragmentation
> > issues:
> >
> > (1) Fragmentation that is caused by prepending an SFC header.
> > (2) Handling fragments at the ingress of an SFC-enabled domain.
> >
> > Increasing the MTU is for sure a recommendation is to be
> > explicitly
> > called out in the text (see my first message).
> >
> > There are other issues that need to be discussed, e.g., how to
> > deal with
> > fragments in SFFs/Classifiers?
> >
> > It is also "prudent" to check that no issues will be experienced
> > in SFF
> > to handle fragments. If an SFC header is prepended for all
> > fragments, I'm not sure there
> > is any particular issue at the SFF level, except if
> > stripping/adding
> > context TLVs depends on the full packet (not just fragment). It
> > is warranted to consider a little bit this point before declaring
> > there is no issue.
> >
> > For point (1), declaring fragmentation out of scope would be
> > meant that
> > an implementation must be prepared to receive fragments with or
> > without NSH header as this is a decision that is left to the
> > transport encapsulation. This is a requirement per se!
> >
> > I won't reiterate all the comments I have about the current
> > wording of
> > this section.
> >
> > Cheers, Med
> >
> > -----Message d'origine----- De : Elzur, Uri
> > [mailto:uri.elzur@intel.com] Envoy=C3=A9 : lundi 25 avril 2016
> > 08:30 =C3=80 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
> > sfc@ietf.org Objet : RE: [sfc] WG last call for
> > draft-ietf-sfc-nsh-04.txt
> >
> > Hi Med
> >
> > My point is that Fragmentation is yet another transport related
> > issue
> > that
> > is beyond the scope of NSH and beyond the charter of the WG, so
> > it
> > doesn't
> > really belong in the draft. We are providing an advice as
> > extending the size of the packet may lead to fragmentation, but
> > as you check RFC 7348 VxLAN, which my create the same issue,
> > you'll find it doesn't even
> > relate
> > to it.
> >
> > Thx
> >
> > Uri ("Oo-Ree") C: 949-378-7568
> >
> >
> > -----Original Message----- From: sfc
> > [mailto:sfc-bounces@ietf.org] On Behalf Of
> > mohamed.boucadair@orange.com Sent: Sunday, April 24, 2016
> > 10:32 PM To: Elzur, Uri <uri.elzur@intel.com>; Thomas Narten
> > <narten@us.ibm.com>;
> > sfc@ietf.org Subject: Re: [sfc] WG last call for
> > draft-ietf-sfc-nsh-04.txt
> >
> > Hi Uri,
> >
> > That's another option that needs to be discussed/investigated.
> > I'm
> > afraid
> > this is not the rationale adopted in -04 since it includes some
> > text
> > that
> > is far to be sufficient to ensure interoperable
> > implementations.
> >
> > BTW, saying that nsh does not need to deal with fragmentation
> > because
> > it
> > is transport-independent is not IMHO a good strategy to adopt
> > here
> > because
> > it opens the door for interoperable issues, it may lead to
> > sub-optimal implementations if the sfc information is present
> > only in one
> > fragments,
> > etc.
> >
> > My comments are related to the current text in the -04.
> > This text needs
> > to
> > be fixed somehow.
> >
> > Cheers, Med
> >
> > -----Message d'origine----- De : Elzur, Uri
> > [mailto:uri.elzur@intel.com] Envoy=C3=A9 : dimanche 24 avril
> > 2016 17:36 =C3=80 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;
> > sfc@ietf.org Objet : RE: [sfc] WG last call for
> > draft-ietf-sfc-nsh-04.txt
> >
> > Hi Med
> >
> > I see no need to specify the exact behavior as NSH is
> > transport independent i.e. like NSH interaction with any other
> > Transport eh issue of Fragmentation is to be dealt in a way
> > that matches the mechanisms supported by the Transport used
> > and do not belong in the NSH draft
> >
> > Thx
> >
> > Uri ("Oo-Ree") C: 949-378-7568
> >
> >
> > -----Original Message----- From: sfc
> > [mailto:sfc-bounces@ietf.org] On Behalf Of
> > mohamed.boucadair@orange.com Sent: Thursday, April 14,
> > 2016 12:43 AM To: Thomas Narten <narten@us.ibm.com>;
> > sfc@ietf.org Subject: Re: [sfc] WG last call for
> > draft-ietf-sfc-nsh-04.txt
> >
> > R-,
> >
> > In addition to other pending issues raised for this draft, I
> > would like to raise this additional one about Section 6.
> >
> > =3D=3D 6.  Fragmentation Considerations
> >
> > NSH and the associated transport header are "added" to the
> > encapsulated packet/frame.  This additional information
> > increases
> > the
> > size of the packet.  In order the ensure proper forwarding of
> > NSH data, several options for handling fragmentation and
> > re-assembly exist:
> >
> > 1.  Jumbo Frames, when supported, enable the transport of NSH
> > and associated transport packets without requiring
> > fragmentation.
> >
> > 2.  Path MTU Discovery [RFC1191]"describes a technique for
> > dynamically discovering the maximum transmission unit (MTU) of
> > an
> > arbitrary internet path" and can be utilized to ensure the
> > the
> > required packet size is used.
> >
> > 3.  [RFC6830] describes two schemes for fragmentation and
> > re-
> > assembly
> > in section 5.4. =3D=3D
> >
> > * The text is weak for a Standard track document that is
> > intended to solve the problem in
> > https://tools.ietf.org/html/rfc7498#section-
> > 2.12.
> > There should be a clear behavior to be followed by an
> > implementation.
> > Further, I would avoid the use of words such as "can".
> >
> > * The text covers only fragmentation when it is induced by SFC
> > operations, it does not discuss the treatment of a fragment
> > when received in an SFC domain. IMHO, the draft should also
> > specify the behavior of the Classifier with regards to
> > fragments for the sake of proper SFC operation. Applying
> > classification policies may require the
> > full packet, not only a fragment.
> > In particular, dedicated resources should dedicated for
> > handling out of order fragments. Of course, it is out of scope
> > of this document to describe how SFs handle fragments.
> >
> > * If an SFC header is prepended for all fragments, I'm not
> > sure there is any particular issue at the SFF level...except
> > if stripping/adding context TLVs depends on the full packet
> > (not just fragment). It is warranted to consider a little bit
> > this point before declaring there
> > is
> > no issue.
> >
> > * The text states "several options". This may be interpreted
> > as if implementing one of them is sufficient...which is not
> > true. The first two points contribute to minimize the
> > fragmentation risk, but fragmentation may still be experienced
> > (e.g., other shims are prepended by other nodes for some other
> > purposes, nested nsh, etc.)
> >
> > * The first two points have nothing to do with reassembly.
> >
> > * The support of jumbo frames by a router/device does not mean
> > that it can make use of it. Appropriate MTU configuration
> > should be undertaken in a consistent manner within an SFC
> > domain. The text should be updated to make it is about
> > (consistent) MTU
> > configuration.
> >
> > * BTW, shouldn't the text be reworded to recommended to
> > increase the MTU of **all nodes** of an SFC-enabled domain by
> > at least the length of SFC header + transport header?
> >
> > * Bullet 2, how PMTU discovery is actually used in this
> > context? Do you assume that all SFC-aware nodes will issue
> > such messages towards other SFC-aware node, arbitrary
> > destination, else?
> >
> > * Bullet 2, I would drop "describes a technique for
> > dynamically discovering the maximum transmission unit
> > (MTU) of an arbitrary internet path".
> >
> > * Bullet 2, s/ the the/the.
> >
> > * The reference to the LISP specification raises two concerns
> > and one comment:
> >
> > (1) I don't think it is a good approach that fragments induced
> > by the network are passed to their ultimate destinations as
> > such
> > (stateless).
> > IMO, reassembly should be done within the SFC domain
> > (responsible for fragmentation) not passed away. (2) Does the
> > stateful mode require all SFC data plane elements maintain a
> > full list of MTU for the any SFF/SF instance of the SFC
> > domain?
> >
> > The current text suggests that [RFC6830] should be listed as
> > normative reference (not an informative one). I would
> > personally favor removing the reference to LISP (as it is an
> > Experimental RFC).
> >
> > * The security section of the draft may be augmented with
> > informational fragmentation-related pointers to:
> > e.g., RFC1858 (Security Considerations for IP Fragment
> > Filtering), RFC3128 (Protection Against a Variant of the Tiny
> > Fragment Attack), and RFC 4963 (IPv4 Reassembly Errors at High
> > Data Rates).
> >
> > Cheers, Med
> >
> > -----Message d'origine----- De : sfc
> > [mailto:sfc-bounces@ietf.org] De la part de
> > mohamed.boucadair@orange.com Envoy=C3=A9 : lundi 11 avril
> > 2016 13:14 =C3=80 : Thomas Narten; sfc@ietf.org Objet : Re:
> > [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >
> > Dear Thomas, all,
> >
> > As I mentioned during the meeting, there are several issues
> > that are not covered in the last version of the draft. I
> > already provided examples of the issues offline as requested
> > by Martin.
> >
> > Cheers, Med
> >
> > -----Message d'origine----- De : sfc
> > [mailto:sfc-bounces@ietf.org] De la part de Thomas Narten
> > Envoy=C3=A9 : jeudi 31 mars 2016 04:48 =C3=80 :
> > sfc@ietf.org Objet : [sfc] WG last call for
> > draft-ietf-sfc-nsh-04.txt
> >
> > Dear WG:
> >
> > This note begins a WG last call on draft-ietf-sfc-nsh-04.txt
> > (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> >
> >
> >
> > The editors of the NSH document have indicated that they have
> > addressed all known comments and that there are no open
> > issues with the current version of the document.
> >
> > Substantive comments to the list please, editorial comments
> > can go directly to the document editors.
> >
> > We'll also get a brief update from the editors at next
> > week's meeting. If there are any remaining issues with the
> > document, raising them before the meeting would be
> > especially helpful.
> >
> > For the chairs, Thomas
> >
> > _______________________________________________ sfc mailing
> > list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________ sfc mailing
> > list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________ sfc mailing
> > list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________ sfc mailing
> > list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________ sfc mailing list
> > sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >
> >
> > _______________________________________________ sfc mailing list
> > sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________ sfc mailing list
> > sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >
> >
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
>
>

--089e011826a4cf44c805317f9aab
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hey, Dino!<div><br></div><div>Regardless of where the reas=
sembly is done, it needs to be done correctly. I=E2=80=99m just wondering h=
ow that can happen without the necessary header fields.</div><div><br></div=
><div>Cheers,</div><div>Andy</div></div><div class=3D"gmail_extra"><br><div=
 class=3D"gmail_quote">On Wed, Apr 27, 2016 at 7:10 PM, Dino Farinacci <spa=
n dir=3D"ltr">&lt;<a href=3D"mailto:farinacci@gmail.com" target=3D"_blank">=
farinacci@gmail.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quo=
te" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"=
>Andy, there is a difference though. RFC6830 says an ITR can fragment but a=
n ETR does not reassemble. That is, an arrived packet at the ITR causes the=
 =E2=80=9Cuser=E2=80=99s header=E2=80=9D to be fragmented and then each fra=
gment is encapsulated. So the fragment reassembly is done at the destinatio=
n host.<br>
<br>
For NSH, I think you want the reassembly to happen at the end of the SFF. B=
ut I=E2=80=99m not sure, so for you all to comment on.<br>
<span class=3D"HOEnZb"><font color=3D"#888888"><br>
Dino<br>
</font></span><div class=3D"HOEnZb"><div class=3D"h5"><br>
&gt; On Apr 27, 2016, at 4:02 PM, Andrew G. Malis &lt;<a href=3D"mailto:agm=
alis@gmail.com">agmalis@gmail.com</a>&gt; wrote:<br>
&gt;<br>
&gt; Joel et al,<br>
&gt;<br>
&gt; All this talk about fragmentation prompted me to re-read section 6 of =
the draft, which recommends (as option 3) using the procedures in section 5=
.4 of RFC 6830 (presumably with the =E2=80=9CNSH header=E2=80=9D replacing =
the =E2=80=9CLISP header=E2=80=9D in the description of the procedures in t=
hat section).<br>
&gt;<br>
&gt; So that led me to read that section (and the LISP header definition in=
 section 5.1), and I see that LISP does fragmentation and reassembly identi=
cally to IPv4, using the Fragment Offset field so that fragments can be cor=
rectly reassembled in the proper order.<br>
&gt;<br>
&gt; However, the NSH Header doesn=E2=80=99t have a Fragment Offset field o=
r any other way to order the fragments.<br>
&gt;<br>
&gt; So how can the procedures in Section 5.4 of 6830 be used?<br>
&gt;<br>
&gt; Thanks,<br>
&gt; Andy<br>
&gt;<br>
&gt; On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern &lt;<a href=3D"mailto=
:jmh@joelhalpern.com">jmh@joelhalpern.com</a>&gt; wrote:<br>
&gt; Both methods are valid, and both depend upon details of the underlying=
 packet and the transport.=C2=A0 As such, I don&#39;t see why this document=
 benefits from describing them, much less why it should mark one method as =
a &quot;should&quot;.=C2=A0 Implementation details are likely to be more si=
gnificant than any bit consumption difference between the two alternatives.=
<br>
&gt;<br>
&gt; Yours,<br>
&gt; Joel<br>
&gt;<br>
&gt;<br>
&gt; On 4/27/16 3:40 PM, Linda Dunbar wrote:<br>
&gt; I suggest adding the following paragraphs after the Bullet 3 of the Se=
ction 6 Fragmentation Consideration to make the process more clear and less=
 controversial:<br>
&gt;<br>
&gt;<br>
&gt; --------------------------------<br>
&gt;<br>
&gt; RFC6830 describes the fragmentation method of breaking the original pa=
cket into two equal sub-frames and encapsulating [LISP Header + Transport h=
eader] to each sub-frame.<br>
&gt;<br>
&gt; If LISP fragmentation [RFC6830 Section 5.4] is used, the [SFC Header +=
 Transport Header] will be added to each half frame (or the original data f=
rame). As the Transport Header is terminated by the next SFF node&#39;s tun=
nel transport layer, the combined two sub-frames will have two SFC Headers.=
<br>
&gt;<br>
&gt; Therefore, the fragmentation for NSH encapsulated data frame should be=
 done completely by the node tunnel transport layer, which should break the=
 [SFC + original packet] into two equal sub-frames and each sub-frame being=
 encapsulated with its respective tunnel header.=C2=A0 The next SFF node&#3=
9;s tunnel transport layer should combine the two sub-frames before sending=
 to the next node.<br>
&gt;<br>
&gt; ------------------------------------------------------<br>
&gt;<br>
&gt;<br>
&gt; By the way, there are to typo in the Section 6:<br>
&gt; 3rd line: &quot;In order the&quot; =3D=3D&gt; &quot;In order to&quot;<=
br>
&gt; Last line of Bullet 2: extra &quot;the&quot; in the &quot;utilized to =
ensure the the required packet&quot;.<br>
&gt;<br>
&gt;<br>
&gt; Hope it helps.<br>
&gt;<br>
&gt; Linda<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt; -----Original Message-----<br>
&gt; From: <a href=3D"mailto:mohamed.boucadair@orange.com">mohamed.boucadai=
r@orange.com</a> [mailto:<a href=3D"mailto:mohamed.boucadair@orange.com">mo=
hamed.boucadair@orange.com</a>]<br>
&gt; Sent: Wednesday, April 27, 2016 12:40 AM<br>
&gt; To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; <a href=3D"mailto:sfc@i=
etf.org">sfc@ietf.org</a><br>
&gt; Subject: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
&gt;<br>
&gt; Hi Joel, all,<br>
&gt;<br>
&gt; Please see inline.<br>
&gt;<br>
&gt; Cheers,<br>
&gt; Med<br>
&gt;<br>
&gt; -----Message d&#39;origine-----<br>
&gt; De : Joel M. Halpern [mailto:<a href=3D"mailto:jmh@joelhalpern.com">jm=
h@joelhalpern.com</a>] Envoy=C3=A9 : mardi 26<br>
&gt; avril 2016 19:18 =C3=80 : Linda Dunbar; BOUCADAIR Mohamed IMT/OLN; Elz=
ur,<br>
&gt; Uri; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> Objet : Re: [sfc=
] WG last call for<br>
&gt; draft-ietf-sfc-nsh-04.txt<br>
&gt;<br>
&gt; With regard to Transport tunnel fragementation, that seems an issue<br=
>
&gt; for the transport protocol.=C2=A0 I don&#39;t actually object to a sen=
tence,<br>
&gt; but it does not seem that it will accomplish anything.<br>
&gt;<br>
&gt; [Med] I would like to see some text added to the draft.<br>
&gt;<br>
&gt;<br>
&gt; With regard to packets fragmented by the source, I completely disagree=
<br>
&gt; with your assertion.=C2=A0 If an SFF were to reassemble the packets, t=
hat<br>
&gt; would be a violation of its job.<br>
&gt;<br>
&gt; [Med] I agree with you.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0There is no reason for an SFF to<br>
&gt; reassemble a packet fragmented by the source.=C2=A0 The classifier may=
 have<br>
&gt; to do some interesting things in order to properly classify succeeding=
<br>
&gt; fragments, but that is an implementation issue (most commonly<br>
&gt; addressed with virtual reassembly, which doe snot delay the<br>
&gt; fragments.)=C2=A0 We don&#39;t specity that.<br>
&gt;<br>
&gt; [Med] Still, the external behavior of the classifier needs to be clear=
 in the document. I don&#39;t find any text in the draft saying for instanc=
e that an NSH header must be present in all fragments. (There some processi=
ng that might be needed at the SFF to &quot;do its job&quot; with regards t=
o fragments (receive out of order fragments + forwarding policy on the full=
 packet).)<br>
&gt;<br>
&gt;<br>
&gt; If an SF needs to reassemble fragments to do its job, that is up to<br=
>
&gt; the SF.=C2=A0 Some will need to actually reassemble.=C2=A0 Some will n=
eed to<br>
&gt; perform virtual reassembly, and some will happily process the<br>
&gt; fragments.=C2=A0 I can not see what the NSH document could possibly ma=
ndate.<br>
&gt;<br>
&gt; [Med] Fully agree.<br>
&gt;<br>
&gt;<br>
&gt; Yours,<br>
&gt; Joel<br>
&gt;<br>
&gt; On 4/26/16 11:47 AM, Linda Dunbar wrote:<br>
&gt; Joel,<br>
&gt;<br>
&gt; I think the document should add the description on the following two<b=
r>
&gt; fragmentation scenarios:<br>
&gt;<br>
&gt; - Transport tunnel generated fragmentation: When a packet<br>
&gt; fragmentation is caused by transport tunnel (i.e. various<br>
&gt; encapsulations), the termination point of the transport tunnel is<br>
&gt; responsible for re-assembling the fragmented pieces of the packet.<br>
&gt; Since there won&#39;t be any SFF nodes in between the Transport Tunnel=
,<br>
&gt; the tunnel generated fragmentation does not require any actions by<br>
&gt; SFF nodes or SF nodes.<br>
&gt;<br>
&gt;<br>
&gt; - Source node generated fragmentation (after adding on the NSH<br>
&gt; header): When fragmentation has to be performed for a packet being<br>
&gt; encapsulated with the NSH header, either the intermediate SFF nodes<br=
>
&gt; or the SF nodes have to be able to reassemble the fragmented pieces.<b=
r>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt; Cheers,<br>
&gt;<br>
&gt;<br>
&gt; Linda<br>
&gt;<br>
&gt; -----Original Message----- From: Joel M. Halpern<br>
&gt; [mailto:<a href=3D"mailto:jmh@joelhalpern.com">jmh@joelhalpern.com</a>=
] Sent: Tuesday, April 26, 2016 10:33 AM<br>
&gt; To: Linda Dunbar; <a href=3D"mailto:mohamed.boucadair@orange.com">moha=
med.boucadair@orange.com</a>; Elzur, Uri;<br>
&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> Subject: Re: [sfc] WG=
 last call for<br>
&gt; draft-ietf-sfc-nsh-04.txt<br>
&gt;<br>
&gt; Re-reading your note, it is possible that you are referring only to<br=
>
&gt; the case of transport generated fragmentation of the outer packet.<br>
&gt; I had assumed you were not talking about that, since the resulting<br>
&gt; fragments will not all have NSH headers.=C2=A0 As with any tunnel<br>
&gt; technology, if the tunnel chooses to fragment at its layer, then the<b=
r>
&gt; tunnel is responsible for reassembly.=C2=A0 That would be invisible to=
<br>
&gt; the SFF.<br>
&gt;<br>
&gt; Yours, Joel<br>
&gt;<br>
&gt; On 4/26/16 11:10 AM, Linda Dunbar wrote:<br>
&gt; Agree with Med.<br>
&gt;<br>
&gt; Even if each fragment piece of a packet with NSH header carries the<br=
>
&gt; NSH header, the intermediate SFF nodes still need to put together<br>
&gt; all the fragments together before passing the whole data frame to<br>
&gt; the SF.<br>
&gt;<br>
&gt; Linda<br>
&gt;<br>
&gt; -----Original Message----- From: sfc [mailto:<a href=3D"mailto:sfc-bou=
nces@ietf.org">sfc-bounces@ietf.org</a>]<br>
&gt; On Behalf Of <a href=3D"mailto:mohamed.boucadair@orange.com">mohamed.b=
oucadair@orange.com</a> Sent: Monday, April 25,<br>
&gt; 2016 9:42 AM To: Elzur, Uri; Joel M. Halpern; <a href=3D"mailto:sfc@ie=
tf.org">sfc@ietf.org</a> Subject:<br>
&gt; Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
&gt;<br>
&gt; Re-,<br>
&gt;<br>
&gt; How do you instruct the transport layer to ALWAYS prepend an NSH<br>
&gt; header even for fragments? Or you don&#39;t care about that?<br>
&gt;<br>
&gt; Thank you.<br>
&gt;<br>
&gt; Cheers, Med<br>
&gt;<br>
&gt; -----Message d&#39;origine----- De : Elzur, Uri<br>
&gt; [mailto:<a href=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>=
] Envoy=C3=A9 : lundi 25 avril 2016 16:26 =C3=80<br>
&gt; : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern; <a href=3D"mailto:sfc@ie=
tf.org">sfc@ietf.org</a> Objet<br>
&gt; : RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
&gt;<br>
&gt; Hi Med<br>
&gt;<br>
&gt; Not to repeat my position, but I&#39;ll do it anyhow :-) As NSH is<br>
&gt; *NOT* a transport, dealing with fragmentation is left to the<br>
&gt; Transport used.<br>
&gt;<br>
&gt; The model I use for NSH, is basically similar to VXLAN . It is an<br>
&gt; overly.<br>
&gt;<br>
&gt; Thx<br>
&gt;<br>
&gt; Uri (&quot;Oo-Ree&quot;) C: <a href=3D"tel:949-378-7568" value=3D"+194=
93787568">949-378-7568</a><br>
&gt;<br>
&gt;<br>
&gt; -----Original Message----- From: sfc [mailto:<a href=3D"mailto:sfc-bou=
nces@ietf.org">sfc-bounces@ietf.org</a>]<br>
&gt; On Behalf Of <a href=3D"mailto:mohamed.boucadair@orange.com">mohamed.b=
oucadair@orange.com</a> Sent: Monday, April 25,<br>
&gt; 2016 7:18 AM To: Joel M. Halpern &lt;<a href=3D"mailto:jmh@joelhalpern=
.com">jmh@joelhalpern.com</a>&gt;;<br>
&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
&gt; Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
&gt;<br>
&gt; Hi Joel,<br>
&gt;<br>
&gt; Please see inline.<br>
&gt;<br>
&gt; Cheers, Med<br>
&gt;<br>
&gt; -----Message d&#39;origine----- De : Joel M. Halpern<br>
&gt; [mailto:<a href=3D"mailto:jmh@joelhalpern.com">jmh@joelhalpern.com</a>=
] Envoy=C3=A9 : lundi 25 avril 2016 15:48 =C3=80<br>
&gt; : BOUCADAIR Mohamed IMT/OLN; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.=
org</a> Objet : Re: [sfc] WG<br>
&gt; last call for draft-ietf-sfc-nsh-04.txt<br>
&gt;<br>
&gt; If I am understanding you correctly Med, you are asking that the<br>
&gt; NSH draft specify how service chaining should cope with packets<br>
&gt; that have been fragmented?<br>
&gt;<br>
&gt;<br>
&gt; [Med] To be accurate, I&#39;m asking to assess whether there are<br>
&gt; implications. If there are, then the draft should be updated<br>
&gt; accordingly.<br>
&gt;<br>
&gt; NSH, and the SFF functionality, does not care.<br>
&gt;<br>
&gt; [Med] I&#39;m not that sure. Some typical implications are listed<br>
&gt; below:<br>
&gt;<br>
&gt; * SFF: If the NSH header is present only in the a fragment but SFF<br>
&gt; didn&#39;t maintained a state, subsequent fragments won&#39;t be<br>
&gt; appropriately processed. * SFC-aware function: if prepending a<br>
&gt; context information depends on the full packet, not only a<br>
&gt; fragment.<br>
&gt;<br>
&gt; It just does its job.<br>
&gt;<br>
&gt; [Med] which may be disturbed in some situations as listed in the<br>
&gt; examples above.<br>
&gt;<br>
&gt; Ingress and intermediate classifiers may cope with fragments in<br>
&gt; any number of ways.<br>
&gt; Specifying such is clearly out of scope for this draft.<br>
&gt;<br>
&gt; [Med] The purpose is not to specify the internal implementation<br>
&gt; details but the external behavior of the classifier function when<br>
&gt; it comes to handle fragments. That behavior may have an incidence<br>
&gt; on SFF, in particular. The purpose is not to recommend the maximum<br>
&gt; resources to be dedicated to out of order fragments nor the<br>
&gt; timeout to cache those; these considerations are of course out of<br>
&gt; scope. Nevertheless, an implementation should offer a configurable<br>
&gt; parameter so that an operator tweak those according to its<br>
&gt; context.<br>
&gt;<br>
&gt; I suppose one could write an informational draft on possible ways<br>
&gt; of coping.=C2=A0 The IETF has not usually published such.<br>
&gt; Service functions have to cope with fragmented packets just as<br>
&gt; they had to before the advent of NSH, so describing that is<br>
&gt; clearly not needed here.<br>
&gt;<br>
&gt; [Med] The advent of NSH has the following implications: * it<br>
&gt; exacerbates fragmentation. Handing over this issue to the<br>
&gt; transport layer may lead to interoperability issues. * the<br>
&gt; chaining may not be efficient if fragments are inappropriately<br>
&gt; handled.<br>
&gt;<br>
&gt; Introducing NSH should not degrade the overall service compared to<br>
&gt; legacy service deployment schemes.<br>
&gt;<br>
&gt;<br>
&gt; Yours, Joel<br>
&gt;<br>
&gt; On 4/25/16 3:00 AM, <a href=3D"mailto:mohamed.boucadair@orange.com">mo=
hamed.boucadair@orange.com</a> wrote:<br>
&gt; Re-,<br>
&gt;<br>
&gt; I hear you, but my comment is that we need, as a WG, to decide<br>
&gt; what to<br>
&gt; put in the draft. FWIW, I&#39;m discussing two fragmentation<br>
&gt; issues:<br>
&gt;<br>
&gt; (1) Fragmentation that is caused by prepending an SFC header.<br>
&gt; (2) Handling fragments at the ingress of an SFC-enabled domain.<br>
&gt;<br>
&gt; Increasing the MTU is for sure a recommendation is to be<br>
&gt; explicitly<br>
&gt; called out in the text (see my first message).<br>
&gt;<br>
&gt; There are other issues that need to be discussed, e.g., how to<br>
&gt; deal with<br>
&gt; fragments in SFFs/Classifiers?<br>
&gt;<br>
&gt; It is also &quot;prudent&quot; to check that no issues will be experie=
nced<br>
&gt; in SFF<br>
&gt; to handle fragments. If an SFC header is prepended for all<br>
&gt; fragments, I&#39;m not sure there<br>
&gt; is any particular issue at the SFF level, except if<br>
&gt; stripping/adding<br>
&gt; context TLVs depends on the full packet (not just fragment). It<br>
&gt; is warranted to consider a little bit this point before declaring<br>
&gt; there is no issue.<br>
&gt;<br>
&gt; For point (1), declaring fragmentation out of scope would be<br>
&gt; meant that<br>
&gt; an implementation must be prepared to receive fragments with or<br>
&gt; without NSH header as this is a decision that is left to the<br>
&gt; transport encapsulation. This is a requirement per se!<br>
&gt;<br>
&gt; I won&#39;t reiterate all the comments I have about the current<br>
&gt; wording of<br>
&gt; this section.<br>
&gt;<br>
&gt; Cheers, Med<br>
&gt;<br>
&gt; -----Message d&#39;origine----- De : Elzur, Uri<br>
&gt; [mailto:<a href=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>=
] Envoy=C3=A9 : lundi 25 avril 2016<br>
&gt; 08:30 =C3=80 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;<br>
&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> Objet : RE: [sfc] WG =
last call for<br>
&gt; draft-ietf-sfc-nsh-04.txt<br>
&gt;<br>
&gt; Hi Med<br>
&gt;<br>
&gt; My point is that Fragmentation is yet another transport related<br>
&gt; issue<br>
&gt; that<br>
&gt; is beyond the scope of NSH and beyond the charter of the WG, so<br>
&gt; it<br>
&gt; doesn&#39;t<br>
&gt; really belong in the draft. We are providing an advice as<br>
&gt; extending the size of the packet may lead to fragmentation, but<br>
&gt; as you check RFC 7348 VxLAN, which my create the same issue,<br>
&gt; you&#39;ll find it doesn&#39;t even<br>
&gt; relate<br>
&gt; to it.<br>
&gt;<br>
&gt; Thx<br>
&gt;<br>
&gt; Uri (&quot;Oo-Ree&quot;) C: <a href=3D"tel:949-378-7568" value=3D"+194=
93787568">949-378-7568</a><br>
&gt;<br>
&gt;<br>
&gt; -----Original Message----- From: sfc<br>
&gt; [mailto:<a href=3D"mailto:sfc-bounces@ietf.org">sfc-bounces@ietf.org</=
a>] On Behalf Of<br>
&gt; <a href=3D"mailto:mohamed.boucadair@orange.com">mohamed.boucadair@oran=
ge.com</a> Sent: Sunday, April 24, 2016<br>
&gt; 10:32 PM To: Elzur, Uri &lt;<a href=3D"mailto:uri.elzur@intel.com">uri=
.elzur@intel.com</a>&gt;; Thomas Narten<br>
&gt; &lt;<a href=3D"mailto:narten@us.ibm.com">narten@us.ibm.com</a>&gt;;<br=
>
&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> Subject: Re: [sfc] WG=
 last call for<br>
&gt; draft-ietf-sfc-nsh-04.txt<br>
&gt;<br>
&gt; Hi Uri,<br>
&gt;<br>
&gt; That&#39;s another option that needs to be discussed/investigated.<br>
&gt; I&#39;m<br>
&gt; afraid<br>
&gt; this is not the rationale adopted in -04 since it includes some<br>
&gt; text<br>
&gt; that<br>
&gt; is far to be sufficient to ensure interoperable<br>
&gt; implementations.<br>
&gt;<br>
&gt; BTW, saying that nsh does not need to deal with fragmentation<br>
&gt; because<br>
&gt; it<br>
&gt; is transport-independent is not IMHO a good strategy to adopt<br>
&gt; here<br>
&gt; because<br>
&gt; it opens the door for interoperable issues, it may lead to<br>
&gt; sub-optimal implementations if the sfc information is present<br>
&gt; only in one<br>
&gt; fragments,<br>
&gt; etc.<br>
&gt;<br>
&gt; My comments are related to the current text in the -04.<br>
&gt; This text needs<br>
&gt; to<br>
&gt; be fixed somehow.<br>
&gt;<br>
&gt; Cheers, Med<br>
&gt;<br>
&gt; -----Message d&#39;origine----- De : Elzur, Uri<br>
&gt; [mailto:<a href=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>=
] Envoy=C3=A9 : dimanche 24 avril<br>
&gt; 2016 17:36 =C3=80 : BOUCADAIR Mohamed IMT/OLN; Thomas Narten;<br>
&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> Objet : RE: [sfc] WG =
last call for<br>
&gt; draft-ietf-sfc-nsh-04.txt<br>
&gt;<br>
&gt; Hi Med<br>
&gt;<br>
&gt; I see no need to specify the exact behavior as NSH is<br>
&gt; transport independent i.e. like NSH interaction with any other<br>
&gt; Transport eh issue of Fragmentation is to be dealt in a way<br>
&gt; that matches the mechanisms supported by the Transport used<br>
&gt; and do not belong in the NSH draft<br>
&gt;<br>
&gt; Thx<br>
&gt;<br>
&gt; Uri (&quot;Oo-Ree&quot;) C: <a href=3D"tel:949-378-7568" value=3D"+194=
93787568">949-378-7568</a><br>
&gt;<br>
&gt;<br>
&gt; -----Original Message----- From: sfc<br>
&gt; [mailto:<a href=3D"mailto:sfc-bounces@ietf.org">sfc-bounces@ietf.org</=
a>] On Behalf Of<br>
&gt; <a href=3D"mailto:mohamed.boucadair@orange.com">mohamed.boucadair@oran=
ge.com</a> Sent: Thursday, April 14,<br>
&gt; 2016 12:43 AM To: Thomas Narten &lt;<a href=3D"mailto:narten@us.ibm.co=
m">narten@us.ibm.com</a>&gt;;<br>
&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> Subject: Re: [sfc] WG=
 last call for<br>
&gt; draft-ietf-sfc-nsh-04.txt<br>
&gt;<br>
&gt; R-,<br>
&gt;<br>
&gt; In addition to other pending issues raised for this draft, I<br>
&gt; would like to raise this additional one about Section 6.<br>
&gt;<br>
&gt; =3D=3D 6.=C2=A0 Fragmentation Considerations<br>
&gt;<br>
&gt; NSH and the associated transport header are &quot;added&quot; to the<b=
r>
&gt; encapsulated packet/frame.=C2=A0 This additional information<br>
&gt; increases<br>
&gt; the<br>
&gt; size of the packet.=C2=A0 In order the ensure proper forwarding of<br>
&gt; NSH data, several options for handling fragmentation and<br>
&gt; re-assembly exist:<br>
&gt;<br>
&gt; 1.=C2=A0 Jumbo Frames, when supported, enable the transport of NSH<br>
&gt; and associated transport packets without requiring<br>
&gt; fragmentation.<br>
&gt;<br>
&gt; 2.=C2=A0 Path MTU Discovery [RFC1191]&quot;describes a technique for<b=
r>
&gt; dynamically discovering the maximum transmission unit (MTU) of<br>
&gt; an<br>
&gt; arbitrary internet path&quot; and can be utilized to ensure the<br>
&gt; the<br>
&gt; required packet size is used.<br>
&gt;<br>
&gt; 3.=C2=A0 [RFC6830] describes two schemes for fragmentation and<br>
&gt; re-<br>
&gt; assembly<br>
&gt; in section 5.4. =3D=3D<br>
&gt;<br>
&gt; * The text is weak for a Standard track document that is<br>
&gt; intended to solve the problem in<br>
&gt; <a href=3D"https://tools.ietf.org/html/rfc7498#section-" rel=3D"norefe=
rrer" target=3D"_blank">https://tools.ietf.org/html/rfc7498#section-</a><br=
>
&gt; 2.12.<br>
&gt; There should be a clear behavior to be followed by an<br>
&gt; implementation.<br>
&gt; Further, I would avoid the use of words such as &quot;can&quot;.<br>
&gt;<br>
&gt; * The text covers only fragmentation when it is induced by SFC<br>
&gt; operations, it does not discuss the treatment of a fragment<br>
&gt; when received in an SFC domain. IMHO, the draft should also<br>
&gt; specify the behavior of the Classifier with regards to<br>
&gt; fragments for the sake of proper SFC operation. Applying<br>
&gt; classification policies may require the<br>
&gt; full packet, not only a fragment.<br>
&gt; In particular, dedicated resources should dedicated for<br>
&gt; handling out of order fragments. Of course, it is out of scope<br>
&gt; of this document to describe how SFs handle fragments.<br>
&gt;<br>
&gt; * If an SFC header is prepended for all fragments, I&#39;m not<br>
&gt; sure there is any particular issue at the SFF level...except<br>
&gt; if stripping/adding context TLVs depends on the full packet<br>
&gt; (not just fragment). It is warranted to consider a little bit<br>
&gt; this point before declaring there<br>
&gt; is<br>
&gt; no issue.<br>
&gt;<br>
&gt; * The text states &quot;several options&quot;. This may be interpreted=
<br>
&gt; as if implementing one of them is sufficient...which is not<br>
&gt; true. The first two points contribute to minimize the<br>
&gt; fragmentation risk, but fragmentation may still be experienced<br>
&gt; (e.g., other shims are prepended by other nodes for some other<br>
&gt; purposes, nested nsh, etc.)<br>
&gt;<br>
&gt; * The first two points have nothing to do with reassembly.<br>
&gt;<br>
&gt; * The support of jumbo frames by a router/device does not mean<br>
&gt; that it can make use of it. Appropriate MTU configuration<br>
&gt; should be undertaken in a consistent manner within an SFC<br>
&gt; domain. The text should be updated to make it is about<br>
&gt; (consistent) MTU<br>
&gt; configuration.<br>
&gt;<br>
&gt; * BTW, shouldn&#39;t the text be reworded to recommended to<br>
&gt; increase the MTU of **all nodes** of an SFC-enabled domain by<br>
&gt; at least the length of SFC header + transport header?<br>
&gt;<br>
&gt; * Bullet 2, how PMTU discovery is actually used in this<br>
&gt; context? Do you assume that all SFC-aware nodes will issue<br>
&gt; such messages towards other SFC-aware node, arbitrary<br>
&gt; destination, else?<br>
&gt;<br>
&gt; * Bullet 2, I would drop &quot;describes a technique for<br>
&gt; dynamically discovering the maximum transmission unit<br>
&gt; (MTU) of an arbitrary internet path&quot;.<br>
&gt;<br>
&gt; * Bullet 2, s/ the the/the.<br>
&gt;<br>
&gt; * The reference to the LISP specification raises two concerns<br>
&gt; and one comment:<br>
&gt;<br>
&gt; (1) I don&#39;t think it is a good approach that fragments induced<br>
&gt; by the network are passed to their ultimate destinations as<br>
&gt; such<br>
&gt; (stateless).<br>
&gt; IMO, reassembly should be done within the SFC domain<br>
&gt; (responsible for fragmentation) not passed away. (2) Does the<br>
&gt; stateful mode require all SFC data plane elements maintain a<br>
&gt; full list of MTU for the any SFF/SF instance of the SFC<br>
&gt; domain?<br>
&gt;<br>
&gt; The current text suggests that [RFC6830] should be listed as<br>
&gt; normative reference (not an informative one). I would<br>
&gt; personally favor removing the reference to LISP (as it is an<br>
&gt; Experimental RFC).<br>
&gt;<br>
&gt; * The security section of the draft may be augmented with<br>
&gt; informational fragmentation-related pointers to:<br>
&gt; e.g., RFC1858 (Security Considerations for IP Fragment<br>
&gt; Filtering), RFC3128 (Protection Against a Variant of the Tiny<br>
&gt; Fragment Attack), and RFC 4963 (IPv4 Reassembly Errors at High<br>
&gt; Data Rates).<br>
&gt;<br>
&gt; Cheers, Med<br>
&gt;<br>
&gt; -----Message d&#39;origine----- De : sfc<br>
&gt; [mailto:<a href=3D"mailto:sfc-bounces@ietf.org">sfc-bounces@ietf.org</=
a>] De la part de<br>
&gt; <a href=3D"mailto:mohamed.boucadair@orange.com">mohamed.boucadair@oran=
ge.com</a> Envoy=C3=A9 : lundi 11 avril<br>
&gt; 2016 13:14 =C3=80 : Thomas Narten; <a href=3D"mailto:sfc@ietf.org">sfc=
@ietf.org</a> Objet : Re:<br>
&gt; [sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
&gt;<br>
&gt; Dear Thomas, all,<br>
&gt;<br>
&gt; As I mentioned during the meeting, there are several issues<br>
&gt; that are not covered in the last version of the draft. I<br>
&gt; already provided examples of the issues offline as requested<br>
&gt; by Martin.<br>
&gt;<br>
&gt; Cheers, Med<br>
&gt;<br>
&gt; -----Message d&#39;origine----- De : sfc<br>
&gt; [mailto:<a href=3D"mailto:sfc-bounces@ietf.org">sfc-bounces@ietf.org</=
a>] De la part de Thomas Narten<br>
&gt; Envoy=C3=A9 : jeudi 31 mars 2016 04:48 =C3=80 :<br>
&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> Objet : [sfc] WG last=
 call for<br>
&gt; draft-ietf-sfc-nsh-04.txt<br>
&gt;<br>
&gt; Dear WG:<br>
&gt;<br>
&gt; This note begins a WG last call on draft-ietf-sfc-nsh-04.txt<br>
&gt; (<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/" rel=
=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ie=
tf-sfc-nsh/</a>).<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt; The editors of the NSH document have indicated that they have<br>
&gt; addressed all known comments and that there are no open<br>
&gt; issues with the current version of the document.<br>
&gt;<br>
&gt; Substantive comments to the list please, editorial comments<br>
&gt; can go directly to the document editors.<br>
&gt;<br>
&gt; We&#39;ll also get a brief update from the editors at next<br>
&gt; week&#39;s meeting. If there are any remaining issues with the<br>
&gt; document, raising them before the meeting would be<br>
&gt; especially helpful.<br>
&gt;<br>
&gt; For the chairs, Thomas<br>
&gt;<br>
&gt; _______________________________________________ sfc mailing<br>
&gt; list <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <a href=3D"https=
://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" target=3D"_blank">=
https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;<br>
&gt; _______________________________________________ sfc mailing<br>
&gt; list <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <a href=3D"https=
://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" target=3D"_blank">=
https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;<br>
&gt; _______________________________________________ sfc mailing<br>
&gt; list <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <a href=3D"https=
://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" target=3D"_blank">=
https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;<br>
&gt; _______________________________________________ sfc mailing<br>
&gt; list <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <a href=3D"https=
://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" target=3D"_blank">=
https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;<br>
&gt; _______________________________________________ sfc mailing list<br>
&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <a href=3D"https://ww=
w.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" target=3D"_blank">https=
://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;<br>
&gt;<br>
&gt; _______________________________________________ sfc mailing list<br>
&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <a href=3D"https://ww=
w.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" target=3D"_blank">https=
://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;<br>
&gt; _______________________________________________ sfc mailing list<br>
&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> <a href=3D"https://ww=
w.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" target=3D"_blank">https=
://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; sfc mailing list<br>
&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferre=
r" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; sfc mailing list<br>
&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferre=
r" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
</div></div></blockquote></div><br></div>

--089e011826a4cf44c805317f9aab--


From nobody Wed Apr 27 16:46:30 2016
Return-Path: <jmh.direct@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 32F5C12D09F for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 16:46:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q-hrmbCF7RS6 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 16:46:25 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0C15A12B029 for <sfc@ietf.org>; Wed, 27 Apr 2016 16:46:25 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id CE2A9240EFB; Wed, 27 Apr 2016 16:46:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461800784; bh=RwMk6jPr9WtRWI1F3YITdgmojW2Qfnho8eDAO+VjAMA=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=RHAKMxUA2V+3PfM+YSq9dIwFj35r/5UJomWmPD1or1lNo3evBUFp4fllgn0vR3nG0 zeuum2VHQ7fiEnOrmgIrJuWwk+IOvFkqZ49aMhU/sQ2sypR8ETejGlOurUqFVF9yxQ PJfKIwX0KrAws+GvnGbqmVACaHiFCqw1/DgOPQWE=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id A7AF22403A3; Wed, 27 Apr 2016 16:46:21 -0700 (PDT)
To: "Andrew G. Malis" <agmalis@gmail.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb> <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com> <CAA=duU0cjXbTxTCqaRetajxFaJVfq8Y-HySPDrR-0AN38Wq3Zw@mail.gmail.com>
From: Joel Halpern Direct <jmh.direct@joelhalpern.com>
Message-ID: <4d65232a-d4a6-a11b-c765-635cb909edbd@joelhalpern.com>
Date: Wed, 27 Apr 2016 19:46:09 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <CAA=duU0cjXbTxTCqaRetajxFaJVfq8Y-HySPDrR-0AN38Wq3Zw@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/4QQJd5D8MWxqb801S_kNSHT4aJA>
Cc: "Elzur, Uri" <uri.elzur@intel.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Apr 2016 23:46:28 -0000

The LISP header does not have a fragment flag or fragment offset.  The 
diagrams in section 6 include the outer encapsulating header (the 
equivalent of the transport header in SFC.)  Yes, the text is a little 
hard to follow in this regard.  The LISP working group is going to be 
rewriting RFC 6830 as part of moving to standards track.

So there is no difference in this regard between NSH and LISP.

Yours,
Joel

On 4/27/16 7:02 PM, Andrew G. Malis wrote:
> Joel et al,
>
> All this talk about fragmentation prompted me to re-read section 6 of
> the draft, which recommends (as option 3) using the procedures in
> section 5.4 of RFC 6830 (presumably with the â€œNSH headerâ€ replacing the
> â€œLISP headerâ€ in the description of the procedures in that section).
>
> So that led me to read that section (and the LISP header definition in
> section 5.1), and I see that LISP does fragmentation and reassembly
> identically to IPv4, using the Fragment Offset field so that fragments
> can be correctly reassembled in the proper order.
>
> However, the NSH Header doesnâ€™t have a Fragment Offset field or any
> other way to order the fragments.
>
> So how can the procedures in Section 5.4 of 6830 be used?
>
> Thanks,
> Andy
>
> On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern <jmh@joelhalpern.com
> <mailto:jmh@joelhalpern.com>> wrote:
>
>     Both methods are valid, and both depend upon details of the
>     underlying packet and the transport.  As such, I don't see why this
>     document benefits from describing them, much less why it should mark
>     one method as a "should".  Implementation details are likely to be
>     more significant than any bit consumption difference between the two
>     alternatives.
>
>     Yours,
>     Joel
>
>
>     On 4/27/16 3:40 PM, Linda Dunbar wrote:
>
>         I suggest adding the following paragraphs after the Bullet 3 of
>         the Section 6 Fragmentation Consideration to make the process
>         more clear and less controversial:
>
>
>         --------------------------------
>
>         RFC6830 describes the fragmentation method of breaking the
>         original packet into two equal sub-frames and encapsulating
>         [LISP Header + Transport header] to each sub-frame.
>
>         If LISP fragmentation [RFC6830 Section 5.4] is used, the [SFC
>         Header + Transport Header] will be added to each half frame (or
>         the original data frame). As the Transport Header is terminated
>         by the next SFF node's tunnel transport layer, the combined two
>         sub-frames will have two SFC Headers.
>
>         Therefore, the fragmentation for NSH encapsulated data frame
>         should be done completely by the node tunnel transport layer,
>         which should break the [SFC + original packet] into two equal
>         sub-frames and each sub-frame being encapsulated with its
>         respective tunnel header.  The next SFF node's tunnel transport
>         layer should combine the two sub-frames before sending to the
>         next node.
>
>         ------------------------------------------------------
>
>
>         By the way, there are to typo in the Section 6:
>         3rd line: "In order the" ==> "In order to"
>         Last line of Bullet 2: extra "the" in the "utilized to ensure
>         the the required packet".
>
>
>         Hope it helps.
>
>         Linda
>
>
>
>         -----Original Message-----
>         From: mohamed.boucadair@orange.com
>         <mailto:mohamed.boucadair@orange.com>
>         [mailto:mohamed.boucadair@orange.com
>         <mailto:mohamed.boucadair@orange.com>]
>         Sent: Wednesday, April 27, 2016 12:40 AM
>         To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; sfc@ietf.org
>         <mailto:sfc@ietf.org>
>         Subject: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
>         Hi Joel, all,
>
>         Please see inline.
>
>         Cheers,
>         Med
>
>             -----Message d'origine-----
>             De : Joel M. Halpern [mailto:jmh@joelhalpern.com
>             <mailto:jmh@joelhalpern.com>] EnvoyÃ© : mardi 26
>             avril 2016 19:18 Ã€ : Linda Dunbar; BOUCADAIR Mohamed
>             IMT/OLN; Elzur,
>             Uri; sfc@ietf.org <mailto:sfc@ietf.org> Objet : Re: [sfc] WG
>             last call for
>             draft-ietf-sfc-nsh-04.txt
>
>             With regard to Transport tunnel fragementation, that seems
>             an issue
>             for the transport protocol.  I don't actually object to a
>             sentence,
>             but it does not seem that it will accomplish anything.
>
>
>         [Med] I would like to see some text added to the draft.
>
>
>             With regard to packets fragmented by the source, I
>             completely disagree
>             with your assertion.  If an SFF were to reassemble the
>             packets, that
>             would be a violation of its job.
>
>
>         [Med] I agree with you.
>
>           There is no reason for an SFF to
>
>             reassemble a packet fragmented by the source.  The
>             classifier may have
>             to do some interesting things in order to properly classify
>             succeeding
>             fragments, but that is an implementation issue (most commonly
>             addressed with virtual reassembly, which doe snot delay the
>             fragments.)  We don't specity that.
>
>
>         [Med] Still, the external behavior of the classifier needs to be
>         clear in the document. I don't find any text in the draft saying
>         for instance that an NSH header must be present in all
>         fragments. (There some processing that might be needed at the
>         SFF to "do its job" with regards to fragments (receive out of
>         order fragments + forwarding policy on the full packet).)
>
>
>             If an SF needs to reassemble fragments to do its job, that
>             is up to
>             the SF.  Some will need to actually reassemble.  Some will
>             need to
>             perform virtual reassembly, and some will happily process the
>             fragments.  I can not see what the NSH document could
>             possibly mandate.
>
>
>         [Med] Fully agree.
>
>
>             Yours,
>             Joel
>
>             On 4/26/16 11:47 AM, Linda Dunbar wrote:
>
>                 Joel,
>
>                 I think the document should add the description on the
>                 following two
>                 fragmentation scenarios:
>
>                 - Transport tunnel generated fragmentation: When a packet
>                 fragmentation is caused by transport tunnel (i.e. various
>                 encapsulations), the termination point of the transport
>                 tunnel is
>                 responsible for re-assembling the fragmented pieces of
>                 the packet.
>                 Since there won't be any SFF nodes in between the
>                 Transport Tunnel,
>                 the tunnel generated fragmentation does not require any
>                 actions by
>                 SFF nodes or SF nodes.
>
>
>                 - Source node generated fragmentation (after adding on
>                 the NSH
>                 header): When fragmentation has to be performed for a
>                 packet being
>                 encapsulated with the NSH header, either the
>                 intermediate SFF nodes
>                 or the SF nodes have to be able to reassemble the
>                 fragmented pieces.
>
>
>
>
>                 Cheers,
>
>
>                 Linda
>
>                 -----Original Message----- From: Joel M. Halpern
>                 [mailto:jmh@joelhalpern.com
>                 <mailto:jmh@joelhalpern.com>] Sent: Tuesday, April 26,
>                 2016 10:33 AM
>                 To: Linda Dunbar; mohamed.boucadair@orange.com
>                 <mailto:mohamed.boucadair@orange.com>; Elzur, Uri;
>                 sfc@ietf.org <mailto:sfc@ietf.org> Subject: Re: [sfc] WG
>                 last call for
>                 draft-ietf-sfc-nsh-04.txt
>
>                 Re-reading your note, it is possible that you are
>                 referring only to
>                 the case of transport generated fragmentation of the
>                 outer packet.
>                 I had assumed you were not talking about that, since the
>                 resulting
>                 fragments will not all have NSH headers.  As with any tunnel
>                 technology, if the tunnel chooses to fragment at its
>                 layer, then the
>                 tunnel is responsible for reassembly.  That would be
>                 invisible to
>                 the SFF.
>
>                 Yours, Joel
>
>                 On 4/26/16 11:10 AM, Linda Dunbar wrote:
>
>                     Agree with Med.
>
>                     Even if each fragment piece of a packet with NSH
>                     header carries the
>                     NSH header, the intermediate SFF nodes still need to
>                     put together
>                     all the fragments together before passing the whole
>                     data frame to
>                     the SF.
>
>                     Linda
>
>                     -----Original Message----- From: sfc
>                     [mailto:sfc-bounces@ietf.org
>                     <mailto:sfc-bounces@ietf.org>]
>                     On Behalf Of mohamed.boucadair@orange.com
>                     <mailto:mohamed.boucadair@orange.com> Sent: Monday,
>                     April 25,
>                     2016 9:42 AM To: Elzur, Uri; Joel M. Halpern;
>                     sfc@ietf.org <mailto:sfc@ietf.org> Subject:
>                     Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
>                     Re-,
>
>                     How do you instruct the transport layer to ALWAYS
>                     prepend an NSH
>                     header even for fragments? Or you don't care about that?
>
>                     Thank you.
>
>                     Cheers, Med
>
>                         -----Message d'origine----- De : Elzur, Uri
>                         [mailto:uri.elzur@intel.com
>                         <mailto:uri.elzur@intel.com>] EnvoyÃ© : lundi 25
>                         avril 2016 16:26 Ã€
>                         : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;
>                         sfc@ietf.org <mailto:sfc@ietf.org> Objet
>                         : RE: [sfc] WG last call for
>                         draft-ietf-sfc-nsh-04.txt
>
>                         Hi Med
>
>                         Not to repeat my position, but I'll do it anyhow
>                         :-) As NSH is
>                         *NOT* a transport, dealing with fragmentation is
>                         left to the
>                         Transport used.
>
>                         The model I use for NSH, is basically similar to
>                         VXLAN . It is an
>                         overly.
>
>                         Thx
>
>                         Uri ("Oo-Ree") C: 949-378-7568 <tel:949-378-7568>
>
>
>                         -----Original Message----- From: sfc
>                         [mailto:sfc-bounces@ietf.org
>                         <mailto:sfc-bounces@ietf.org>]
>                         On Behalf Of mohamed.boucadair@orange.com
>                         <mailto:mohamed.boucadair@orange.com> Sent:
>                         Monday, April 25,
>                         2016 7:18 AM To: Joel M. Halpern
>                         <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>>;
>                         sfc@ietf.org <mailto:sfc@ietf.org>
>                         Subject: Re: [sfc] WG last call for
>                         draft-ietf-sfc-nsh-04.txt
>
>                         Hi Joel,
>
>                         Please see inline.
>
>                         Cheers, Med
>
>                             -----Message d'origine----- De : Joel M. Halpern
>                             [mailto:jmh@joelhalpern.com
>                             <mailto:jmh@joelhalpern.com>] EnvoyÃ© : lundi
>                             25 avril 2016 15:48 Ã€
>                             : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org
>                             <mailto:sfc@ietf.org> Objet : Re: [sfc] WG
>                             last call for draft-ietf-sfc-nsh-04.txt
>
>                             If I am understanding you correctly Med, you
>                             are asking that the
>                             NSH draft specify how service chaining
>                             should cope with packets
>                             that have been fragmented?
>
>
>                         [Med] To be accurate, I'm asking to assess
>                         whether there are
>                         implications. If there are, then the draft
>                         should be updated
>                         accordingly.
>
>                             NSH, and the SFF functionality, does not care.
>
>
>                         [Med] I'm not that sure. Some typical
>                         implications are listed
>                         below:
>
>                         * SFF: If the NSH header is present only in the
>                         a fragment but SFF
>                         didn't maintained a state, subsequent fragments
>                         won't be
>                         appropriately processed. * SFC-aware function:
>                         if prepending a
>                         context information depends on the full packet,
>                         not only a
>                         fragment.
>
>                         It just does its job.
>
>                         [Med] which may be disturbed in some situations
>                         as listed in the
>                         examples above.
>
>                             Ingress and intermediate classifiers may
>                             cope with fragments in
>                             any number of ways.
>
>                         Specifying such is clearly out of scope for this
>                         draft.
>
>                         [Med] The purpose is not to specify the internal
>                         implementation
>                         details but the external behavior of the
>                         classifier function when
>                         it comes to handle fragments. That behavior may
>                         have an incidence
>                         on SFF, in particular. The purpose is not to
>                         recommend the maximum
>                         resources to be dedicated to out of order
>                         fragments nor the
>                         timeout to cache those; these considerations are
>                         of course out of
>                         scope. Nevertheless, an implementation should
>                         offer a configurable
>                         parameter so that an operator tweak those
>                         according to its
>                         context.
>
>                             I suppose one could write an informational
>                             draft on possible ways
>                             of coping.  The IETF has not usually
>                             published such.
>                             Service functions have to cope with
>                             fragmented packets just as
>                             they had to before the advent of NSH, so
>                             describing that is
>                             clearly not needed here.
>
>
>                         [Med] The advent of NSH has the following
>                         implications: * it
>                         exacerbates fragmentation. Handing over this
>                         issue to the
>                         transport layer may lead to interoperability
>                         issues. * the
>                         chaining may not be efficient if fragments are
>                         inappropriately
>                         handled.
>
>                         Introducing NSH should not degrade the overall
>                         service compared to
>                         legacy service deployment schemes.
>
>
>                             Yours, Joel
>
>                             On 4/25/16 3:00 AM,
>                             mohamed.boucadair@orange.com
>                             <mailto:mohamed.boucadair@orange.com> wrote:
>
>                                 Re-,
>
>                                 I hear you, but my comment is that we
>                                 need, as a WG, to decide
>                                 what to
>
>                             put in the draft. FWIW, I'm discussing two
>                             fragmentation
>                             issues:
>
>
>                                 (1) Fragmentation that is caused by
>                                 prepending an SFC header.
>                                 (2) Handling fragments at the ingress of
>                                 an SFC-enabled domain.
>
>                                 Increasing the MTU is for sure a
>                                 recommendation is to be
>                                 explicitly
>
>                             called out in the text (see my first message).
>
>
>                                 There are other issues that need to be
>                                 discussed, e.g., how to
>                                 deal with
>
>                             fragments in SFFs/Classifiers?
>
>
>                                 It is also "prudent" to check that no
>                                 issues will be experienced
>                                 in SFF
>
>                             to handle fragments. If an SFC header is
>                             prepended for all
>                             fragments, I'm not sure there
>
>                                 is any particular issue at the SFF
>                                 level, except if
>                                 stripping/adding
>
>                             context TLVs depends on the full packet (not
>                             just fragment). It
>                             is warranted to consider a little bit this
>                             point before declaring
>                             there is no issue.
>
>
>                                 For point (1), declaring fragmentation
>                                 out of scope would be
>                                 meant that
>
>                             an implementation must be prepared to
>                             receive fragments with or
>                             without NSH header as this is a decision
>                             that is left to the
>                             transport encapsulation. This is a
>                             requirement per se!
>
>
>                                 I won't reiterate all the comments I
>                                 have about the current
>                                 wording of
>
>                             this section.
>
>
>                                 Cheers, Med
>
>                                     -----Message d'origine----- De :
>                                     Elzur, Uri
>                                     [mailto:uri.elzur@intel.com
>                                     <mailto:uri.elzur@intel.com>] EnvoyÃ©
>                                     : lundi 25 avril 2016
>                                     08:30 Ã€ : BOUCADAIR Mohamed IMT/OLN;
>                                     Thomas Narten;
>                                     sfc@ietf.org <mailto:sfc@ietf.org>
>                                     Objet : RE: [sfc] WG last call for
>                                     draft-ietf-sfc-nsh-04.txt
>
>                                     Hi Med
>
>                                     My point is that Fragmentation is
>                                     yet another transport related
>                                     issue
>
>                             that
>
>                                     is beyond the scope of NSH and
>                                     beyond the charter of the WG, so
>                                     it
>
>                             doesn't
>
>                                     really belong in the draft. We are
>                                     providing an advice as
>                                     extending the size of the packet may
>                                     lead to fragmentation, but
>                                     as you check RFC 7348 VxLAN, which
>                                     my create the same issue,
>                                     you'll find it doesn't even
>
>                             relate
>
>                                     to it.
>
>                                     Thx
>
>                                     Uri ("Oo-Ree") C: 949-378-7568
>                                     <tel:949-378-7568>
>
>
>                                     -----Original Message----- From: sfc
>                                     [mailto:sfc-bounces@ietf.org
>                                     <mailto:sfc-bounces@ietf.org>] On
>                                     Behalf Of
>                                     mohamed.boucadair@orange.com
>                                     <mailto:mohamed.boucadair@orange.com> Sent:
>                                     Sunday, April 24, 2016
>                                     10:32 PM To: Elzur, Uri
>                                     <uri.elzur@intel.com
>                                     <mailto:uri.elzur@intel.com>>;
>                                     Thomas Narten
>
>                             <narten@us.ibm.com <mailto:narten@us.ibm.com>>;
>
>                                     sfc@ietf.org <mailto:sfc@ietf.org>
>                                     Subject: Re: [sfc] WG last call for
>                                     draft-ietf-sfc-nsh-04.txt
>
>                                     Hi Uri,
>
>                                     That's another option that needs to
>                                     be discussed/investigated.
>                                     I'm
>
>                             afraid
>
>                                     this is not the rationale adopted in
>                                     -04 since it includes some
>                                     text
>
>                             that
>
>                                     is far to be sufficient to ensure
>                                     interoperable
>                                     implementations.
>
>                                     BTW, saying that nsh does not need
>                                     to deal with fragmentation
>                                     because
>
>                             it
>
>                                     is transport-independent is not IMHO
>                                     a good strategy to adopt
>                                     here
>
>                             because
>
>                                     it opens the door for interoperable
>                                     issues, it may lead to
>                                     sub-optimal implementations if the
>                                     sfc information is present
>                                     only in one
>
>                             fragments,
>
>                                     etc.
>
>                                     My comments are related to the
>                                     current text in the -04.
>                                     This text needs
>
>                             to
>
>                                     be fixed somehow.
>
>                                     Cheers, Med
>
>                                         -----Message d'origine----- De :
>                                         Elzur, Uri
>                                         [mailto:uri.elzur@intel.com
>                                         <mailto:uri.elzur@intel.com>]
>                                         EnvoyÃ© : dimanche 24 avril
>                                         2016 17:36 Ã€ : BOUCADAIR Mohamed
>                                         IMT/OLN; Thomas Narten;
>                                         sfc@ietf.org
>                                         <mailto:sfc@ietf.org> Objet :
>                                         RE: [sfc] WG last call for
>                                         draft-ietf-sfc-nsh-04.txt
>
>                                         Hi Med
>
>                                         I see no need to specify the
>                                         exact behavior as NSH is
>                                         transport independent i.e. like
>                                         NSH interaction with any other
>                                         Transport eh issue of
>                                         Fragmentation is to be dealt in
>                                         a way
>                                         that matches the mechanisms
>                                         supported by the Transport used
>                                         and do not belong in the NSH draft
>
>                                         Thx
>
>                                         Uri ("Oo-Ree") C: 949-378-7568
>                                         <tel:949-378-7568>
>
>
>                                         -----Original Message----- From: sfc
>                                         [mailto:sfc-bounces@ietf.org
>                                         <mailto:sfc-bounces@ietf.org>]
>                                         On Behalf Of
>                                         mohamed.boucadair@orange.com
>                                         <mailto:mohamed.boucadair@orange.com>
>                                         Sent: Thursday, April 14,
>                                         2016 12:43 AM To: Thomas Narten
>                                         <narten@us.ibm.com
>                                         <mailto:narten@us.ibm.com>>;
>                                         sfc@ietf.org
>                                         <mailto:sfc@ietf.org> Subject:
>                                         Re: [sfc] WG last call for
>                                         draft-ietf-sfc-nsh-04.txt
>
>                                         R-,
>
>                                         In addition to other pending
>                                         issues raised for this draft, I
>                                         would like to raise this
>                                         additional one about Section 6.
>
>                                         == 6.  Fragmentation Considerations
>
>                                         NSH and the associated transport
>                                         header are "added" to the
>                                         encapsulated packet/frame.  This
>                                         additional information
>                                         increases
>
>                             the
>
>                                         size of the packet.  In order
>                                         the ensure proper forwarding of
>                                         NSH data, several options for
>                                         handling fragmentation and
>                                         re-assembly exist:
>
>                                         1.  Jumbo Frames, when
>                                         supported, enable the transport
>                                         of NSH
>                                         and associated transport packets
>                                         without requiring
>                                         fragmentation.
>
>                                         2.  Path MTU Discovery
>                                         [RFC1191]"describes a technique for
>                                         dynamically discovering the
>                                         maximum transmission unit (MTU) of
>
>                             an
>
>                                         arbitrary internet path" and can
>                                         be utilized to ensure the
>
>                         the
>
>                                         required packet size is used.
>
>                                         3.  [RFC6830] describes two
>                                         schemes for fragmentation and
>                                         re-
>
>                             assembly
>
>                                         in section 5.4. ==
>
>                                         * The text is weak for a
>                                         Standard track document that is
>                                         intended to solve the problem in
>                                         https://tools.ietf.org/html/rfc7498#section-
>
>                         2.12.
>
>                                         There should be a clear behavior
>                                         to be followed by an
>
>                         implementation.
>
>                                         Further, I would avoid the use
>                                         of words such as "can".
>
>                                         * The text covers only
>                                         fragmentation when it is induced
>                                         by SFC
>                                         operations, it does not discuss
>                                         the treatment of a fragment
>                                         when received in an SFC domain.
>                                         IMHO, the draft should also
>                                         specify the behavior of the
>                                         Classifier with regards to
>                                         fragments for the sake of proper
>                                         SFC operation. Applying
>                                         classification policies may
>                                         require the
>
>                                     full packet, not only a fragment.
>
>                                         In particular, dedicated
>                                         resources should dedicated for
>                                         handling out of order fragments.
>                                         Of course, it is out of scope
>                                         of this document to describe how
>                                         SFs handle fragments.
>
>                                         * If an SFC header is prepended
>                                         for all fragments, I'm not
>                                         sure there is any particular
>                                         issue at the SFF level...except
>                                         if stripping/adding context TLVs
>                                         depends on the full packet
>                                         (not just fragment). It is
>                                         warranted to consider a little bit
>                                         this point before declaring there
>
>                             is
>
>                                     no issue.
>
>
>                                         * The text states "several
>                                         options". This may be interpreted
>                                         as if implementing one of them
>                                         is sufficient...which is not
>                                         true. The first two points
>                                         contribute to minimize the
>                                         fragmentation risk, but
>                                         fragmentation may still be
>                                         experienced
>                                         (e.g., other shims are prepended
>                                         by other nodes for some other
>                                         purposes, nested nsh, etc.)
>
>                                         * The first two points have
>                                         nothing to do with reassembly.
>
>                                         * The support of jumbo frames by
>                                         a router/device does not mean
>                                         that it can make use of it.
>                                         Appropriate MTU configuration
>                                         should be undertaken in a
>                                         consistent manner within an SFC
>                                         domain. The text should be
>                                         updated to make it is about
>                                         (consistent) MTU
>
>                         configuration.
>
>
>                                         * BTW, shouldn't the text be
>                                         reworded to recommended to
>                                         increase the MTU of **all
>                                         nodes** of an SFC-enabled domain by
>                                         at least the length of SFC
>                                         header + transport header?
>
>                                         * Bullet 2, how PMTU discovery
>                                         is actually used in this
>                                         context? Do you assume that all
>                                         SFC-aware nodes will issue
>                                         such messages towards other
>                                         SFC-aware node, arbitrary
>                                         destination, else?
>
>                                         * Bullet 2, I would drop
>                                         "describes a technique for
>                                         dynamically discovering the
>                                         maximum transmission unit
>                                         (MTU) of an arbitrary internet
>                                         path".
>
>                                         * Bullet 2, s/ the the/the.
>
>                                         * The reference to the LISP
>                                         specification raises two concerns
>                                         and one comment:
>
>                                         (1) I don't think it is a good
>                                         approach that fragments induced
>                                         by the network are passed to
>                                         their ultimate destinations as
>                                         such
>
>                         (stateless).
>
>                                         IMO, reassembly should be done
>                                         within the SFC domain
>                                         (responsible for fragmentation)
>                                         not passed away. (2) Does the
>                                         stateful mode require all SFC
>                                         data plane elements maintain a
>                                         full list of MTU for the any
>                                         SFF/SF instance of the SFC
>
>                                     domain?
>
>
>                                         The current text suggests that
>                                         [RFC6830] should be listed as
>                                         normative reference (not an
>                                         informative one). I would
>                                         personally favor removing the
>                                         reference to LISP (as it is an
>                                         Experimental RFC).
>
>                                         * The security section of the
>                                         draft may be augmented with
>                                         informational
>                                         fragmentation-related pointers to:
>                                         e.g., RFC1858 (Security
>                                         Considerations for IP Fragment
>                                         Filtering), RFC3128 (Protection
>                                         Against a Variant of the Tiny
>                                         Fragment Attack), and RFC 4963
>                                         (IPv4 Reassembly Errors at High
>                                         Data Rates).
>
>                                         Cheers, Med
>
>                                             -----Message d'origine-----
>                                             De : sfc
>                                             [mailto:sfc-bounces@ietf.org
>                                             <mailto:sfc-bounces@ietf.org>]
>                                             De la part de
>                                             mohamed.boucadair@orange.com
>                                             <mailto:mohamed.boucadair@orange.com>
>                                             EnvoyÃ© : lundi 11 avril
>                                             2016 13:14 Ã€ : Thomas
>                                             Narten; sfc@ietf.org
>                                             <mailto:sfc@ietf.org> Objet
>                                             : Re:
>                                             [sfc] WG last call for
>                                             draft-ietf-sfc-nsh-04.txt
>
>                                             Dear Thomas, all,
>
>                                             As I mentioned during the
>                                             meeting, there are several
>                                             issues
>                                             that are not covered in the
>                                             last version of the draft. I
>                                             already provided examples of
>                                             the issues offline as requested
>                                             by Martin.
>
>                                             Cheers, Med
>
>                                                 -----Message
>                                                 d'origine----- De : sfc
>                                                 [mailto:sfc-bounces@ietf.org
>                                                 <mailto:sfc-bounces@ietf.org>]
>                                                 De la part de Thomas Narten
>                                                 EnvoyÃ© : jeudi 31 mars
>                                                 2016 04:48 Ã€ :
>                                                 sfc@ietf.org
>                                                 <mailto:sfc@ietf.org>
>                                                 Objet : [sfc] WG last
>                                                 call for
>                                                 draft-ietf-sfc-nsh-04.txt
>
>                                                 Dear WG:
>
>                                                 This note begins a WG
>                                                 last call on
>                                                 draft-ietf-sfc-nsh-04.txt
>                                                 (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>
>
>
>             The editors of the NSH document have indicated that they have
>
>                                                 addressed all known
>                                                 comments and that there
>                                                 are no open
>                                                 issues with the current
>                                                 version of the document.
>
>                                                 Substantive comments to
>                                                 the list please,
>                                                 editorial comments
>                                                 can go directly to the
>                                                 document editors.
>
>                                                 We'll also get a brief
>                                                 update from the editors
>                                                 at next
>                                                 week's meeting. If there
>                                                 are any remaining issues
>                                                 with the
>                                                 document, raising them
>                                                 before the meeting would be
>                                                 especially helpful.
>
>                                                 For the chairs, Thomas
>
>                                                 _______________________________________________
>                                                 sfc mailing
>                                                 list sfc@ietf.org
>                                                 <mailto:sfc@ietf.org>
>                                                 https://www.ietf.org/mailman/listinfo/sfc
>
>
>                                             _______________________________________________
>                                             sfc mailing
>                                             list sfc@ietf.org
>                                             <mailto:sfc@ietf.org>
>                                             https://www.ietf.org/mailman/listinfo/sfc
>
>
>                                         _______________________________________________
>                                         sfc mailing
>                                         list sfc@ietf.org
>                                         <mailto:sfc@ietf.org>
>                                         https://www.ietf.org/mailman/listinfo/sfc
>
>
>                                     _______________________________________________
>                                     sfc mailing
>                                     list sfc@ietf.org
>                                     <mailto:sfc@ietf.org>
>                                     https://www.ietf.org/mailman/listinfo/sfc
>
>
>                                 _______________________________________________
>                                 sfc mailing list
>                                 sfc@ietf.org <mailto:sfc@ietf.org>
>                                 https://www.ietf.org/mailman/listinfo/sfc
>
>
>                         _______________________________________________
>                         sfc mailing list
>                         sfc@ietf.org <mailto:sfc@ietf.org>
>                         https://www.ietf.org/mailman/listinfo/sfc
>
>
>                     _______________________________________________ sfc
>                     mailing list
>                     sfc@ietf.org <mailto:sfc@ietf.org>
>                     https://www.ietf.org/mailman/listinfo/sfc
>
>
>
>     _______________________________________________
>     sfc mailing list
>     sfc@ietf.org <mailto:sfc@ietf.org>
>     https://www.ietf.org/mailman/listinfo/sfc
>
>



From nobody Wed Apr 27 18:05:59 2016
Return-Path: <oliver.huang@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B63512B040 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 18:05:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.217
X-Spam-Level: 
X-Spam-Status: No, score=-5.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LAMIkhb7phEV for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 18:05:55 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F3237120047 for <sfc@ietf.org>; Wed, 27 Apr 2016 18:05:54 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml705-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CNL03048; Thu, 28 Apr 2016 01:05:52 +0000 (GMT)
Received: from SZXEMA411-HUB.china.huawei.com (10.82.72.70) by lhreml705-cah.china.huawei.com (10.201.5.168) with Microsoft SMTP Server (TLS) id 14.3.235.1; Thu, 28 Apr 2016 02:05:51 +0100
Received: from SZXEMA506-MBX.china.huawei.com ([169.254.3.126]) by szxema411-hub.china.huawei.com ([10.82.72.70]) with mapi id 14.03.0235.001; Thu, 28 Apr 2016 09:05:46 +0800
From: "Huangyong (Oliver)" <oliver.huang@huawei.com>
To: Martin Stiemerling <mls.ietf@gmail.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
Thread-Index: AQHRoD1iU0PcZg0k+ke2A/Hr//oAEZ+ekzvw
Date: Thu, 28 Apr 2016 01:05:45 +0000
Message-ID: <8172B566C79A4A4C8EB6C7B1F6529EFC8B7435C1@szxema506-mbx.china.huawei.com>
References: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com>
In-Reply-To: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.74.158.105]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020202.572161F1.006B, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.3.126, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 95c8649cdd91b71b3c28533f926e658a
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/pKnQyI2TwjV62aGf0FhGa08aLL8>
Subject: [sfc] =?gb2312?b?tPC4tDogIFdHTEMgZm9yIGRyYWZ0LWlldGYtc2ZjLWNvbnRy?= =?gb2312?b?b2wtcGxhbmUtMDQudHh0?=
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 01:05:57 -0000
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From nobody Wed Apr 27 23:58:49 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A381212D1E5 for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 23:58:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.914
X-Spam-Level: 
X-Spam-Status: No, score=-1.914 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uBQFyNkL0MJQ for <sfc@ietfa.amsl.com>; Wed, 27 Apr 2016 23:58:45 -0700 (PDT)
Received: from relais-inet.orange.com (relais-nor35.orange.com [80.12.70.35]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D799512B02E for <sfc@ietf.org>; Wed, 27 Apr 2016 23:58:44 -0700 (PDT)
Received: from opfednr04.francetelecom.fr (unknown [xx.xx.xx.68]) by opfednr27.francetelecom.fr (ESMTP service) with ESMTP id 61233A0581; Thu, 28 Apr 2016 08:58:43 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.27]) by opfednr04.francetelecom.fr (ESMTP service) with ESMTP id 32D9A4007A; Thu, 28 Apr 2016 08:58:43 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7C.corporate.adroot.infra.ftgroup ([fe80::8007:17b:c3b4:d68b%19]) with mapi id 14.03.0279.002; Thu, 28 Apr 2016 08:58:42 +0200
From: <mohamed.boucadair@orange.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>, Martin Stiemerling <mls.ietf@gmail.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
Thread-Index: AQHRoD1hgqCe3Pkr6EKnc83IMsxhI5+d714AgAD0McA=
Date: Thu, 28 Apr 2016 06:58:41 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D6100C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com> <D3462926.4C3CA%jguichar@cisco.com>
In-Reply-To: <D3462926.4C3CA%jguichar@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B933008D6100COPEXCLILMA3corp_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/btXo6Cth9Mkun5Ldi-s1DN1GLbc>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 06:58:48 -0000

--_000_787AE7BB302AE849A7480A190F8B933008D6100COPEXCLILMA3corp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Jim,

Thank you for the review.

Please see inline.

Cheers,
Med

De : sfc [mailto:sfc-bounces@ietf.org] De la part de Jim Guichard (jguichar=
)
Envoy=E9 : mercredi 27 avril 2016 16:18
=C0 : Martin Stiemerling; sfc@ietf.org
Objet : Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt

Hi Martin & WG:

A few comments that I would like to see addressed in the document before it=
 can move forward to the next step.

  *   Section 2.2 SFC Control Plane Bootstrapping.
This section is too wishy washy. It makes the statement "this document assu=
mes the SFC control plane is provided with a set of information that is req=
uired for proper SFC operation" but then goes on to list bullets that are l=
ikely to be provided or may be provided. It does not actually provide any i=
nformation on what is required for proper SFC operation. In the list of lik=
ely information there is no indication of whether this information must exi=
st in the network prior to bootstrapping the SFC control plane element; thi=
s is true also for the list of may information. Surely we should provide gu=
idelines on what must be available before the SFC control plane element can=
 actually function although it is reasonable to assume that it can bootstra=
p without any information (albeit it can't actually do anything). On this p=
oint I would argue that several of the may elements are actually required s=
uch as SFF, SF, SFC-proxy locators and may exist prior to bootstrapping the=
 SFC control plane element, or may be added later through some control inte=
rface.

[Med] Fair point. I suggest to make these modifications:

(1)

OLD:
   The following information that is likely to be provided to the SFC
   control plane at bootstrapping includes (non-exhaustive list):

NEW:

   The following information that is RECOMMENDED to be provided to the SFC

   control plane prior to bootstrapping includes:

(2)

Remove this bullet from the list and insert it right after the list.


   o  Optionally, (traffic/CPU/memory) load balancing objectives at the

      SFC level or on a per node (e.g., per-SF/SFF/SFP proxy) basis.

Minor point -> typo in bullet point 6 - SFP proxy should read SFC proxy
[Med] Fixed. Thanks.

  *   Section 2.3 Coherent Setup of an SFC-enabled Domain
What does the sentence "various transport encapsulation schemes and/or vari=
ations of SFC header implementations may be supported" actually mean ? Are =
we referring to the fact that the SFC header may carry type-1 or type-2 met=
adata or something else ? Note that there is only one SFC header implementa=
tion based on the WG charter so if we are referring to different SFC format=
s (meaning metadata) then please make this clear in the text, and if not, p=
lease remove this sentence.

[Med] That sentence is related to the rich set of transport encapsulation s=
chemes, but also that nsh header includes a version number.

The current nsh spec does not specify how nodes with distinct nsh versions =
are supposed to behave. Also, we don't know in 2016 (because there is no ns=
h v2) whether v0 and v2 will be backward compatible. If these versions are =
not backward compatible, this will lead to failures when two adjacent eleme=
nts in a service chain do not support the same version.

The cp is key to ensure coherent setup of an SFC-domain to avoid failures t=
hat are due to unsupported version and/or unsupported transport encapsulati=
on.

  *   Section 3.1 Reference Architecture
Second bullet point "mapping between service function chains and SFPs" - th=
is is a general comment for the entire document but applies here also. Ther=
e is no mention of mapping SFPs -> RSPs - in fact RSP is mentioned only onc=
e in the entire document. The architecture is explicit in that the SFP when=
 rendered into the network is an RSP and therefore the SFC control plane el=
ement needs to have information on currently deployed RSPs.

[Med] I agree RSP is not explicitly mentioned in Section 3.1, but the point=
 you raised is what is under this bullet:


   o  Determine a forwarding path in the context of a centralized

      deployment model (see Section 3.2<https://tools.ietf.org/html/draft-i=
etf-sfc-control-plane-04#section-3.2>).

Section 3.2 states the following:


      For some traffic engineering proposes, the SFP may be constrained

      by the control plane; as such, some SFPs can be fully specified

      (i.e., list all the SFF/SFs that need to be solicited) or

      partially specified (e.g., exclude some nodes, explicitly select

      which instance of a given SF needs to be invoked, etc.).



Do you think a change is still needed to the text?


Additionally there is no interface specified for communication between the =
SFC Control Plane Element and SF management systems. This is an important a=
spect as many SF's may require that SFC information be communicated to thei=
r management systems that will be responsible for communicating directly wi=
th their respective SF's.

[Med] Good point. I suggest this change in Section 3.3.3 that I believe is =
sufficient to take into account this comment:

OLD:


   The SFC control plane uses this interface to interact with SFC-aware

   SFs.

NEW:


   The SFC control plane uses this interface to interact with SFC-aware

   SFs. This interaction may be direct or via dedicated SF management syste=
ms.

  *   Section 3.1.1. C1: Interface between SFC Control Plane & SFC Classifi=
er
The sentence "The control plane may instruct the classifier about the initi=
al values of the Service Index (SI)" should be changed to say MUST as other=
wise if a classifier chooses whatever value it wants then that may not alig=
n with what is programmed into the SFFs by the SFC Control Plane element.

[Med] Makes sense. I made the change in my local copy.

  *   Section 4.10.4. Encoding the Exact SFF/SF Sequence in Data Packets
This section does not actually provide any meaning or indication of relatio=
nship with the SFC Control Plane element. Furthermore,  there has been no W=
G consensus to carry source routes within the SFC encapsulation. Therefore =
this entire section should be removed from the document.

[Med] FWIW, there was a call about this section (https://www.ietf.org/mail-=
archive/web/sfc/current/msg03756.html). This section does not recommend nor=
 exclude source routes.

  *   Section 4.10.5. Fully Controlled SFF/SF Sequence for a SFP
Figure 2 lists 3 different SFP-id's whereas the text mentions only SFP-id #=
1. Is this simply a typo or are you trying to convey something else ?

Further you state that "the steering policies to a SFF node for service fun=
ction chain depends on if the packet comes from previous SFF or comes from =
a specific SF i.e., the SFP Forwarding Table entries have to be ingress por=
t specific" -  this is an inaccurate statement as the combination of the SF=
P-id and service-index determines the forwarding behavior (as specified in =
section 3.3 & section 7 of draft-ietf-sfc-nsh-04).  This sentence should be=
 removed from the text.

[Med] I will defer to Linda/Andrew to clarify this part of that text.

Jim



On 4/27/16, 12:29 AM, "sfc on behalf of Martin Stiemerling" <sfc-bounces@ie=
tf.org<mailto:sfc-bounces@ietf.org> on behalf of mls.ietf@gmail.com<mailto:=
mls.ietf@gmail.com>> wrote:

Dear all,

This is the start of the Working Group Last Call (WGLC) for

draft-ietf-sfc-control-plane-04.txt

The WGLC lasts for 2 weeks and will end May 11th at 10 pm PDT.

Please send your comments and reviews to the sfc@ietf.org<mailto:sfc@ietf.o=
rg> list.

Regards,

   Martin (SFC co-chair)

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_787AE7BB302AE849A7480A190F8B933008D6100COPEXCLILMA3corp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:"Courier New";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:70.85pt 70.85pt 70.85pt 70.85pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:286008905;
	mso-list-template-ids:-706940182;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1
	{mso-list-id:470829784;
	mso-list-template-ids:442282966;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l1:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2
	{mso-list-id:922103303;
	mso-list-template-ids:389864376;}
@list l2:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l2:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l2:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3
	{mso-list-id:1655571925;
	mso-list-template-ids:-983147934;}
@list l3:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l3:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l3:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4
	{mso-list-id:1725593478;
	mso-list-template-ids:1284937460;}
@list l4:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l4:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l4:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5
	{mso-list-id:1804037960;
	mso-list-template-ids:-1240840590;}
@list l5:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l5:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l5:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Hi Jim,
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Thank you for the review.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Please see inline.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc =
[mailto:sfc-bounces@ietf.org]
<b>De la part de</b> Jim Guichard (jguichar)<br>
<b>Envoy=E9&nbsp;:</b> mercredi 27 avril 2016 16:18<br>
<b>=C0&nbsp;:</b> Martin Stiemerling; sfc@ietf.org<br>
<b>Objet&nbsp;:</b> Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt<=
o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Hi Martin &amp; WG:<o:p></o=
:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">A few comments that I would=
 like to see addressed in the document before it can move forward to the ne=
xt step.<o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l1 level1 lfo1">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 2.2 SFC Control Plane Bootstrapping.<o:p></o:p></span>=
</li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">This section is too wishy w=
ashy. It makes the statement &#8220;this document assumes the SFC control p=
lane is provided with a set of information that is
<u>required</u> for proper SFC operation&#8221; but then goes on to list bu=
llets that are
<u>likely</u>&nbsp;to be provided or <u>may</u>&nbsp;be provided. It does n=
ot actually provide any information on what
<u>is required for proper SFC operation</u>. In the list of <u>likely</u>&n=
bsp;information there is no indication of whether this information must exi=
st in the network prior to bootstrapping the SFC control plane element; thi=
s is true also for the list of
<u>may</u>&nbsp;information. Surely we should provide guidelines on what <u=
>must</u>&nbsp;be available before the SFC control plane element can actual=
ly function although it is reasonable to assume that it can bootstrap witho=
ut any information (albeit it can&#8217;t actually
 do anything). On this point I would argue that several of the <u>may</u>&n=
bsp;elements are actually required such as SFF, SF, SFC-proxy locators and =
may exist prior to bootstrapping the SFC control plane element, or may be a=
dded later through some control interface.&nbsp;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] Fair point. I suggest to =
make these modifications:
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">(1)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">OLD:
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp;&nbsp;The following information=
 that is likely to be provided to the SFC<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp; control plane at bootstrapping=
 includes (non-exhaustive list):<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; The following information that is RE=
COMMENDED to be provided to the SFC<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; control plane prior to bootstrapping=
 includes:<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">(2)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Remove this bullet from the lis=
t and insert it right after the list.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; o&nbsp; Optionally, (traffic/CPU/mem=
ory) load balancing objectives at the<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SFC level or on a =
per node (e.g., per-SF/SFF/SFP proxy) basis.<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Minor point =
-&gt; typo in bullet point 6 &#8211; SFP proxy should read
<b>SFC</b>&nbsp;proxy<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">[Med] Fixed. Thanks.<o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l3 level1 lfo2">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 2.3 Coherent Setup of an SFC-enabled Domain<o:p></o:p>=
</span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">What does the sentence &#82=
20;various transport encapsulation schemes and/or variations of SFC header =
implementations may be supported&#8221; actually mean ? Are we referring
 to the fact that the SFC header may carry type-1 or type-2 metadata or som=
ething else ? Note that there is only
<b>one </b>SFC header implementation based on the WG charter so if we are r=
eferring to different SFC formats (meaning metadata) then please make this =
clear in the text, and if not, please remove this sentence.&nbsp;<o:p></o:p=
></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:5.25pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black">[M=
ed] That sentence is related to the rich set of transport encapsulation sch=
emes, but also that nsh header includes a version
 number. <o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:5.25pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black"><o=
:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:5.25pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black">Th=
e current nsh spec does not specify how nodes with distinct nsh versions ar=
e supposed to behave. Also, we don&#8217;t know in 2016
 (because there is no nsh v2) whether v0 and v2 will be backward compatible=
. If these versions are not backward compatible, this will lead to failures=
 when two adjacent elements in a service chain do not support the same vers=
ion.
<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:5.25pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black"><o=
:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:5.25pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black">Th=
e cp is key to ensure coherent setup of an SFC-domain to avoid failures tha=
t are due to unsupported version and/or unsupported
 transport encapsulation.<o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l4 level1 lfo3">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 3.1 Reference Architecture<o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Second bullet point &#8220;=
mapping between service function chains and SFPs&#8221; - this is a general=
 comment for the entire document but applies here also. There is no
 mention of mapping SFPs -&gt; RSPs &#8211; in fact RSP is mentioned only o=
nce in the entire document. The architecture is explicit in that the SFP wh=
en rendered into the network is an RSP and therefore the SFC control plane =
element needs to have information on currently
 deployed RSPs.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] I agree RSP is not explic=
itly mentioned in Section 3.1, but the point you raised is what is under th=
is bullet:
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; o&nbsp; Determine a forwarding path =
in the context of a centralized<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>deployment =
model (see <a href=3D"https://tools.ietf.org/html/draft-ietf-sfc-control-pl=
ane-04#section-3.2">Section 3.2</a>).<o:p></o:p></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Section 3.2 states the followin=
g:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; For some traffic e=
ngineering proposes, the SFP may be constrained<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; by the control pla=
ne; as such, some SFPs can be fully specified<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (i.e., list all th=
e SFF/SFs that need to be solicited) or<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; partially specifie=
d (e.g., exclude some nodes, explicitly select<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; which instance of =
a given SF needs to be invoked, etc.).<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></pre>
</div>
<div>
<pre><span lang=3D"EN-US">Do you think a change is still needed to the text=
? <o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></pre>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Additionally=
 there is no interface specified for communication between the SFC Control =
Plane Element and SF management systems.
</span><span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;;color:black">This is an important aspect as many SF&#821=
7;s may require that SFC information be communicated to their management sy=
stems that will be responsible for communicating directly with
 their respective SF&#8217;s.&nbsp;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] Good point. I suggest thi=
s change in Section 3.3.3 that I believe is sufficient to take into account=
 this comment:
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">OLD:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; The SFC control plane uses this inte=
rface to interact with SFC-aware<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; </span>SFs.<o:p></o:p></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; The SFC control plane uses this inte=
rface to interact with SFC-aware<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; SFs. This interaction may be direct =
or via dedicated SF management systems.</span><span lang=3D"EN-US" style=3D=
"color:black"><o:p></o:p></span></pre>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l2 level1 lfo4">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 3.1.1. C1: Interface between SFC Control Plane &amp; S=
FC Classifier<o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">The sentence &#8220;The con=
trol plane may instruct the classifier about the initial values of the Serv=
ice Index (SI)&#8221; should be changed to say
<b>MUST</b>&nbsp;as otherwise if a classifier chooses whatever value it wan=
ts then that may not align with what is programmed into the SFFs by the SFC=
 Control Plane element.</span><span style=3D"font-size:10.5pt;font-family:&=
quot;Courier New&quot;;color:black;background:#FFFDF5">&nbsp;<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] Makes sense. I made the c=
hange in my local copy.<o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l5 level1 lfo5">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 4.10.4. Encoding the Exact SFF/SF Sequence in Data Pac=
kets<o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">This section does not actua=
lly provide any meaning or indication of relationship with the SFC Control =
Plane element. Furthermore, &nbsp;there has been no WG consensus
 to carry source routes within the SFC encapsulation. Therefore this entire=
 section should be removed from the document.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] FWIW, there was a call ab=
out this section (<a href=3D"https://www.ietf.org/mail-archive/web/sfc/curr=
ent/msg03756.html">https://www.ietf.org/mail-archive/web/sfc/current/msg037=
56.html</a>).
 This section does not recommend nor exclude source routes. <o:p></o:p></sp=
an></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l0 level1 lfo6">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 4.10.5. Fully Controlled SFF/SF Sequence for a SFP<o:p=
></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Figure 2 lists 3 different =
SFP-id&#8217;s whereas the text mentions only SFP-id #1. Is this simply a t=
ypo or are you trying to convey something else ?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Further you state that &#82=
20;the steering policies to a SFF node for service function chain depends o=
n if the packet comes from previous SFF or comes from a specific
 SF i.e., the SFP Forwarding Table entries have to be ingress port specific=
&#8221; - &nbsp;this is an inaccurate statement as the combination of the S=
FP-id and service-index determines the forwarding behavior (as specified in=
 section 3.3 &amp; section 7 of draft-ietf-sfc-nsh-04).
 &nbsp;This sentence should be removed from the text.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] I will defer to Linda/And=
rew to clarify this part of that text. &nbsp;&nbsp;&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Jim<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">On 4/27/16, 12:29 AM, &quot=
;sfc on behalf of Martin Stiemerling&quot; &lt;<a href=3D"mailto:sfc-bounce=
s@ietf.org">sfc-bounces@ietf.org</a> on behalf of
<a href=3D"mailto:mls.ietf@gmail.com">mls.ietf@gmail.com</a>&gt; wrote:<o:p=
></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<blockquote style=3D"border:none;border-left:solid #B5C4DF 4.5pt;padding:0c=
m 0cm 0cm 4.0pt;margin-left:3.75pt;margin-right:0cm" id=3D"MAC_OUTLOOK_ATTR=
IBUTION_BLOCKQUOTE">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Dear all,<o:p></o:p></span>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">This is the start of the Wo=
rking Group Last Call (WGLC) for<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">draft-ietf-sfc-control-plan=
e-04.txt<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">The WGLC lasts for 2 weeks =
and will end May 11th at 10 pm PDT.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Please send your comments a=
nd reviews to the
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> list.<o:p></o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Regards,<o:p></o:p></span><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;&nbsp; Martin (SFC co=
-chair)<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">___________________________=
____________________<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">sfc mailing list<o:p></o:p>=
</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><a href=3D"mailto:sfc@ietf.=
org">sfc@ietf.org</a><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><a href=3D"https://www.ietf=
.org/mailman/listinfo/sfc">https://www.ietf.org/mailman/listinfo/sfc</a><o:=
p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
</blockquote>
</div>
</div>
</body>
</html>

--_000_787AE7BB302AE849A7480A190F8B933008D6100COPEXCLILMA3corp_--


From nobody Thu Apr 28 01:07:00 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B77612D1E5 for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 01:06:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BTS81ld6XUqF for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 01:06:55 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E3FE512B052 for <sfc@ietf.org>; Thu, 28 Apr 2016 01:06:54 -0700 (PDT)
Received: from omfedm06.si.francetelecom.fr (unknown [xx.xx.xx.2]) by omfedm11.si.francetelecom.fr (ESMTP service) with ESMTP id 0B22E3B46A3; Thu, 28 Apr 2016 10:06:53 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.66]) by omfedm06.si.francetelecom.fr (ESMTP service) with ESMTP id D5AFF27C053; Thu, 28 Apr 2016 10:06:52 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILMA1.corporate.adroot.infra.ftgroup ([fe80::95e2:eb4b:3053:fabf%19]) with mapi id 14.03.0279.002; Thu, 28 Apr 2016 10:06:52 +0200
From: <mohamed.boucadair@orange.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Ron Parker <Ron_Parker@affirmednetworks.com>, "Elzur, Uri" <uri.elzur@intel.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRoI2umc2+lVuP1Eu9qKRylYgewZ+e4ZPg
Date: Thu, 28 Apr 2016 08:06:51 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D61111@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <m3egarz7kh.wl-narten@us.ibm.com> <787AE7BB302AE849A7480A190F8B933008D5EEAB@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <CDF2F015F4429F458815ED2A6C2B6B0B6D786B8B@MBX021-W3-CA-2.exch021.domain.local> <0f0e8705-1ca4-6df0-81c3-93db0f94a99f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604F7@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <f9aac050-9c8f-d7de-d57e-ff23dbd9b8e4@joelhalpern.com>
In-Reply-To: <f9aac050-9c8f-d7de-d57e-ff23dbd9b8e4@joelhalpern.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.25.91516
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/Bj9mc5LfzxPkUhf2ldh0YszQ4cQ>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 08:06:59 -0000

Hi Joel,

Now that we agree on the scope, shouldn't the text be /updated to reflect a=
nd clarify what was discussed in this thread?

>From where I stand, I would like to see added in particular text saying tha=
t nsh header is present in every fragment. =20

Cheers,
Med

> -----Message d'origine-----
> De=A0: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Envoy=E9=A0: mercredi 27 avril 2016 16:04
> =C0=A0: BOUCADAIR Mohamed IMT/OLN; Ron Parker; Elzur, Uri; sfc@ietf.org
> Objet=A0: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> On the Classifier<->SFF communication, you have a fiar point.  My
> personal model is off in that regard.  My apologies.
>=20
> I believe that the assumption there is that just as with an SFF, it will
> use a local means to couple to a transport encapsulator.  I tend to
> think of this as putting an SFF co-located with the classifier, and then
> using SFF functionality, but that is not required by the architecture.
>=20
> The external behavior of the SFF,_>SF interface, where the SF speaks
> NSH, is that an NSH encapsulated frame is communicated between the two.
> The transport mechanism (which may need to fragment) is out of scope.
>=20
> Yours,
> Joel
>=20
> On 4/27/16 1:46 AM, mohamed.boucadair@orange.com wrote:
> > Re-,
> >
> > Please see inline.
> >
> > Cheers, Med
> >
> >> -----Message d'origine----- De : Joel M. Halpern
> >> [mailto:jmh@joelhalpern.com] Envoy=E9 : mardi 26 avril 2016 19:22 =C0 =
:
> >> Ron Parker; Joel M. Halpern; BOUCADAIR Mohamed IMT/OLN; Elzur,
> >> Uri; sfc@ietf.org Objet : Re: [sfc] WG last call for
> >> draft-ietf-sfc-nsh-04.txt
> >>
> >> At least so far, we have treated the communication between
> >> classifier and SFF (ingress or intermediate) as outside of the
> >> scope of our work.
> >
> > [Med] I'm afraid I don't get this one. Isn't this what is depicted in
> > https://tools.ietf.org/html/rfc7665#section-4?
> >
> >> For SF <-> SFF communication we have ntoed the need for a proxy to
> >> handle the case when the SF can not accept and return the NSH
> >> header, since we assume that is preserved.  Other than that
> >> preservation, similar to the above, we have treated the details as
> >> outside of our scope. That is because they depend so heavily on the
> >> implementation technique used.  (Hypervisor ,_> application
> >> communication vs communication inside a user space or communication
> >> over an actual Ethernet are all very different.)
> >
> > [Med] Specifying the external behavior of the interface between an
> > SFF and an SFC-aware SF is completely in scope, imho.
> >
> >>
> >> Trying to extend the NSH document to address these would be a
> >> major change, and would step into the issues related to transport
> >> selection, which are explicitly out of scope.
> >>
> >> Yours, Joel
> >>
> >> On 4/26/16 11:58 AM, Ron Parker wrote:
> >>> Linda,
> >>>
> >>> I like the first clause (transport tunnel based fragmentation).
> >>>
> >>> Regarding the second (source based), I think there are more
> >>> subcases to
> >> consider:
> >>>
> >>> 1.  Propagation of NSH encapsulated packet from classifier to
> >>> SFF 2.  Propagation of NSH encapsulated packet from SFF to SF 3.
> >>> Propagation of NSH encapsulated packet from SF to SFF (including
> >> possibility that NSH size increased at SF)
> >>> 4.  Propagation of NSH encapsulated packet from SFF to SFF
> >>>
> >>> In each of the 4 cases above,  there is the possibility that MTU
> >>> will be
> >> exceeded and therefore there are procedures to be defined in that
> >> eventuality.
> >>>
> >>> Thanks.
> >>>
> >>> Ron
> >>>
> >>>
> >>> -----Original Message----- From: sfc
> >>> [mailto:sfc-bounces@ietf.org] On Behalf Of Linda Dunbar Sent:
> >>> Tuesday, April 26, 2016 11:48 AM To: Joel M. Halpern
> >>> <jmh@joelhalpern.com>; mohamed.boucadair@orange.com;
> >> Elzur, Uri <uri.elzur@intel.com>; sfc@ietf.org
> >>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>
> >>> Joel,
> >>>
> >>> I think the document should add the description on the following
> >>> two
> >> fragmentation scenarios:
> >>>
> >>> - Transport tunnel generated fragmentation: When a packet
> >>> fragmentation is caused by transport tunnel (i.e.
> >> various encapsulations), the termination point of the transport
> >> tunnel is responsible for re-assembling the fragmented pieces of
> >> the packet. Since there won't be any SFF nodes in between the
> >> Transport Tunnel, the tunnel generated fragmentation does not
> >> require any actions by SFF nodes or SF nodes.
> >>>
> >>>
> >>> - Source node generated fragmentation (after adding on the NSH
> >>> header): When fragmentation has to be performed for a packet
> >>> being
> >> encapsulated with the NSH header, either the intermediate SFF nodes
> >> or the SF nodes have to be able to reassemble the fragmented
> >> pieces.
> >>>
> >>>
> >>>
> >>> Cheers,
> >>>
> >>>
> >>> Linda
> >>>
> >>> -----Original Message----- From: Joel M. Halpern
> >>> [mailto:jmh@joelhalpern.com] Sent: Tuesday, April 26, 2016 10:33
> >>> AM To: Linda Dunbar; mohamed.boucadair@orange.com; Elzur, Uri;
> >>> sfc@ietf.org Subject: Re: [sfc] WG last call for
> >>> draft-ietf-sfc-nsh-04.txt
> >>>
> >>> Re-reading your note, it is possible that you are referring only
> >>> to the
> >> case of transport generated fragmentation of the outer packet.  I
> >> had assumed you were not talking about that, since the resulting
> >> fragments will not all have NSH headers.  As with any tunnel
> >> technology, if the tunnel chooses to fragment at its layer, then
> >> the tunnel is responsible for reassembly.  That would be invisible
> >> to the SFF.
> >>>
> >>> Yours, Joel
> >>>
> >>> On 4/26/16 11:10 AM, Linda Dunbar wrote:
> >>>> Agree with Med.
> >>>>
> >>>> Even if each fragment piece of a packet with NSH header carries
> >>>> the NSH
> >> header, the intermediate SFF nodes still need to put together all
> >> the fragments together before passing the whole data frame to the
> >> SF.
> >>>>
> >>>> Linda
> >>>>
> >>>> -----Original Message----- From: sfc
> >>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
> >>>> mohamed.boucadair@orange.com Sent: Monday, April 25, 2016 9:42
> >>>> AM To: Elzur, Uri; Joel M. Halpern; sfc@ietf.org Subject: Re:
> >>>> [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>
> >>>> Re-,
> >>>>
> >>>> How do you instruct the transport layer to ALWAYS prepend an
> >>>> NSH header
> >> even for fragments? Or you don't care about that?
> >>>>
> >>>> Thank you.
> >>>>
> >>>> Cheers, Med
> >>>>
> >>>>> -----Message d'origine----- De : Elzur, Uri
> >>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril 2016
> >>>>> 16:26 =C0 : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;
> >>>>> sfc@ietf.org Objet : RE: [sfc] WG last call for
> >>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>
> >>>>> Hi Med
> >>>>>
> >>>>> Not to repeat my position, but I'll do it anyhow :-) As NSH
> >>>>> is *NOT* a transport, dealing with fragmentation is left to
> >>>>> the Transport used.
> >>>>>
> >>>>> The model I use for NSH, is basically similar to VXLAN . It
> >>>>> is an
> >> overly.
> >>>>>
> >>>>> Thx
> >>>>>
> >>>>> Uri ("Oo-Ree") C: 949-378-7568
> >>>>>
> >>>>>
> >>>>> -----Original Message----- From: sfc
> >>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
> >>>>> mohamed.boucadair@orange.com Sent: Monday, April 25, 2016
> >>>>> 7:18 AM To: Joel M. Halpern <jmh@joelhalpern.com>;
> >>>>> sfc@ietf.org Subject: Re: [sfc] WG last call for
> >>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>
> >>>>> Hi Joel,
> >>>>>
> >>>>> Please see inline.
> >>>>>
> >>>>> Cheers, Med
> >>>>>
> >>>>>> -----Message d'origine----- De : Joel M. Halpern
> >>>>>> [mailto:jmh@joelhalpern.com] Envoy=E9 : lundi 25 avril 2016
> >>>>>> 15:48 =C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org Objet :
> >>>>>> Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>>>
> >>>>>> If I am understanding you correctly Med, you are asking
> >>>>>> that the NSH draft specify how service chaining should cope
> >>>>>> with packets that have been fragmented?
> >>>>>>
> >>>>>
> >>>>> [Med] To be accurate, I'm asking to assess whether there are
> >> implications.
> >>>>> If there are, then the draft should be updated accordingly.
> >>>>>
> >>>>>> NSH, and the SFF functionality, does not care.
> >>>>>
> >>>>> [Med] I'm not that sure. Some typical implications are listed
> >>>>> below:
> >>>>>
> >>>>> * SFF: If the NSH header is present only in the a fragment
> >>>>> but SFF didn't maintained a state, subsequent fragments won't
> >>>>> be appropriately
> >> processed.
> >>>>> * SFC-aware function: if prepending a context information
> >>>>> depends on the full packet, not only a fragment.
> >>>>>
> >>>>> It just does its job.
> >>>>>
> >>>>> [Med] which may be disturbed in some situations as listed in
> >>>>> the examples above.
> >>>>>
> >>>>>> Ingress and intermediate classifiers may cope with
> >>>>>> fragments in any number of ways.
> >>>>> Specifying such is clearly out of scope for this draft.
> >>>>>
> >>>>> [Med] The purpose is not to specify the internal
> >>>>> implementation details but the external behavior of the
> >>>>> classifier function when it comes to handle fragments. That
> >>>>> behavior may have an incidence on SFF, in particular. The
> >>>>> purpose is not to recommend the maximum resources to be
> >>>>> dedicated to out of order fragments nor the timeout to cache
> >>>>> those; these considerations are of course out of scope.
> >>>>> Nevertheless, an implementation should offer a configurable
> >>>>> parameter so that an operator tweak those according to its
> >>>>> context.
> >>>>>
> >>>>>> I suppose one could write an informational draft on
> >>>>>> possible ways of coping.  The IETF has not usually
> >>>>>> published such. Service functions have to cope with
> >>>>>> fragmented packets just as they had to before the advent of
> >>>>>> NSH, so describing that is clearly not needed here.
> >>>>>
> >>>>> [Med] The advent of NSH has the following implications: * it
> >>>>> exacerbates fragmentation. Handing over this issue to the
> >>>>> transport layer may lead to interoperability issues. * the
> >>>>> chaining may not be efficient if fragments are
> >>>>> inappropriately handled.
> >>>>>
> >>>>> Introducing NSH should not degrade the overall service
> >>>>> compared to legacy service deployment schemes.
> >>>>>
> >>>>>>
> >>>>>> Yours, Joel
> >>>>>>
> >>>>>> On 4/25/16 3:00 AM, mohamed.boucadair@orange.com wrote:
> >>>>>>> Re-,
> >>>>>>>
> >>>>>>> I hear you, but my comment is that we need, as a WG, to
> >>>>>>> decide what to
> >>>>>> put in the draft. FWIW, I'm discussing two fragmentation
> >>>>>> issues:
> >>>>>>>
> >>>>>>> (1) Fragmentation that is caused by prepending an SFC
> >>>>>>> header. (2) Handling fragments at the ingress of an
> >>>>>>> SFC-enabled domain.
> >>>>>>>
> >>>>>>> Increasing the MTU is for sure a recommendation is to be
> >>>>>>> explicitly
> >>>>>> called out in the text (see my first message).
> >>>>>>>
> >>>>>>> There are other issues that need to be discussed, e.g.,
> >>>>>>> how to deal with
> >>>>>> fragments in SFFs/Classifiers?
> >>>>>>>
> >>>>>>> It is also "prudent" to check that no issues will be
> >>>>>>> experienced in SFF
> >>>>>> to handle fragments. If an SFC header is prepended for all
> >>>>>> fragments, I'm not sure there
> >>>>>>> is any particular issue at the SFF level, except if
> >>>>>>> stripping/adding
> >>>>>> context TLVs depends on the full packet (not just
> >>>>>> fragment). It is warranted to consider a little bit this
> >>>>>> point before declaring there is no issue.
> >>>>>>>
> >>>>>>> For point (1), declaring fragmentation out of scope would
> >>>>>>> be meant that
> >>>>>> an implementation must be prepared to receive fragments
> >>>>>> with or without NSH header as this is a decision that is
> >>>>>> left to the transport encapsulation. This is a requirement
> >>>>>> per se!
> >>>>>>>
> >>>>>>> I won't reiterate all the comments I have about the
> >>>>>>> current wording of
> >>>>>> this section.
> >>>>>>>
> >>>>>>> Cheers, Med
> >>>>>>>
> >>>>>>>> -----Message d'origine----- De : Elzur, Uri
> >>>>>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : lundi 25 avril
> >>>>>>>> 2016 08:30 =C0 : BOUCADAIR Mohamed IMT/OLN; Thomas
> >>>>>>>> Narten; sfc@ietf.org Objet : RE: [sfc] WG last call
> >>>>>>>> for draft-ietf-sfc-nsh-04.txt
> >>>>>>>>
> >>>>>>>> Hi Med
> >>>>>>>>
> >>>>>>>> My point is that Fragmentation is yet another transport
> >>>>>>>> related issue
> >>>>>> that
> >>>>>>>> is beyond the scope of NSH and beyond the charter of
> >>>>>>>> the WG, so it
> >>>>>> doesn't
> >>>>>>>> really belong in the draft. We are providing an advice
> >>>>>>>> as extending the size of the packet may lead to
> >>>>>>>> fragmentation, but as you check RFC 7348 VxLAN, which
> >>>>>>>> my create the same issue, you'll find it doesn't even
> >>>>>> relate
> >>>>>>>> to it.
> >>>>>>>>
> >>>>>>>> Thx
> >>>>>>>>
> >>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> -----Original Message----- From: sfc
> >>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
> >>>>>>>> mohamed.boucadair@orange.com Sent: Sunday, April 24,
> >>>>>>>> 2016 10:32 PM To: Elzur, Uri <uri.elzur@intel.com>;
> >>>>>>>> Thomas Narten
> >>>>>> <narten@us.ibm.com>;
> >>>>>>>> sfc@ietf.org Subject: Re: [sfc] WG last call for
> >>>>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>>>
> >>>>>>>> Hi Uri,
> >>>>>>>>
> >>>>>>>> That's another option that needs to be
> >>>>>>>> discussed/investigated. I'm
> >>>>>> afraid
> >>>>>>>> this is not the rationale adopted in -04 since it
> >>>>>>>> includes some text
> >>>>>> that
> >>>>>>>> is far to be sufficient to ensure interoperable
> >>>>>>>> implementations.
> >>>>>>>>
> >>>>>>>> BTW, saying that nsh does not need to deal with
> >>>>>>>> fragmentation because
> >>>>>> it
> >>>>>>>> is transport-independent is not IMHO a good strategy to
> >>>>>>>> adopt here
> >>>>>> because
> >>>>>>>> it opens the door for interoperable issues, it may lead
> >>>>>>>> to sub-optimal implementations if the sfc information
> >>>>>>>> is present only in one
> >>>>>> fragments,
> >>>>>>>> etc.
> >>>>>>>>
> >>>>>>>> My comments are related to the current text in the -04.
> >>>>>>>> This text needs
> >>>>>> to
> >>>>>>>> be fixed somehow.
> >>>>>>>>
> >>>>>>>> Cheers, Med
> >>>>>>>>
> >>>>>>>>> -----Message d'origine----- De : Elzur, Uri
> >>>>>>>>> [mailto:uri.elzur@intel.com] Envoy=E9 : dimanche 24
> >>>>>>>>> avril 2016 17:36 =C0 : BOUCADAIR Mohamed IMT/OLN;
> >>>>>>>>> Thomas Narten; sfc@ietf.org Objet : RE: [sfc] WG last
> >>>>>>>>> call for draft-ietf-sfc-nsh-04.txt
> >>>>>>>>>
> >>>>>>>>> Hi Med
> >>>>>>>>>
> >>>>>>>>> I see no need to specify the exact behavior as NSH is
> >>>>>>>>> transport independent i.e. like NSH interaction with
> >>>>>>>>> any other Transport eh issue of Fragmentation is to
> >>>>>>>>> be dealt in a way that matches the mechanisms
> >>>>>>>>> supported by the Transport used and do not belong in
> >>>>>>>>> the NSH draft
> >>>>>>>>>
> >>>>>>>>> Thx
> >>>>>>>>>
> >>>>>>>>> Uri ("Oo-Ree") C: 949-378-7568
> >>>>>>>>>
> >>>>>>>>>
> >>>>>>>>> -----Original Message----- From: sfc
> >>>>>>>>> [mailto:sfc-bounces@ietf.org] On Behalf Of
> >>>>>>>>> mohamed.boucadair@orange.com Sent: Thursday, April
> >>>>>>>>> 14, 2016 12:43 AM To: Thomas Narten
> >>>>>>>>> <narten@us.ibm.com>; sfc@ietf.org Subject: Re: [sfc]
> >>>>>>>>> WG last call for draft-ietf-sfc-nsh-04.txt
> >>>>>>>>>
> >>>>>>>>> R-,
> >>>>>>>>>
> >>>>>>>>> In addition to other pending issues raised for this
> >>>>>>>>> draft, I would like to raise this additional one
> >>>>>>>>> about Section 6.
> >>>>>>>>>
> >>>>>>>>> =3D=3D 6.  Fragmentation Considerations
> >>>>>>>>>
> >>>>>>>>> NSH and the associated transport header are "added"
> >>>>>>>>> to the encapsulated packet/frame.  This additional
> >>>>>>>>> information increases
> >>>>>> the
> >>>>>>>>> size of the packet.  In order the ensure proper
> >>>>>>>>> forwarding of
> >> NSH
> >>>>>>>>> data, several options for handling fragmentation and
> >>>>>>>>> re-
> >> assembly
> >>>>>>>>> exist:
> >>>>>>>>>
> >>>>>>>>> 1.  Jumbo Frames, when supported, enable the
> >>>>>>>>> transport of NSH
> >> and
> >>>>>>>>> associated transport packets without requiring
> >> fragmentation.
> >>>>>>>>>
> >>>>>>>>> 2.  Path MTU Discovery [RFC1191]"describes a
> >>>>>>>>> technique for dynamically discovering the maximum
> >>>>>>>>> transmission unit (MTU) of
> >>>>>> an
> >>>>>>>>> arbitrary internet path" and can be utilized to
> >>>>>>>>> ensure the
> >>>>> the
> >>>>>>>>> required packet size is used.
> >>>>>>>>>
> >>>>>>>>> 3.  [RFC6830] describes two schemes for fragmentation
> >>>>>>>>> and re-
> >>>>>> assembly
> >>>>>>>>> in section 5.4. =3D=3D
> >>>>>>>>>
> >>>>>>>>> * The text is weak for a Standard track document that
> >>>>>>>>> is intended to solve the problem in
> >>>>>>>>> https://tools.ietf.org/html/rfc7498#section-
> >>>>> 2.12.
> >>>>>>>>> There should be a clear behavior to be followed by
> >>>>>>>>> an
> >>>>> implementation.
> >>>>>>>>> Further, I would avoid the use of words such as
> >>>>>>>>> "can".
> >>>>>>>>>
> >>>>>>>>> * The text covers only fragmentation when it is
> >>>>>>>>> induced by SFC operations, it does not discuss the
> >>>>>>>>> treatment of a fragment when received in an SFC
> >>>>>>>>> domain. IMHO, the draft should also specify the
> >>>>>>>>> behavior of the Classifier with regards to fragments
> >>>>>>>>> for the sake of proper SFC operation. Applying
> >>>>>>>>> classification policies may require the
> >>>>>>>> full packet, not only a fragment.
> >>>>>>>>> In particular, dedicated resources should dedicated
> >>>>>>>>> for handling out of order fragments. Of course, it is
> >>>>>>>>> out of scope of this document to describe how SFs
> >>>>>>>>> handle fragments.
> >>>>>>>>>
> >>>>>>>>> * If an SFC header is prepended for all fragments,
> >>>>>>>>> I'm not sure there is any particular issue at the SFF
> >>>>>>>>> level...except if stripping/adding context TLVs
> >>>>>>>>> depends on the full packet (not just fragment). It is
> >>>>>>>>> warranted to consider a little bit this point before
> >>>>>>>>> declaring there
> >>>>>> is
> >>>>>>>> no issue.
> >>>>>>>>>
> >>>>>>>>> * The text states "several options". This may be
> >>>>>>>>> interpreted as if implementing one of them is
> >>>>>>>>> sufficient...which is not true. The first two points
> >>>>>>>>> contribute to minimize the fragmentation risk, but
> >>>>>>>>> fragmentation may still be experienced (e.g., other
> >>>>>>>>> shims are prepended by other nodes for some other
> >>>>>>>>> purposes, nested nsh, etc.)
> >>>>>>>>>
> >>>>>>>>> * The first two points have nothing to do with
> >>>>>>>>> reassembly.
> >>>>>>>>>
> >>>>>>>>> * The support of jumbo frames by a router/device does
> >>>>>>>>> not mean that it can make use of it. Appropriate MTU
> >>>>>>>>> configuration should be undertaken in a consistent
> >>>>>>>>> manner within an SFC domain. The text should be
> >>>>>>>>> updated to make it is about (consistent) MTU
> >>>>> configuration.
> >>>>>>>>>
> >>>>>>>>> * BTW, shouldn't the text be reworded to recommended
> >>>>>>>>> to increase the MTU of **all nodes** of an
> >>>>>>>>> SFC-enabled domain by at least the length of SFC
> >>>>>>>>> header + transport header?
> >>>>>>>>>
> >>>>>>>>> * Bullet 2, how PMTU discovery is actually used in
> >>>>>>>>> this context? Do you assume that all SFC-aware nodes
> >>>>>>>>> will issue such messages towards other SFC-aware
> >>>>>>>>> node, arbitrary destination, else?
> >>>>>>>>>
> >>>>>>>>> * Bullet 2, I would drop "describes a technique for
> >>>>>>>>> dynamically discovering the maximum transmission unit
> >>>>>>>>> (MTU) of an arbitrary internet path".
> >>>>>>>>>
> >>>>>>>>> * Bullet 2, s/ the the/the.
> >>>>>>>>>
> >>>>>>>>> * The reference to the LISP specification raises two
> >>>>>>>>> concerns and one comment:
> >>>>>>>>>
> >>>>>>>>> (1) I don't think it is a good approach that
> >>>>>>>>> fragments induced by the network are passed to their
> >>>>>>>>> ultimate destinations as such
> >>>>> (stateless).
> >>>>>>>>> IMO, reassembly should be done within the SFC domain
> >>>>>>>>> (responsible for fragmentation) not passed away. (2)
> >>>>>>>>> Does the stateful mode require all SFC data plane
> >>>>>>>>> elements maintain a full list of MTU for the any
> >>>>>>>>> SFF/SF instance of the SFC
> >>>>>>>> domain?
> >>>>>>>>>
> >>>>>>>>> The current text suggests that [RFC6830] should be
> >>>>>>>>> listed as normative reference (not an informative
> >>>>>>>>> one). I would personally favor removing the reference
> >>>>>>>>> to LISP (as it is an Experimental
> >> RFC).
> >>>>>>>>>
> >>>>>>>>> * The security section of the draft may be augmented
> >>>>>>>>> with informational fragmentation-related pointers to:
> >>>>>>>>> e.g., RFC1858 (Security Considerations for IP
> >>>>>>>>> Fragment Filtering), RFC3128 (Protection Against a
> >>>>>>>>> Variant of the Tiny Fragment Attack), and RFC 4963
> >>>>>>>>> (IPv4 Reassembly Errors at High Data Rates).
> >>>>>>>>>
> >>>>>>>>> Cheers, Med
> >>>>>>>>>
> >>>>>>>>>> -----Message d'origine----- De : sfc
> >>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de
> >>>>>>>>>> mohamed.boucadair@orange.com Envoy=E9 : lundi 11
> >>>>>>>>>> avril 2016 13:14 =C0
> >> :
> >>>>>>>>>> Thomas Narten; sfc@ietf.org Objet : Re: [sfc] WG
> >>>>>>>>>> last call for draft-ietf-sfc-nsh-04.txt
> >>>>>>>>>>
> >>>>>>>>>> Dear Thomas, all,
> >>>>>>>>>>
> >>>>>>>>>> As I mentioned during the meeting, there are
> >>>>>>>>>> several issues that are not covered in the last
> >>>>>>>>>> version of the draft. I already provided examples
> >>>>>>>>>> of the issues offline as requested by Martin.
> >>>>>>>>>>
> >>>>>>>>>> Cheers, Med
> >>>>>>>>>>
> >>>>>>>>>>> -----Message d'origine----- De : sfc
> >>>>>>>>>>> [mailto:sfc-bounces@ietf.org] De la part de
> >>>>>>>>>>> Thomas Narten Envoy=E9 : jeudi 31 mars 2016 04:48 =C0
> >>>>>>>>>>> : sfc@ietf.org Objet : [sfc] WG last call for
> >>>>>>>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>>>>>>
> >>>>>>>>>>> Dear WG:
> >>>>>>>>>>>
> >>>>>>>>>>> This note begins a WG last call on
> >>>>>>>>>>> draft-ietf-sfc-nsh-04.txt
> >>>>>>>>>>> (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
> >>>>>>>>>>>
> >>>>>>>>>>>
> >>>>>>>>>>>
> The editors of the NSH document have indicated that they have
> >>>>>>>>>>> addressed all known comments and that there are
> >>>>>>>>>>> no open issues with the current version of the
> >>>>>>>>>>> document.
> >>>>>>>>>>>
> >>>>>>>>>>> Substantive comments to the list please,
> >>>>>>>>>>> editorial comments can go directly to the
> >>>>>>>>>>> document editors.
> >>>>>>>>>>>
> >>>>>>>>>>> We'll also get a brief update from the editors at
> >>>>>>>>>>> next week's meeting. If there are any remaining
> >>>>>>>>>>> issues with the document, raising them before the
> >>>>>>>>>>> meeting would be especially helpful.
> >>>>>>>>>>>
> >>>>>>>>>>> For the chairs, Thomas
> >>>>>>>>>>>
> >>>>>>>>>>> _______________________________________________
> >>>>>>>>>>> sfc mailing list sfc@ietf.org
> >>>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>>>>>>>
> >>>>>>>>>> _______________________________________________ sfc
> >>>>>>>>>> mailing list sfc@ietf.org
> >>>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>>>>>>
> >>>>>>>>> _______________________________________________ sfc
> >>>>>>>>> mailing list sfc@ietf.org
> >>>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>>>>>
> >>>>>>>> _______________________________________________ sfc
> >>>>>>>> mailing list sfc@ietf.org
> >>>>>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>>>>
> >>>>>>> _______________________________________________ sfc
> >>>>>>> mailing list sfc@ietf.org
> >>>>>>> https://www.ietf.org/mailman/listinfo/sfc
> >>>>>>>
> >>>>>
> >>>>> _______________________________________________ sfc mailing
> >>>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >>>>
> >>>> _______________________________________________ sfc mailing
> >>>> list sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >>>>
> >>>
> >>> _______________________________________________ sfc mailing list
> >>> sfc@ietf.org https://www.ietf.org/mailman/listinfo/sfc
> >>>
> >


From nobody Thu Apr 28 05:17:52 2016
Return-Path: <agmalis@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 08DE412B05C for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 05:17:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vMeTBEoMrcq6 for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 05:17:44 -0700 (PDT)
Received: from mail-oi0-x22c.google.com (mail-oi0-x22c.google.com [IPv6:2607:f8b0:4003:c06::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 82F2612D0A2 for <sfc@ietf.org>; Thu, 28 Apr 2016 05:17:44 -0700 (PDT)
Received: by mail-oi0-x22c.google.com with SMTP id x201so81155654oif.3 for <sfc@ietf.org>; Thu, 28 Apr 2016 05:17:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=JHC8PIDzIxjmmu2gmsng1f4KAHfQ9zVHaYG1N/EVjqM=; b=PlmumaLcOUiiOXv+ftBZd4w96DyekP05k3C+YQpkKLkLTxqEKxMt32UDrBOCXzbiL1 rhHJDruR648FGX6CKCYtB3A7cw5MiVLcgaH27oNX9Vz2aAHyTOOIjNKER5d9vuje8tpT LUo67YOZ8blAggk4IMFsf0ZH/JwFNLo0ApiT4grUfhwIgZQQXwhP7vaTm8pT8H1NntI7 YeBZ/gO1e/Seg+cwXN+eXv9Js15iQXgjADA7Nx4pQlvI5lrxJpwPaX20bm6OC8nvB0OR okEn+oWLufa4ZV6RBkaZJLoqUVkiz3uVHFthEKUNnh4NisFChbD4OlDK9DKe0ZWsUfKe AKKw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=JHC8PIDzIxjmmu2gmsng1f4KAHfQ9zVHaYG1N/EVjqM=; b=AE4oiI8FGd2+t5yEfbxdAFDl7d1AN+nLr8z9cjIz1qrPn8SVDosBLOI0YuPtH7+MKx Ve3WQb4oJcZwYJ5GK3hr3T7KrIZzkfrTCAuAb5HVsGXefadTSfkyYyJsaWCW76XNLqZM GfuMyBHaZF08UzrS4bo47hbX4MHcMmaSRvlDTDCuxIXDwWowdaA0McNpPXvxCQhJjbJK +uzWD8YHgWXujnFH2rUQXY7bm9mSgXjgSwXwY2d0OlOwwsHJi4q1lCTpmfjIn/OAeL4X CdIcfcvOzkPWgrqGfBMXMaFYxuL+sHv5h3K1o7VCIwPA62rkkbSldi4oyyrmUrBhY0U0 Z9yg==
X-Gm-Message-State: AOPr4FUYQo+lBCNZu3cPpmTv3vvlLkb0aM71qNFwPs9UzF41yDmUiTBsTmZSSsHQPslDghZCzaprNXCypJllMQ==
X-Received: by 10.157.13.227 with SMTP id 90mr6904856ots.79.1461845863565; Thu, 28 Apr 2016 05:17:43 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.182.231.106 with HTTP; Thu, 28 Apr 2016 05:17:24 -0700 (PDT)
In-Reply-To: <4d65232a-d4a6-a11b-c765-635cb909edbd@joelhalpern.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb> <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com> <CAA=duU0cjXbTxTCqaRetajxFaJVfq8Y-HySPDrR-0AN38Wq3Zw@mail.gmail.com> <4d65232a-d4a6-a11b-c765-635cb909edbd@joelhalpern.com>
From: "Andrew G. Malis" <agmalis@gmail.com>
Date: Thu, 28 Apr 2016 08:17:24 -0400
Message-ID: <CAA=duU0PujWB0LB=wxFauPqaqbf4kFsqkzAwtNn7r3MzBUdCqA@mail.gmail.com>
To: Joel Halpern Direct <jmh.direct@joelhalpern.com>
Content-Type: multipart/alternative; boundary=94eb2c1100146a10f205318a831a
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/GYVNbefNPPgNYWDp8aRhKouzdFw>
Cc: "Elzur, Uri" <uri.elzur@intel.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 12:17:50 -0000

--94eb2c1100146a10f205318a831a
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Joel,

The diagrams in section 6 of RFC 6830 are control plane, not data plane.
The data plane diagrams are in section 5.

But the overriding question is - without any fields in the NSH header to
sequence fragments, how can the fragments be correctly reassembled?

Cheers,
Andy

On Wed, Apr 27, 2016 at 7:46 PM, Joel Halpern Direct <
jmh.direct@joelhalpern.com> wrote:

> The LISP header does not have a fragment flag or fragment offset.  The
> diagrams in section 6 include the outer encapsulating header (the
> equivalent of the transport header in SFC.)  Yes, the text is a little ha=
rd
> to follow in this regard.  The LISP working group is going to be rewritin=
g
> RFC 6830 as part of moving to standards track.
>
> So there is no difference in this regard between NSH and LISP.
>
> Yours,
> Joel
>
> On 4/27/16 7:02 PM, Andrew G. Malis wrote:
>
>> Joel et al,
>>
>> All this talk about fragmentation prompted me to re-read section 6 of
>> the draft, which recommends (as option 3) using the procedures in
>> section 5.4 of RFC 6830 (presumably with the =E2=80=9CNSH header=E2=80=
=9D replacing the
>> =E2=80=9CLISP header=E2=80=9D in the description of the procedures in th=
at section).
>>
>> So that led me to read that section (and the LISP header definition in
>> section 5.1), and I see that LISP does fragmentation and reassembly
>> identically to IPv4, using the Fragment Offset field so that fragments
>> can be correctly reassembled in the proper order.
>>
>> However, the NSH Header doesn=E2=80=99t have a Fragment Offset field or =
any
>> other way to order the fragments.
>>
>> So how can the procedures in Section 5.4 of 6830 be used?
>>
>> Thanks,
>> Andy
>>
>> On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern <jmh@joelhalpern.com
>> <mailto:jmh@joelhalpern.com>> wrote:
>>
>>     Both methods are valid, and both depend upon details of the
>>     underlying packet and the transport.  As such, I don't see why this
>>     document benefits from describing them, much less why it should mark
>>     one method as a "should".  Implementation details are likely to be
>>     more significant than any bit consumption difference between the two
>>     alternatives.
>>
>>     Yours,
>>     Joel
>>
>>
>>     On 4/27/16 3:40 PM, Linda Dunbar wrote:
>>
>>         I suggest adding the following paragraphs after the Bullet 3 of
>>         the Section 6 Fragmentation Consideration to make the process
>>         more clear and less controversial:
>>
>>
>>         --------------------------------
>>
>>         RFC6830 describes the fragmentation method of breaking the
>>         original packet into two equal sub-frames and encapsulating
>>         [LISP Header + Transport header] to each sub-frame.
>>
>>         If LISP fragmentation [RFC6830 Section 5.4] is used, the [SFC
>>         Header + Transport Header] will be added to each half frame (or
>>         the original data frame). As the Transport Header is terminated
>>         by the next SFF node's tunnel transport layer, the combined two
>>         sub-frames will have two SFC Headers.
>>
>>         Therefore, the fragmentation for NSH encapsulated data frame
>>         should be done completely by the node tunnel transport layer,
>>         which should break the [SFC + original packet] into two equal
>>         sub-frames and each sub-frame being encapsulated with its
>>         respective tunnel header.  The next SFF node's tunnel transport
>>         layer should combine the two sub-frames before sending to the
>>         next node.
>>
>>         ------------------------------------------------------
>>
>>
>>         By the way, there are to typo in the Section 6:
>>         3rd line: "In order the" =3D=3D> "In order to"
>>         Last line of Bullet 2: extra "the" in the "utilized to ensure
>>         the the required packet".
>>
>>
>>         Hope it helps.
>>
>>         Linda
>>
>>
>>
>>         -----Original Message-----
>>         From: mohamed.boucadair@orange.com
>>         <mailto:mohamed.boucadair@orange.com>
>>         [mailto:mohamed.boucadair@orange.com
>>         <mailto:mohamed.boucadair@orange.com>]
>>         Sent: Wednesday, April 27, 2016 12:40 AM
>>         To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; sfc@ietf.org
>>         <mailto:sfc@ietf.org>
>>         Subject: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>>         Hi Joel, all,
>>
>>         Please see inline.
>>
>>         Cheers,
>>         Med
>>
>>             -----Message d'origine-----
>>             De : Joel M. Halpern [mailto:jmh@joelhalpern.com
>>             <mailto:jmh@joelhalpern.com>] Envoy=C3=A9 : mardi 26
>>             avril 2016 19:18 =C3=80 : Linda Dunbar; BOUCADAIR Mohamed
>>             IMT/OLN; Elzur,
>>             Uri; sfc@ietf.org <mailto:sfc@ietf.org> Objet : Re: [sfc] WG
>>             last call for
>>             draft-ietf-sfc-nsh-04.txt
>>
>>             With regard to Transport tunnel fragementation, that seems
>>             an issue
>>             for the transport protocol.  I don't actually object to a
>>             sentence,
>>             but it does not seem that it will accomplish anything.
>>
>>
>>         [Med] I would like to see some text added to the draft.
>>
>>
>>             With regard to packets fragmented by the source, I
>>             completely disagree
>>             with your assertion.  If an SFF were to reassemble the
>>             packets, that
>>             would be a violation of its job.
>>
>>
>>         [Med] I agree with you.
>>
>>           There is no reason for an SFF to
>>
>>             reassemble a packet fragmented by the source.  The
>>             classifier may have
>>             to do some interesting things in order to properly classify
>>             succeeding
>>             fragments, but that is an implementation issue (most commonl=
y
>>             addressed with virtual reassembly, which doe snot delay the
>>             fragments.)  We don't specity that.
>>
>>
>>         [Med] Still, the external behavior of the classifier needs to be
>>         clear in the document. I don't find any text in the draft saying
>>         for instance that an NSH header must be present in all
>>         fragments. (There some processing that might be needed at the
>>         SFF to "do its job" with regards to fragments (receive out of
>>         order fragments + forwarding policy on the full packet).)
>>
>>
>>             If an SF needs to reassemble fragments to do its job, that
>>             is up to
>>             the SF.  Some will need to actually reassemble.  Some will
>>             need to
>>             perform virtual reassembly, and some will happily process th=
e
>>             fragments.  I can not see what the NSH document could
>>             possibly mandate.
>>
>>
>>         [Med] Fully agree.
>>
>>
>>             Yours,
>>             Joel
>>
>>             On 4/26/16 11:47 AM, Linda Dunbar wrote:
>>
>>                 Joel,
>>
>>                 I think the document should add the description on the
>>                 following two
>>                 fragmentation scenarios:
>>
>>                 - Transport tunnel generated fragmentation: When a packe=
t
>>                 fragmentation is caused by transport tunnel (i.e. variou=
s
>>                 encapsulations), the termination point of the transport
>>                 tunnel is
>>                 responsible for re-assembling the fragmented pieces of
>>                 the packet.
>>                 Since there won't be any SFF nodes in between the
>>                 Transport Tunnel,
>>                 the tunnel generated fragmentation does not require any
>>                 actions by
>>                 SFF nodes or SF nodes.
>>
>>
>>                 - Source node generated fragmentation (after adding on
>>                 the NSH
>>                 header): When fragmentation has to be performed for a
>>                 packet being
>>                 encapsulated with the NSH header, either the
>>                 intermediate SFF nodes
>>                 or the SF nodes have to be able to reassemble the
>>                 fragmented pieces.
>>
>>
>>
>>
>>                 Cheers,
>>
>>
>>                 Linda
>>
>>                 -----Original Message----- From: Joel M. Halpern
>>                 [mailto:jmh@joelhalpern.com
>>                 <mailto:jmh@joelhalpern.com>] Sent: Tuesday, April 26,
>>                 2016 10:33 AM
>>                 To: Linda Dunbar; mohamed.boucadair@orange.com
>>                 <mailto:mohamed.boucadair@orange.com>; Elzur, Uri;
>>                 sfc@ietf.org <mailto:sfc@ietf.org> Subject: Re: [sfc] WG
>>                 last call for
>>                 draft-ietf-sfc-nsh-04.txt
>>
>>                 Re-reading your note, it is possible that you are
>>                 referring only to
>>                 the case of transport generated fragmentation of the
>>                 outer packet.
>>                 I had assumed you were not talking about that, since the
>>                 resulting
>>                 fragments will not all have NSH headers.  As with any
>> tunnel
>>                 technology, if the tunnel chooses to fragment at its
>>                 layer, then the
>>                 tunnel is responsible for reassembly.  That would be
>>                 invisible to
>>                 the SFF.
>>
>>                 Yours, Joel
>>
>>                 On 4/26/16 11:10 AM, Linda Dunbar wrote:
>>
>>                     Agree with Med.
>>
>>                     Even if each fragment piece of a packet with NSH
>>                     header carries the
>>                     NSH header, the intermediate SFF nodes still need to
>>                     put together
>>                     all the fragments together before passing the whole
>>                     data frame to
>>                     the SF.
>>
>>                     Linda
>>
>>                     -----Original Message----- From: sfc
>>                     [mailto:sfc-bounces@ietf.org
>>                     <mailto:sfc-bounces@ietf.org>]
>>                     On Behalf Of mohamed.boucadair@orange.com
>>                     <mailto:mohamed.boucadair@orange.com> Sent: Monday,
>>                     April 25,
>>                     2016 9:42 AM To: Elzur, Uri; Joel M. Halpern;
>>                     sfc@ietf.org <mailto:sfc@ietf.org> Subject:
>>                     Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>>                     Re-,
>>
>>                     How do you instruct the transport layer to ALWAYS
>>                     prepend an NSH
>>                     header even for fragments? Or you don't care about
>> that?
>>
>>                     Thank you.
>>
>>                     Cheers, Med
>>
>>                         -----Message d'origine----- De : Elzur, Uri
>>                         [mailto:uri.elzur@intel.com
>>                         <mailto:uri.elzur@intel.com>] Envoy=C3=A9 : lund=
i 25
>>                         avril 2016 16:26 =C3=80
>>                         : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;
>>                         sfc@ietf.org <mailto:sfc@ietf.org> Objet
>>                         : RE: [sfc] WG last call for
>>                         draft-ietf-sfc-nsh-04.txt
>>
>>                         Hi Med
>>
>>                         Not to repeat my position, but I'll do it anyhow
>>                         :-) As NSH is
>>                         *NOT* a transport, dealing with fragmentation is
>>                         left to the
>>                         Transport used.
>>
>>                         The model I use for NSH, is basically similar to
>>                         VXLAN . It is an
>>                         overly.
>>
>>                         Thx
>>
>>                         Uri ("Oo-Ree") C: 949-378-7568 <tel:949-378-7568=
>
>>
>>
>>                         -----Original Message----- From: sfc
>>                         [mailto:sfc-bounces@ietf.org
>>                         <mailto:sfc-bounces@ietf.org>]
>>                         On Behalf Of mohamed.boucadair@orange.com
>>                         <mailto:mohamed.boucadair@orange.com> Sent:
>>                         Monday, April 25,
>>                         2016 7:18 AM To: Joel M. Halpern
>>                         <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com
>> >>;
>>                         sfc@ietf.org <mailto:sfc@ietf.org>
>>                         Subject: Re: [sfc] WG last call for
>>                         draft-ietf-sfc-nsh-04.txt
>>
>>                         Hi Joel,
>>
>>                         Please see inline.
>>
>>                         Cheers, Med
>>
>>                             -----Message d'origine----- De : Joel M.
>> Halpern
>>                             [mailto:jmh@joelhalpern.com
>>                             <mailto:jmh@joelhalpern.com>] Envoy=C3=A9 : =
lundi
>>                             25 avril 2016 15:48 =C3=80
>>                             : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org
>>                             <mailto:sfc@ietf.org> Objet : Re: [sfc] WG
>>                             last call for draft-ietf-sfc-nsh-04.txt
>>
>>                             If I am understanding you correctly Med, you
>>                             are asking that the
>>                             NSH draft specify how service chaining
>>                             should cope with packets
>>                             that have been fragmented?
>>
>>
>>                         [Med] To be accurate, I'm asking to assess
>>                         whether there are
>>                         implications. If there are, then the draft
>>                         should be updated
>>                         accordingly.
>>
>>                             NSH, and the SFF functionality, does not car=
e.
>>
>>
>>                         [Med] I'm not that sure. Some typical
>>                         implications are listed
>>                         below:
>>
>>                         * SFF: If the NSH header is present only in the
>>                         a fragment but SFF
>>                         didn't maintained a state, subsequent fragments
>>                         won't be
>>                         appropriately processed. * SFC-aware function:
>>                         if prepending a
>>                         context information depends on the full packet,
>>                         not only a
>>                         fragment.
>>
>>                         It just does its job.
>>
>>                         [Med] which may be disturbed in some situations
>>                         as listed in the
>>                         examples above.
>>
>>                             Ingress and intermediate classifiers may
>>                             cope with fragments in
>>                             any number of ways.
>>
>>                         Specifying such is clearly out of scope for this
>>                         draft.
>>
>>                         [Med] The purpose is not to specify the internal
>>                         implementation
>>                         details but the external behavior of the
>>                         classifier function when
>>                         it comes to handle fragments. That behavior may
>>                         have an incidence
>>                         on SFF, in particular. The purpose is not to
>>                         recommend the maximum
>>                         resources to be dedicated to out of order
>>                         fragments nor the
>>                         timeout to cache those; these considerations are
>>                         of course out of
>>                         scope. Nevertheless, an implementation should
>>                         offer a configurable
>>                         parameter so that an operator tweak those
>>                         according to its
>>                         context.
>>
>>                             I suppose one could write an informational
>>                             draft on possible ways
>>                             of coping.  The IETF has not usually
>>                             published such.
>>                             Service functions have to cope with
>>                             fragmented packets just as
>>                             they had to before the advent of NSH, so
>>                             describing that is
>>                             clearly not needed here.
>>
>>
>>                         [Med] The advent of NSH has the following
>>                         implications: * it
>>                         exacerbates fragmentation. Handing over this
>>                         issue to the
>>                         transport layer may lead to interoperability
>>                         issues. * the
>>                         chaining may not be efficient if fragments are
>>                         inappropriately
>>                         handled.
>>
>>                         Introducing NSH should not degrade the overall
>>                         service compared to
>>                         legacy service deployment schemes.
>>
>>
>>                             Yours, Joel
>>
>>                             On 4/25/16 3:00 AM,
>>                             mohamed.boucadair@orange.com
>>                             <mailto:mohamed.boucadair@orange.com> wrote:
>>
>>                                 Re-,
>>
>>                                 I hear you, but my comment is that we
>>                                 need, as a WG, to decide
>>                                 what to
>>
>>                             put in the draft. FWIW, I'm discussing two
>>                             fragmentation
>>                             issues:
>>
>>
>>                                 (1) Fragmentation that is caused by
>>                                 prepending an SFC header.
>>                                 (2) Handling fragments at the ingress of
>>                                 an SFC-enabled domain.
>>
>>                                 Increasing the MTU is for sure a
>>                                 recommendation is to be
>>                                 explicitly
>>
>>                             called out in the text (see my first message=
).
>>
>>
>>                                 There are other issues that need to be
>>                                 discussed, e.g., how to
>>                                 deal with
>>
>>                             fragments in SFFs/Classifiers?
>>
>>
>>                                 It is also "prudent" to check that no
>>                                 issues will be experienced
>>                                 in SFF
>>
>>                             to handle fragments. If an SFC header is
>>                             prepended for all
>>                             fragments, I'm not sure there
>>
>>                                 is any particular issue at the SFF
>>                                 level, except if
>>                                 stripping/adding
>>
>>                             context TLVs depends on the full packet (not
>>                             just fragment). It
>>                             is warranted to consider a little bit this
>>                             point before declaring
>>                             there is no issue.
>>
>>
>>                                 For point (1), declaring fragmentation
>>                                 out of scope would be
>>                                 meant that
>>
>>                             an implementation must be prepared to
>>                             receive fragments with or
>>                             without NSH header as this is a decision
>>                             that is left to the
>>                             transport encapsulation. This is a
>>                             requirement per se!
>>
>>
>>                                 I won't reiterate all the comments I
>>                                 have about the current
>>                                 wording of
>>
>>                             this section.
>>
>>
>>                                 Cheers, Med
>>
>>                                     -----Message d'origine----- De :
>>                                     Elzur, Uri
>>                                     [mailto:uri.elzur@intel.com
>>                                     <mailto:uri.elzur@intel.com>] Envoy=
=C3=A9
>>                                     : lundi 25 avril 2016
>>                                     08:30 =C3=80 : BOUCADAIR Mohamed IMT=
/OLN;
>>                                     Thomas Narten;
>>                                     sfc@ietf.org <mailto:sfc@ietf.org>
>>                                     Objet : RE: [sfc] WG last call for
>>                                     draft-ietf-sfc-nsh-04.txt
>>
>>                                     Hi Med
>>
>>                                     My point is that Fragmentation is
>>                                     yet another transport related
>>                                     issue
>>
>>                             that
>>
>>                                     is beyond the scope of NSH and
>>                                     beyond the charter of the WG, so
>>                                     it
>>
>>                             doesn't
>>
>>                                     really belong in the draft. We are
>>                                     providing an advice as
>>                                     extending the size of the packet may
>>                                     lead to fragmentation, but
>>                                     as you check RFC 7348 VxLAN, which
>>                                     my create the same issue,
>>                                     you'll find it doesn't even
>>
>>                             relate
>>
>>                                     to it.
>>
>>                                     Thx
>>
>>                                     Uri ("Oo-Ree") C: 949-378-7568
>>                                     <tel:949-378-7568>
>>
>>
>>                                     -----Original Message----- From: sfc
>>                                     [mailto:sfc-bounces@ietf.org
>>                                     <mailto:sfc-bounces@ietf.org>] On
>>                                     Behalf Of
>>                                     mohamed.boucadair@orange.com
>>                                     <mailto:mohamed.boucadair@orange.com=
>
>> Sent:
>>                                     Sunday, April 24, 2016
>>                                     10:32 PM To: Elzur, Uri
>>                                     <uri.elzur@intel.com
>>                                     <mailto:uri.elzur@intel.com>>;
>>                                     Thomas Narten
>>
>>                             <narten@us.ibm.com <mailto:narten@us.ibm.com
>> >>;
>>
>>                                     sfc@ietf.org <mailto:sfc@ietf.org>
>>                                     Subject: Re: [sfc] WG last call for
>>                                     draft-ietf-sfc-nsh-04.txt
>>
>>                                     Hi Uri,
>>
>>                                     That's another option that needs to
>>                                     be discussed/investigated.
>>                                     I'm
>>
>>                             afraid
>>
>>                                     this is not the rationale adopted in
>>                                     -04 since it includes some
>>                                     text
>>
>>                             that
>>
>>                                     is far to be sufficient to ensure
>>                                     interoperable
>>                                     implementations.
>>
>>                                     BTW, saying that nsh does not need
>>                                     to deal with fragmentation
>>                                     because
>>
>>                             it
>>
>>                                     is transport-independent is not IMHO
>>                                     a good strategy to adopt
>>                                     here
>>
>>                             because
>>
>>                                     it opens the door for interoperable
>>                                     issues, it may lead to
>>                                     sub-optimal implementations if the
>>                                     sfc information is present
>>                                     only in one
>>
>>                             fragments,
>>
>>                                     etc.
>>
>>                                     My comments are related to the
>>                                     current text in the -04.
>>                                     This text needs
>>
>>                             to
>>
>>                                     be fixed somehow.
>>
>>                                     Cheers, Med
>>
>>                                         -----Message d'origine----- De :
>>                                         Elzur, Uri
>>                                         [mailto:uri.elzur@intel.com
>>                                         <mailto:uri.elzur@intel.com>]
>>                                         Envoy=C3=A9 : dimanche 24 avril
>>                                         2016 17:36 =C3=80 : BOUCADAIR Mo=
hamed
>>                                         IMT/OLN; Thomas Narten;
>>                                         sfc@ietf.org
>>                                         <mailto:sfc@ietf.org> Objet :
>>                                         RE: [sfc] WG last call for
>>                                         draft-ietf-sfc-nsh-04.txt
>>
>>                                         Hi Med
>>
>>                                         I see no need to specify the
>>                                         exact behavior as NSH is
>>                                         transport independent i.e. like
>>                                         NSH interaction with any other
>>                                         Transport eh issue of
>>                                         Fragmentation is to be dealt in
>>                                         a way
>>                                         that matches the mechanisms
>>                                         supported by the Transport used
>>                                         and do not belong in the NSH dra=
ft
>>
>>                                         Thx
>>
>>                                         Uri ("Oo-Ree") C: 949-378-7568
>>                                         <tel:949-378-7568>
>>
>>
>>                                         -----Original Message----- From:
>> sfc
>>                                         [mailto:sfc-bounces@ietf.org
>>                                         <mailto:sfc-bounces@ietf.org>]
>>                                         On Behalf Of
>>                                         mohamed.boucadair@orange.com
>>                                         <mailto:
>> mohamed.boucadair@orange.com>
>>                                         Sent: Thursday, April 14,
>>                                         2016 12:43 AM To: Thomas Narten
>>                                         <narten@us.ibm.com
>>                                         <mailto:narten@us.ibm.com>>;
>>                                         sfc@ietf.org
>>                                         <mailto:sfc@ietf.org> Subject:
>>                                         Re: [sfc] WG last call for
>>                                         draft-ietf-sfc-nsh-04.txt
>>
>>                                         R-,
>>
>>                                         In addition to other pending
>>                                         issues raised for this draft, I
>>                                         would like to raise this
>>                                         additional one about Section 6.
>>
>>                                         =3D=3D 6.  Fragmentation
>> Considerations
>>
>>                                         NSH and the associated transport
>>                                         header are "added" to the
>>                                         encapsulated packet/frame.  This
>>                                         additional information
>>                                         increases
>>
>>                             the
>>
>>                                         size of the packet.  In order
>>                                         the ensure proper forwarding of
>>                                         NSH data, several options for
>>                                         handling fragmentation and
>>                                         re-assembly exist:
>>
>>                                         1.  Jumbo Frames, when
>>                                         supported, enable the transport
>>                                         of NSH
>>                                         and associated transport packets
>>                                         without requiring
>>                                         fragmentation.
>>
>>                                         2.  Path MTU Discovery
>>                                         [RFC1191]"describes a technique
>> for
>>                                         dynamically discovering the
>>                                         maximum transmission unit (MTU) =
of
>>
>>                             an
>>
>>                                         arbitrary internet path" and can
>>                                         be utilized to ensure the
>>
>>                         the
>>
>>                                         required packet size is used.
>>
>>                                         3.  [RFC6830] describes two
>>                                         schemes for fragmentation and
>>                                         re-
>>
>>                             assembly
>>
>>                                         in section 5.4. =3D=3D
>>
>>                                         * The text is weak for a
>>                                         Standard track document that is
>>                                         intended to solve the problem in
>>
>> https://tools.ietf.org/html/rfc7498#section-
>>
>>                         2.12.
>>
>>                                         There should be a clear behavior
>>                                         to be followed by an
>>
>>                         implementation.
>>
>>                                         Further, I would avoid the use
>>                                         of words such as "can".
>>
>>                                         * The text covers only
>>                                         fragmentation when it is induced
>>                                         by SFC
>>                                         operations, it does not discuss
>>                                         the treatment of a fragment
>>                                         when received in an SFC domain.
>>                                         IMHO, the draft should also
>>                                         specify the behavior of the
>>                                         Classifier with regards to
>>                                         fragments for the sake of proper
>>                                         SFC operation. Applying
>>                                         classification policies may
>>                                         require the
>>
>>                                     full packet, not only a fragment.
>>
>>                                         In particular, dedicated
>>                                         resources should dedicated for
>>                                         handling out of order fragments.
>>                                         Of course, it is out of scope
>>                                         of this document to describe how
>>                                         SFs handle fragments.
>>
>>                                         * If an SFC header is prepended
>>                                         for all fragments, I'm not
>>                                         sure there is any particular
>>                                         issue at the SFF level...except
>>                                         if stripping/adding context TLVs
>>                                         depends on the full packet
>>                                         (not just fragment). It is
>>                                         warranted to consider a little b=
it
>>                                         this point before declaring ther=
e
>>
>>                             is
>>
>>                                     no issue.
>>
>>
>>                                         * The text states "several
>>                                         options". This may be interprete=
d
>>                                         as if implementing one of them
>>                                         is sufficient...which is not
>>                                         true. The first two points
>>                                         contribute to minimize the
>>                                         fragmentation risk, but
>>                                         fragmentation may still be
>>                                         experienced
>>                                         (e.g., other shims are prepended
>>                                         by other nodes for some other
>>                                         purposes, nested nsh, etc.)
>>
>>                                         * The first two points have
>>                                         nothing to do with reassembly.
>>
>>                                         * The support of jumbo frames by
>>                                         a router/device does not mean
>>                                         that it can make use of it.
>>                                         Appropriate MTU configuration
>>                                         should be undertaken in a
>>                                         consistent manner within an SFC
>>                                         domain. The text should be
>>                                         updated to make it is about
>>                                         (consistent) MTU
>>
>>                         configuration.
>>
>>
>>                                         * BTW, shouldn't the text be
>>                                         reworded to recommended to
>>                                         increase the MTU of **all
>>                                         nodes** of an SFC-enabled domain
>> by
>>                                         at least the length of SFC
>>                                         header + transport header?
>>
>>                                         * Bullet 2, how PMTU discovery
>>                                         is actually used in this
>>                                         context? Do you assume that all
>>                                         SFC-aware nodes will issue
>>                                         such messages towards other
>>                                         SFC-aware node, arbitrary
>>                                         destination, else?
>>
>>                                         * Bullet 2, I would drop
>>                                         "describes a technique for
>>                                         dynamically discovering the
>>                                         maximum transmission unit
>>                                         (MTU) of an arbitrary internet
>>                                         path".
>>
>>                                         * Bullet 2, s/ the the/the.
>>
>>                                         * The reference to the LISP
>>                                         specification raises two concern=
s
>>                                         and one comment:
>>
>>                                         (1) I don't think it is a good
>>                                         approach that fragments induced
>>                                         by the network are passed to
>>                                         their ultimate destinations as
>>                                         such
>>
>>                         (stateless).
>>
>>                                         IMO, reassembly should be done
>>                                         within the SFC domain
>>                                         (responsible for fragmentation)
>>                                         not passed away. (2) Does the
>>                                         stateful mode require all SFC
>>                                         data plane elements maintain a
>>                                         full list of MTU for the any
>>                                         SFF/SF instance of the SFC
>>
>>                                     domain?
>>
>>
>>                                         The current text suggests that
>>                                         [RFC6830] should be listed as
>>                                         normative reference (not an
>>                                         informative one). I would
>>                                         personally favor removing the
>>                                         reference to LISP (as it is an
>>                                         Experimental RFC).
>>
>>                                         * The security section of the
>>                                         draft may be augmented with
>>                                         informational
>>                                         fragmentation-related pointers t=
o:
>>                                         e.g., RFC1858 (Security
>>                                         Considerations for IP Fragment
>>                                         Filtering), RFC3128 (Protection
>>                                         Against a Variant of the Tiny
>>                                         Fragment Attack), and RFC 4963
>>                                         (IPv4 Reassembly Errors at High
>>                                         Data Rates).
>>
>>                                         Cheers, Med
>>
>>                                             -----Message d'origine-----
>>                                             De : sfc
>>                                             [mailto:sfc-bounces@ietf.org
>>                                             <mailto:sfc-bounces@ietf.org
>> >]
>>                                             De la part de
>>                                             mohamed.boucadair@orange.com
>>                                             <mailto:
>> mohamed.boucadair@orange.com>
>>                                             Envoy=C3=A9 : lundi 11 avril
>>                                             2016 13:14 =C3=80 : Thomas
>>                                             Narten; sfc@ietf.org
>>                                             <mailto:sfc@ietf.org> Objet
>>                                             : Re:
>>                                             [sfc] WG last call for
>>                                             draft-ietf-sfc-nsh-04.txt
>>
>>                                             Dear Thomas, all,
>>
>>                                             As I mentioned during the
>>                                             meeting, there are several
>>                                             issues
>>                                             that are not covered in the
>>                                             last version of the draft. I
>>                                             already provided examples of
>>                                             the issues offline as
>> requested
>>                                             by Martin.
>>
>>                                             Cheers, Med
>>
>>                                                 -----Message
>>                                                 d'origine----- De : sfc
>>                                                 [mailto:
>> sfc-bounces@ietf.org
>>                                                 <mailto:
>> sfc-bounces@ietf.org>]
>>                                                 De la part de Thomas
>> Narten
>>                                                 Envoy=C3=A9 : jeudi 31 m=
ars
>>                                                 2016 04:48 =C3=80 :
>>                                                 sfc@ietf.org
>>                                                 <mailto:sfc@ietf.org>
>>                                                 Objet : [sfc] WG last
>>                                                 call for
>>                                                 draft-ietf-sfc-nsh-04.tx=
t
>>
>>                                                 Dear WG:
>>
>>                                                 This note begins a WG
>>                                                 last call on
>>                                                 draft-ietf-sfc-nsh-04.tx=
t
>>                                                 (
>> https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>
>>
>>
>>             The editors of the NSH document have indicated that they hav=
e
>>
>>                                                 addressed all known
>>                                                 comments and that there
>>                                                 are no open
>>                                                 issues with the current
>>                                                 version of the document.
>>
>>                                                 Substantive comments to
>>                                                 the list please,
>>                                                 editorial comments
>>                                                 can go directly to the
>>                                                 document editors.
>>
>>                                                 We'll also get a brief
>>                                                 update from the editors
>>                                                 at next
>>                                                 week's meeting. If there
>>                                                 are any remaining issues
>>                                                 with the
>>                                                 document, raising them
>>                                                 before the meeting would
>> be
>>                                                 especially helpful.
>>
>>                                                 For the chairs, Thomas
>>
>>
>> _______________________________________________
>>                                                 sfc mailing
>>                                                 list sfc@ietf.org
>>                                                 <mailto:sfc@ietf.org>
>>
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>>
>>
>> _______________________________________________
>>                                             sfc mailing
>>                                             list sfc@ietf.org
>>                                             <mailto:sfc@ietf.org>
>>
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>>
>>
>> _______________________________________________
>>                                         sfc mailing
>>                                         list sfc@ietf.org
>>                                         <mailto:sfc@ietf.org>
>>
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>>
>>
>> _______________________________________________
>>                                     sfc mailing
>
>

--94eb2c1100146a10f205318a831a
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: base64
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--94eb2c1100146a10f205318a831a--


From nobody Thu Apr 28 05:45:47 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C207F12D690 for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 05:45:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FdmHvkZT8NRZ for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 05:45:43 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 410ED12D692 for <sfc@ietf.org>; Thu, 28 Apr 2016 05:45:43 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id E8E4E25348E; Thu, 28 Apr 2016 05:45:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461847542; bh=p9d0tkkaTez/P4G+eR6RGZs2wcqxE7x9eKp+yfuLLN0=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=JjLUO/GgJuJM6DSCFQI2LFQE6z3MmZnK9Fdd0F0rcqJi/ASP1RtBkEfJo3KOUyAya qhwMLHwQ+U8xYmClpg36LzcDriTcUaiq2LBiUMQhigZXjzRfRqPucVQ4uu0rQRuehu bYtKR2ELlLOrpclQsCsOKZGM/ZJ8vUI5iFGDH9P0=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 90EAE240F47; Thu, 28 Apr 2016 05:45:41 -0700 (PDT)
To: "Andrew G. Malis" <agmalis@gmail.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb> <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com> <CAA=duU0cjXbTxTCqaRetajxFaJVfq8Y-HySPDrR-0AN38Wq3Zw@mail.gmail.com> <4d65232a-d4a6-a11b-c765-635cb909edbd@joelhalpern.com> <CAA=duU0PujWB0LB=wxFauPqaqbf4kFsqkzAwtNn7r3MzBUdCqA@mail.gmail.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <fe977e88-03dc-c77b-7064-f77bd3ddb6f2@joelhalpern.com>
Date: Thu, 28 Apr 2016 08:45:28 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <CAA=duU0PujWB0LB=wxFauPqaqbf4kFsqkzAwtNn7r3MzBUdCqA@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/KVUYu5CVg6QJeCBT3gCYxWOkJEw>
Cc: "Elzur, Uri" <uri.elzur@intel.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 12:45:47 -0000

The fragmentation fields shown in all the diagrams in the LISP spec are 
the IP fragmentation fields.  There is no LISP fragmentation information.

Thus, in parallel, I don't see nay need for NSH to have fragmentation 
information.

Yes, there is an implication.  Inner packet fragmentation can only be 
used as a response to an MTU issue when the inner packet format supports 
fragmentation.  As far as I know, that is only IPv4.

Outer (transport) packet fragmentation can only be used to address the 
MTU issue when the outer (transport) packet supports fragmentation, that 
being IPv4 and IPv6.

Note that a corollary of this is that SFC simply puts NSH headers on the 
packets it (the classifier or SFF) sends.

Yours,
Joel

On 4/28/16 8:17 AM, Andrew G. Malis wrote:
> Joel,
>
> The diagrams in section 6 of RFC 6830 are control plane, not data plane.
> The data plane diagrams are in section 5.
>
> But the overriding question is - without any fields in the NSH header to
> sequence fragments, how can the fragments be correctly reassembled?
>
> Cheers,
> Andy
>
> On Wed, Apr 27, 2016 at 7:46 PM, Joel Halpern Direct
> <jmh.direct@joelhalpern.com <mailto:jmh.direct@joelhalpern.com>> wrote:
>
>     The LISP header does not have a fragment flag or fragment offset.
>     The diagrams in section 6 include the outer encapsulating header
>     (the equivalent of the transport header in SFC.)  Yes, the text is a
>     little hard to follow in this regard.  The LISP working group is
>     going to be rewriting RFC 6830 as part of moving to standards track.
>
>     So there is no difference in this regard between NSH and LISP.
>
>     Yours,
>     Joel
>
>     On 4/27/16 7:02 PM, Andrew G. Malis wrote:
>
>         Joel et al,
>
>         All this talk about fragmentation prompted me to re-read section
>         6 of
>         the draft, which recommends (as option 3) using the procedures in
>         section 5.4 of RFC 6830 (presumably with the â€œNSH headerâ€
>         replacing the
>         â€œLISP headerâ€ in the description of the procedures in that section).
>
>         So that led me to read that section (and the LISP header
>         definition in
>         section 5.1), and I see that LISP does fragmentation and reassembly
>         identically to IPv4, using the Fragment Offset field so that
>         fragments
>         can be correctly reassembled in the proper order.
>
>         However, the NSH Header doesnâ€™t have a Fragment Offset field or any
>         other way to order the fragments.
>
>         So how can the procedures in Section 5.4 of 6830 be used?
>
>         Thanks,
>         Andy
>
>         On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern
>         <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>
>         <mailto:jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>>> wrote:
>
>             Both methods are valid, and both depend upon details of the
>             underlying packet and the transport.  As such, I don't see
>         why this
>             document benefits from describing them, much less why it
>         should mark
>             one method as a "should".  Implementation details are likely
>         to be
>             more significant than any bit consumption difference between
>         the two
>             alternatives.
>
>             Yours,
>             Joel
>
>
>             On 4/27/16 3:40 PM, Linda Dunbar wrote:
>
>                 I suggest adding the following paragraphs after the
>         Bullet 3 of
>                 the Section 6 Fragmentation Consideration to make the
>         process
>                 more clear and less controversial:
>
>
>                 --------------------------------
>
>                 RFC6830 describes the fragmentation method of breaking the
>                 original packet into two equal sub-frames and encapsulating
>                 [LISP Header + Transport header] to each sub-frame.
>
>                 If LISP fragmentation [RFC6830 Section 5.4] is used, the
>         [SFC
>                 Header + Transport Header] will be added to each half
>         frame (or
>                 the original data frame). As the Transport Header is
>         terminated
>                 by the next SFF node's tunnel transport layer, the
>         combined two
>                 sub-frames will have two SFC Headers.
>
>                 Therefore, the fragmentation for NSH encapsulated data frame
>                 should be done completely by the node tunnel transport
>         layer,
>                 which should break the [SFC + original packet] into two
>         equal
>                 sub-frames and each sub-frame being encapsulated with its
>                 respective tunnel header.  The next SFF node's tunnel
>         transport
>                 layer should combine the two sub-frames before sending
>         to the
>                 next node.
>
>                 ------------------------------------------------------
>
>
>                 By the way, there are to typo in the Section 6:
>                 3rd line: "In order the" ==> "In order to"
>                 Last line of Bullet 2: extra "the" in the "utilized to
>         ensure
>                 the the required packet".
>
>
>                 Hope it helps.
>
>                 Linda
>
>
>
>                 -----Original Message-----
>                 From: mohamed.boucadair@orange.com
>         <mailto:mohamed.boucadair@orange.com>
>                 <mailto:mohamed.boucadair@orange.com
>         <mailto:mohamed.boucadair@orange.com>>
>                 [mailto:mohamed.boucadair@orange.com
>         <mailto:mohamed.boucadair@orange.com>
>                 <mailto:mohamed.boucadair@orange.com
>         <mailto:mohamed.boucadair@orange.com>>]
>                 Sent: Wednesday, April 27, 2016 12:40 AM
>                 To: Joel M. Halpern; Linda Dunbar; Elzur, Uri;
>         sfc@ietf.org <mailto:sfc@ietf.org>
>                 <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>                 Subject: RE: [sfc] WG last call for
>         draft-ietf-sfc-nsh-04.txt
>
>                 Hi Joel, all,
>
>                 Please see inline.
>
>                 Cheers,
>                 Med
>
>                     -----Message d'origine-----
>                     De : Joel M. Halpern [mailto:jmh@joelhalpern.com
>         <mailto:jmh@joelhalpern.com>
>                     <mailto:jmh@joelhalpern.com
>         <mailto:jmh@joelhalpern.com>>] EnvoyÃ© : mardi 26
>                     avril 2016 19:18 Ã€ : Linda Dunbar; BOUCADAIR Mohamed
>                     IMT/OLN; Elzur,
>                     Uri; sfc@ietf.org <mailto:sfc@ietf.org>
>         <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Objet : Re: [sfc] WG
>                     last call for
>                     draft-ietf-sfc-nsh-04.txt
>
>                     With regard to Transport tunnel fragementation, that
>         seems
>                     an issue
>                     for the transport protocol.  I don't actually object
>         to a
>                     sentence,
>                     but it does not seem that it will accomplish anything.
>
>
>                 [Med] I would like to see some text added to the draft.
>
>
>                     With regard to packets fragmented by the source, I
>                     completely disagree
>                     with your assertion.  If an SFF were to reassemble the
>                     packets, that
>                     would be a violation of its job.
>
>
>                 [Med] I agree with you.
>
>                   There is no reason for an SFF to
>
>                     reassemble a packet fragmented by the source.  The
>                     classifier may have
>                     to do some interesting things in order to properly
>         classify
>                     succeeding
>                     fragments, but that is an implementation issue (most
>         commonly
>                     addressed with virtual reassembly, which doe snot
>         delay the
>                     fragments.)  We don't specity that.
>
>
>                 [Med] Still, the external behavior of the classifier
>         needs to be
>                 clear in the document. I don't find any text in the
>         draft saying
>                 for instance that an NSH header must be present in all
>                 fragments. (There some processing that might be needed
>         at the
>                 SFF to "do its job" with regards to fragments (receive
>         out of
>                 order fragments + forwarding policy on the full packet).)
>
>
>                     If an SF needs to reassemble fragments to do its
>         job, that
>                     is up to
>                     the SF.  Some will need to actually reassemble.
>         Some will
>                     need to
>                     perform virtual reassembly, and some will happily
>         process the
>                     fragments.  I can not see what the NSH document could
>                     possibly mandate.
>
>
>                 [Med] Fully agree.
>
>
>                     Yours,
>                     Joel
>
>                     On 4/26/16 11:47 AM, Linda Dunbar wrote:
>
>                         Joel,
>
>                         I think the document should add the description
>         on the
>                         following two
>                         fragmentation scenarios:
>
>                         - Transport tunnel generated fragmentation: When
>         a packet
>                         fragmentation is caused by transport tunnel
>         (i.e. various
>                         encapsulations), the termination point of the
>         transport
>                         tunnel is
>                         responsible for re-assembling the fragmented
>         pieces of
>                         the packet.
>                         Since there won't be any SFF nodes in between the
>                         Transport Tunnel,
>                         the tunnel generated fragmentation does not
>         require any
>                         actions by
>                         SFF nodes or SF nodes.
>
>
>                         - Source node generated fragmentation (after
>         adding on
>                         the NSH
>                         header): When fragmentation has to be performed
>         for a
>                         packet being
>                         encapsulated with the NSH header, either the
>                         intermediate SFF nodes
>                         or the SF nodes have to be able to reassemble the
>                         fragmented pieces.
>
>
>
>
>                         Cheers,
>
>
>                         Linda
>
>                         -----Original Message----- From: Joel M. Halpern
>                         [mailto:jmh@joelhalpern.com
>         <mailto:jmh@joelhalpern.com>
>                         <mailto:jmh@joelhalpern.com
>         <mailto:jmh@joelhalpern.com>>] Sent: Tuesday, April 26,
>                         2016 10:33 AM
>                         To: Linda Dunbar; mohamed.boucadair@orange.com
>         <mailto:mohamed.boucadair@orange.com>
>                         <mailto:mohamed.boucadair@orange.com
>         <mailto:mohamed.boucadair@orange.com>>; Elzur, Uri;
>                         sfc@ietf.org <mailto:sfc@ietf.org>
>         <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Subject: Re: [sfc] WG
>                         last call for
>                         draft-ietf-sfc-nsh-04.txt
>
>                         Re-reading your note, it is possible that you are
>                         referring only to
>                         the case of transport generated fragmentation of the
>                         outer packet.
>                         I had assumed you were not talking about that,
>         since the
>                         resulting
>                         fragments will not all have NSH headers.  As
>         with any tunnel
>                         technology, if the tunnel chooses to fragment at its
>                         layer, then the
>                         tunnel is responsible for reassembly.  That would be
>                         invisible to
>                         the SFF.
>
>                         Yours, Joel
>
>                         On 4/26/16 11:10 AM, Linda Dunbar wrote:
>
>                             Agree with Med.
>
>                             Even if each fragment piece of a packet with NSH
>                             header carries the
>                             NSH header, the intermediate SFF nodes still
>         need to
>                             put together
>                             all the fragments together before passing
>         the whole
>                             data frame to
>                             the SF.
>
>                             Linda
>
>                             -----Original Message----- From: sfc
>                             [mailto:sfc-bounces@ietf.org
>         <mailto:sfc-bounces@ietf.org>
>                             <mailto:sfc-bounces@ietf.org
>         <mailto:sfc-bounces@ietf.org>>]
>                             On Behalf Of mohamed.boucadair@orange.com
>         <mailto:mohamed.boucadair@orange.com>
>                             <mailto:mohamed.boucadair@orange.com
>         <mailto:mohamed.boucadair@orange.com>> Sent: Monday,
>                             April 25,
>                             2016 9:42 AM To: Elzur, Uri; Joel M. Halpern;
>                             sfc@ietf.org <mailto:sfc@ietf.org>
>         <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Subject:
>                             Re: [sfc] WG last call for
>         draft-ietf-sfc-nsh-04.txt
>
>                             Re-,
>
>                             How do you instruct the transport layer to
>         ALWAYS
>                             prepend an NSH
>                             header even for fragments? Or you don't care
>         about that?
>
>                             Thank you.
>
>                             Cheers, Med
>
>                                 -----Message d'origine----- De : Elzur, Uri
>                                 [mailto:uri.elzur@intel.com
>         <mailto:uri.elzur@intel.com>
>                                 <mailto:uri.elzur@intel.com
>         <mailto:uri.elzur@intel.com>>] EnvoyÃ© : lundi 25
>                                 avril 2016 16:26 Ã€
>                                 : BOUCADAIR Mohamed IMT/OLN; Joel M.
>         Halpern;
>                                 sfc@ietf.org <mailto:sfc@ietf.org>
>         <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Objet
>                                 : RE: [sfc] WG last call for
>                                 draft-ietf-sfc-nsh-04.txt
>
>                                 Hi Med
>
>                                 Not to repeat my position, but I'll do
>         it anyhow
>                                 :-) As NSH is
>                                 *NOT* a transport, dealing with
>         fragmentation is
>                                 left to the
>                                 Transport used.
>
>                                 The model I use for NSH, is basically
>         similar to
>                                 VXLAN . It is an
>                                 overly.
>
>                                 Thx
>
>                                 Uri ("Oo-Ree") C: 949-378-7568
>         <tel:949-378-7568> <tel:949-378-7568 <tel:949-378-7568>>
>
>
>                                 -----Original Message----- From: sfc
>                                 [mailto:sfc-bounces@ietf.org
>         <mailto:sfc-bounces@ietf.org>
>                                 <mailto:sfc-bounces@ietf.org
>         <mailto:sfc-bounces@ietf.org>>]
>                                 On Behalf Of
>         mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>
>                                 <mailto:mohamed.boucadair@orange.com
>         <mailto:mohamed.boucadair@orange.com>> Sent:
>                                 Monday, April 25,
>                                 2016 7:18 AM To: Joel M. Halpern
>                                 <jmh@joelhalpern.com
>         <mailto:jmh@joelhalpern.com> <mailto:jmh@joelhalpern.com
>         <mailto:jmh@joelhalpern.com>>>;
>                                 sfc@ietf.org <mailto:sfc@ietf.org>
>         <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>                                 Subject: Re: [sfc] WG last call for
>                                 draft-ietf-sfc-nsh-04.txt
>
>                                 Hi Joel,
>
>                                 Please see inline.
>
>                                 Cheers, Med
>
>                                     -----Message d'origine----- De :
>         Joel M. Halpern
>                                     [mailto:jmh@joelhalpern.com
>         <mailto:jmh@joelhalpern.com>
>                                     <mailto:jmh@joelhalpern.com
>         <mailto:jmh@joelhalpern.com>>] EnvoyÃ© : lundi
>                                     25 avril 2016 15:48 Ã€
>                                     : BOUCADAIR Mohamed IMT/OLN;
>         sfc@ietf.org <mailto:sfc@ietf.org>
>                                     <mailto:sfc@ietf.org
>         <mailto:sfc@ietf.org>> Objet : Re: [sfc] WG
>                                     last call for draft-ietf-sfc-nsh-04.txt
>
>                                     If I am understanding you correctly
>         Med, you
>                                     are asking that the
>                                     NSH draft specify how service chaining
>                                     should cope with packets
>                                     that have been fragmented?
>
>
>                                 [Med] To be accurate, I'm asking to assess
>                                 whether there are
>                                 implications. If there are, then the draft
>                                 should be updated
>                                 accordingly.
>
>                                     NSH, and the SFF functionality, does
>         not care.
>
>
>                                 [Med] I'm not that sure. Some typical
>                                 implications are listed
>                                 below:
>
>                                 * SFF: If the NSH header is present only
>         in the
>                                 a fragment but SFF
>                                 didn't maintained a state, subsequent
>         fragments
>                                 won't be
>                                 appropriately processed. * SFC-aware
>         function:
>                                 if prepending a
>                                 context information depends on the full
>         packet,
>                                 not only a
>                                 fragment.
>
>                                 It just does its job.
>
>                                 [Med] which may be disturbed in some
>         situations
>                                 as listed in the
>                                 examples above.
>
>                                     Ingress and intermediate classifiers may
>                                     cope with fragments in
>                                     any number of ways.
>
>                                 Specifying such is clearly out of scope
>         for this
>                                 draft.
>
>                                 [Med] The purpose is not to specify the
>         internal
>                                 implementation
>                                 details but the external behavior of the
>                                 classifier function when
>                                 it comes to handle fragments. That
>         behavior may
>                                 have an incidence
>                                 on SFF, in particular. The purpose is not to
>                                 recommend the maximum
>                                 resources to be dedicated to out of order
>                                 fragments nor the
>                                 timeout to cache those; these
>         considerations are
>                                 of course out of
>                                 scope. Nevertheless, an implementation
>         should
>                                 offer a configurable
>                                 parameter so that an operator tweak those
>                                 according to its
>                                 context.
>
>                                     I suppose one could write an
>         informational
>                                     draft on possible ways
>                                     of coping.  The IETF has not usually
>                                     published such.
>                                     Service functions have to cope with
>                                     fragmented packets just as
>                                     they had to before the advent of NSH, so
>                                     describing that is
>                                     clearly not needed here.
>
>
>                                 [Med] The advent of NSH has the following
>                                 implications: * it
>                                 exacerbates fragmentation. Handing over this
>                                 issue to the
>                                 transport layer may lead to interoperability
>                                 issues. * the
>                                 chaining may not be efficient if
>         fragments are
>                                 inappropriately
>                                 handled.
>
>                                 Introducing NSH should not degrade the
>         overall
>                                 service compared to
>                                 legacy service deployment schemes.
>
>
>                                     Yours, Joel
>
>                                     On 4/25/16 3:00 AM,
>                                     mohamed.boucadair@orange.com
>         <mailto:mohamed.boucadair@orange.com>
>                                     <mailto:mohamed.boucadair@orange.com
>         <mailto:mohamed.boucadair@orange.com>> wrote:
>
>                                         Re-,
>
>                                         I hear you, but my comment is
>         that we
>                                         need, as a WG, to decide
>                                         what to
>
>                                     put in the draft. FWIW, I'm
>         discussing two
>                                     fragmentation
>                                     issues:
>
>
>                                         (1) Fragmentation that is caused by
>                                         prepending an SFC header.
>                                         (2) Handling fragments at the
>         ingress of
>                                         an SFC-enabled domain.
>
>                                         Increasing the MTU is for sure a
>                                         recommendation is to be
>                                         explicitly
>
>                                     called out in the text (see my first
>         message).
>
>
>                                         There are other issues that need
>         to be
>                                         discussed, e.g., how to
>                                         deal with
>
>                                     fragments in SFFs/Classifiers?
>
>
>                                         It is also "prudent" to check
>         that no
>                                         issues will be experienced
>                                         in SFF
>
>                                     to handle fragments. If an SFC header is
>                                     prepended for all
>                                     fragments, I'm not sure there
>
>                                         is any particular issue at the SFF
>                                         level, except if
>                                         stripping/adding
>
>                                     context TLVs depends on the full
>         packet (not
>                                     just fragment). It
>                                     is warranted to consider a little
>         bit this
>                                     point before declaring
>                                     there is no issue.
>
>
>                                         For point (1), declaring
>         fragmentation
>                                         out of scope would be
>                                         meant that
>
>                                     an implementation must be prepared to
>                                     receive fragments with or
>                                     without NSH header as this is a decision
>                                     that is left to the
>                                     transport encapsulation. This is a
>                                     requirement per se!
>
>
>                                         I won't reiterate all the comments I
>                                         have about the current
>                                         wording of
>
>                                     this section.
>
>
>                                         Cheers, Med
>
>                                             -----Message d'origine----- De :
>                                             Elzur, Uri
>                                             [mailto:uri.elzur@intel.com
>         <mailto:uri.elzur@intel.com>
>                                             <mailto:uri.elzur@intel.com
>         <mailto:uri.elzur@intel.com>>] EnvoyÃ©
>                                             : lundi 25 avril 2016
>                                             08:30 Ã€ : BOUCADAIR Mohamed
>         IMT/OLN;
>                                             Thomas Narten;
>                                             sfc@ietf.org
>         <mailto:sfc@ietf.org> <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>                                             Objet : RE: [sfc] WG last
>         call for
>                                             draft-ietf-sfc-nsh-04.txt
>
>                                             Hi Med
>
>                                             My point is that
>         Fragmentation is
>                                             yet another transport related
>                                             issue
>
>                                     that
>
>                                             is beyond the scope of NSH and
>                                             beyond the charter of the WG, so
>                                             it
>
>                                     doesn't
>
>                                             really belong in the draft.
>         We are
>                                             providing an advice as
>                                             extending the size of the
>         packet may
>                                             lead to fragmentation, but
>                                             as you check RFC 7348 VxLAN,
>         which
>                                             my create the same issue,
>                                             you'll find it doesn't even
>
>                                     relate
>
>                                             to it.
>
>                                             Thx
>
>                                             Uri ("Oo-Ree") C:
>         949-378-7568 <tel:949-378-7568>
>                                             <tel:949-378-7568
>         <tel:949-378-7568>>
>
>
>                                             -----Original Message-----
>         From: sfc
>                                             [mailto:sfc-bounces@ietf.org
>         <mailto:sfc-bounces@ietf.org>
>                                             <mailto:sfc-bounces@ietf.org
>         <mailto:sfc-bounces@ietf.org>>] On
>                                             Behalf Of
>                                             mohamed.boucadair@orange.com
>         <mailto:mohamed.boucadair@orange.com>
>
>         <mailto:mohamed.boucadair@orange.com
>         <mailto:mohamed.boucadair@orange.com>> Sent:
>                                             Sunday, April 24, 2016
>                                             10:32 PM To: Elzur, Uri
>                                             <uri.elzur@intel.com
>         <mailto:uri.elzur@intel.com>
>                                             <mailto:uri.elzur@intel.com
>         <mailto:uri.elzur@intel.com>>>;
>                                             Thomas Narten
>
>                                     <narten@us.ibm.com
>         <mailto:narten@us.ibm.com> <mailto:narten@us.ibm.com
>         <mailto:narten@us.ibm.com>>>;
>
>                                             sfc@ietf.org
>         <mailto:sfc@ietf.org> <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>                                             Subject: Re: [sfc] WG last
>         call for
>                                             draft-ietf-sfc-nsh-04.txt
>
>                                             Hi Uri,
>
>                                             That's another option that
>         needs to
>                                             be discussed/investigated.
>                                             I'm
>
>                                     afraid
>
>                                             this is not the rationale
>         adopted in
>                                             -04 since it includes some
>                                             text
>
>                                     that
>
>                                             is far to be sufficient to
>         ensure
>                                             interoperable
>                                             implementations.
>
>                                             BTW, saying that nsh does
>         not need
>                                             to deal with fragmentation
>                                             because
>
>                                     it
>
>                                             is transport-independent is
>         not IMHO
>                                             a good strategy to adopt
>                                             here
>
>                                     because
>
>                                             it opens the door for
>         interoperable
>                                             issues, it may lead to
>                                             sub-optimal implementations
>         if the
>                                             sfc information is present
>                                             only in one
>
>                                     fragments,
>
>                                             etc.
>
>                                             My comments are related to the
>                                             current text in the -04.
>                                             This text needs
>
>                                     to
>
>                                             be fixed somehow.
>
>                                             Cheers, Med
>
>                                                 -----Message
>         d'origine----- De :
>                                                 Elzur, Uri
>
>         [mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>
>
>         <mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>>]
>                                                 EnvoyÃ© : dimanche 24 avril
>                                                 2016 17:36 Ã€ : BOUCADAIR
>         Mohamed
>                                                 IMT/OLN; Thomas Narten;
>                                                 sfc@ietf.org
>         <mailto:sfc@ietf.org>
>                                                 <mailto:sfc@ietf.org
>         <mailto:sfc@ietf.org>> Objet :
>                                                 RE: [sfc] WG last call for
>                                                 draft-ietf-sfc-nsh-04.txt
>
>                                                 Hi Med
>
>                                                 I see no need to specify the
>                                                 exact behavior as NSH is
>                                                 transport independent
>         i.e. like
>                                                 NSH interaction with any
>         other
>                                                 Transport eh issue of
>                                                 Fragmentation is to be
>         dealt in
>                                                 a way
>                                                 that matches the mechanisms
>                                                 supported by the
>         Transport used
>                                                 and do not belong in the
>         NSH draft
>
>                                                 Thx
>
>                                                 Uri ("Oo-Ree") C:
>         949-378-7568 <tel:949-378-7568>
>                                                 <tel:949-378-7568
>         <tel:949-378-7568>>
>
>
>                                                 -----Original
>         Message----- From: sfc
>
>         [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>
>
>         <mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>>]
>                                                 On Behalf Of
>
>         mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>
>
>         <mailto:mohamed.boucadair@orange.com
>         <mailto:mohamed.boucadair@orange.com>>
>                                                 Sent: Thursday, April 14,
>                                                 2016 12:43 AM To: Thomas
>         Narten
>                                                 <narten@us.ibm.com
>         <mailto:narten@us.ibm.com>
>
>         <mailto:narten@us.ibm.com <mailto:narten@us.ibm.com>>>;
>                                                 sfc@ietf.org
>         <mailto:sfc@ietf.org>
>                                                 <mailto:sfc@ietf.org
>         <mailto:sfc@ietf.org>> Subject:
>                                                 Re: [sfc] WG last call for
>                                                 draft-ietf-sfc-nsh-04.txt
>
>                                                 R-,
>
>                                                 In addition to other pending
>                                                 issues raised for this
>         draft, I
>                                                 would like to raise this
>                                                 additional one about
>         Section 6.
>
>                                                 == 6.  Fragmentation
>         Considerations
>
>                                                 NSH and the associated
>         transport
>                                                 header are "added" to the
>                                                 encapsulated
>         packet/frame.  This
>                                                 additional information
>                                                 increases
>
>                                     the
>
>                                                 size of the packet.  In
>         order
>                                                 the ensure proper
>         forwarding of
>                                                 NSH data, several
>         options for
>                                                 handling fragmentation and
>                                                 re-assembly exist:
>
>                                                 1.  Jumbo Frames, when
>                                                 supported, enable the
>         transport
>                                                 of NSH
>                                                 and associated transport
>         packets
>                                                 without requiring
>                                                 fragmentation.
>
>                                                 2.  Path MTU Discovery
>                                                 [RFC1191]"describes a
>         technique for
>                                                 dynamically discovering the
>                                                 maximum transmission
>         unit (MTU) of
>
>                                     an
>
>                                                 arbitrary internet path"
>         and can
>                                                 be utilized to ensure the
>
>                                 the
>
>                                                 required packet size is
>         used.
>
>                                                 3.  [RFC6830] describes two
>                                                 schemes for
>         fragmentation and
>                                                 re-
>
>                                     assembly
>
>                                                 in section 5.4. ==
>
>                                                 * The text is weak for a
>                                                 Standard track document
>         that is
>                                                 intended to solve the
>         problem in
>
>         https://tools.ietf.org/html/rfc7498#section-
>
>                                 2.12.
>
>                                                 There should be a clear
>         behavior
>                                                 to be followed by an
>
>                                 implementation.
>
>                                                 Further, I would avoid
>         the use
>                                                 of words such as "can".
>
>                                                 * The text covers only
>                                                 fragmentation when it is
>         induced
>                                                 by SFC
>                                                 operations, it does not
>         discuss
>                                                 the treatment of a fragment
>                                                 when received in an SFC
>         domain.
>                                                 IMHO, the draft should also
>                                                 specify the behavior of the
>                                                 Classifier with regards to
>                                                 fragments for the sake
>         of proper
>                                                 SFC operation. Applying
>                                                 classification policies may
>                                                 require the
>
>                                             full packet, not only a
>         fragment.
>
>                                                 In particular, dedicated
>                                                 resources should
>         dedicated for
>                                                 handling out of order
>         fragments.
>                                                 Of course, it is out of
>         scope
>                                                 of this document to
>         describe how
>                                                 SFs handle fragments.
>
>                                                 * If an SFC header is
>         prepended
>                                                 for all fragments, I'm not
>                                                 sure there is any particular
>                                                 issue at the SFF
>         level...except
>                                                 if stripping/adding
>         context TLVs
>                                                 depends on the full packet
>                                                 (not just fragment). It is
>                                                 warranted to consider a
>         little bit
>                                                 this point before
>         declaring there
>
>                                     is
>
>                                             no issue.
>
>
>                                                 * The text states "several
>                                                 options". This may be
>         interpreted
>                                                 as if implementing one
>         of them
>                                                 is sufficient...which is not
>                                                 true. The first two points
>                                                 contribute to minimize the
>                                                 fragmentation risk, but
>                                                 fragmentation may still be
>                                                 experienced
>                                                 (e.g., other shims are
>         prepended
>                                                 by other nodes for some
>         other
>                                                 purposes, nested nsh, etc.)
>
>                                                 * The first two points have
>                                                 nothing to do with
>         reassembly.
>
>                                                 * The support of jumbo
>         frames by
>                                                 a router/device does not
>         mean
>                                                 that it can make use of it.
>                                                 Appropriate MTU
>         configuration
>                                                 should be undertaken in a
>                                                 consistent manner within
>         an SFC
>                                                 domain. The text should be
>                                                 updated to make it is about
>                                                 (consistent) MTU
>
>                                 configuration.
>
>
>                                                 * BTW, shouldn't the text be
>                                                 reworded to recommended to
>                                                 increase the MTU of **all
>                                                 nodes** of an
>         SFC-enabled domain by
>                                                 at least the length of SFC
>                                                 header + transport header?
>
>                                                 * Bullet 2, how PMTU
>         discovery
>                                                 is actually used in this
>                                                 context? Do you assume
>         that all
>                                                 SFC-aware nodes will issue
>                                                 such messages towards other
>                                                 SFC-aware node, arbitrary
>                                                 destination, else?
>
>                                                 * Bullet 2, I would drop
>                                                 "describes a technique for
>                                                 dynamically discovering the
>                                                 maximum transmission unit
>                                                 (MTU) of an arbitrary
>         internet
>                                                 path".
>
>                                                 * Bullet 2, s/ the the/the.
>
>                                                 * The reference to the LISP
>                                                 specification raises two
>         concerns
>                                                 and one comment:
>
>                                                 (1) I don't think it is
>         a good
>                                                 approach that fragments
>         induced
>                                                 by the network are passed to
>                                                 their ultimate
>         destinations as
>                                                 such
>
>                                 (stateless).
>
>                                                 IMO, reassembly should
>         be done
>                                                 within the SFC domain
>                                                 (responsible for
>         fragmentation)
>                                                 not passed away. (2)
>         Does the
>                                                 stateful mode require
>         all SFC
>                                                 data plane elements
>         maintain a
>                                                 full list of MTU for the any
>                                                 SFF/SF instance of the SFC
>
>                                             domain?
>
>
>                                                 The current text
>         suggests that
>                                                 [RFC6830] should be
>         listed as
>                                                 normative reference (not an
>                                                 informative one). I would
>                                                 personally favor
>         removing the
>                                                 reference to LISP (as it
>         is an
>                                                 Experimental RFC).
>
>                                                 * The security section
>         of the
>                                                 draft may be augmented with
>                                                 informational
>                                                 fragmentation-related
>         pointers to:
>                                                 e.g., RFC1858 (Security
>                                                 Considerations for IP
>         Fragment
>                                                 Filtering), RFC3128
>         (Protection
>                                                 Against a Variant of the
>         Tiny
>                                                 Fragment Attack), and
>         RFC 4963
>                                                 (IPv4 Reassembly Errors
>         at High
>                                                 Data Rates).
>
>                                                 Cheers, Med
>
>                                                     -----Message
>         d'origine-----
>                                                     De : sfc
>
>         [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>
>
>         <mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>>]
>                                                     De la part de
>
>         mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>
>
>         <mailto:mohamed.boucadair@orange.com
>         <mailto:mohamed.boucadair@orange.com>>
>                                                     EnvoyÃ© : lundi 11 avril
>                                                     2016 13:14 Ã€ : Thomas
>                                                     Narten; sfc@ietf.org
>         <mailto:sfc@ietf.org>
>                                                     <mailto:sfc@ietf.org
>         <mailto:sfc@ietf.org>> Objet
>                                                     : Re:
>                                                     [sfc] WG last call for
>
>         draft-ietf-sfc-nsh-04.txt
>
>                                                     Dear Thomas, all,
>
>                                                     As I mentioned
>         during the
>                                                     meeting, there are
>         several
>                                                     issues
>                                                     that are not covered
>         in the
>                                                     last version of the
>         draft. I
>                                                     already provided
>         examples of
>                                                     the issues offline
>         as requested
>                                                     by Martin.
>
>                                                     Cheers, Med
>
>                                                         -----Message
>                                                         d'origine-----
>         De : sfc
>
>         [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>
>
>         <mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>>]
>                                                         De la part de
>         Thomas Narten
>                                                         EnvoyÃ© : jeudi
>         31 mars
>                                                         2016 04:48 Ã€ :
>                                                         sfc@ietf.org
>         <mailto:sfc@ietf.org>
>
>         <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>                                                         Objet : [sfc] WG
>         last
>                                                         call for
>
>         draft-ietf-sfc-nsh-04.txt
>
>                                                         Dear WG:
>
>                                                         This note begins
>         a WG
>                                                         last call on
>
>         draft-ietf-sfc-nsh-04.txt
>
>         (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>
>
>
>                     The editors of the NSH document have indicated that
>         they have
>
>                                                         addressed all known
>                                                         comments and
>         that there
>                                                         are no open
>                                                         issues with the
>         current
>                                                         version of the
>         document.
>
>                                                         Substantive
>         comments to
>                                                         the list please,
>                                                         editorial comments
>                                                         can go directly
>         to the
>                                                         document editors.
>
>                                                         We'll also get a
>         brief
>                                                         update from the
>         editors
>                                                         at next
>                                                         week's meeting.
>         If there
>                                                         are any
>         remaining issues
>                                                         with the
>                                                         document,
>         raising them
>                                                         before the
>         meeting would be
>                                                         especially helpful.
>
>                                                         For the chairs,
>         Thomas
>
>
>         _______________________________________________
>                                                         sfc mailing
>                                                         list
>         sfc@ietf.org <mailto:sfc@ietf.org>
>
>         <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>
>         https://www.ietf.org/mailman/listinfo/sfc
>
>
>
>         _______________________________________________
>                                                     sfc mailing
>                                                     list sfc@ietf.org
>         <mailto:sfc@ietf.org>
>                                                     <mailto:sfc@ietf.org
>         <mailto:sfc@ietf.org>>
>
>         https://www.ietf.org/mailman/listinfo/sfc
>
>
>
>         _______________________________________________
>                                                 sfc mailing
>                                                 list sfc@ietf.org
>         <mailto:sfc@ietf.org>
>                                                 <mailto:sfc@ietf.org
>         <mailto:sfc@ietf.org>>
>
>         https://www.ietf.org/mailman/listinfo/sfc
>
>
>
>         _______________________________________________
>                                             sfc mailing
>
>


From nobody Thu Apr 28 06:23:02 2016
Return-Path: <agmalis@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 068A612D6F8 for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 06:23:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SOnUmTNfbchK for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 06:22:55 -0700 (PDT)
Received: from mail-oi0-x22b.google.com (mail-oi0-x22b.google.com [IPv6:2607:f8b0:4003:c06::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2D80012D73A for <sfc@ietf.org>; Thu, 28 Apr 2016 06:22:33 -0700 (PDT)
Received: by mail-oi0-x22b.google.com with SMTP id v145so49818358oie.0 for <sfc@ietf.org>; Thu, 28 Apr 2016 06:22:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=lddZI4e0lO0kUqFj5BcHGagnQMMLmS5v0fFM2l7Of2o=; b=ACduZRWvL3VbzzNTuNGI15Ace80o8lmzGDN2edzsXTvPILMHJphbRqHLV9oDM9O0Qb JwMWeamIOEXrgDPbfZURQQkfX3/n0ejn6DO3Rdq5iQiqTbq/UxwufF1Ugbi0nIriIlHW kq5sGzKC0Bt+gyPAaB0N4obwU92NJegx1qt0UdMgTRLEm4wwBwR7IhLZ23bwf1gntN6w MlJCjAr6d4Yny4+k4BfPXt1vDfPzu6nG7WPoIC/BAhZtZsSxRtQibkdiY12S3d3d0NDX rAShb9GVEebozbes+hjtC+H3sEzqF+uMIiXJLHlZW8L0nHX+Zb0qGQxC9NLIclQIZqSG jmbw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=lddZI4e0lO0kUqFj5BcHGagnQMMLmS5v0fFM2l7Of2o=; b=P0id0SR4mx4CaGShEz9WnARi58O9UwE1+e9Ux3v3d03j1bOeoO4E3dAXvKMZhDleS+ jFiQpBvDfD16RV0leYcuteKtpnxRu1IaBdT6sK9DF4ve/OftYdeSUpdLkFwx/bJWPkSh ri+du8sE5o/kYM/Zg/mLSEYBZRoUSe8XywNbT+RoCmBcL27rj57KeK2En/qyFzsh03QT FqYfBT28ziZf3FFAPGg7HLo+xgN8K4dTWG0UkN8U0A3Ii0S5A7HZXLA8/A2LxISI17Cn zUs0m4ncLyLYed0KPpOG75e+jHwfbsrex5bFtAJF1MKW1Qb0iTBSA+cciKSnn0M1oiUt HlRg==
X-Gm-Message-State: AOPr4FW85gv1MoUlq/qu4NgmMDwYf7YuaXBVpGdqcveE6KfqqUs7nb96Nl0oTu4arelma4MuJedBGXqVa2CrTw==
X-Received: by 10.202.102.36 with SMTP id a36mr5768867oic.122.1461849751644; Thu, 28 Apr 2016 06:22:31 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.182.231.106 with HTTP; Thu, 28 Apr 2016 06:22:11 -0700 (PDT)
In-Reply-To: <fe977e88-03dc-c77b-7064-f77bd3ddb6f2@joelhalpern.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb> <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com> <CAA=duU0cjXbTxTCqaRetajxFaJVfq8Y-HySPDrR-0AN38Wq3Zw@mail.gmail.com> <4d65232a-d4a6-a11b-c765-635cb909edbd@joelhalpern.com> <CAA=duU0PujWB0LB=wxFauPqaqbf4kFsqkzAwtNn7r3MzBUdCqA@mail.gmail.com> <fe977e88-03dc-c77b-7064-f77bd3ddb6f2@joelhalpern.com>
From: "Andrew G. Malis" <agmalis@gmail.com>
Date: Thu, 28 Apr 2016 09:22:11 -0400
Message-ID: <CAA=duU0iEAjb3K-sMXdupTco8r0bTrNnbobrJr0On1Mg+qJY2g@mail.gmail.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Content-Type: multipart/alternative; boundary=001a11408aa42978c305318b6b4c
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/FZZtIU5ZP5xh0r-wqj8769XrnGQ>
Cc: "Elzur, Uri" <uri.elzur@intel.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 13:23:00 -0000

--001a11408aa42978c305318b6b4c
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Joel,

If this is actually how section 6 should work, there should be text to make
it clear.

I=E2=80=99m curious if any of the existing implementations of this draft ha=
ve
implemented fragmentation, and if so, if they=E2=80=99re interoperable.

Thanks,
Andy


On Thu, Apr 28, 2016 at 8:45 AM, Joel M. Halpern <jmh@joelhalpern.com>
wrote:

> The fragmentation fields shown in all the diagrams in the LISP spec are
> the IP fragmentation fields.  There is no LISP fragmentation information.
>
> Thus, in parallel, I don't see nay need for NSH to have fragmentation
> information.
>
> Yes, there is an implication.  Inner packet fragmentation can only be use=
d
> as a response to an MTU issue when the inner packet format supports
> fragmentation.  As far as I know, that is only IPv4.
>
> Outer (transport) packet fragmentation can only be used to address the MT=
U
> issue when the outer (transport) packet supports fragmentation, that bein=
g
> IPv4 and IPv6.
>
> Note that a corollary of this is that SFC simply puts NSH headers on the
> packets it (the classifier or SFF) sends.
>
> Yours,
> Joel
>
> On 4/28/16 8:17 AM, Andrew G. Malis wrote:
>
>> Joel,
>>
>> The diagrams in section 6 of RFC 6830 are control plane, not data plane.
>> The data plane diagrams are in section 5.
>>
>> But the overriding question is - without any fields in the NSH header to
>> sequence fragments, how can the fragments be correctly reassembled?
>>
>> Cheers,
>> Andy
>>
>> On Wed, Apr 27, 2016 at 7:46 PM, Joel Halpern Direct
>> <jmh.direct@joelhalpern.com <mailto:jmh.direct@joelhalpern.com>> wrote:
>>
>>     The LISP header does not have a fragment flag or fragment offset.
>>     The diagrams in section 6 include the outer encapsulating header
>>     (the equivalent of the transport header in SFC.)  Yes, the text is a
>>     little hard to follow in this regard.  The LISP working group is
>>     going to be rewriting RFC 6830 as part of moving to standards track.
>>
>>     So there is no difference in this regard between NSH and LISP.
>>
>>     Yours,
>>     Joel
>>
>>     On 4/27/16 7:02 PM, Andrew G. Malis wrote:
>>
>>         Joel et al,
>>
>>         All this talk about fragmentation prompted me to re-read section
>>         6 of
>>         the draft, which recommends (as option 3) using the procedures i=
n
>>         section 5.4 of RFC 6830 (presumably with the =E2=80=9CNSH header=
=E2=80=9D
>>         replacing the
>>         =E2=80=9CLISP header=E2=80=9D in the description of the procedur=
es in that
>> section).
>>
>>         So that led me to read that section (and the LISP header
>>         definition in
>>         section 5.1), and I see that LISP does fragmentation and
>> reassembly
>>         identically to IPv4, using the Fragment Offset field so that
>>         fragments
>>         can be correctly reassembled in the proper order.
>>
>>         However, the NSH Header doesn=E2=80=99t have a Fragment Offset f=
ield or
>> any
>>         other way to order the fragments.
>>
>>         So how can the procedures in Section 5.4 of 6830 be used?
>>
>>         Thanks,
>>         Andy
>>
>>         On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern
>>         <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>
>>         <mailto:jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>>> wrote=
:
>>
>>             Both methods are valid, and both depend upon details of the
>>             underlying packet and the transport.  As such, I don't see
>>         why this
>>             document benefits from describing them, much less why it
>>         should mark
>>             one method as a "should".  Implementation details are likely
>>         to be
>>             more significant than any bit consumption difference between
>>         the two
>>             alternatives.
>>
>>             Yours,
>>             Joel
>>
>>
>>             On 4/27/16 3:40 PM, Linda Dunbar wrote:
>>
>>                 I suggest adding the following paragraphs after the
>>         Bullet 3 of
>>                 the Section 6 Fragmentation Consideration to make the
>>         process
>>                 more clear and less controversial:
>>
>>
>>                 --------------------------------
>>
>>                 RFC6830 describes the fragmentation method of breaking t=
he
>>                 original packet into two equal sub-frames and
>> encapsulating
>>                 [LISP Header + Transport header] to each sub-frame.
>>
>>                 If LISP fragmentation [RFC6830 Section 5.4] is used, the
>>         [SFC
>>                 Header + Transport Header] will be added to each half
>>         frame (or
>>                 the original data frame). As the Transport Header is
>>         terminated
>>                 by the next SFF node's tunnel transport layer, the
>>         combined two
>>                 sub-frames will have two SFC Headers.
>>
>>                 Therefore, the fragmentation for NSH encapsulated data
>> frame
>>                 should be done completely by the node tunnel transport
>>         layer,
>>                 which should break the [SFC + original packet] into two
>>         equal
>>                 sub-frames and each sub-frame being encapsulated with it=
s
>>                 respective tunnel header.  The next SFF node's tunnel
>>         transport
>>                 layer should combine the two sub-frames before sending
>>         to the
>>                 next node.
>>
>>                 ------------------------------------------------------
>>
>>
>>                 By the way, there are to typo in the Section 6:
>>                 3rd line: "In order the" =3D=3D> "In order to"
>>                 Last line of Bullet 2: extra "the" in the "utilized to
>>         ensure
>>                 the the required packet".
>>
>>
>>                 Hope it helps.
>>
>>                 Linda
>>
>>
>>
>>                 -----Original Message-----
>>                 From: mohamed.boucadair@orange.com
>>         <mailto:mohamed.boucadair@orange.com>
>>                 <mailto:mohamed.boucadair@orange.com
>>         <mailto:mohamed.boucadair@orange.com>>
>>                 [mailto:mohamed.boucadair@orange.com
>>         <mailto:mohamed.boucadair@orange.com>
>>                 <mailto:mohamed.boucadair@orange.com
>>         <mailto:mohamed.boucadair@orange.com>>]
>>                 Sent: Wednesday, April 27, 2016 12:40 AM
>>                 To: Joel M. Halpern; Linda Dunbar; Elzur, Uri;
>>         sfc@ietf.org <mailto:sfc@ietf.org>
>>                 <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>>                 Subject: RE: [sfc] WG last call for
>>         draft-ietf-sfc-nsh-04.txt
>>
>>                 Hi Joel, all,
>>
>>                 Please see inline.
>>
>>                 Cheers,
>>                 Med
>>
>>                     -----Message d'origine-----
>>                     De : Joel M. Halpern [mailto:jmh@joelhalpern.com
>>         <mailto:jmh@joelhalpern.com>
>>                     <mailto:jmh@joelhalpern.com
>>         <mailto:jmh@joelhalpern.com>>] Envoy=C3=A9 : mardi 26
>>                     avril 2016 19:18 =C3=80 : Linda Dunbar; BOUCADAIR Mo=
hamed
>>                     IMT/OLN; Elzur,
>>                     Uri; sfc@ietf.org <mailto:sfc@ietf.org>
>>         <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Objet : Re: [sfc] WG
>>                     last call for
>>                     draft-ietf-sfc-nsh-04.txt
>>
>>                     With regard to Transport tunnel fragementation, that
>>         seems
>>                     an issue
>>                     for the transport protocol.  I don't actually object
>>         to a
>>                     sentence,
>>                     but it does not seem that it will accomplish anythin=
g.
>>
>>
>>                 [Med] I would like to see some text added to the draft.
>>
>>
>>                     With regard to packets fragmented by the source, I
>>                     completely disagree
>>                     with your assertion.  If an SFF were to reassemble t=
he
>>                     packets, that
>>                     would be a violation of its job.
>>
>>
>>                 [Med] I agree with you.
>>
>>                   There is no reason for an SFF to
>>
>>                     reassemble a packet fragmented by the source.  The
>>                     classifier may have
>>                     to do some interesting things in order to properly
>>         classify
>>                     succeeding
>>                     fragments, but that is an implementation issue (most
>>         commonly
>>                     addressed with virtual reassembly, which doe snot
>>         delay the
>>                     fragments.)  We don't specity that.
>>
>>
>>                 [Med] Still, the external behavior of the classifier
>>         needs to be
>>                 clear in the document. I don't find any text in the
>>         draft saying
>>                 for instance that an NSH header must be present in all
>>                 fragments. (There some processing that might be needed
>>         at the
>>                 SFF to "do its job" with regards to fragments (receive
>>         out of
>>                 order fragments + forwarding policy on the full packet).=
)
>>
>>
>>                     If an SF needs to reassemble fragments to do its
>>         job, that
>>                     is up to
>>                     the SF.  Some will need to actually reassemble.
>>         Some will
>>                     need to
>>                     perform virtual reassembly, and some will happily
>>         process the
>>                     fragments.  I can not see what the NSH document coul=
d
>>                     possibly mandate.
>>
>>
>>                 [Med] Fully agree.
>>
>>
>>                     Yours,
>>                     Joel
>>
>>                     On 4/26/16 11:47 AM, Linda Dunbar wrote:
>>
>>                         Joel,
>>
>>                         I think the document should add the description
>>         on the
>>                         following two
>>                         fragmentation scenarios:
>>
>>                         - Transport tunnel generated fragmentation: When
>>         a packet
>>                         fragmentation is caused by transport tunnel
>>         (i.e. various
>>                         encapsulations), the termination point of the
>>         transport
>>                         tunnel is
>>                         responsible for re-assembling the fragmented
>>         pieces of
>>                         the packet.
>>                         Since there won't be any SFF nodes in between th=
e
>>                         Transport Tunnel,
>>                         the tunnel generated fragmentation does not
>>         require any
>>                         actions by
>>                         SFF nodes or SF nodes.
>>
>>
>>                         - Source node generated fragmentation (after
>>         adding on
>>                         the NSH
>>                         header): When fragmentation has to be performed
>>         for a
>>                         packet being
>>                         encapsulated with the NSH header, either the
>>                         intermediate SFF nodes
>>                         or the SF nodes have to be able to reassemble th=
e
>>                         fragmented pieces.
>>
>>
>>
>>
>>                         Cheers,
>>
>>
>>                         Linda
>>
>>                         -----Original Message----- From: Joel M. Halpern
>>                         [mailto:jmh@joelhalpern.com
>>         <mailto:jmh@joelhalpern.com>
>>                         <mailto:jmh@joelhalpern.com
>>         <mailto:jmh@joelhalpern.com>>] Sent: Tuesday, April 26,
>>                         2016 10:33 AM
>>                         To: Linda Dunbar; mohamed.boucadair@orange.com
>>         <mailto:mohamed.boucadair@orange.com>
>>                         <mailto:mohamed.boucadair@orange.com
>>         <mailto:mohamed.boucadair@orange.com>>; Elzur, Uri;
>>                         sfc@ietf.org <mailto:sfc@ietf.org>
>>         <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Subject: Re: [sfc] W=
G
>>                         last call for
>>                         draft-ietf-sfc-nsh-04.txt
>>
>>                         Re-reading your note, it is possible that you ar=
e
>>                         referring only to
>>                         the case of transport generated fragmentation of
>> the
>>                         outer packet.
>>                         I had assumed you were not talking about that,
>>         since the
>>                         resulting
>>                         fragments will not all have NSH headers.  As
>>         with any tunnel
>>                         technology, if the tunnel chooses to fragment at
>> its
>>                         layer, then the
>>                         tunnel is responsible for reassembly.  That woul=
d
>> be
>>                         invisible to
>>                         the SFF.
>>
>>                         Yours, Joel
>>
>>                         On 4/26/16 11:10 AM, Linda Dunbar wrote:
>>
>>                             Agree with Med.
>>
>>                             Even if each fragment piece of a packet with
>> NSH
>>                             header carries the
>>                             NSH header, the intermediate SFF nodes still
>>         need to
>>                             put together
>>                             all the fragments together before passing
>>         the whole
>>                             data frame to
>>                             the SF.
>>
>>                             Linda
>>
>>                             -----Original Message----- From: sfc
>>                             [mailto:sfc-bounces@ietf.org
>>         <mailto:sfc-bounces@ietf.org>
>>                             <mailto:sfc-bounces@ietf.org
>>         <mailto:sfc-bounces@ietf.org>>]
>>                             On Behalf Of mohamed.boucadair@orange.com
>>         <mailto:mohamed.boucadair@orange.com>
>>                             <mailto:mohamed.boucadair@orange.com
>>         <mailto:mohamed.boucadair@orange.com>> Sent: Monday,
>>                             April 25,
>>                             2016 9:42 AM To: Elzur, Uri; Joel M. Halpern=
;
>>                             sfc@ietf.org <mailto:sfc@ietf.org>
>>         <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Subject:
>>                             Re: [sfc] WG last call for
>>         draft-ietf-sfc-nsh-04.txt
>>
>>                             Re-,
>>
>>                             How do you instruct the transport layer to
>>         ALWAYS
>>                             prepend an NSH
>>                             header even for fragments? Or you don't care
>>         about that?
>>
>>                             Thank you.
>>
>>                             Cheers, Med
>>
>>                                 -----Message d'origine----- De : Elzur,
>> Uri
>>                                 [mailto:uri.elzur@intel.com
>>         <mailto:uri.elzur@intel.com>
>>                                 <mailto:uri.elzur@intel.com
>>         <mailto:uri.elzur@intel.com>>] Envoy=C3=A9 : lundi 25
>>                                 avril 2016 16:26 =C3=80
>>                                 : BOUCADAIR Mohamed IMT/OLN; Joel M.
>>         Halpern;
>>                                 sfc@ietf.org <mailto:sfc@ietf.org>
>>         <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Objet
>>                                 : RE: [sfc] WG last call for
>>                                 draft-ietf-sfc-nsh-04.txt
>>
>>                                 Hi Med
>>
>>                                 Not to repeat my position, but I'll do
>>         it anyhow
>>                                 :-) As NSH is
>>                                 *NOT* a transport, dealing with
>>         fragmentation is
>>                                 left to the
>>                                 Transport used.
>>
>>                                 The model I use for NSH, is basically
>>         similar to
>>                                 VXLAN . It is an
>>                                 overly.
>>
>>                                 Thx
>>
>>                                 Uri ("Oo-Ree") C: 949-378-7568
>>         <tel:949-378-7568> <tel:949-378-7568 <tel:949-378-7568>>
>>
>>
>>                                 -----Original Message----- From: sfc
>>                                 [mailto:sfc-bounces@ietf.org
>>         <mailto:sfc-bounces@ietf.org>
>>                                 <mailto:sfc-bounces@ietf.org
>>         <mailto:sfc-bounces@ietf.org>>]
>>                                 On Behalf Of
>>         mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.co=
m
>> >
>>                                 <mailto:mohamed.boucadair@orange.com
>>         <mailto:mohamed.boucadair@orange.com>> Sent:
>>                                 Monday, April 25,
>>                                 2016 7:18 AM To: Joel M. Halpern
>>                                 <jmh@joelhalpern.com
>>         <mailto:jmh@joelhalpern.com> <mailto:jmh@joelhalpern.com
>>         <mailto:jmh@joelhalpern.com>>>;
>>                                 sfc@ietf.org <mailto:sfc@ietf.org>
>>         <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>>                                 Subject: Re: [sfc] WG last call for
>>                                 draft-ietf-sfc-nsh-04.txt
>>
>>                                 Hi Joel,
>>
>>                                 Please see inline.
>>
>>                                 Cheers, Med
>>
>>                                     -----Message d'origine----- De :
>>         Joel M. Halpern
>>                                     [mailto:jmh@joelhalpern.com
>>         <mailto:jmh@joelhalpern.com>
>>                                     <mailto:jmh@joelhalpern.com
>>         <mailto:jmh@joelhalpern.com>>] Envoy=C3=A9 : lundi
>>                                     25 avril 2016 15:48 =C3=80
>>                                     : BOUCADAIR Mohamed IMT/OLN;
>>         sfc@ietf.org <mailto:sfc@ietf.org>
>>                                     <mailto:sfc@ietf.org
>>         <mailto:sfc@ietf.org>> Objet : Re: [sfc] WG
>>                                     last call for
>> draft-ietf-sfc-nsh-04.txt
>>
>>                                     If I am understanding you correctly
>>         Med, you
>>                                     are asking that the
>>                                     NSH draft specify how service chaini=
ng
>>                                     should cope with packets
>>                                     that have been fragmented?
>>
>>
>>                                 [Med] To be accurate, I'm asking to asse=
ss
>>                                 whether there are
>>                                 implications. If there are, then the dra=
ft
>>                                 should be updated
>>                                 accordingly.
>>
>>                                     NSH, and the SFF functionality, does
>>         not care.
>>
>>
>>                                 [Med] I'm not that sure. Some typical
>>                                 implications are listed
>>                                 below:
>>
>>                                 * SFF: If the NSH header is present only
>>         in the
>>                                 a fragment but SFF
>>                                 didn't maintained a state, subsequent
>>         fragments
>>                                 won't be
>>                                 appropriately processed. * SFC-aware
>>         function:
>>                                 if prepending a
>>                                 context information depends on the full
>>         packet,
>>                                 not only a
>>                                 fragment.
>>
>>                                 It just does its job.
>>
>>                                 [Med] which may be disturbed in some
>>         situations
>>                                 as listed in the
>>                                 examples above.
>>
>>                                     Ingress and intermediate classifiers
>> may
>>                                     cope with fragments in
>>                                     any number of ways.
>>
>>                                 Specifying such is clearly out of scope
>>         for this
>>                                 draft.
>>
>>                                 [Med] The purpose is not to specify the
>>         internal
>>                                 implementation
>>                                 details but the external behavior of the
>>                                 classifier function when
>>                                 it comes to handle fragments. That
>>         behavior may
>>                                 have an incidence
>>                                 on SFF, in particular. The purpose is no=
t
>> to
>>                                 recommend the maximum
>>                                 resources to be dedicated to out of orde=
r
>>                                 fragments nor the
>>                                 timeout to cache those; these
>>         considerations are
>>                                 of course out of
>>                                 scope. Nevertheless, an implementation
>>         should
>>                                 offer a configurable
>>                                 parameter so that an operator tweak thos=
e
>>                                 according to its
>>                                 context.
>>
>>                                     I suppose one could write an
>>         informational
>>                                     draft on possible ways
>>                                     of coping.  The IETF has not usually
>>                                     published such.
>>                                     Service functions have to cope with
>>                                     fragmented packets just as
>>                                     they had to before the advent of NSH=
,
>> so
>>                                     describing that is
>>                                     clearly not needed here.
>>
>>
>>                                 [Med] The advent of NSH has the followin=
g
>>                                 implications: * it
>>                                 exacerbates fragmentation. Handing over
>> this
>>                                 issue to the
>>                                 transport layer may lead to
>> interoperability
>>                                 issues. * the
>>                                 chaining may not be efficient if
>>         fragments are
>>                                 inappropriately
>>                                 handled.
>>
>>                                 Introducing NSH should not degrade the
>>         overall
>>                                 service compared to
>>                                 legacy service deployment schemes.
>>
>>
>>                                     Yours, Joel
>>
>>                                     On 4/25/16 3:00 AM,
>>                                     mohamed.boucadair@orange.com
>>         <mailto:mohamed.boucadair@orange.com>
>>                                     <mailto:mohamed.boucadair@orange.com
>>         <mailto:mohamed.boucadair@orange.com>> wrote:
>>
>>                                         Re-,
>>
>>                                         I hear you, but my comment is
>>         that we
>>                                         need, as a WG, to decide
>>                                         what to
>>
>>                                     put in the draft. FWIW, I'm
>>         discussing two
>>                                     fragmentation
>>                                     issues:
>>
>>
>>                                         (1) Fragmentation that is caused
>> by
>>                                         prepending an SFC header.
>>                                         (2) Handling fragments at the
>>         ingress of
>>                                         an SFC-enabled domain.
>>
>>                                         Increasing the MTU is for sure a
>>                                         recommendation is to be
>>                                         explicitly
>>
>>                                     called out in the text (see my first
>>         message).
>>
>>
>>                                         There are other issues that need
>>         to be
>>                                         discussed, e.g., how to
>>                                         deal with
>>
>>                                     fragments in SFFs/Classifiers?
>>
>>
>>                                         It is also "prudent" to check
>>         that no
>>                                         issues will be experienced
>>                                         in SFF
>>
>>                                     to handle fragments. If an SFC heade=
r
>> is
>>                                     prepended for all
>>                                     fragments, I'm not sure there
>>
>>                                         is any particular issue at the S=
FF
>>                                         level, except if
>>                                         stripping/adding
>>
>>                                     context TLVs depends on the full
>>         packet (not
>>                                     just fragment). It
>>                                     is warranted to consider a little
>>         bit this
>>                                     point before declaring
>>                                     there is no issue.
>>
>>
>>                                         For point (1), declaring
>>         fragmentation
>>                                         out of scope would be
>>                                         meant that
>>
>>                                     an implementation must be prepared t=
o
>>                                     receive fragments with or
>>                                     without NSH header as this is a
>> decision
>>                                     that is left to the
>>                                     transport encapsulation. This is a
>>                                     requirement per se!
>>
>>
>>                                         I won't reiterate all the
>> comments I
>>                                         have about the current
>>                                         wording of
>>
>>                                     this section.
>>
>>
>>                                         Cheers, Med
>>
>>                                             -----Message d'origine-----
>> De :
>>                                             Elzur, Uri
>>                                             [mailto:uri.elzur@intel.com
>>         <mailto:uri.elzur@intel.com>
>>                                             <mailto:uri.elzur@intel.com
>>         <mailto:uri.elzur@intel.com>>] Envoy=C3=A9
>>                                             : lundi 25 avril 2016
>>                                             08:30 =C3=80 : BOUCADAIR Moh=
amed
>>         IMT/OLN;
>>                                             Thomas Narten;
>>                                             sfc@ietf.org
>>         <mailto:sfc@ietf.org> <mailto:sfc@ietf.org <mailto:sfc@ietf.org>=
>
>>                                             Objet : RE: [sfc] WG last
>>         call for
>>                                             draft-ietf-sfc-nsh-04.txt
>>
>>                                             Hi Med
>>
>>                                             My point is that
>>         Fragmentation is
>>                                             yet another transport relate=
d
>>                                             issue
>>
>>                                     that
>>
>>                                             is beyond the scope of NSH a=
nd
>>                                             beyond the charter of the WG=
,
>> so
>>                                             it
>>
>>                                     doesn't
>>
>>                                             really belong in the draft.
>>         We are
>>                                             providing an advice as
>>                                             extending the size of the
>>         packet may
>>                                             lead to fragmentation, but
>>                                             as you check RFC 7348 VxLAN,
>>         which
>>                                             my create the same issue,
>>                                             you'll find it doesn't even
>>
>>                                     relate
>>
>>                                             to it.
>>
>>                                             Thx
>>
>>                                             Uri ("Oo-Ree") C:
>>         949-378-7568 <tel:949-378-7568>
>>                                             <tel:949-378-7568
>>         <tel:949-378-7568>>
>>
>>
>>                                             -----Original Message-----
>>         From: sfc
>>                                             [mailto:sfc-bounces@ietf.org
>>         <mailto:sfc-bounces@ietf.org>
>>                                             <mailto:sfc-bounces@ietf.org
>>         <mailto:sfc-bounces@ietf.org>>] On
>>                                             Behalf Of
>>                                             mohamed.boucadair@orange.com
>>         <mailto:mohamed.boucadair@orange.com>
>>
>>         <mailto:mohamed.boucadair@orange.com
>>         <mailto:mohamed.boucadair@orange.com>> Sent:
>>                                             Sunday, April 24, 2016
>>                                             10:32 PM To: Elzur, Uri
>>                                             <uri.elzur@intel.com
>>         <mailto:uri.elzur@intel.com>
>>                                             <mailto:uri.elzur@intel.com
>>         <mailto:uri.elzur@intel.com>>>;
>>                                             Thomas Narten
>>
>>                                     <narten@us.ibm.com
>>         <mailto:narten@us.ibm.com> <mailto:narten@us.ibm.com
>>         <mailto:narten@us.ibm.com>>>;
>>
>>                                             sfc@ietf.org
>>         <mailto:sfc@ietf.org> <mailto:sfc@ietf.org <mailto:sfc@ietf.org>=
>
>>                                             Subject: Re: [sfc] WG last
>>         call for
>>                                             draft-ietf-sfc-nsh-04.txt
>>
>>                                             Hi Uri,
>>
>>                                             That's another option that
>>         needs to
>>                                             be discussed/investigated.
>>                                             I'm
>>
>>                                     afraid
>>
>>                                             this is not the rationale
>>         adopted in
>>                                             -04 since it includes some
>>                                             text
>>
>>                                     that
>>
>>                                             is far to be sufficient to
>>         ensure
>>                                             interoperable
>>                                             implementations.
>>
>>                                             BTW, saying that nsh does
>>         not need
>>                                             to deal with fragmentation
>>                                             because
>>
>>                                     it
>>
>>                                             is transport-independent is
>>         not IMHO
>>                                             a good strategy to adopt
>>                                             here
>>
>>                                     because
>>
>>                                             it opens the door for
>>         interoperable
>>                                             issues, it may lead to
>>                                             sub-optimal implementations
>>         if the
>>                                             sfc information is present
>>                                             only in one
>>
>>                                     fragments,
>>
>>                                             etc.
>>
>>                                             My comments are related to t=
he
>>                                             current text in the -04.
>>                                             This text needs
>>
>>                                     to
>>
>>                                             be fixed somehow.
>>
>>                                             Cheers, Med
>>
>>                                                 -----Message
>>         d'origine----- De :
>>                                                 Elzur, Uri
>>
>>         [mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>
>>
>>         <mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>>]
>>                                                 Envoy=C3=A9 : dimanche 2=
4 avril
>>                                                 2016 17:36 =C3=80 : BOUC=
ADAIR
>>         Mohamed
>>                                                 IMT/OLN; Thomas Narten;
>>                                                 sfc@ietf.org
>>         <mailto:sfc@ietf.org>
>>                                                 <mailto:sfc@ietf.org
>>         <mailto:sfc@ietf.org>> Objet :
>>                                                 RE: [sfc] WG last call f=
or
>>                                                 draft-ietf-sfc-nsh-04.tx=
t
>>
>>                                                 Hi Med
>>
>>                                                 I see no need to specify
>> the
>>                                                 exact behavior as NSH is
>>                                                 transport independent
>>         i.e. like
>>                                                 NSH interaction with any
>>         other
>>                                                 Transport eh issue of
>>                                                 Fragmentation is to be
>>         dealt in
>>                                                 a way
>>                                                 that matches the
>> mechanisms
>>                                                 supported by the
>>         Transport used
>>                                                 and do not belong in the
>>         NSH draft
>>
>>                                                 Thx
>>
>>                                                 Uri ("Oo-Ree") C:
>>         949-378-7568 <tel:949-378-7568>
>>                                                 <tel:949-378-7568
>>         <tel:949-378-7568>>
>>
>>
>>                                                 -----Original
>>         Message----- From: sfc
>>
>>         [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>
>>
>>         <mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>>]
>>                                                 On Behalf Of
>>
>>         mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.co=
m
>> >
>>
>>         <mailto:mohamed.boucadair@orange.com
>>         <mailto:mohamed.boucadair@orange.com>>
>>                                                 Sent: Thursday, April 14=
,
>>                                                 2016 12:43 AM To: Thomas
>>         Narten
>>                                                 <narten@us.ibm.com
>>         <mailto:narten@us.ibm.com>
>>
>>         <mailto:narten@us.ibm.com <mailto:narten@us.ibm.com>>>;
>>                                                 sfc@ietf.org
>>         <mailto:sfc@ietf.org>
>>                                                 <mailto:sfc@ietf.org
>>         <mailto:sfc@ietf.org>> Subject:
>>                                                 Re: [sfc] WG last call f=
or
>>                                                 draft-ietf-sfc-nsh-04.tx=
t
>>
>>                                                 R-,
>>
>>                                                 In addition to other
>> pending
>>                                                 issues raised for this
>>         draft, I
>>                                                 would like to raise this
>>                                                 additional one about
>>         Section 6.
>>
>>                                                 =3D=3D 6.  Fragmentation
>>         Considerations
>>
>>                                                 NSH and the associated
>>         transport
>>                                                 header are "added" to th=
e
>>                                                 encapsulated
>>         packet/frame.  This
>>                                                 additional information
>>                                                 increases
>>
>>                                     the
>>
>>                                                 size of the packet.  In
>>         order
>>                                                 the ensure proper
>>         forwarding of
>>                                                 NSH data, several
>>         options for
>>                                                 handling fragmentation a=
nd
>>                                                 re-assembly exist:
>>
>>                                                 1.  Jumbo Frames, when
>>                                                 supported, enable the
>>         transport
>>                                                 of NSH
>>                                                 and associated transport
>>         packets
>>                                                 without requiring
>>                                                 fragmentation.
>>
>>                                                 2.  Path MTU Discovery
>>                                                 [RFC1191]"describes a
>>         technique for
>>                                                 dynamically discovering
>> the
>>                                                 maximum transmission
>>         unit (MTU) of
>>
>>                                     an
>>
>>                                                 arbitrary internet path"
>>         and can
>>                                                 be utilized to ensure th=
e
>>
>>                                 the
>>
>>                                                 required packet size is
>>         used.
>>
>>                                                 3.  [RFC6830] describes
>> two
>>                                                 schemes for
>>         fragmentation and
>>                                                 re-
>>
>>                                     assembly
>>
>>                                                 in section 5.4. =3D=3D
>>
>>                                                 * The text is weak for a
>>                                                 Standard track document
>>         that is
>>                                                 intended to solve the
>>         problem in
>>
>>         https://tools.ietf.org/html/rfc7498#section-
>>
>>                                 2.12.
>>
>>                                                 There should be a clear
>>         behavior
>>                                                 to be followed by an
>>
>>                                 implementation.
>>
>>                                                 Further, I would avoid
>>         the use
>>                                                 of words such as "can".
>>
>>                                                 * The text covers only
>>                                                 fragmentation when it is
>>         induced
>>                                                 by SFC
>>                                                 operations, it does not
>>         discuss
>>                                                 the treatment of a
>> fragment
>>                                                 when received in an SFC
>>         domain.
>>                                                 IMHO, the draft should
>> also
>>                                                 specify the behavior of
>> the
>>                                                 Classifier with regards =
to
>>                                                 fragments for the sake
>>         of proper
>>                                                 SFC operation. Applying
>>                                                 classification policies
>> may
>>                                                 require the
>>
>>                                             full packet, not only a
>>         fragment.
>>
>>                                                 In particular, dedicated
>>                                                 resources should
>>         dedicated for
>>                                                 handling out of order
>>         fragments.
>>                                                 Of course, it is out of
>>         scope
>>                                                 of this document to
>>         describe how
>>                                                 SFs handle fragments.
>>
>>                                                 * If an SFC header is
>>         prepended
>>                                                 for all fragments, I'm n=
ot
>>                                                 sure there is any
>> particular
>>                                                 issue at the SFF
>>         level...except
>>                                                 if stripping/adding
>>         context TLVs
>>                                                 depends on the full pack=
et
>>                                                 (not just fragment). It =
is
>>                                                 warranted to consider a
>>         little bit
>>                                                 this point before
>>         declaring there
>>
>>                                     is
>>
>>                                             no issue.
>>
>>
>>                                                 * The text states "sever=
al
>>                                                 options". This may be
>>         interpreted
>>                                                 as if implementing one
>>         of them
>>                                                 is sufficient...which is
>> not
>>                                                 true. The first two poin=
ts
>>                                                 contribute to minimize t=
he
>>                                                 fragmentation risk, but
>>                                                 fragmentation may still =
be
>>                                                 experienced
>>                                                 (e.g., other shims are
>>         prepended
>>                                                 by other nodes for some
>>         other
>>                                                 purposes, nested nsh,
>> etc.)
>>
>>                                                 * The first two points
>> have
>>                                                 nothing to do with
>>         reassembly.
>>
>>                                                 * The support of jumbo
>
>

--001a11408aa42978c305318b6b4c
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: base64
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=
--001a11408aa42978c305318b6b4c--


From nobody Thu Apr 28 06:24:43 2016
Return-Path: <agmalis@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3FEF812D6F8 for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 06:24:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1aRvlB2C1OjY for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 06:24:37 -0700 (PDT)
Received: from mail-oi0-x235.google.com (mail-oi0-x235.google.com [IPv6:2607:f8b0:4003:c06::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A87BC12D6FF for <sfc@ietf.org>; Thu, 28 Apr 2016 06:24:16 -0700 (PDT)
Received: by mail-oi0-x235.google.com with SMTP id k142so83144823oib.1 for <sfc@ietf.org>; Thu, 28 Apr 2016 06:24:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=mjodXZ3F37tv2SoXjm8HFNfcO+VOaSzetyOduuzsXF0=; b=jVhMuE1pprkJZXBPw1zX/gXhXUn8DLCfX+Nx9F56z0Rfy8P3/hJQdn/BP2u6LHMUao RuI+fNDkeNFRAdOPfP8OYDCspUqNO3j8iV/TcwsUg4dL23EMG1o8NGXH1YvUKkiPUtLb vnk4nj0Oygx8An62HeesI8mwSSgv8oj2K5TATwx0dLIKjZck99uBpfvZpulbgroVBB2J eVQGm8jivxM4FHbsbrdygcI/OTVUH98g+XaroXHajz/PIWm5JlECSM7EnRdBxJaHiq7Y wLwA79EMj0s+gtJXjfxkqgyBmmg6QD1v2aIZ8nWqp0VIVhH16x9H6b37I3uFI0ZxI95Z cFyA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=mjodXZ3F37tv2SoXjm8HFNfcO+VOaSzetyOduuzsXF0=; b=W4wAwcXGPcc9PDS34wdWSTP6ytpTxoTRE5cBf5x/MEm6COJEA0aFZldKwVH6jt/dMo zWvErbKCCQQMbfFoj3neWzgZUrpxGR5g4jOV9808btTyHGkqDymGvLfenQA+LffdMZmk TUTnng8KWGddM/RdiXxspFdRCj7vz9c5vSauFclE+gIfF6nhBPHVeEt/B867nT8Uip5I EeqFuw0COz7Itfu8o5/SsW9jKrYqXOnlpfcg7gO7KshojoB7nUuJszNOn0FW1e5J8tHm 5AeIb490OlgrfpN0UTOi9mcroMeGi8awqrRl31wxfd64FaYLxE/7yjj+HNf9sUCci0fu z1eQ==
X-Gm-Message-State: AOPr4FVQie4tZqFKLSJFxVP5VhwHbZtdyE5uJhv+ytP/qrk8RLnwcL8xkc1kDZCS0KlPc2sN2EcOy+0yj7Or+A==
X-Received: by 10.157.48.98 with SMTP id w31mr6114139otd.61.1461849855950; Thu, 28 Apr 2016 06:24:15 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.182.231.106 with HTTP; Thu, 28 Apr 2016 06:23:56 -0700 (PDT)
In-Reply-To: <D3478632.4C66A%jguichar@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb> <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com> <CAA=duU0cjXbTxTCqaRetajxFaJVfq8Y-HySPDrR-0AN38Wq3Zw@mail.gmail.com> <4d65232a-d4a6-a11b-c765-635cb909edbd@joelhalpern.com> <CAA=duU0PujWB0LB=wxFauPqaqbf4kFsqkzAwtNn7r3MzBUdCqA@mail.gmail.com> <D3478632.4C66A%jguichar@cisco.com>
From: "Andrew G. Malis" <agmalis@gmail.com>
Date: Thu, 28 Apr 2016 09:23:56 -0400
Message-ID: <CAA=duU2XZL8ZH0i3EAx5ZfqH4AmcWziBirnX4f=eW+t9Umw9rg@mail.gmail.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>
Content-Type: multipart/alternative; boundary=001a114187be61056505318b71f9
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/2s_c4epuKbmrysECaor9vVakseY>
Cc: "Elzur, Uri" <uri.elzur@intel.com>, Joel Halpern Direct <jmh.direct@joelhalpern.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 13:24:42 -0000

--001a114187be61056505318b71f9
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Jim,

Thanks. To paraphrase what I just said to Joel, if that=E2=80=99s the inten=
t, then
the text should make it clear.

Thanks,
Andy


On Thu, Apr 28, 2016 at 9:22 AM, Jim Guichard (jguichar) <jguichar@cisco.co=
m
> wrote:

> Hi Andy,
>
> I think the key point is that NSH !=3D network overlay but rather utilize=
s a
>  network overlay for packet transport between SFC network elements. The
> reference is just an example of how a network overlay might deal with
> fragmentation and is not a suggestion that NSH adopt that mechanism but
> rather makes the point that it can utilize the existing network overlay
> mechanics.
>
> Jim
>
> From: sfc <sfc-bounces@ietf.org> on behalf of "Andrew G. Malis" <
> agmalis@gmail.com>
> Date: Thursday, April 28, 2016 at 8:17 AM
> To: Joel Halpern Direct <jmh.direct@joelhalpern.com>
> Cc: "Elzur, Uri" <uri.elzur@intel.com>, "mohamed.boucadair@orange.com" <
> mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda
> Dunbar <linda.dunbar@huawei.com>
> Subject: Re: [sfc] Suggested wording addtion to the Section 6
> (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
>
> Joel,
>
> The diagrams in section 6 of RFC 6830 are control plane, not data plane.
> The data plane diagrams are in section 5.
>
> But the overriding question is - without any fields in the NSH header to
> sequence fragments, how can the fragments be correctly reassembled?
>
> Cheers,
> Andy
>
> On Wed, Apr 27, 2016 at 7:46 PM, Joel Halpern Direct <
> jmh.direct@joelhalpern.com> wrote:
>
>> The LISP header does not have a fragment flag or fragment offset.  The
>> diagrams in section 6 include the outer encapsulating header (the
>> equivalent of the transport header in SFC.)  Yes, the text is a little h=
ard
>> to follow in this regard.  The LISP working group is going to be rewriti=
ng
>> RFC 6830 as part of moving to standards track.
>>
>> So there is no difference in this regard between NSH and LISP.
>>
>> Yours,
>> Joel
>>
>> On 4/27/16 7:02 PM, Andrew G. Malis wrote:
>>
>>> Joel et al,
>>>
>>> All this talk about fragmentation prompted me to re-read section 6 of
>>> the draft, which recommends (as option 3) using the procedures in
>>> section 5.4 of RFC 6830 (presumably with the =E2=80=9CNSH header=E2=80=
=9D replacing the
>>> =E2=80=9CLISP header=E2=80=9D in the description of the procedures in t=
hat section).
>>>
>>> So that led me to read that section (and the LISP header definition in
>>> section 5.1), and I see that LISP does fragmentation and reassembly
>>> identically to IPv4, using the Fragment Offset field so that fragments
>>> can be correctly reassembled in the proper order.
>>>
>>> However, the NSH Header doesn=E2=80=99t have a Fragment Offset field or=
 any
>>> other way to order the fragments.
>>>
>>> So how can the procedures in Section 5.4 of 6830 be used?
>>>
>>> Thanks,
>>> Andy
>>>
>>> On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern <jmh@joelhalpern.com
>>> <mailto:jmh@joelhalpern.com>> wrote:
>>>
>>>     Both methods are valid, and both depend upon details of the
>>>     underlying packet and the transport.  As such, I don't see why this
>>>     document benefits from describing them, much less why it should mar=
k
>>>     one method as a "should".  Implementation details are likely to be
>>>     more significant than any bit consumption difference between the tw=
o
>>>     alternatives.
>>>
>>>     Yours,
>>>     Joel
>>>
>>>
>>>     On 4/27/16 3:40 PM, Linda Dunbar wrote:
>>>
>>>         I suggest adding the following paragraphs after the Bullet 3 of
>>>         the Section 6 Fragmentation Consideration to make the process
>>>         more clear and less controversial:
>>>
>>>
>>>         --------------------------------
>>>
>>>         RFC6830 describes the fragmentation method of breaking the
>>>         original packet into two equal sub-frames and encapsulating
>>>         [LISP Header + Transport header] to each sub-frame.
>>>
>>>         If LISP fragmentation [RFC6830 Section 5.4] is used, the [SFC
>>>         Header + Transport Header] will be added to each half frame (or
>>>         the original data frame). As the Transport Header is terminated
>>>         by the next SFF node's tunnel transport layer, the combined two
>>>         sub-frames will have two SFC Headers.
>>>
>>>         Therefore, the fragmentation for NSH encapsulated data frame
>>>         should be done completely by the node tunnel transport layer,
>>>         which should break the [SFC + original packet] into two equal
>>>         sub-frames and each sub-frame being encapsulated with its
>>>         respective tunnel header.  The next SFF node's tunnel transport
>>>         layer should combine the two sub-frames before sending to the
>>>         next node.
>>>
>>>         ------------------------------------------------------
>>>
>>>
>>>         By the way, there are to typo in the Section 6:
>>>         3rd line: "In order the" =3D=3D> "In order to"
>>>         Last line of Bullet 2: extra "the" in the "utilized to ensure
>>>         the the required packet".
>>>
>>>
>>>         Hope it helps.
>>>
>>>         Linda
>>>
>>>
>>>
>>>         -----Original Message-----
>>>         From: mohamed.boucadair@orange.com
>>>         <mailto:mohamed.boucadair@orange.com>
>>>         [mailto:mohamed.boucadair@orange.com
>>>         <mailto:mohamed.boucadair@orange.com>]
>>>         Sent: Wednesday, April 27, 2016 12:40 AM
>>>         To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; sfc@ietf.org
>>>         <mailto:sfc@ietf.org>
>>>         Subject: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>>         Hi Joel, all,
>>>
>>>         Please see inline.
>>>
>>>         Cheers,
>>>         Med
>>>
>>>             -----Message d'origine-----
>>>             De : Joel M. Halpern [mailto:jmh@joelhalpern.com
>>>             <mailto:jmh@joelhalpern.com>] Envoy=C3=A9 : mardi 26
>>>             avril 2016 19:18 =C3=80 : Linda Dunbar; BOUCADAIR Mohamed
>>>             IMT/OLN; Elzur,
>>>             Uri; sfc@ietf.org <mailto:sfc@ietf.org> Objet : Re: [sfc] W=
G
>>>             last call for
>>>             draft-ietf-sfc-nsh-04.txt
>>>
>>>             With regard to Transport tunnel fragementation, that seems
>>>             an issue
>>>             for the transport protocol.  I don't actually object to a
>>>             sentence,
>>>             but it does not seem that it will accomplish anything.
>>>
>>>
>>>         [Med] I would like to see some text added to the draft.
>>>
>>>
>>>             With regard to packets fragmented by the source, I
>>>             completely disagree
>>>             with your assertion.  If an SFF were to reassemble the
>>>             packets, that
>>>             would be a violation of its job.
>>>
>>>
>>>         [Med] I agree with you.
>>>
>>>           There is no reason for an SFF to
>>>
>>>             reassemble a packet fragmented by the source.  The
>>>             classifier may have
>>>             to do some interesting things in order to properly classify
>>>             succeeding
>>>             fragments, but that is an implementation issue (most common=
ly
>>>             addressed with virtual reassembly, which doe snot delay the
>>>             fragments.)  We don't specity that.
>>>
>>>
>>>         [Med] Still, the external behavior of the classifier needs to b=
e
>>>         clear in the document. I don't find any text in the draft sayin=
g
>>>         for instance that an NSH header must be present in all
>>>         fragments. (There some processing that might be needed at the
>>>         SFF to "do its job" with regards to fragments (receive out of
>>>         order fragments + forwarding policy on the full packet).)
>>>
>>>
>>>             If an SF needs to reassemble fragments to do its job, that
>>>             is up to
>>>             the SF.  Some will need to actually reassemble.  Some will
>>>             need to
>>>             perform virtual reassembly, and some will happily process t=
he
>>>             fragments.  I can not see what the NSH document could
>>>             possibly mandate.
>>>
>>>
>>>         [Med] Fully agree.
>>>
>>>
>>>             Yours,
>>>             Joel
>>>
>>>             On 4/26/16 11:47 AM, Linda Dunbar wrote:
>>>
>>>                 Joel,
>>>
>>>                 I think the document should add the description on the
>>>                 following two
>>>                 fragmentation scenarios:
>>>
>>>                 - Transport tunnel generated fragmentation: When a pack=
et
>>>                 fragmentation is caused by transport tunnel (i.e. vario=
us
>>>                 encapsulations), the termination point of the transport
>>>                 tunnel is
>>>                 responsible for re-assembling the fragmented pieces of
>>>                 the packet.
>>>                 Since there won't be any SFF nodes in between the
>>>                 Transport Tunnel,
>>>                 the tunnel generated fragmentation does not require any
>>>                 actions by
>>>                 SFF nodes or SF nodes.
>>>
>>>
>>>                 - Source node generated fragmentation (after adding on
>>>                 the NSH
>>>                 header): When fragmentation has to be performed for a
>>>                 packet being
>>>                 encapsulated with the NSH header, either the
>>>                 intermediate SFF nodes
>>>                 or the SF nodes have to be able to reassemble the
>>>                 fragmented pieces.
>>>
>>>
>>>
>>>
>>>                 Cheers,
>>>
>>>
>>>                 Linda
>>>
>>>                 -----Original Message----- From: Joel M. Halpern
>>>                 [mailto:jmh@joelhalpern.com
>>>                 <mailto:jmh@joelhalpern.com>] Sent: Tuesday, April 26,
>>>                 2016 10:33 AM
>>>                 To: Linda Dunbar; mohamed.boucadair@orange.com
>>>                 <mailto:mohamed.boucadair@orange.com>; Elzur, Uri;
>>>                 sfc@ietf.org <mailto:sfc@ietf.org> Subject: Re: [sfc] W=
G
>>>                 last call for
>>>                 draft-ietf-sfc-nsh-04.txt
>>>
>>>                 Re-reading your note, it is possible that you are
>>>                 referring only to
>>>                 the case of transport generated fragmentation of the
>>>                 outer packet.
>>>                 I had assumed you were not talking about that, since th=
e
>>>                 resulting
>>>                 fragments will not all have NSH headers.  As with any
>>> tunnel
>>>                 technology, if the tunnel chooses to fragment at its
>>>                 layer, then the
>>>                 tunnel is responsible for reassembly.  That would be
>>>                 invisible to
>>>                 the SFF.
>>>
>>>                 Yours, Joel
>>>
>>>                 On 4/26/16 11:10 AM, Linda Dunbar wrote:
>>>
>>>                     Agree with Med.
>>>
>>>                     Even if each fragment piece of a packet with NSH
>>>                     header carries the
>>>                     NSH header, the intermediate SFF nodes still need t=
o
>>>                     put together
>>>                     all the fragments together before passing the whole
>>>                     data frame to
>>>                     the SF.
>>>
>>>                     Linda
>>>
>>>                     -----Original Message----- From: sfc
>>>                     [mailto:sfc-bounces@ietf.org
>>>                     <mailto:sfc-bounces@ietf.org>]
>>>                     On Behalf Of mohamed.boucadair@orange.com
>>>                     <mailto:mohamed.boucadair@orange.com> Sent: Monday,
>>>                     April 25,
>>>                     2016 9:42 AM To: Elzur, Uri; Joel M. Halpern;
>>>                     sfc@ietf.org <mailto:sfc@ietf.org> Subject:
>>>                     Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.tx=
t
>>>
>>>                     Re-,
>>>
>>>                     How do you instruct the transport layer to ALWAYS
>>>                     prepend an NSH
>>>                     header even for fragments? Or you don't care about
>>> that?
>>>
>>>                     Thank you.
>>>
>>>                     Cheers, Med
>>>
>>>                         -----Message d'origine----- De : Elzur, Uri
>>>                         [mailto:uri.elzur@intel.com
>>>                         <mailto:uri.elzur@intel.com>] Envoy=C3=A9 : lun=
di 25
>>>                         avril 2016 16:26 =C3=80
>>>                         : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;
>>>                         sfc@ietf.org <mailto:sfc@ietf.org> Objet
>>>                         : RE: [sfc] WG last call for
>>>                         draft-ietf-sfc-nsh-04.txt
>>>
>>>                         Hi Med
>>>
>>>                         Not to repeat my position, but I'll do it anyho=
w
>>>                         :-) As NSH is
>>>                         *NOT* a transport, dealing with fragmentation i=
s
>>>                         left to the
>>>                         Transport used.
>>>
>>>                         The model I use for NSH, is basically similar t=
o
>>>                         VXLAN . It is an
>>>                         overly.
>>>
>>>                         Thx
>>>
>>>                         Uri ("Oo-Ree") C: 949-378-7568 <tel:949-378-756=
8
>>> >
>>>
>>>
>>>                         -----Original Message----- From: sfc
>>>                         [mailto:sfc-bounces@ietf.org
>>>                         <mailto:sfc-bounces@ietf.org>]
>>>                         On Behalf Of mohamed.boucadair@orange.com
>>>                         <mailto:mohamed.boucadair@orange.com> Sent:
>>>                         Monday, April 25,
>>>                         2016 7:18 AM To: Joel M. Halpern
>>>                         <jmh@joelhalpern.com <mailto:jmh@joelhalpern.co=
m
>>> >>;
>>>                         sfc@ietf.org <mailto:sfc@ietf.org>
>>>                         Subject: Re: [sfc] WG last call for
>>>                         draft-ietf-sfc-nsh-04.txt
>>>
>>>                         Hi Joel,
>>>
>>>                         Please see inline.
>>>
>>>                         Cheers, Med
>>>
>>>                             -----Message d'origine----- De : Joel M.
>>> Halpern
>>>                             [mailto:jmh@joelhalpern.com
>>>                             <mailto:jmh@joelhalpern.com>] Envoy=C3=A9 :=
 lundi
>>>                             25 avril 2016 15:48 =C3=80
>>>                             : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org
>>>                             <mailto:sfc@ietf.org> Objet : Re: [sfc] WG
>>>                             last call for draft-ietf-sfc-nsh-04.txt
>>>
>>>                             If I am understanding you correctly Med, yo=
u
>>>                             are asking that the
>>>                             NSH draft specify how service chaining
>>>                             should cope with packets
>>>                             that have been fragmented?
>>>
>>>
>>>                         [Med] To be accurate, I'm asking to assess
>>>                         whether there are
>>>                         implications. If there are, then the draft
>>>                         should be updated
>>>                         accordingly.
>>>
>>>                             NSH, and the SFF functionality, does not
>>> care.
>>>
>>>
>>>                         [Med] I'm not that sure. Some typical
>>>                         implications are listed
>>>                         below:
>>>
>>>                         * SFF: If the NSH header is present only in the
>>>                         a fragment but SFF
>>>                         didn't maintained a state, subsequent fragments
>>>                         won't be
>>>                         appropriately processed. * SFC-aware function:
>>>                         if prepending a
>>>                         context information depends on the full packet,
>>>                         not only a
>>>                         fragment.
>>>
>>>                         It just does its job.
>>>
>>>                         [Med] which may be disturbed in some situations
>>>                         as listed in the
>>>                         examples above.
>>>
>>>                             Ingress and intermediate classifiers may
>>>                             cope with fragments in
>>>                             any number of ways.
>>>
>>>                         Specifying such is clearly out of scope for thi=
s
>>>                         draft.
>>>
>>>                         [Med] The purpose is not to specify the interna=
l
>>>                         implementation
>>>                         details but the external behavior of the
>>>                         classifier function when
>>>                         it comes to handle fragments. That behavior may
>>>                         have an incidence
>>>                         on SFF, in particular. The purpose is not to
>>>                         recommend the maximum
>>>                         resources to be dedicated to out of order
>>>                         fragments nor the
>>>                         timeout to cache those; these considerations ar=
e
>>>                         of course out of
>>>                         scope. Nevertheless, an implementation should
>>>                         offer a configurable
>>>                         parameter so that an operator tweak those
>>>                         according to its
>>>                         context.
>>>
>>>                             I suppose one could write an informational
>>>                             draft on possible ways
>>>                             of coping.  The IETF has not usually
>>>                             published such.
>>>                             Service functions have to cope with
>>>                             fragmented packets just as
>>>                             they had to before the advent of NSH, so
>>>                             describing that is
>>>                             clearly not needed here.
>>>
>>>
>>>                         [Med] The advent of NSH has the following
>>>                         implications: * it
>>>                         exacerbates fragmentation. Handing over this
>>>                         issue to the
>>>                         transport layer may lead to interoperability
>>>                         issues. * the
>>>                         chaining may not be efficient if fragments are
>>>                         inappropriately
>>>                         handled.
>>>
>>>                         Introducing NSH should not degrade the overall
>>>                         service compared to
>>>                         legacy service deployment schemes.
>>>
>>>
>>>                             Yours, Joel
>>>
>>>                             On 4/25/16 3:00 AM,
>>>                             mohamed.boucadair@orange.com
>>>                             <mailto:mohamed.boucadair@orange.com> wrote=
:
>>>
>>>                                 Re-,
>>>
>>>                                 I hear you, but my comment is that we
>>>                                 need, as a WG, to decide
>>>                                 what to
>>>
>>>                             put in the draft. FWIW, I'm discussing two
>>>                             fragmentation
>>>                             issues:
>>>
>>>
>>>                                 (1) Fragmentation that is caused by
>>>                                 prepending an SFC header.
>>>                                 (2) Handling fragments at the ingress o=
f
>>>                                 an SFC-enabled domain.
>>>
>>>                                 Increasing the MTU is for sure a
>>>                                 recommendation is to be
>>>                                 explicitly
>>>
>>>                             called out in the text (see my first
>>> message).
>>>
>>>
>>>                                 There are other issues that need to be
>>>                                 discussed, e.g., how to
>>>                                 deal with
>>>
>>>                             fragments in SFFs/Classifiers?
>>>
>>>
>>>                                 It is also "prudent" to check that no
>>>                                 issues will be experienced
>>>                                 in SFF
>>>
>>>                             to handle fragments. If an SFC header is
>>>                             prepended for all
>>>                             fragments, I'm not sure there
>>>
>>>                                 is any particular issue at the SFF
>>>                                 level, except if
>>>                                 stripping/adding
>>>
>>>                             context TLVs depends on the full packet (no=
t
>>>                             just fragment). It
>>>                             is warranted to consider a little bit this
>>>                             point before declaring
>>>                             there is no issue.
>>>
>>>
>>>                                 For point (1), declaring fragmentation
>>>                                 out of scope would be
>>>                                 meant that
>>>
>>>                             an implementation must be prepared to
>>>                             receive fragments with or
>>>                             without NSH header as this is a decision
>>>                             that is left to the
>>>                             transport encapsulation. This is a
>>>                             requirement per se!
>>>
>>>
>>>                                 I won't reiterate all the comments I
>>>                                 have about the current
>>>                                 wording of
>>>
>>>                             this section.
>>>
>>>
>>>                                 Cheers, Med
>>>
>>>                                     -----Message d'origine----- De :
>>>                                     Elzur, Uri
>>>                                     [mailto:uri.elzur@intel.com
>>>                                     <mailto:uri.elzur@intel.com>] Envoy=
=C3=A9
>>>                                     : lundi 25 avril 2016
>>>                                     08:30 =C3=80 : BOUCADAIR Mohamed IM=
T/OLN;
>>>                                     Thomas Narten;
>>>                                     sfc@ietf.org <mailto:sfc@ietf.org>
>>>                                     Objet : RE: [sfc] WG last call for
>>>                                     draft-ietf-sfc-nsh-04.txt
>>>
>>>                                     Hi Med
>>>
>>>                                     My point is that Fragmentation is
>>>                                     yet another transport related
>>>                                     issue
>>>
>>>                             that
>>>
>>>                                     is beyond the scope of NSH and
>>>                                     beyond the charter of the WG, so
>>>                                     it
>>>
>>>                             doesn't
>>>
>>>                                     really belong in the draft. We are
>>>                                     providing an advice as
>>>                                     extending the size of the packet ma=
y
>>>                                     lead to fragmentation, but
>>>                                     as you check RFC 7348 VxLAN, which
>>>                                     my create the same issue,
>>>                                     you'll find it doesn't even
>>>
>>>                             relate
>>>
>>>                                     to it.
>>>
>>>                                     Thx
>>>
>>>                                     Uri ("Oo-Ree") C: 949-378-7568
>>>                                     <tel:949-378-7568>
>>>
>>>
>>>                                     -----Original Message----- From: sf=
c
>>>                                     [mailto:sfc-bounces@ietf.org
>>>                                     <mailto:sfc-bounces@ietf.org>] On
>>>                                     Behalf Of
>>>                                     mohamed.boucadair@orange.com
>>>                                     <mailto:mohamed.boucadair@orange.co=
m>
>>> Sent:
>>>                                     Sunday, April 24, 2016
>>>                                     10:32 PM To: Elzur, Uri
>>>                                     <uri.elzur@intel.com
>>>                                     <mailto:uri.elzur@intel.com>>;
>>>                                     Thomas Narten
>>>
>>>                             <narten@us.ibm.com <mailto:narten@us.ibm.co=
m
>>> >>;
>>>
>>>                                     sfc@ietf.org <mailto:sfc@ietf.org>
>>>                                     Subject: Re: [sfc] WG last call for
>>>                                     draft-ietf-sfc-nsh-04.txt
>>>
>>>                                     Hi Uri,
>>>
>>>                                     That's another option that needs to
>>>                                     be discussed/investigated.
>>>                                     I'm
>>>
>>>                             afraid
>>>
>>>                                     this is not the rationale adopted i=
n
>>>                                     -04 since it includes some
>>>                                     text
>>>
>>>                             that
>>>
>>>                                     is far to be sufficient to ensure
>>>                                     interoperable
>>>                                     implementations.
>>>
>>>                                     BTW, saying that nsh does not need
>>>                                     to deal with fragmentation
>>>                                     because
>>>
>>>                             it
>>>
>>>                                     is transport-independent is not IMH=
O
>>>                                     a good strategy to adopt
>>>                                     here
>>>
>>>                             because
>>>
>>>                                     it opens the door for interoperable
>>>                                     issues, it may lead to
>>>                                     sub-optimal implementations if the
>>>                                     sfc information is present
>>>                                     only in one
>>>
>>>                             fragments,
>>>
>>>                                     etc.
>>>
>>>                                     My comments are related to the
>>>                                     current text in the -04.
>>>                                     This text needs
>>>
>>>                             to
>>>
>>>                                     be fixed somehow.
>>>
>>>                                     Cheers, Med
>>>
>>>                                         -----Message d'origine----- De =
:
>>>                                         Elzur, Uri
>>>                                         [mailto:uri.elzur@intel.com
>>>                                         <mailto:uri.elzur@intel.com>]
>>>                                         Envoy=C3=A9 : dimanche 24 avril
>>>                                         2016 17:36 =C3=80 : BOUCADAIR M=
ohamed
>>>                                         IMT/OLN; Thomas Narten;
>>>                                         sfc@ietf.org
>>>                                         <mailto:sfc@ietf.org> Objet :
>>>                                         RE: [sfc] WG last call for
>>>                                         draft-ietf-sfc-nsh-04.txt
>>>
>>>                                         Hi Med
>>>
>>>                                         I see no need to specify the
>>>                                         exact behavior as NSH is
>>>                                         transport independent i.e. like
>>>                                         NSH interaction with any other
>>>                                         Transport eh issue of
>>>                                         Fragmentation is to be dealt in
>>>                                         a way
>>>                                         that matches the mechanisms
>>>                                         supported by the Transport used
>>>                                         and do not belong in the NSH
>>> draft
>>>
>>>                                         Thx
>>>
>>>                                         Uri ("Oo-Ree") C: 949-378-7568
>>>                                         <tel:949-378-7568>
>>>
>>>
>>>                                         -----Original Message----- From=
:
>>> sfc
>>>                                         [mailto:sfc-bounces@ietf.org
>>>                                         <mailto:sfc-bounces@ietf.org>]
>>>                                         On Behalf Of
>>>                                         mohamed.boucadair@orange.com
>>>                                         <mailto:
>>> mohamed.boucadair@orange.com>
>>>                                         Sent: Thursday, April 14,
>>>                                         2016 12:43 AM To: Thomas Narten
>>>                                         <narten@us.ibm.com
>>>                                         <mailto:narten@us.ibm.com>>;
>>>                                         sfc@ietf.org
>>>                                         <mailto:sfc@ietf.org> Subject:
>>>                                         Re: [sfc] WG last call for
>>>                                         draft-ietf-sfc-nsh-04.txt
>>>
>>>                                         R-,
>>>
>>>                                         In addition to other pending
>>>                                         issues raised for this draft, I
>>>                                         would like to raise this
>>>                                         additional one about Section 6.
>>>
>>>                                         =3D=3D 6.  Fragmentation
>>> Considerations
>>>
>>>                                         NSH and the associated transpor=
t
>>>                                         header are "added" to the
>>>                                         encapsulated packet/frame.  Thi=
s
>>>                                         additional information
>>>                                         increases
>>>
>>>                             the
>>>
>>>                                         size of the packet.  In order
>>>                                         the ensure proper forwarding of
>>>                                         NSH data, several options for
>>>                                         handling fragmentation and
>>>                                         re-assembly exist:
>>>
>>>                                         1.  Jumbo Frames, when
>>>                                         supported, enable the transport
>>>                                         of NSH
>>>                                         and associated transport packet=
s
>>>                                         without requiring
>>>                                         fragmentation.
>>>
>>>                                         2.  Path MTU Discovery
>>>                                         [RFC1191]"describes a technique
>>> for
>>>                                         dynamically discovering the
>>>                                         maximum transmission unit (MTU)
>>> of
>>>
>>>                             an
>>>
>>>                                         arbitrary internet path" and ca=
n
>>>                                         be utilized to ensure the
>>>
>>>                         the
>>>
>>>                                         required packet size is used.
>>>
>>>                                         3.  [RFC6830] describes two
>>>                                         schemes for fragmentation and
>>>                                         re-
>>>
>>>                             assembly
>>>
>>>                                         in section 5.4. =3D=3D
>>>
>>>                                         * The text is weak for a
>>>                                         Standard track document that is
>>>                                         intended to solve the problem i=
n
>>>
>>> https://tools.ietf.org/html/rfc7498#section-
>>>
>>>                         2.12.
>>>
>>>                                         There should be a clear behavio=
r
>>>                                         to be followed by an
>>>
>>>                         implementation.
>>>
>>>                                         Further, I would avoid the use
>>>                                         of words such as "can".
>>>
>>>                                         * The text covers only
>>>                                         fragmentation when it is induce=
d
>>>                                         by SFC
>>>                                         operations, it does not discuss
>>>                                         the treatment of a fragment
>>>                                         when received in an SFC domain.
>>>                                         IMHO, the draft should also
>>>                                         specify the behavior of the
>>>                                         Classifier with regards to
>>>                                         fragments for the sake of prope=
r
>>>                                         SFC operation. Applying
>>>                                         classification policies may
>>>                                         require the
>>>
>>>                                     full packet, not only a fragment.
>>>
>>>                                         In particular, dedicated
>>>                                         resources should dedicated for
>>>                                         handling out of order fragments=
.
>>>                                         Of course, it is out of scope
>>>                                         of this document to describe ho=
w
>>>                                         SFs handle fragments.
>>>
>>>                                         * If an SFC header is prepended
>>>                                         for all fragments, I'm not
>>>                                         sure there is any particular
>>>                                         issue at the SFF level...except
>>>                                         if stripping/adding context TLV=
s
>>>                                         depends on the full packet
>>>                                         (not just fragment). It is
>>>                                         warranted to consider a little
>>> bit
>>>                                         this point before declaring the=
re
>>>
>>>                             is
>>>
>>>                                     no issue.
>>>
>>>
>>>                                         * The text states "several
>>>                                         options". This may be interpret=
ed
>>>                                         as if implementing one of them
>>>                                         is sufficient...which is not
>>>                                         true. The first two points
>>>                                         contribute to minimize the
>>>                                         fragmentation risk, but
>>>                                         fragmentation may still be
>>>                                         experienced
>>>                                         (e.g., other shims are prepende=
d
>>>                                         by other nodes for some other
>>>                                         purposes, nested nsh, etc.)
>>>
>>>                                         * The first two points have
>>>                                         nothing to do with reassembly.
>>>
>>>                                         * The support of jumbo frames b=
y
>>>                                         a router/device does not mean
>>>                                         that it can make use of it.
>>>                                         Appropriate MTU configuration
>>>                                         should be undertaken in a
>>>                                         consistent manner within an SFC
>>>                                         domain. The text should be
>>>                                         updated to make it is about
>>>                                         (consistent) MTU
>>>
>>>                         configuration.
>>>
>>>
>>>                                         * BTW, shouldn't the text be
>>>                                         reworded to recommended to
>>>                                         increase the MTU of **all
>>>                                         nodes** of an SFC-enabled domai=
n
>>> by
>>>                                         at least the length of SFC
>>>                                         header + transport header?
>>>
>>>                                         * Bullet 2, how PMTU discovery
>>>                                         is actually used in this
>>>                                         context? Do you assume that all
>>>                                         SFC-aware nodes will issue
>>>                                         such messages towards other
>>>                                         SFC-aware node, arbitrary
>>>                                         destination, else?
>>>
>>>                                         * Bullet 2, I would drop
>>>                                         "describes a technique for
>>>                                         dynamically discovering the
>>>                                         maximum transmission unit
>>>                                         (MTU) of an arbitrary internet
>>>                                         path".
>>>
>>>                                         * Bullet 2, s/ the the/the.
>>>
>>>                                         * The reference to the LISP
>>>                                         specification raises two concer=
ns
>>>                                         and one comment:
>>>
>>>                                         (1) I don't think it is a good
>>>                                         approach that fragments induced
>>>                                         by the network are passed to
>>>                                         their ultimate destinations as
>>>                                         such
>>>
>>>                         (stateless).
>>>
>>>                                         IMO, reassembly should be done
>>>                                         within the SFC domain
>>>                                         (responsible for fragmentation)
>>>                                         not passed away. (2) Does the
>>>                                         stateful mode require all SFC
>>>                                         data plane elements maintain a
>>>                                         full list of MTU for the any
>>>                                         SFF/SF instance of the SFC
>>>
>>>                                     domain?
>>>
>>>
>>>                                         The current text suggests that
>>>                                         [RFC6830] should be listed as
>>>                                         normative reference (not an
>>>                                         informative one). I would
>>>                                         personally favor removing the
>>>                                         reference to LISP (as it is an
>>>                                         Experimental RFC).
>>>
>>>                                         * The security section of the
>>>                                         draft may be augmented with
>>>                                         informational
>>>                                         fragmentation-related pointers
>>> to:
>>>                                         e.g., RFC1858 (Security
>>>                                         Considerations for IP Fragment
>>>                                         Filtering), RFC3128 (Protection
>>>                                         Against a Variant of the Tiny
>>>                                         Fragment Attack), and RFC 4963
>>>                                         (IPv4 Reassembly Errors at High
>>>                                         Data Rates).
>>>
>>>                                         Cheers, Med
>>>
>>>                                             -----Message d'origine-----
>>>                                             De : sfc
>>>                                             [mailto:sfc-bounces@ietf.or=
g
>>>                                             <mailto:sfc-bounces@ietf.or=
g
>>> >]
>>>                                             De la part de
>>>                                             mohamed.boucadair@orange.co=
m
>>>                                             <mailto:
>>> mohamed.boucadair@orange.com>
>>>                                             Envoy=C3=A9 : lundi 11 avri=
l
>>>                                             2016 13:14 =C3=80 : Thomas
>>>                                             Narten; sfc@ietf.org
>>>                                             <mailto:sfc@ietf.org> Objet
>>>                                             : Re:
>>>                                             [sfc] WG last call for
>>>                                             draft-ietf-sfc-nsh-04.txt
>>>
>>>                                             Dear Thomas, all,
>>>
>>>                                             As I mentioned during the
>>>                                             meeting, there are several
>>>                                             issues
>>>                                             that are not covered in the
>>>                                             last version of the draft. =
I
>>>                                             already provided examples o=
f
>>>                                             the issues offline as
>>> requested
>>>                                             by Martin.
>>>
>>>                                             Cheers, Med
>>>
>>>                                                 -----Message
>>>                                                 d'origine----- De : sfc
>>>                                                 [mailto:
>>> sfc-bounces@ietf.org
>>>                                                 <mailto:
>>> sfc-bounces@ietf.org>]
>>>                                                 De la part de Thomas
>>> Narten
>>>                                                 Envoy=C3=A9 : jeudi 31 =
mars
>>>                                                 2016 04:48 =C3=80 :
>>>                                                 sfc@ietf.org
>>>                                                 <mailto:sfc@ietf.org>
>>>                                                 Objet : [sfc] WG last
>>>                                                 call for
>>>                                                 draft-ietf-sfc-nsh-04.t=
xt
>>>
>>>                                                 Dear WG:
>>>
>>>                                                 This note begins a WG
>>>                                                 last call on
>>>                                                 draft-ietf-sfc-nsh-04.t=
xt
>>>                                                 (
>>> https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>
>>>
>>>
>>>             The editors of the NSH document have indicated that they ha=
ve
>>>
>>>                                                 addressed all known
>>>                                                 comments and that there
>>>                                                 are no open
>>>                                                 issues with the current
>>>                                                 version of the document=
.
>>>
>>>                                                 Substantive comments to
>>>                                                 the list please,
>>>                                                 editorial comments
>>>                                                 can go directly to the
>>>                                                 document editors.
>>>
>>>                                                 We'll also get a brief
>>>                                                 update from the editors
>>>                                                 at next
>>>                                                 week's meeting. If ther=
e
>>>                                                 are any remaining issue=
s
>>>                                                 with the
>>>                                                 document, raising them
>>>                                                 before the meeting woul=
d
>>> be
>>>                                                 especially helpful.
>>>
>>>                                                 For the chairs, Thomas
>>>
>>>
>>> _______________________________________________
>>>                                                 sfc mailing
>>>                                                 list sfc@ietf.org
>>>                                                 <mailto:sfc@ietf.org>
>>>
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>>
>>>
>>> _______________________________________________
>>>                                             sfc mailing
>>>                                             list sfc@ietf.org
>>>                                             <mailto:sfc@ietf.org>
>>>
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>>
>>>
>>> _______________________________________________
>>>                                         sfc mailing
>>>                                         list sfc@ietf.org
>>>                                         <mailto:sfc@ietf.org>
>>>
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>>
>>>
>>> _______________________________________________
>>>                                     sfc mailing
>>
>>
>

--001a114187be61056505318b71f9
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: base64
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--001a114187be61056505318b71f9--


From nobody Thu Apr 28 06:32:36 2016
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8DDB012D14E for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 06:32:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7hLDq2Nu9jzI for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 06:32:31 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6ACCE12D720 for <sfc@ietf.org>; Thu, 28 Apr 2016 06:22:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=157925; q=dns/txt; s=iport; t=1461849755; x=1463059355; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=DqUtCgIxxcX1at+Wr3OMbCOFa/ixSnWJWHy97Pmdc48=; b=ZLM/h4/RxFu1GMcQjDyyXaI7Za8/rYrPRB6tgpZ/s1KIObkoD0pRYo3P Rkm8LxHfnlELjkXvWD8WqlLuMBPXuuO4YJ4oMDDeeYgjofHk2f34f7J9k 2pMiB3emOp1IlcStwYeupzBVt4i1GOdMDfL8mgv0zodrBqE+qf7dOu688 g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BiAgAWDiJX/49dJa1bA4JsTFN9Bq4Qi?= =?us-ascii?q?14BDYFyBBcBCoVtAoEnOBQBAQEBAQEBZSeEQQEBAQQBAQEXAQJKBwsMBAIBCBE?= =?us-ascii?q?DAQEBIQECBAchBgsUCQgCBAENBYgVAxIOvlINhEsBAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQERBIYhhEuCQYIcASaFDwWHdIsrhEAxAYV7gneDLoF2gWeETYMphTSGJIE?= =?us-ascii?q?th14BHgEBQoI2gTVshml/AQEB?=
X-IronPort-AV: E=Sophos;i="5.24,546,1454976000";  d="scan'208,217";a="267110899"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 28 Apr 2016 13:22:33 +0000
Received: from XCH-RCD-007.cisco.com (xch-rcd-007.cisco.com [173.37.102.17]) by rcdn-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id u3SDMWlY002718 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 28 Apr 2016 13:22:32 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-007.cisco.com (173.37.102.17) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 28 Apr 2016 08:22:31 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Thu, 28 Apr 2016 08:22:31 -0500
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: "Andrew G. Malis" <agmalis@gmail.com>, Joel Halpern Direct <jmh.direct@joelhalpern.com>
Thread-Topic: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRoLy5gODJbPprtEyKsV065fH5RJ+elnwAgAAtrACAAAwigIAA0eUA///PIYA=
Date: Thu, 28 Apr 2016 13:22:31 +0000
Message-ID: <D3478632.4C66A%jguichar@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb> <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com> <CAA=duU0cjXbTxTCqaRetajxFaJVfq8Y-HySPDrR-0AN38Wq3Zw@mail.gmail.com> <4d65232a-d4a6-a11b-c765-635cb909edbd@joelhalpern.com> <CAA=duU0PujWB0LB=wxFauPqaqbf4kFsqkzAwtNn7r3MzBUdCqA@mail.gmail.com>
In-Reply-To: <CAA=duU0PujWB0LB=wxFauPqaqbf4kFsqkzAwtNn7r3MzBUdCqA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.98.43.179]
Content-Type: multipart/alternative; boundary="_000_D34786324C66Ajguicharciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/SxWmPmMEp6illHXRnP6lKiKHqIY>
Cc: "Elzur, Uri" <uri.elzur@intel.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 13:32:34 -0000

--_000_D34786324C66Ajguicharciscocom_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Hi Andy,

I think the key point is that NSH !=3D network overlay but rather utilizes =
a network overlay for packet transport between SFC network elements. The re=
ference is just an example of how a network overlay might deal with fragmen=
tation and is not a suggestion that NSH adopt that mechanism but rather mak=
es the point that it can utilize the existing network overlay mechanics.

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Andrew G. Malis" <agmalis@gmail.com<mailto:agmalis@gmail.com>>
Date: Thursday, April 28, 2016 at 8:17 AM
To: Joel Halpern Direct <jmh.direct@joelhalpern.com<mailto:jmh.direct@joelh=
alpern.com>>
Cc: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "mohame=
d.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>" <mohamed.bouca=
dair@orange.com<mailto:mohamed.boucadair@orange.com>>, "sfc@ietf.org<mailto=
:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>, Linda Dunbar <linda.du=
nbar@huawei.com<mailto:linda.dunbar@huawei.com>>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentatio=
n Consideration) of the draft-ietf-sfc-nsh-04.txt

Joel,

The diagrams in section 6 of RFC 6830 are control plane, not data plane. Th=
e data plane diagrams are in section 5.

But the overriding question is - without any fields in the NSH header to se=
quence fragments, how can the fragments be correctly reassembled?

Cheers,
Andy

On Wed, Apr 27, 2016 at 7:46 PM, Joel Halpern Direct <jmh.direct@joelhalper=
n.com<mailto:jmh.direct@joelhalpern.com>> wrote:
The LISP header does not have a fragment flag or fragment offset.  The diag=
rams in section 6 include the outer encapsulating header (the equivalent of=
 the transport header in SFC.)  Yes, the text is a little hard to follow in=
 this regard.  The LISP working group is going to be rewriting RFC 6830 as =
part of moving to standards track.

So there is no difference in this regard between NSH and LISP.

Yours,
Joel

On 4/27/16 7:02 PM, Andrew G. Malis wrote:
Joel et al,

All this talk about fragmentation prompted me to re-read section 6 of
the draft, which recommends (as option 3) using the procedures in
section 5.4 of RFC 6830 (presumably with the =93NSH header=94 replacing the
=93LISP header=94 in the description of the procedures in that section).

So that led me to read that section (and the LISP header definition in
section 5.1), and I see that LISP does fragmentation and reassembly
identically to IPv4, using the Fragment Offset field so that fragments
can be correctly reassembled in the proper order.

However, the NSH Header doesn=92t have a Fragment Offset field or any
other way to order the fragments.

So how can the procedures in Section 5.4 of 6830 be used?

Thanks,
Andy

On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern <jmh@joelhalpern.com<mailt=
o:jmh@joelhalpern.com>
<mailto:jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>> wrote:

    Both methods are valid, and both depend upon details of the
    underlying packet and the transport.  As such, I don't see why this
    document benefits from describing them, much less why it should mark
    one method as a "should".  Implementation details are likely to be
    more significant than any bit consumption difference between the two
    alternatives.

    Yours,
    Joel


    On 4/27/16 3:40 PM, Linda Dunbar wrote:

        I suggest adding the following paragraphs after the Bullet 3 of
        the Section 6 Fragmentation Consideration to make the process
        more clear and less controversial:


        --------------------------------

        RFC6830 describes the fragmentation method of breaking the
        original packet into two equal sub-frames and encapsulating
        [LISP Header + Transport header] to each sub-frame.

        If LISP fragmentation [RFC6830 Section 5.4] is used, the [SFC
        Header + Transport Header] will be added to each half frame (or
        the original data frame). As the Transport Header is terminated
        by the next SFF node's tunnel transport layer, the combined two
        sub-frames will have two SFC Headers.

        Therefore, the fragmentation for NSH encapsulated data frame
        should be done completely by the node tunnel transport layer,
        which should break the [SFC + original packet] into two equal
        sub-frames and each sub-frame being encapsulated with its
        respective tunnel header.  The next SFF node's tunnel transport
        layer should combine the two sub-frames before sending to the
        next node.

        ------------------------------------------------------


        By the way, there are to typo in the Section 6:
        3rd line: "In order the" =3D=3D> "In order to"
        Last line of Bullet 2: extra "the" in the "utilized to ensure
        the the required packet".


        Hope it helps.

        Linda



        -----Original Message-----
        From: mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.=
com>
        <mailto:mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orang=
e.com>>
        [mailto:mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orang=
e.com>
        <mailto:mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orang=
e.com>>]
        Sent: Wednesday, April 27, 2016 12:40 AM
        To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; sfc@ietf.org<mailto:=
sfc@ietf.org>
        <mailto:sfc@ietf.org<mailto:sfc@ietf.org>>
        Subject: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

        Hi Joel, all,

        Please see inline.

        Cheers,
        Med

            -----Message d'origine-----
            De : Joel M. Halpern [mailto:jmh@joelhalpern.com<mailto:jmh@joe=
lhalpern.com>
            <mailto:jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>] Envoy=
=E9 : mardi 26
            avril 2016 19:18 =C0 : Linda Dunbar; BOUCADAIR Mohamed
            IMT/OLN; Elzur,
            Uri; sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.org<mai=
lto:sfc@ietf.org>> Objet : Re: [sfc] WG
            last call for
            draft-ietf-sfc-nsh-04.txt

            With regard to Transport tunnel fragementation, that seems
            an issue
            for the transport protocol.  I don't actually object to a
            sentence,
            but it does not seem that it will accomplish anything.


        [Med] I would like to see some text added to the draft.


            With regard to packets fragmented by the source, I
            completely disagree
            with your assertion.  If an SFF were to reassemble the
            packets, that
            would be a violation of its job.


        [Med] I agree with you.

          There is no reason for an SFF to

            reassemble a packet fragmented by the source.  The
            classifier may have
            to do some interesting things in order to properly classify
            succeeding
            fragments, but that is an implementation issue (most commonly
            addressed with virtual reassembly, which doe snot delay the
            fragments.)  We don't specity that.


        [Med] Still, the external behavior of the classifier needs to be
        clear in the document. I don't find any text in the draft saying
        for instance that an NSH header must be present in all
        fragments. (There some processing that might be needed at the
        SFF to "do its job" with regards to fragments (receive out of
        order fragments + forwarding policy on the full packet).)


            If an SF needs to reassemble fragments to do its job, that
            is up to
            the SF.  Some will need to actually reassemble.  Some will
            need to
            perform virtual reassembly, and some will happily process the
            fragments.  I can not see what the NSH document could
            possibly mandate.


        [Med] Fully agree.


            Yours,
            Joel

            On 4/26/16 11:47 AM, Linda Dunbar wrote:

                Joel,

                I think the document should add the description on the
                following two
                fragmentation scenarios:

                - Transport tunnel generated fragmentation: When a packet
                fragmentation is caused by transport tunnel (i.e. various
                encapsulations), the termination point of the transport
                tunnel is
                responsible for re-assembling the fragmented pieces of
                the packet.
                Since there won't be any SFF nodes in between the
                Transport Tunnel,
                the tunnel generated fragmentation does not require any
                actions by
                SFF nodes or SF nodes.


                - Source node generated fragmentation (after adding on
                the NSH
                header): When fragmentation has to be performed for a
                packet being
                encapsulated with the NSH header, either the
                intermediate SFF nodes
                or the SF nodes have to be able to reassemble the
                fragmented pieces.




                Cheers,


                Linda

                -----Original Message----- From: Joel M. Halpern
                [mailto:jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>
                <mailto:jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>] S=
ent: Tuesday, April 26,
                2016 10:33 AM
                To: Linda Dunbar; mohamed.boucadair@orange.com<mailto:moham=
ed.boucadair@orange.com>
                <mailto:mohamed.boucadair@orange.com<mailto:mohamed.boucada=
ir@orange.com>>; Elzur, Uri;
                sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.org<mail=
to:sfc@ietf.org>> Subject: Re: [sfc] WG
                last call for
                draft-ietf-sfc-nsh-04.txt

                Re-reading your note, it is possible that you are
                referring only to
                the case of transport generated fragmentation of the
                outer packet.
                I had assumed you were not talking about that, since the
                resulting
                fragments will not all have NSH headers.  As with any tunne=
l
                technology, if the tunnel chooses to fragment at its
                layer, then the
                tunnel is responsible for reassembly.  That would be
                invisible to
                the SFF.

                Yours, Joel

                On 4/26/16 11:10 AM, Linda Dunbar wrote:

                    Agree with Med.

                    Even if each fragment piece of a packet with NSH
                    header carries the
                    NSH header, the intermediate SFF nodes still need to
                    put together
                    all the fragments together before passing the whole
                    data frame to
                    the SF.

                    Linda

                    -----Original Message----- From: sfc
                    [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.or=
g>
                    <mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.or=
g>>]
                    On Behalf Of mohamed.boucadair@orange.com<mailto:mohame=
d.boucadair@orange.com>
                    <mailto:mohamed.boucadair@orange.com<mailto:mohamed.bou=
cadair@orange.com>> Sent: Monday,
                    April 25,
                    2016 9:42 AM To: Elzur, Uri; Joel M. Halpern;
                    sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.org<=
mailto:sfc@ietf.org>> Subject:
                    Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

                    Re-,

                    How do you instruct the transport layer to ALWAYS
                    prepend an NSH
                    header even for fragments? Or you don't care about that=
?

                    Thank you.

                    Cheers, Med

                        -----Message d'origine----- De : Elzur, Uri
                        [mailto:uri.elzur@intel.com<mailto:uri.elzur@intel.=
com>
                        <mailto:uri.elzur@intel.com<mailto:uri.elzur@intel.=
com>>] Envoy=E9 : lundi 25
                        avril 2016 16:26 =C0
                        : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;
                        sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.=
org<mailto:sfc@ietf.org>> Objet
                        : RE: [sfc] WG last call for
                        draft-ietf-sfc-nsh-04.txt

                        Hi Med

                        Not to repeat my position, but I'll do it anyhow
                        :-) As NSH is
                        *NOT* a transport, dealing with fragmentation is
                        left to the
                        Transport used.

                        The model I use for NSH, is basically similar to
                        VXLAN . It is an
                        overly.

                        Thx

                        Uri ("Oo-Ree") C: 949-378-7568<tel:949-378-7568> <t=
el:949-378-7568<tel:949-378-7568>>


                        -----Original Message----- From: sfc
                        [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@iet=
f.org>
                        <mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@iet=
f.org>>]
                        On Behalf Of mohamed.boucadair@orange.com<mailto:mo=
hamed.boucadair@orange.com>
                        <mailto:mohamed.boucadair@orange.com<mailto:mohamed=
.boucadair@orange.com>> Sent:
                        Monday, April 25,
                        2016 7:18 AM To: Joel M. Halpern
                        <jmh@joelhalpern.com<mailto:jmh@joelhalpern.com> <m=
ailto:jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>>;
                        sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.=
org<mailto:sfc@ietf.org>>
                        Subject: Re: [sfc] WG last call for
                        draft-ietf-sfc-nsh-04.txt

                        Hi Joel,

                        Please see inline.

                        Cheers, Med

                            -----Message d'origine----- De : Joel M. Halper=
n
                            [mailto:jmh@joelhalpern.com<mailto:jmh@joelhalp=
ern.com>
                            <mailto:jmh@joelhalpern.com<mailto:jmh@joelhalp=
ern.com>>] Envoy=E9 : lundi
                            25 avril 2016 15:48 =C0
                            : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org<mailt=
o:sfc@ietf.org>
                            <mailto:sfc@ietf.org<mailto:sfc@ietf.org>> Obje=
t : Re: [sfc] WG
                            last call for draft-ietf-sfc-nsh-04.txt

                            If I am understanding you correctly Med, you
                            are asking that the
                            NSH draft specify how service chaining
                            should cope with packets
                            that have been fragmented?


                        [Med] To be accurate, I'm asking to assess
                        whether there are
                        implications. If there are, then the draft
                        should be updated
                        accordingly.

                            NSH, and the SFF functionality, does not care.


                        [Med] I'm not that sure. Some typical
                        implications are listed
                        below:

                        * SFF: If the NSH header is present only in the
                        a fragment but SFF
                        didn't maintained a state, subsequent fragments
                        won't be
                        appropriately processed. * SFC-aware function:
                        if prepending a
                        context information depends on the full packet,
                        not only a
                        fragment.

                        It just does its job.

                        [Med] which may be disturbed in some situations
                        as listed in the
                        examples above.

                            Ingress and intermediate classifiers may
                            cope with fragments in
                            any number of ways.

                        Specifying such is clearly out of scope for this
                        draft.

                        [Med] The purpose is not to specify the internal
                        implementation
                        details but the external behavior of the
                        classifier function when
                        it comes to handle fragments. That behavior may
                        have an incidence
                        on SFF, in particular. The purpose is not to
                        recommend the maximum
                        resources to be dedicated to out of order
                        fragments nor the
                        timeout to cache those; these considerations are
                        of course out of
                        scope. Nevertheless, an implementation should
                        offer a configurable
                        parameter so that an operator tweak those
                        according to its
                        context.

                            I suppose one could write an informational
                            draft on possible ways
                            of coping.  The IETF has not usually
                            published such.
                            Service functions have to cope with
                            fragmented packets just as
                            they had to before the advent of NSH, so
                            describing that is
                            clearly not needed here.


                        [Med] The advent of NSH has the following
                        implications: * it
                        exacerbates fragmentation. Handing over this
                        issue to the
                        transport layer may lead to interoperability
                        issues. * the
                        chaining may not be efficient if fragments are
                        inappropriately
                        handled.

                        Introducing NSH should not degrade the overall
                        service compared to
                        legacy service deployment schemes.


                            Yours, Joel

                            On 4/25/16 3:00 AM,
                            mohamed.boucadair@orange.com<mailto:mohamed.bou=
cadair@orange.com>
                            <mailto:mohamed.boucadair@orange.com<mailto:moh=
amed.boucadair@orange.com>> wrote:

                                Re-,

                                I hear you, but my comment is that we
                                need, as a WG, to decide
                                what to

                            put in the draft. FWIW, I'm discussing two
                            fragmentation
                            issues:


                                (1) Fragmentation that is caused by
                                prepending an SFC header.
                                (2) Handling fragments at the ingress of
                                an SFC-enabled domain.

                                Increasing the MTU is for sure a
                                recommendation is to be
                                explicitly

                            called out in the text (see my first message).


                                There are other issues that need to be
                                discussed, e.g., how to
                                deal with

                            fragments in SFFs/Classifiers?


                                It is also "prudent" to check that no
                                issues will be experienced
                                in SFF

                            to handle fragments. If an SFC header is
                            prepended for all
                            fragments, I'm not sure there

                                is any particular issue at the SFF
                                level, except if
                                stripping/adding

                            context TLVs depends on the full packet (not
                            just fragment). It
                            is warranted to consider a little bit this
                            point before declaring
                            there is no issue.


                                For point (1), declaring fragmentation
                                out of scope would be
                                meant that

                            an implementation must be prepared to
                            receive fragments with or
                            without NSH header as this is a decision
                            that is left to the
                            transport encapsulation. This is a
                            requirement per se!


                                I won't reiterate all the comments I
                                have about the current
                                wording of

                            this section.


                                Cheers, Med

                                    -----Message d'origine----- De :
                                    Elzur, Uri
                                    [mailto:uri.elzur@intel.com<mailto:uri.=
elzur@intel.com>
                                    <mailto:uri.elzur@intel.com<mailto:uri.=
elzur@intel.com>>] Envoy=E9
                                    : lundi 25 avril 2016
                                    08:30 =C0 : BOUCADAIR Mohamed IMT/OLN;
                                    Thomas Narten;
                                    sfc@ietf.org<mailto:sfc@ietf.org> <mail=
to:sfc@ietf.org<mailto:sfc@ietf.org>>
                                    Objet : RE: [sfc] WG last call for
                                    draft-ietf-sfc-nsh-04.txt

                                    Hi Med

                                    My point is that Fragmentation is
                                    yet another transport related
                                    issue

                            that

                                    is beyond the scope of NSH and
                                    beyond the charter of the WG, so
                                    it

                            doesn't

                                    really belong in the draft. We are
                                    providing an advice as
                                    extending the size of the packet may
                                    lead to fragmentation, but
                                    as you check RFC 7348 VxLAN, which
                                    my create the same issue,
                                    you'll find it doesn't even

                            relate

                                    to it.

                                    Thx

                                    Uri ("Oo-Ree") C: 949-378-7568<tel:949-=
378-7568>
                                    <tel:949-378-7568<tel:949-378-7568>>


                                    -----Original Message----- From: sfc
                                    [mailto:sfc-bounces@ietf.org<mailto:sfc=
-bounces@ietf.org>
                                    <mailto:sfc-bounces@ietf.org<mailto:sfc=
-bounces@ietf.org>>] On
                                    Behalf Of
                                    mohamed.boucadair@orange.com<mailto:moh=
amed.boucadair@orange.com>
                                    <mailto:mohamed.boucadair@orange.com<ma=
ilto:mohamed.boucadair@orange.com>> Sent:
                                    Sunday, April 24, 2016
                                    10:32 PM To: Elzur, Uri
                                    <uri.elzur@intel.com<mailto:uri.elzur@i=
ntel.com>
                                    <mailto:uri.elzur@intel.com<mailto:uri.=
elzur@intel.com>>>;
                                    Thomas Narten

                            <narten@us.ibm.com<mailto:narten@us.ibm.com> <m=
ailto:narten@us.ibm.com<mailto:narten@us.ibm.com>>>;

                                    sfc@ietf.org<mailto:sfc@ietf.org> <mail=
to:sfc@ietf.org<mailto:sfc@ietf.org>>
                                    Subject: Re: [sfc] WG last call for
                                    draft-ietf-sfc-nsh-04.txt

                                    Hi Uri,

                                    That's another option that needs to
                                    be discussed/investigated.
                                    I'm

                            afraid

                                    this is not the rationale adopted in
                                    -04 since it includes some
                                    text

                            that

                                    is far to be sufficient to ensure
                                    interoperable
                                    implementations.

                                    BTW, saying that nsh does not need
                                    to deal with fragmentation
                                    because

                            it

                                    is transport-independent is not IMHO
                                    a good strategy to adopt
                                    here

                            because

                                    it opens the door for interoperable
                                    issues, it may lead to
                                    sub-optimal implementations if the
                                    sfc information is present
                                    only in one

                            fragments,

                                    etc.

                                    My comments are related to the
                                    current text in the -04.
                                    This text needs

                            to

                                    be fixed somehow.

                                    Cheers, Med

                                        -----Message d'origine----- De :
                                        Elzur, Uri
                                        [mailto:uri.elzur@intel.com<mailto:=
uri.elzur@intel.com>
                                        <mailto:uri.elzur@intel.com<mailto:=
uri.elzur@intel.com>>]
                                        Envoy=E9 : dimanche 24 avril
                                        2016 17:36 =C0 : BOUCADAIR Mohamed
                                        IMT/OLN; Thomas Narten;
                                        sfc@ietf.org<mailto:sfc@ietf.org>
                                        <mailto:sfc@ietf.org<mailto:sfc@iet=
f.org>> Objet :
                                        RE: [sfc] WG last call for
                                        draft-ietf-sfc-nsh-04.txt

                                        Hi Med

                                        I see no need to specify the
                                        exact behavior as NSH is
                                        transport independent i.e. like
                                        NSH interaction with any other
                                        Transport eh issue of
                                        Fragmentation is to be dealt in
                                        a way
                                        that matches the mechanisms
                                        supported by the Transport used
                                        and do not belong in the NSH draft

                                        Thx

                                        Uri ("Oo-Ree") C: 949-378-7568<tel:=
949-378-7568>
                                        <tel:949-378-7568<tel:949-378-7568>=
>


                                        -----Original Message----- From: sf=
c
                                        [mailto:sfc-bounces@ietf.org<mailto=
:sfc-bounces@ietf.org>
                                        <mailto:sfc-bounces@ietf.org<mailto=
:sfc-bounces@ietf.org>>]
                                        On Behalf Of
                                        mohamed.boucadair@orange.com<mailto=
:mohamed.boucadair@orange.com>
                                        <mailto:mohamed.boucadair@orange.co=
m<mailto:mohamed.boucadair@orange.com>>
                                        Sent: Thursday, April 14,
                                        2016 12:43 AM To: Thomas Narten
                                        <narten@us.ibm.com<mailto:narten@us=
.ibm.com>
                                        <mailto:narten@us.ibm.com<mailto:na=
rten@us.ibm.com>>>;
                                        sfc@ietf.org<mailto:sfc@ietf.org>
                                        <mailto:sfc@ietf.org<mailto:sfc@iet=
f.org>> Subject:
                                        Re: [sfc] WG last call for
                                        draft-ietf-sfc-nsh-04.txt

                                        R-,

                                        In addition to other pending
                                        issues raised for this draft, I
                                        would like to raise this
                                        additional one about Section 6.

                                        =3D=3D 6.  Fragmentation Considerat=
ions

                                        NSH and the associated transport
                                        header are "added" to the
                                        encapsulated packet/frame.  This
                                        additional information
                                        increases

                            the

                                        size of the packet.  In order
                                        the ensure proper forwarding of
                                        NSH data, several options for
                                        handling fragmentation and
                                        re-assembly exist:

                                        1.  Jumbo Frames, when
                                        supported, enable the transport
                                        of NSH
                                        and associated transport packets
                                        without requiring
                                        fragmentation.

                                        2.  Path MTU Discovery
                                        [RFC1191]"describes a technique for
                                        dynamically discovering the
                                        maximum transmission unit (MTU) of

                            an

                                        arbitrary internet path" and can
                                        be utilized to ensure the

                        the

                                        required packet size is used.

                                        3.  [RFC6830] describes two
                                        schemes for fragmentation and
                                        re-

                            assembly

                                        in section 5.4. =3D=3D

                                        * The text is weak for a
                                        Standard track document that is
                                        intended to solve the problem in
                                        https://tools.ietf.org/html/rfc7498=
#section-

                        2.12.

                                        There should be a clear behavior
                                        to be followed by an

                        implementation.

                                        Further, I would avoid the use
                                        of words such as "can".

                                        * The text covers only
                                        fragmentation when it is induced
                                        by SFC
                                        operations, it does not discuss
                                        the treatment of a fragment
                                        when received in an SFC domain.
                                        IMHO, the draft should also
                                        specify the behavior of the
                                        Classifier with regards to
                                        fragments for the sake of proper
                                        SFC operation. Applying
                                        classification policies may
                                        require the

                                    full packet, not only a fragment.

                                        In particular, dedicated
                                        resources should dedicated for
                                        handling out of order fragments.
                                        Of course, it is out of scope
                                        of this document to describe how
                                        SFs handle fragments.

                                        * If an SFC header is prepended
                                        for all fragments, I'm not
                                        sure there is any particular
                                        issue at the SFF level...except
                                        if stripping/adding context TLVs
                                        depends on the full packet
                                        (not just fragment). It is
                                        warranted to consider a little bit
                                        this point before declaring there

                            is

                                    no issue.


                                        * The text states "several
                                        options". This may be interpreted
                                        as if implementing one of them
                                        is sufficient...which is not
                                        true. The first two points
                                        contribute to minimize the
                                        fragmentation risk, but
                                        fragmentation may still be
                                        experienced
                                        (e.g., other shims are prepended
                                        by other nodes for some other
                                        purposes, nested nsh, etc.)

                                        * The first two points have
                                        nothing to do with reassembly.

                                        * The support of jumbo frames by
                                        a router/device does not mean
                                        that it can make use of it.
                                        Appropriate MTU configuration
                                        should be undertaken in a
                                        consistent manner within an SFC
                                        domain. The text should be
                                        updated to make it is about
                                        (consistent) MTU

                        configuration.


                                        * BTW, shouldn't the text be
                                        reworded to recommended to
                                        increase the MTU of **all
                                        nodes** of an SFC-enabled domain by
                                        at least the length of SFC
                                        header + transport header?

                                        * Bullet 2, how PMTU discovery
                                        is actually used in this
                                        context? Do you assume that all
                                        SFC-aware nodes will issue
                                        such messages towards other
                                        SFC-aware node, arbitrary
                                        destination, else?

                                        * Bullet 2, I would drop
                                        "describes a technique for
                                        dynamically discovering the
                                        maximum transmission unit
                                        (MTU) of an arbitrary internet
                                        path".

                                        * Bullet 2, s/ the the/the.

                                        * The reference to the LISP
                                        specification raises two concerns
                                        and one comment:

                                        (1) I don't think it is a good
                                        approach that fragments induced
                                        by the network are passed to
                                        their ultimate destinations as
                                        such

                        (stateless).

                                        IMO, reassembly should be done
                                        within the SFC domain
                                        (responsible for fragmentation)
                                        not passed away. (2) Does the
                                        stateful mode require all SFC
                                        data plane elements maintain a
                                        full list of MTU for the any
                                        SFF/SF instance of the SFC

                                    domain?


                                        The current text suggests that
                                        [RFC6830] should be listed as
                                        normative reference (not an
                                        informative one). I would
                                        personally favor removing the
                                        reference to LISP (as it is an
                                        Experimental RFC).

                                        * The security section of the
                                        draft may be augmented with
                                        informational
                                        fragmentation-related pointers to:
                                        e.g., RFC1858 (Security
                                        Considerations for IP Fragment
                                        Filtering), RFC3128 (Protection
                                        Against a Variant of the Tiny
                                        Fragment Attack), and RFC 4963
                                        (IPv4 Reassembly Errors at High
                                        Data Rates).

                                        Cheers, Med

                                            -----Message d'origine-----
                                            De : sfc
                                            [mailto:sfc-bounces@ietf.org<ma=
ilto:sfc-bounces@ietf.org>
                                            <mailto:sfc-bounces@ietf.org<ma=
ilto:sfc-bounces@ietf.org>>]
                                            De la part de
                                            mohamed.boucadair@orange.com<ma=
ilto:mohamed.boucadair@orange.com>
                                            <mailto:mohamed.boucadair@orang=
e.com<mailto:mohamed.boucadair@orange.com>>
                                            Envoy=E9 : lundi 11 avril
                                            2016 13:14 =C0 : Thomas
                                            Narten; sfc@ietf.org<mailto:sfc=
@ietf.org>
                                            <mailto:sfc@ietf.org<mailto:sfc=
@ietf.org>> Objet
                                            : Re:
                                            [sfc] WG last call for
                                            draft-ietf-sfc-nsh-04.txt

                                            Dear Thomas, all,

                                            As I mentioned during the
                                            meeting, there are several
                                            issues
                                            that are not covered in the
                                            last version of the draft. I
                                            already provided examples of
                                            the issues offline as requested
                                            by Martin.

                                            Cheers, Med

                                                -----Message
                                                d'origine----- De : sfc
                                                [mailto:sfc-bounces@ietf.or=
g<mailto:sfc-bounces@ietf.org>
                                                <mailto:sfc-bounces@ietf.or=
g<mailto:sfc-bounces@ietf.org>>]
                                                De la part de Thomas Narten
                                                Envoy=E9 : jeudi 31 mars
                                                2016 04:48 =C0 :
                                                sfc@ietf.org<mailto:sfc@iet=
f.org>
                                                <mailto:sfc@ietf.org<mailto=
:sfc@ietf.org>>
                                                Objet : [sfc] WG last
                                                call for
                                                draft-ietf-sfc-nsh-04.txt

                                                Dear WG:

                                                This note begins a WG
                                                last call on
                                                draft-ietf-sfc-nsh-04.txt
                                                (https://datatracker.ietf.o=
rg/doc/draft-ietf-sfc-nsh/).



            The editors of the NSH document have indicated that they have

                                                addressed all known
                                                comments and that there
                                                are no open
                                                issues with the current
                                                version of the document.

                                                Substantive comments to
                                                the list please,
                                                editorial comments
                                                can go directly to the
                                                document editors.

                                                We'll also get a brief
                                                update from the editors
                                                at next
                                                week's meeting. If there
                                                are any remaining issues
                                                with the
                                                document, raising them
                                                before the meeting would be
                                                especially helpful.

                                                For the chairs, Thomas

                                                ___________________________=
____________________
                                                sfc mailing
                                                list sfc@ietf.org<mailto:sf=
c@ietf.org>
                                                <mailto:sfc@ietf.org<mailto=
:sfc@ietf.org>>
                                                https://www.ietf.org/mailma=
n/listinfo/sfc


                                            _______________________________=
________________
                                            sfc mailing
                                            list sfc@ietf.org<mailto:sfc@ie=
tf.org>
                                            <mailto:sfc@ietf.org<mailto:sfc=
@ietf.org>>
                                            https://www.ietf.org/mailman/li=
stinfo/sfc


                                        ___________________________________=
____________
                                        sfc mailing
                                        list sfc@ietf.org<mailto:sfc@ietf.o=
rg>
                                        <mailto:sfc@ietf.org<mailto:sfc@iet=
f.org>>
                                        https://www.ietf.org/mailman/listin=
fo/sfc


                                    _______________________________________=
________
                                    sfc mailing


--_000_D34786324C66Ajguicharciscocom_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <51CC8F4E024A9A46AF1B627BFFFD8B92@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif;">
<div>Hi Andy,</div>
<div><br>
</div>
<div>I think the key point is that NSH !=3D network overlay but rather util=
izes a<span style=3D"font-weight: bold;">&nbsp;</span>network overlay for p=
acket transport between SFC network elements. The reference is just an exam=
ple of how a network overlay might deal with
 fragmentation and is not a suggestion that NSH adopt that mechanism but ra=
ther makes the point that it can utilize the existing network overlay mecha=
nics.&nbsp;</div>
<div><br>
</div>
<div>Jim</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>sfc &lt;<a href=3D"mailto:sfc=
-bounces@ietf.org">sfc-bounces@ietf.org</a>&gt; on behalf of &quot;Andrew G=
. Malis&quot; &lt;<a href=3D"mailto:agmalis@gmail.com">agmalis@gmail.com</a=
>&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Thursday, April 28, 2016 at 8=
:17 AM<br>
<span style=3D"font-weight:bold">To: </span>Joel Halpern Direct &lt;<a href=
=3D"mailto:jmh.direct@joelhalpern.com">jmh.direct@joelhalpern.com</a>&gt;<b=
r>
<span style=3D"font-weight:bold">Cc: </span>&quot;Elzur, Uri&quot; &lt;<a h=
ref=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>&gt;, &quot;<a hr=
ef=3D"mailto:mohamed.boucadair@orange.com">mohamed.boucadair@orange.com</a>=
&quot; &lt;<a href=3D"mailto:mohamed.boucadair@orange.com">mohamed.boucadai=
r@orange.com</a>&gt;,
 &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &lt;<a href=
=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;, Linda Dunbar &lt;<a href=3D"=
mailto:linda.dunbar@huawei.com">linda.dunbar@huawei.com</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>Re: [sfc] Suggested wordin=
g addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-=
sfc-nsh-04.txt<br>
</div>
<div><br>
</div>
<div>
<div>
<div dir=3D"ltr">Joel,
<div><br>
</div>
<div>The diagrams in section 6 of RFC 6830 are control plane, not data plan=
e. The data plane diagrams are in section 5.</div>
<div><br>
</div>
<div>But the overriding question is - without any fields in the NSH header =
to sequence fragments, how can the fragments be correctly reassembled?</div=
>
<div><br>
</div>
<div>Cheers,</div>
<div>Andy</div>
<div><br>
</div>
<div class=3D"gmail_extra">
<div class=3D"gmail_quote">On Wed, Apr 27, 2016 at 7:46 PM, Joel Halpern Di=
rect <span dir=3D"ltr">
&lt;<a href=3D"mailto:jmh.direct@joelhalpern.com" target=3D"_blank">jmh.dir=
ect@joelhalpern.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
The LISP header does not have a fragment flag or fragment offset.&nbsp; The=
 diagrams in section 6 include the outer encapsulating header (the equivale=
nt of the transport header in SFC.)&nbsp; Yes, the text is a little hard to=
 follow in this regard.&nbsp; The LISP working
 group is going to be rewriting RFC 6830 as part of moving to standards tra=
ck.<br>
<br>
So there is no difference in this regard between NSH and LISP.<br>
<br>
Yours,<br>
Joel<br>
<br>
On 4/27/16 7:02 PM, Andrew G. Malis wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
Joel et al,<br>
<br>
All this talk about fragmentation prompted me to re-read section 6 of<br>
the draft, which recommends (as option 3) using the procedures in<br>
section 5.4 of RFC 6830 (presumably with the =93NSH header=94 replacing the=
<br>
=93LISP header=94 in the description of the procedures in that section).<br=
>
<br>
So that led me to read that section (and the LISP header definition in<br>
section 5.1), and I see that LISP does fragmentation and reassembly<br>
identically to IPv4, using the Fragment Offset field so that fragments<br>
can be correctly reassembled in the proper order.<br>
<br>
However, the NSH Header doesn=92t have a Fragment Offset field or any<br>
other way to order the fragments.<br>
<br>
So how can the procedures in Section 5.4 of 6830 be used?<br>
<br>
Thanks,<br>
Andy<br>
<br>
On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern &lt;<a href=3D"mailto:jmh@=
joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a><br>
&lt;mailto:<a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joe=
lhalpern.com</a>&gt;&gt; wrote:<br>
<br>
&nbsp; &nbsp; Both methods are valid, and both depend upon details of the<b=
r>
&nbsp; &nbsp; underlying packet and the transport.&nbsp; As such, I don't s=
ee why this<br>
&nbsp; &nbsp; document benefits from describing them, much less why it shou=
ld mark<br>
&nbsp; &nbsp; one method as a &quot;should&quot;.&nbsp; Implementation deta=
ils are likely to be<br>
&nbsp; &nbsp; more significant than any bit consumption difference between =
the two<br>
&nbsp; &nbsp; alternatives.<br>
<br>
&nbsp; &nbsp; Yours,<br>
&nbsp; &nbsp; Joel<br>
<br>
<br>
&nbsp; &nbsp; On 4/27/16 3:40 PM, Linda Dunbar wrote:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; I suggest adding the following paragraphs after=
 the Bullet 3 of<br>
&nbsp; &nbsp; &nbsp; &nbsp; the Section 6 Fragmentation Consideration to ma=
ke the process<br>
&nbsp; &nbsp; &nbsp; &nbsp; more clear and less controversial:<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; --------------------------------<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; RFC6830 describes the fragmentation method of b=
reaking the<br>
&nbsp; &nbsp; &nbsp; &nbsp; original packet into two equal sub-frames and e=
ncapsulating<br>
&nbsp; &nbsp; &nbsp; &nbsp; [LISP Header &#43; Transport header] to each su=
b-frame.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; If LISP fragmentation [RFC6830 Section 5.4] is =
used, the [SFC<br>
&nbsp; &nbsp; &nbsp; &nbsp; Header &#43; Transport Header] will be added to=
 each half frame (or<br>
&nbsp; &nbsp; &nbsp; &nbsp; the original data frame). As the Transport Head=
er is terminated<br>
&nbsp; &nbsp; &nbsp; &nbsp; by the next SFF node's tunnel transport layer, =
the combined two<br>
&nbsp; &nbsp; &nbsp; &nbsp; sub-frames will have two SFC Headers.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Therefore, the fragmentation for NSH encapsulat=
ed data frame<br>
&nbsp; &nbsp; &nbsp; &nbsp; should be done completely by the node tunnel tr=
ansport layer,<br>
&nbsp; &nbsp; &nbsp; &nbsp; which should break the [SFC &#43; original pack=
et] into two equal<br>
&nbsp; &nbsp; &nbsp; &nbsp; sub-frames and each sub-frame being encapsulate=
d with its<br>
&nbsp; &nbsp; &nbsp; &nbsp; respective tunnel header.&nbsp; The next SFF no=
de's tunnel transport<br>
&nbsp; &nbsp; &nbsp; &nbsp; layer should combine the two sub-frames before =
sending to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; next node.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; -----------------------------------------------=
-------<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; By the way, there are to typo in the Section 6:=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; 3rd line: &quot;In order the&quot; =3D=3D&gt; &=
quot;In order to&quot;<br>
&nbsp; &nbsp; &nbsp; &nbsp; Last line of Bullet 2: extra &quot;the&quot; in=
 the &quot;utilized to ensure<br>
&nbsp; &nbsp; &nbsp; &nbsp; the the required packet&quot;.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Hope it helps.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Linda<br>
<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; -----Original Message-----<br>
&nbsp; &nbsp; &nbsp; &nbsp; From: <a href=3D"mailto:mohamed.boucadair@orang=
e.com" target=3D"_blank">mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:mohamed.boucadair@=
orange.com" target=3D"_blank">mohamed.boucadair@orange.com</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a href=3D"mailto:mohamed.boucadair@ora=
nge.com" target=3D"_blank">mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:mohamed.boucadair@=
orange.com" target=3D"_blank">mohamed.boucadair@orange.com</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; Sent: Wednesday, April 27, 2016 12:40 AM<br>
&nbsp; &nbsp; &nbsp; &nbsp; To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; =
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" targ=
et=3D"_blank">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; Subject: RE: [sfc] WG last call for draft-ietf-=
sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Hi Joel, all,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Please see inline.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Cheers,<br>
&nbsp; &nbsp; &nbsp; &nbsp; Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Message d'origine-----<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; De : Joel M. Halpern [mailto:<a h=
ref=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a=
><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:jmh@=
joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a>&gt;] Envoy=E9 : =
mardi 26<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; avril 2016 19:18 =C0 : Linda Dunb=
ar; BOUCADAIR Mohamed<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; IMT/OLN; Elzur,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Uri; <a href=3D"mailto:sfc@ietf.o=
rg" target=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@iet=
f.org" target=3D"_blank">sfc@ietf.org</a>&gt; Objet : Re: [sfc] WG<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; With regard to Transport tunnel f=
ragementation, that seems<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; an issue<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; for the transport protocol.&nbsp;=
 I don't actually object to a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sentence,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; but it does not seem that it will=
 accomplish anything.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; [Med] I would like to see some text added to th=
e draft.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; With regard to packets fragmented=
 by the source, I<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; completely disagree<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; with your assertion.&nbsp; If an =
SFF were to reassemble the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; packets, that<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; would be a violation of its job.<=
br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; [Med] I agree with you.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; There is no reason for an SFF to<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; reassemble a packet fragmented by=
 the source.&nbsp; The<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; classifier may have<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; to do some interesting things in =
order to properly classify<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; succeeding<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragments, but that is an impleme=
ntation issue (most commonly<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; addressed with virtual reassembly=
, which doe snot delay the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragments.)&nbsp; We don't specit=
y that.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; [Med] Still, the external behavior of the class=
ifier needs to be<br>
&nbsp; &nbsp; &nbsp; &nbsp; clear in the document. I don't find any text in=
 the draft saying<br>
&nbsp; &nbsp; &nbsp; &nbsp; for instance that an NSH header must be present=
 in all<br>
&nbsp; &nbsp; &nbsp; &nbsp; fragments. (There some processing that might be=
 needed at the<br>
&nbsp; &nbsp; &nbsp; &nbsp; SFF to &quot;do its job&quot; with regards to f=
ragments (receive out of<br>
&nbsp; &nbsp; &nbsp; &nbsp; order fragments &#43; forwarding policy on the =
full packet).)<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; If an SF needs to reassemble frag=
ments to do its job, that<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is up to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the SF.&nbsp; Some will need to a=
ctually reassemble.&nbsp; Some will<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; need to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; perform virtual reassembly, and s=
ome will happily process the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragments.&nbsp; I can not see wh=
at the NSH document could<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; possibly mandate.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; [Med] Fully agree.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Yours,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Joel<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; On 4/26/16 11:47 AM, Linda Dunbar=
 wrote:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Joel,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I think the documen=
t should add the description on the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; following two<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentation scena=
rios:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; - Transport tunnel =
generated fragmentation: When a packet<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentation is ca=
used by transport tunnel (i.e. various<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; encapsulations), th=
e termination point of the transport<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; tunnel is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; responsible for re-=
assembling the fragmented pieces of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the packet.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Since there won't b=
e any SFF nodes in between the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Transport Tunnel,<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the tunnel generate=
d fragmentation does not require any<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; actions by<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFF nodes or SF nod=
es.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; - Source node gener=
ated fragmentation (after adding on<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the NSH<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; header): When fragm=
entation has to be performed for a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; packet being<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; encapsulated with t=
he NSH header, either the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; intermediate SFF no=
des<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; or the SF nodes hav=
e to be able to reassemble the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmented pieces.<=
br>
<br>
<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Cheers,<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Linda<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Original Messa=
ge----- From: Joel M. Halpern<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a href=3D"=
mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=
=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a>&g=
t;] Sent: Tuesday, April 26,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2016 10:33 AM<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; To: Linda Dunbar; <=
a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=
=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">mohamed.boucadai=
r@orange.com</a>&gt;; Elzur, Uri;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D"mailto:s=
fc@ietf.org" target=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailt=
o:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt; Subject: Re: [sfc] W=
G<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf-sfc-nsh-=
04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Re-reading your not=
e, it is possible that you are<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; referring only to<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the case of transpo=
rt generated fragmentation of the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; outer packet.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I had assumed you w=
ere not talking about that, since the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; resulting<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragments will not =
all have NSH headers.&nbsp; As with any tunnel<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; technology, if the =
tunnel chooses to fragment at its<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; layer, then the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; tunnel is responsib=
le for reassembly.&nbsp; That would be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; invisible to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the SFF.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Yours, Joel<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; On 4/26/16 11:10 AM=
, Linda Dunbar wrote:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Agree=
 with Med.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Even =
if each fragment piece of a packet with NSH<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; heade=
r carries the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; NSH h=
eader, the intermediate SFF nodes still need to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; put t=
ogether<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; all t=
he fragments together before passing the whole<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; data =
frame to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the S=
F.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Linda=
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----=
Original Message----- From: sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mail=
to:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ie=
tf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;m=
ailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces=
@ietf.org</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; On Be=
half Of <a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;m=
ailto:<a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">moh=
amed.boucadair@orange.com</a>&gt; Sent: Monday,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; April=
 25,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2016 =
9:42 AM To: Elzur, Uri; Joel M. Halpern;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a hr=
ef=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a=
 href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt; Subjec=
t:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Re: [=
sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Re-,<=
br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; How d=
o you instruct the transport layer to ALWAYS<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; prepe=
nd an NSH<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; heade=
r even for fragments? Or you don't care about that?<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Thank=
 you.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Cheer=
s, Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; -----Message d'origine----- De : Elzur, Uri<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [mailto:<a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank">u=
ri.elzur@intel.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &lt;mailto:<a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank=
">uri.elzur@intel.com</a>&gt;] Envoy=E9 : lundi 25<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; avril 2016 16:26 =C0<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>=
 &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org<=
/a>&gt; Objet<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; : RE: [sfc] WG last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Hi Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Not to repeat my position, but I'll do it anyhow<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; :-) As NSH is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; *NOT* a transport, dealing with fragmentation is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; left to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Transport used.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; The model I use for NSH, is basically similar to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; VXLAN . It is an<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; overly.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Thx<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Uri (&quot;Oo-Ree&quot;) C: <a href=3D"tel:949-378-7568" value=3D"=
&#43;19493787568" target=3D"_blank">
949-378-7568</a> &lt;tel:<a href=3D"tel:949-378-7568" value=3D"&#43;1949378=
7568" target=3D"_blank">949-378-7568</a>&gt;<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; -----Original Message----- From: sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">=
sfc-bounces@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &lt;mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blan=
k">sfc-bounces@ietf.org</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; On Behalf Of <a href=3D"mailto:mohamed.boucadair@orange.com" targe=
t=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &lt;mailto:<a href=3D"mailto:mohamed.boucadair@orange.com" target=
=3D"_blank">mohamed.boucadair@orange.com</a>&gt; Sent:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Monday, April 25,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; 2016 7:18 AM To: Joel M. Halpern<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &lt;<a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@j=
oelhalpern.com</a> &lt;mailto:<a href=3D"mailto:jmh@joelhalpern.com" target=
=3D"_blank">jmh@joelhalpern.com</a>&gt;&gt;;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>=
 &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org<=
/a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Subject: Re: [sfc] WG last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Hi Joel,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Please see inline.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Cheers, Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; -----Message d'origine----- De : Joel M. Halpern<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; [mailto:<a href=3D"mailto:jmh@joelhalpern.com" targe=
t=3D"_blank">jmh@joelhalpern.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:jmh@joelhalpern.com" ta=
rget=3D"_blank">jmh@joelhalpern.com</a>&gt;] Envoy=E9 : lundi<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; 25 avril 2016 15:48 =C0<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; : BOUCADAIR Mohamed IMT/OLN; <a href=3D"mailto:sfc@i=
etf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D=
"_blank">sfc@ietf.org</a>&gt; Objet : Re: [sfc] WG<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; last call for draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; If I am understanding you correctly Med, you<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; are asking that the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; NSH draft specify how service chaining<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; should cope with packets<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; that have been fragmented?<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [Med] To be accurate, I'm asking to assess<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; whether there are<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; implications. If there are, then the draft<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; should be updated<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; accordingly.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; NSH, and the SFF functionality, does not care.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [Med] I'm not that sure. Some typical<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; implications are listed<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; below:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; * SFF: If the NSH header is present only in the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; a fragment but SFF<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; didn't maintained a state, subsequent fragments<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; won't be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; appropriately processed. * SFC-aware function:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; if prepending a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; context information depends on the full packet,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; not only a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; fragment.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; It just does its job.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [Med] which may be disturbed in some situations<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; as listed in the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; examples above.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; Ingress and intermediate classifiers may<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; cope with fragments in<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; any number of ways.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Specifying such is clearly out of scope for this<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; draft.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [Med] The purpose is not to specify the internal<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; implementation<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; details but the external behavior of the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; classifier function when<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; it comes to handle fragments. That behavior may<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; have an incidence<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; on SFF, in particular. The purpose is not to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; recommend the maximum<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; resources to be dedicated to out of order<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; fragments nor the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; timeout to cache those; these considerations are<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; of course out of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; scope. Nevertheless, an implementation should<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; offer a configurable<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; parameter so that an operator tweak those<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; according to its<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; context.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; I suppose one could write an informational<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; draft on possible ways<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; of coping.&nbsp; The IETF has not usually<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; published such.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; Service functions have to cope with<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; fragmented packets just as<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; they had to before the advent of NSH, so<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; describing that is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; clearly not needed here.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [Med] The advent of NSH has the following<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; implications: * it<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; exacerbates fragmentation. Handing over this<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; issue to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; transport layer may lead to interoperability<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; issues. * the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; chaining may not be efficient if fragments are<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; inappropriately<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; handled.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Introducing NSH should not degrade the overall<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; service compared to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; legacy service deployment schemes.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; Yours, Joel<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; On 4/25/16 3:00 AM,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; <a href=3D"mailto:mohamed.boucadair@orange.com" targ=
et=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:mohamed.boucadair@orang=
e.com" target=3D"_blank">mohamed.boucadair@orange.com</a>&gt; wrote:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Re-,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I hear you, but my comment is that we<=
br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; need, as a WG, to decide<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; what to<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; put in the draft. FWIW, I'm discussing two<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; fragmentation<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; issues:<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (1) Fragmentation that is caused by<br=
>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; prepending an SFC header.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (2) Handling fragments at the ingress =
of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; an SFC-enabled domain.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Increasing the MTU is for sure a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; recommendation is to be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; explicitly<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; called out in the text (see my first message).<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; There are other issues that need to be=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; discussed, e.g., how to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; deal with<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; fragments in SFFs/Classifiers?<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; It is also &quot;prudent&quot; to chec=
k that no<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; issues will be experienced<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; in SFF<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; to handle fragments. If an SFC header is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; prepended for all<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; fragments, I'm not sure there<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is any particular issue at the SFF<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; level, except if<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; stripping/adding<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; context TLVs depends on the full packet (not<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; just fragment). It<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; is warranted to consider a little bit this<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; point before declaring<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; there is no issue.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; For point (1), declaring fragmentation=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; out of scope would be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; meant that<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; an implementation must be prepared to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; receive fragments with or<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; without NSH header as this is a decision<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; that is left to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; transport encapsulation. This is a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; requirement per se!<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I won't reiterate all the comments I<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; have about the current<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; wording of<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; this section.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Cheers, Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Message d'origine--=
--- De :<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Elzur, Uri<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a href=3D"mailt=
o:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"ma=
ilto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel.com</a>&gt;] En=
voy=E9<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : lundi 25 avril 2016<br=
>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 08:30 =C0 : BOUCADAIR Mo=
hamed IMT/OLN;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Thomas Narten;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D"mailto:sfc@ie=
tf.org" target=3D"_blank">
sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blan=
k">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Objet : RE: [sfc] WG las=
t call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf-sfc-nsh-04.tx=
t<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Hi Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; My point is that Fragmen=
tation is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; yet another transport re=
lated<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; issue<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; that<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is beyond the scope of N=
SH and<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; beyond the charter of th=
e WG, so<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; it<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; doesn't<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; really belong in the dra=
ft. We are<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; providing an advice as<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; extending the size of th=
e packet may<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; lead to fragmentation, b=
ut<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; as you check RFC 7348 Vx=
LAN, which<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; my create the same issue=
,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; you'll find it doesn't e=
ven<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; relate<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; to it.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Thx<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Uri (&quot;Oo-Ree&quot;)=
 C: <a href=3D"tel:949-378-7568" value=3D"&#43;19493787568" target=3D"_blan=
k">
949-378-7568</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;tel:<a href=3D"tel:9=
49-378-7568" value=3D"&#43;19493787568" target=3D"_blank">949-378-7568</a>&=
gt;<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Original Message---=
-- From: sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a href=3D"mailt=
o:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"ma=
ilto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ietf.org</a>&gt;] =
On<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Behalf Of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D"mailto:mohame=
d.boucadair@orange.com" target=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"ma=
ilto:mohamed.boucadair@orange.com" target=3D"_blank">mohamed.boucadair@oran=
ge.com</a>&gt; Sent:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Sunday, April 24, 2016<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 10:32 PM To: Elzur, Uri<=
br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;<a href=3D"mailto:ur=
i.elzur@intel.com" target=3D"_blank">uri.elzur@intel.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"ma=
ilto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel.com</a>&gt;&gt;=
;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Thomas Narten<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &lt;<a href=3D"mailto:narten@us.ibm.com" target=3D"_=
blank">narten@us.ibm.com</a> &lt;mailto:<a href=3D"mailto:narten@us.ibm.com=
" target=3D"_blank">narten@us.ibm.com</a>&gt;&gt;;<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D"mailto:sfc@ie=
tf.org" target=3D"_blank">
sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blan=
k">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Subject: Re: [sfc] WG la=
st call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf-sfc-nsh-04.tx=
t<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Hi Uri,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; That's another option th=
at needs to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; be discussed/investigate=
d.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I'm<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; afraid<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; this is not the rational=
e adopted in<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -04 since it includes so=
me<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; text<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; that<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is far to be sufficient =
to ensure<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; interoperable<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; implementations.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; BTW, saying that nsh doe=
s not need<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; to deal with fragmentati=
on<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; because<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; it<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is transport-independent=
 is not IMHO<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; a good strategy to adopt=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; here<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; because<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; it opens the door for in=
teroperable<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; issues, it may lead to<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sub-optimal implementati=
ons if the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sfc information is prese=
nt<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; only in one<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; fragments,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; etc.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; My comments are related =
to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; current text in the -04.=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; This text needs<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; to<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; be fixed somehow.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Cheers, Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Messa=
ge d'origine----- De :<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Elzur, Uri=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a=
 href=3D"mailto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel.com<=
/a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel.c=
om</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Envoy=E9 :=
 dimanche 24 avril<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2016 17:36=
 =C0 : BOUCADAIR Mohamed<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; IMT/OLN; T=
homas Narten;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D=
"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt; Obj=
et :<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; RE: [sfc] =
WG last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf=
-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Hi Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I see no n=
eed to specify the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; exact beha=
vior as NSH is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; transport =
independent i.e. like<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; NSH intera=
ction with any other<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Transport =
eh issue of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Fragmentat=
ion is to be dealt in<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; a way<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; that match=
es the mechanisms<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; supported =
by the Transport used<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; and do not=
 belong in the NSH draft<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Thx<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Uri (&quot=
;Oo-Ree&quot;) C: <a href=3D"tel:949-378-7568" value=3D"&#43;19493787568" t=
arget=3D"_blank">
949-378-7568</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;tel:<a=
 href=3D"tel:949-378-7568" value=3D"&#43;19493787568" target=3D"_blank">949=
-378-7568</a>&gt;<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Origi=
nal Message----- From: sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a=
 href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ietf.or=
g</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ietf=
.org</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; On Behalf =
Of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D=
"mailto:mohamed.boucadair@orange.com" target=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">mohamed.=
boucadair@orange.com</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Sent: Thur=
sday, April 14,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2016 12:43=
 AM To: Thomas Narten<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;<a hre=
f=3D"mailto:narten@us.ibm.com" target=3D"_blank">narten@us.ibm.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:narten@us.ibm.com" target=3D"_blank">narten@us.ibm.com</=
a>&gt;&gt;;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D=
"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt; Sub=
ject:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Re: [sfc] =
WG last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf=
-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; R-,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; In additio=
n to other pending<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; issues rai=
sed for this draft, I<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; would like=
 to raise this<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; additional=
 one about Section 6.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =3D=3D 6.&=
nbsp; Fragmentation Considerations<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; NSH and th=
e associated transport<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; header are=
 &quot;added&quot; to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; encapsulat=
ed packet/frame.&nbsp; This<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; additional=
 information<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; increases<=
br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; the<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; size of th=
e packet.&nbsp; In order<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the ensure=
 proper forwarding of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; NSH data, =
several options for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; handling f=
ragmentation and<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; re-assembl=
y exist:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 1.&nbsp; J=
umbo Frames, when<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; supported,=
 enable the transport<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; of NSH<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; and associ=
ated transport packets<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; without re=
quiring<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentat=
ion.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2.&nbsp; P=
ath MTU Discovery<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [RFC1191]&=
quot;describes a technique for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; dynamicall=
y discovering the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; maximum tr=
ansmission unit (MTU) of<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; an<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; arbitrary =
internet path&quot; and can<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; be utilize=
d to ensure the<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; the<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; required p=
acket size is used.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 3.&nbsp; [=
RFC6830] describes two<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; schemes fo=
r fragmentation and<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; re-<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; assembly<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; in section=
 5.4. =3D=3D<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The text=
 is weak for a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Standard t=
rack document that is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; intended t=
o solve the problem in<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D=
"https://tools.ietf.org/html/rfc7498#section-" rel=3D"noreferrer" target=3D=
"_blank">
https://tools.ietf.org/html/rfc7498#section-</a><br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; 2.12.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; There shou=
ld be a clear behavior<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; to be foll=
owed by an<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; implementation.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Further, I=
 would avoid the use<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; of words s=
uch as &quot;can&quot;.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The text=
 covers only<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentat=
ion when it is induced<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; by SFC<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; operations=
, it does not discuss<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the treatm=
ent of a fragment<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; when recei=
ved in an SFC domain.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; IMHO, the =
draft should also<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; specify th=
e behavior of the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Classifier=
 with regards to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragments =
for the sake of proper<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFC operat=
ion. Applying<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; classifica=
tion policies may<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; require th=
e<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; full packet, not only a =
fragment.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; In particu=
lar, dedicated<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; resources =
should dedicated for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; handling o=
ut of order fragments.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Of course,=
 it is out of scope<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; of this do=
cument to describe how<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFs handle=
 fragments.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * If an SF=
C header is prepended<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; for all fr=
agments, I'm not<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sure there=
 is any particular<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; issue at t=
he SFF level...except<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; if strippi=
ng/adding context TLVs<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; depends on=
 the full packet<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (not just =
fragment). It is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; warranted =
to consider a little bit<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; this point=
 before declaring there<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; is<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; no issue.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The text=
 states &quot;several<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; options&qu=
ot;. This may be interpreted<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; as if impl=
ementing one of them<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is suffici=
ent...which is not<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; true. The =
first two points<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; contribute=
 to minimize the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentat=
ion risk, but<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentat=
ion may still be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; experience=
d<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (e.g., oth=
er shims are prepended<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; by other n=
odes for some other<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; purposes, =
nested nsh, etc.)<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The firs=
t two points have<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; nothing to=
 do with reassembly.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The supp=
ort of jumbo frames by<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; a router/d=
evice does not mean<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; that it ca=
n make use of it.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Appropriat=
e MTU configuration<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; should be =
undertaken in a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; consistent=
 manner within an SFC<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; domain. Th=
e text should be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; updated to=
 make it is about<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (consisten=
t) MTU<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; configuration.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * BTW, sho=
uldn't the text be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; reworded t=
o recommended to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; increase t=
he MTU of **all<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; nodes** of=
 an SFC-enabled domain by<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; at least t=
he length of SFC<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; header &#4=
3; transport header?<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * Bullet 2=
, how PMTU discovery<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is actuall=
y used in this<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; context? D=
o you assume that all<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFC-aware =
nodes will issue<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; such messa=
ges towards other<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFC-aware =
node, arbitrary<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; destinatio=
n, else?<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * Bullet 2=
, I would drop<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &quot;desc=
ribes a technique for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; dynamicall=
y discovering the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; maximum tr=
ansmission unit<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (MTU) of a=
n arbitrary internet<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; path&quot;=
.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * Bullet 2=
, s/ the the/the.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The refe=
rence to the LISP<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; specificat=
ion raises two concerns<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; and one co=
mment:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (1) I don'=
t think it is a good<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; approach t=
hat fragments induced<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; by the net=
work are passed to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; their ulti=
mate destinations as<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; such<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; (stateless).<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; IMO, reass=
embly should be done<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; within the=
 SFC domain<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (responsib=
le for fragmentation)<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; not passed=
 away. (2) Does the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; stateful m=
ode require all SFC<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; data plane=
 elements maintain a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; full list =
of MTU for the any<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFF/SF ins=
tance of the SFC<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; domain?<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; The curren=
t text suggests that<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [RFC6830] =
should be listed as<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; normative =
reference (not an<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; informativ=
e one). I would<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; personally=
 favor removing the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; reference =
to LISP (as it is an<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Experiment=
al RFC).<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The secu=
rity section of the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft may =
be augmented with<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; informatio=
nal<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentat=
ion-related pointers to:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; e.g., RFC1=
858 (Security<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Considerat=
ions for IP Fragment<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Filtering)=
, RFC3128 (Protection<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Against a =
Variant of the Tiny<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Fragment A=
ttack), and RFC 4963<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (IPv4 Reas=
sembly Errors at High<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Data Rates=
).<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Cheers, Me=
d<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; -----Message d'origine-----<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; De : sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-b=
ounces@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &lt;mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sf=
c-bounces@ietf.org</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; De la part de<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; <a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &lt;mailto:<a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_b=
lank">mohamed.boucadair@orange.com</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; Envoy=E9 : lundi 11 avril<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; 2016 13:14 =C0 : Thomas<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; Narten; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.o=
rg</a>&gt; Objet<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; : Re:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; [sfc] WG last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; Dear Thomas, all,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; As I mentioned during the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; meeting, there are several<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; issues<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; that are not covered in the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; last version of the draft. I<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; already provided examples of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; the issues offline as requested<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; by Martin.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; Cheers, Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; -----Message<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; d'origine----- De : sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D=
"_blank">sfc-bounces@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=
=3D"_blank">sfc-bounces@ietf.org</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; De la part de Thomas Narten<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; Envoy=E9 : jeudi 31 mars<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; 2016 04:48 =C0 :<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_bla=
nk">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; Objet : [sfc] WG last<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; Dear WG:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; This note begins a WG<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; last call on<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; draft-ietf-sfc-nsh-04.txt<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; (<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-s=
fc-nsh/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/=
doc/draft-ietf-sfc-nsh/</a>).<br>
<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; The editors of the NSH document h=
ave indicated that they have<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; addressed all known<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; comments and that there<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; are no open<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; issues with the current<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; version of the document.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; Substantive comments to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; the list please,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; editorial comments<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; can go directly to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; document editors.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; We'll also get a brief<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; update from the editors<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; at next<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; week's meeting. If there<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; are any remaining issues<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; with the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; document, raising them<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; before the meeting would be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; especially helpful.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; For the chairs, Thomas<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; _______________________________________________<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; sfc mailing<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; list <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_bla=
nk">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=
=3D"noreferrer" target=3D"_blank">
https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; _______________________________________________<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; sfc mailing<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; list <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.o=
rg</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer=
" target=3D"_blank">
https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; __________=
_____________________________________<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sfc mailin=
g<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; list <a hr=
ef=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D=
"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" target=3D"_b=
lank">
https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; ________________________=
_______________________<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sfc mailing</blockquote>
</blockquote>
</div>
<br>
</div>
</div>
</div>
</div>
</span>
</body>
</html>

--_000_D34786324C66Ajguicharciscocom_--


From nobody Thu Apr 28 06:57:46 2016
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B71612D78E for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 06:57:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q4nSPKFuGWK1 for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 06:57:40 -0700 (PDT)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F0BED12D790 for <sfc@ietf.org>; Thu, 28 Apr 2016 06:57:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=55291; q=dns/txt; s=iport; t=1461851848; x=1463061448; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=W3WLAOyx2zgkyDQAJBBncYg1hi3LlAlR/78krWaukxo=; b=nETC+cWl14hA2wXzNWvLwVuAKIwCHUd0N/KBtU0CEl2dRxu/W4W1SVKr McvgDOQ4HaGr4T2Jzf7wy3T7zrf3FYKPnoyWv3+oEvBXUVIqvVK/Krpsr H+uoFZGIO7dTTQBmm6OodLCiyjbEHGQSqn7kAkcgUrp7IW/NO0OG5DQVh 8=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BhAgCUFSJX/4QNJK1egmxMU30GrhGLX?= =?us-ascii?q?gENgXIEFwEKhW0CgSc4FAEBAQEBAQFlJ4RBAQEBBAEBASQGQQQXAgEIEQECAQI?= =?us-ascii?q?WCwEGByEGCxQDBggCBAESiBUDEg6+Sg2ESwEBAQEBAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?REEhiGES4JBgV8BATsWCYUXBZMME4RAMQGFe4YlgXaBZ4RNgyl7hDmHUYdeAR4?= =?us-ascii?q?BAUKDa2wBhjI2fwEBAQ?=
X-IronPort-AV: E=Sophos; i="5.24,546,1454976000"; d="scan'208,217"; a="98902571"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 28 Apr 2016 13:57:27 +0000
Received: from XCH-RCD-009.cisco.com (xch-rcd-009.cisco.com [173.37.102.19]) by alln-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id u3SDvRCx014103 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 28 Apr 2016 13:57:27 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-009.cisco.com (173.37.102.19) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 28 Apr 2016 08:57:26 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Thu, 28 Apr 2016 08:57:26 -0500
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Martin Stiemerling" <mls.ietf@gmail.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
Thread-Index: AQHRoD1hgqCe3Pkr6EKnc83IMsxhI5+d714AgAD0McCAAJiAgA==
Date: Thu, 28 Apr 2016 13:57:26 +0000
Message-ID: <D3478CFF.4C690%jguichar@cisco.com>
References: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com> <D3462926.4C3CA%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008D6100C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D6100C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.98.43.179]
Content-Type: multipart/alternative; boundary="_000_D3478CFF4C690jguicharciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/4c-8vs-lIanfKPMfuW3Sx6rmRsI>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 13:57:44 -0000

--_000_D3478CFF4C690jguicharciscocom_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Hi Med,

Inline ..

From: "mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>" <=
mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>>
Date: Thursday, April 28, 2016 at 2:58 AM
To: Jim Guichard <jguichar@cisco.com<mailto:jguichar@cisco.com>>, Martin St=
iemerling <mls.ietf@gmail.com<mailto:mls.ietf@gmail.com>>, "sfc@ietf.org<ma=
ilto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: RE: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt

Hi Jim,

Thank you for the review.

Please see inline.

Cheers,
Med

De : sfc [mailto:sfc-bounces@ietf.org] De la part de Jim Guichard (jguichar=
)
Envoy=E9 : mercredi 27 avril 2016 16:18
=C0 : Martin Stiemerling; sfc@ietf.org<mailto:sfc@ietf.org>
Objet : Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt

Hi Martin & WG:

A few comments that I would like to see addressed in the document before it=
 can move forward to the next step.

  *   Section 2.2 SFC Control Plane Bootstrapping.
This section is too wishy washy. It makes the statement =93this document as=
sumes the SFC control plane is provided with a set of information that is r=
equired for proper SFC operation=94 but then goes on to list bullets that a=
re likely to be provided or may be provided. It does not actually provide a=
ny information on what is required for proper SFC operation. In the list of=
 likely information there is no indication of whether this information must=
 exist in the network prior to bootstrapping the SFC control plane element;=
 this is true also for the list of may information. Surely we should provid=
e guidelines on what must be available before the SFC control plane element=
 can actually function although it is reasonable to assume that it can boot=
strap without any information (albeit it can=92t actually do anything). On =
this point I would argue that several of the may elements are actually requ=
ired such as SFF, SF, SFC-proxy locators and may exist prior to bootstrappi=
ng the SFC control plane element, or may be added later through some contro=
l interface.

[Med] Fair point. I suggest to make these modifications:

(1)

OLD:
   The following information that is likely to be provided to the SFC
   control plane at bootstrapping includes (non-exhaustive list):

NEW:

   The following information that is RECOMMENDED to be provided to the SFC

   control plane prior to bootstrapping includes:

(2)

Remove this bullet from the list and insert it right after the list.


   o  Optionally, (traffic/CPU/memory) load balancing objectives at the

      SFC level or on a per node (e.g., per-SF/SFF/SFP proxy) basis.


Jim> that seems fine.

Minor point -> typo in bullet point 6 =96 SFP proxy should read SFC proxy
[Med] Fixed. Thanks.

  *   Section 2.3 Coherent Setup of an SFC-enabled Domain
What does the sentence =93various transport encapsulation schemes and/or va=
riations of SFC header implementations may be supported=94 actually mean ? =
Are we referring to the fact that the SFC header may carry type-1 or type-2=
 metadata or something else ? Note that there is only one SFC header implem=
entation based on the WG charter so if we are referring to different SFC fo=
rmats (meaning metadata) then please make this clear in the text, and if no=
t, please remove this sentence.

[Med] That sentence is related to the rich set of transport encapsulation s=
chemes, but also that nsh header includes a version number.

The current nsh spec does not specify how nodes with distinct nsh versions =
are supposed to behave. Also, we don=92t know in 2016 (because there is no =
nsh v2) whether v0 and v2 will be backward compatible. If these versions ar=
e not backward compatible, this will lead to failures when two adjacent ele=
ments in a service chain do not support the same version.

The cp is key to ensure coherent setup of an SFC-domain to avoid failures t=
hat are due to unsupported version and/or unsupported transport encapsulati=
on.

Jim> maybe just replace =93variations=94 with =93versions=94 so that it is =
clear what is being talked about ?

  *   Section 3.1 Reference Architecture
Second bullet point =93mapping between service function chains and SFPs=94 =
- this is a general comment for the entire document but applies here also. =
There is no mention of mapping SFPs -> RSPs =96 in fact RSP is mentioned on=
ly once in the entire document. The architecture is explicit in that the SF=
P when rendered into the network is an RSP and therefore the SFC control pl=
ane element needs to have information on currently deployed RSPs.

[Med] I agree RSP is not explicitly mentioned in Section 3.1, but the point=
 you raised is what is under this bullet:


   o  Determine a forwarding path in the context of a centralized

      deployment model (see Section 3.2<https://tools.ietf.org/html/draft-i=
etf-sfc-control-plane-04#section-3.2>).

Section 3.2 states the following:


      For some traffic engineering proposes, the SFP may be constrained

      by the control plane; as such, some SFPs can be fully specified

      (i.e., list all the SFF/SFs that need to be solicited) or

      partially specified (e.g., exclude some nodes, explicitly select

      which instance of a given SF needs to be invoked, etc.).



Do you think a change is still needed to the text?

Jim> no I am fine with the text as it stands.



Additionally there is no interface specified for communication between the =
SFC Control Plane Element and SF management systems. This is an important a=
spect as many SF=92s may require that SFC information be communicated to th=
eir management systems that will be responsible for communicating directly =
with their respective SF=92s.

[Med] Good point. I suggest this change in Section 3.3.3 that I believe is =
sufficient to take into account this comment:

OLD:


   The SFC control plane uses this interface to interact with SFC-aware

   SFs.

NEW:


   The SFC control plane uses this interface to interact with SFC-aware

   SFs. This interaction may be direct or via dedicated SF management syste=
ms.

Jim> that looks good.

  *   Section 3.1.1. C1: Interface between SFC Control Plane & SFC Classifi=
er
The sentence =93The control plane may instruct the classifier about the ini=
tial values of the Service Index (SI)=94 should be changed to say MUST as o=
therwise if a classifier chooses whatever value it wants then that may not =
align with what is programmed into the SFFs by the SFC Control Plane elemen=
t.

[Med] Makes sense. I made the change in my local copy.

  *   Section 4.10.4. Encoding the Exact SFF/SF Sequence in Data Packets
This section does not actually provide any meaning or indication of relatio=
nship with the SFC Control Plane element. Furthermore,  there has been no W=
G consensus to carry source routes within the SFC encapsulation. Therefore =
this entire section should be removed from the document.

[Med] FWIW, there was a call about this section (https://www.ietf.org/mail-=
archive/web/sfc/current/msg03756.html). This section does not recommend nor=
 exclude source routes.

Jim> the title of the section is =93Encoding the exact SFF/SF sequence in d=
ata packets=94 which is pretty clear what that means. The only encoding of =
the SFF/SF sequence supported by the SFC encapsulation (taking type-2 metad=
ata out of the equation) is the SPI + SI (which is actually a reference to =
the placement within the service path rather than an encoding directly of a=
 service sequence in the data plane) hence again I think this section shoul=
d be removed from the document.

Jim

  *   Section 4.10.5. Fully Controlled SFF/SF Sequence for a SFP
Figure 2 lists 3 different SFP-id=92s whereas the text mentions only SFP-id=
 #1. Is this simply a typo or are you trying to convey something else ?

Further you state that =93the steering policies to a SFF node for service f=
unction chain depends on if the packet comes from previous SFF or comes fro=
m a specific SF i.e., the SFP Forwarding Table entries have to be ingress p=
ort specific=94 -  this is an inaccurate statement as the combination of th=
e SFP-id and service-index determines the forwarding behavior (as specified=
 in section 3.3 & section 7 of draft-ietf-sfc-nsh-04).  This sentence shoul=
d be removed from the text.

[Med] I will defer to Linda/Andrew to clarify this part of that text.

Jim



On 4/27/16, 12:29 AM, "sfc on behalf of Martin Stiemerling" <sfc-bounces@ie=
tf.org<mailto:sfc-bounces@ietf.org> on behalf of mls.ietf@gmail.com<mailto:=
mls.ietf@gmail.com>> wrote:

Dear all,

This is the start of the Working Group Last Call (WGLC) for

draft-ietf-sfc-control-plane-04.txt

The WGLC lasts for 2 weeks and will end May 11th at 10 pm PDT.

Please send your comments and reviews to the sfc@ietf.org<mailto:sfc@ietf.o=
rg> list.

Regards,

   Martin (SFC co-chair)

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_D3478CFF4C690jguicharciscocom_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <C5D5A3A4252EDB4CB198EC62347444E3@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif;">
<div>Hi Med,</div>
<div><br>
</div>
<div>Inline ..&nbsp;</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>&quot;<a href=3D"mailto:moham=
ed.boucadair@orange.com">mohamed.boucadair@orange.com</a>&quot; &lt;<a href=
=3D"mailto:mohamed.boucadair@orange.com">mohamed.boucadair@orange.com</a>&g=
t;<br>
<span style=3D"font-weight:bold">Date: </span>Thursday, April 28, 2016 at 2=
:58 AM<br>
<span style=3D"font-weight:bold">To: </span>Jim Guichard &lt;<a href=3D"mai=
lto:jguichar@cisco.com">jguichar@cisco.com</a>&gt;, Martin Stiemerling &lt;=
<a href=3D"mailto:mls.ietf@gmail.com">mls.ietf@gmail.com</a>&gt;, &quot;<a =
href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &lt;<a href=3D"mailto:s=
fc@ietf.org">sfc@ietf.org</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>RE: [sfc] WGLC for draft-i=
etf-sfc-control-plane-04.txt<br>
</div>
<div><br>
</div>
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:"Courier New";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:70.85pt 70.85pt 70.85pt 70.85pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:286008905;
	mso-list-template-ids:-706940182;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1
	{mso-list-id:470829784;
	mso-list-template-ids:442282966;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l1:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2
	{mso-list-id:922103303;
	mso-list-template-ids:389864376;}
@list l2:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l2:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l2:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3
	{mso-list-id:1655571925;
	mso-list-template-ids:-983147934;}
@list l3:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l3:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l3:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4
	{mso-list-id:1725593478;
	mso-list-template-ids:1284937460;}
@list l4:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l4:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l4:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5
	{mso-list-id:1804037960;
	mso-list-template-ids:-1240840590;}
@list l5:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l5:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l5:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
<div lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Hi Jim,
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Thank you for the review.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Please see inline.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size: 10pt; font-family: Taho=
ma, sans-serif;">De&nbsp;:</span></b><span style=3D"font-size: 10pt; font-f=
amily: Tahoma, sans-serif;"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">m=
ailto:sfc-bounces@ietf.org</a>]
<b>De la part de</b> Jim Guichard (jguichar)<br>
<b>Envoy=E9&nbsp;:</b> mercredi 27 avril 2016 16:18<br>
<b>=C0&nbsp;:</b> Martin Stiemerling; <a href=3D"mailto:sfc@ietf.org">sfc@i=
etf.org</a><br>
<b>Objet&nbsp;:</b> Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt<=
o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Hi Martin &amp; WG:<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">A few comments that I would like to see addr=
essed in the document before it can move forward to the next step.<o:p></o:=
p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l1 level1 lfo1">
<span style=3D"font-size: 10.5pt; font-family: Calibri, sans-serif;">Sectio=
n 2.2 SFC Control Plane Bootstrapping.<o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">This section is too wishy washy. It makes th=
e statement =93this document assumes the SFC control plane is provided with=
 a set of information that is
<u>required</u> for proper SFC operation=94 but then goes on to list bullet=
s that are
<u>likely</u>&nbsp;to be provided or <u>may</u>&nbsp;be provided. It does n=
ot actually provide any information on what
<u>is required for proper SFC operation</u>. In the list of <u>likely</u>&n=
bsp;information there is no indication of whether this information must exi=
st in the network prior to bootstrapping the SFC control plane element; thi=
s is true also for the list of
<u>may</u>&nbsp;information. Surely we should provide guidelines on what <u=
>must</u>&nbsp;be available before the SFC control plane element can actual=
ly function although it is reasonable to assume that it can bootstrap witho=
ut any information (albeit it can=92t actually
 do anything). On this point I would argue that several of the <u>may</u>&n=
bsp;elements are actually required such as SFF, SF, SFC-proxy locators and =
may exist prior to bootstrapping the SFC control plane element, or may be a=
dded later through some control interface.&nbsp;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] Fair point. I suggest to =
make these modifications:
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">(1)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">OLD:
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp;&nbsp;The following information=
 that is likely to be provided to the SFC<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp; control plane at bootstrapping=
 includes (non-exhaustive list):<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; The following information that is RE=
COMMENDED to be provided to the SFC<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; control plane prior to bootstrapping=
 includes:<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">(2)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Remove this bullet from the lis=
t and insert it right after the list.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; o&nbsp; Optionally, (traffic/CPU/mem=
ory) load balancing objectives at the<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SFC level or on a =
per node (e.g., per-SF/SFF/SFP proxy) basis.<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
</div>
</div>
</div>
</div>
</span>
<div><br>
</div>
<div>Jim&gt; that seems fine.</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<div lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size: 10.5pt; fon=
t-family: Calibri, sans-serif; color: black;">Minor point -&gt; typo in bul=
let point 6 =96 SFP proxy should read
<b>SFC</b>&nbsp;proxy<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">[Med] Fixed. Thanks.<o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l3 level1 lfo2">
<span style=3D"font-size: 10.5pt; font-family: Calibri, sans-serif;">Sectio=
n 2.3 Coherent Setup of an SFC-enabled Domain<o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">What does the sentence =93various transport =
encapsulation schemes and/or variations of SFC header implementations may b=
e supported=94 actually mean ? Are we referring
 to the fact that the SFC header may carry type-1 or type-2 metadata or som=
ething else ? Note that there is only
<b>one </b>SFC header implementation based on the WG charter so if we are r=
eferring to different SFC formats (meaning metadata) then please make this =
clear in the text, and if not, please remove this sentence.&nbsp;<o:p></o:p=
></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:5.25pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black">[M=
ed] That sentence is related to the rich set of transport encapsulation sch=
emes, but also that nsh header includes a version
 number. <o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:5.25pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black"><o=
:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:5.25pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black">Th=
e current nsh spec does not specify how nodes with distinct nsh versions ar=
e supposed to behave. Also, we don=92t know in 2016
 (because there is no nsh v2) whether v0 and v2 will be backward compatible=
. If these versions are not backward compatible, this will lead to failures=
 when two adjacent elements in a service chain do not support the same vers=
ion.
<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:5.25pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black"><o=
:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:5.25pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black">Th=
e cp is key to ensure coherent setup of an SFC-domain to avoid failures tha=
t are due to unsupported version and/or unsupported
 transport encapsulation.</span></p>
</div>
</div>
</div>
</div>
</div>
</span>
<div><br>
</div>
<div>Jim&gt; maybe just replace =93variations=94 with =93versions=94 so tha=
t it is clear what is being talked about ?</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<div lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<p class=3D"MsoNormal" style=3D"margin-left:5.25pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black"><o=
:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l4 level1 lfo3">
<span style=3D"font-size: 10.5pt; font-family: Calibri, sans-serif;">Sectio=
n 3.1 Reference Architecture<o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Second bullet point =93mapping between servi=
ce function chains and SFPs=94 - this is a general comment for the entire d=
ocument but applies here also. There is
 no mention of mapping SFPs -&gt; RSPs =96 in fact RSP is mentioned only on=
ce in the entire document. The architecture is explicit in that the SFP whe=
n rendered into the network is an RSP and therefore the SFC control plane e=
lement needs to have information on currently
 deployed RSPs.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] I agree RSP is not explic=
itly mentioned in Section 3.1, but the point you raised is what is under th=
is bullet:
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; o&nbsp; Determine a forwarding path =
in the context of a centralized<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>deployment =
model (see <a href=3D"https://tools.ietf.org/html/draft-ietf-sfc-control-pl=
ane-04#section-3.2">Section 3.2</a>).<o:p></o:p></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Section 3.2 states the followin=
g:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; For some traffic e=
ngineering proposes, the SFP may be constrained<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; by the control pla=
ne; as such, some SFPs can be fully specified<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (i.e., list all th=
e SFF/SFs that need to be solicited) or<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; partially specifie=
d (e.g., exclude some nodes, explicitly select<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; which instance of =
a given SF needs to be invoked, etc.).<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></pre>
</div>
<div>
<pre><span lang=3D"EN-US">Do you think a change is still needed to the text=
? </span></pre>
</div>
</div>
</div>
</div>
</div>
</span>
<div><br>
</div>
<div>Jim&gt; no I am fine with the text as it stands.</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<div lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<pre><span lang=3D"EN-US"><o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"font-size: 10.5pt; font-family: Calibri,=
 sans-serif; color: black;"><o:p>&nbsp;</o:p></span></pre>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size: 10.5pt; fon=
t-family: Calibri, sans-serif; color: black;">Additionally there is no inte=
rface specified for communication between the SFC Control Plane Element and=
 SF management systems.
</span><span style=3D"font-size: 10.5pt; font-family: Calibri, sans-serif; =
color: black;">This is an important aspect as many SF=92s may require that =
SFC information be communicated to their management systems that will be re=
sponsible for communicating directly
 with their respective SF=92s.&nbsp;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] Good point. I suggest thi=
s change in Section 3.3.3 that I believe is sufficient to take into account=
 this comment:
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">OLD:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; The SFC control plane uses this inte=
rface to interact with SFC-aware<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; </span>SFs.<o:p></o:p></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; The SFC control plane uses this inte=
rface to interact with SFC-aware<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; SFs. This interaction may be direct =
or via dedicated SF management systems.</span></pre>
</div>
</div>
</div>
</div>
</div>
</span>
<div><br>
</div>
<div>Jim&gt; that looks good.</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<div lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<pre><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></pre>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l2 level1 lfo4">
<span style=3D"font-size: 10.5pt; font-family: Calibri, sans-serif;">Sectio=
n 3.1.1. C1: Interface between SFC Control Plane &amp; SFC Classifier<o:p><=
/o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">The sentence =93The control plane may instru=
ct the classifier about the initial values of the Service Index (SI)=94 sho=
uld be changed to say
<b>MUST</b>&nbsp;as otherwise if a classifier chooses whatever value it wan=
ts then that may not align with what is programmed into the SFFs by the SFC=
 Control Plane element.</span><span style=3D"font-size:10.5pt;font-family:&=
quot;Courier New&quot;;color:black;background:#FFFDF5">&nbsp;<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] Makes sense. I made the c=
hange in my local copy.<o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l5 level1 lfo5">
<span style=3D"font-size: 10.5pt; font-family: Calibri, sans-serif;">Sectio=
n 4.10.4. Encoding the Exact SFF/SF Sequence in Data Packets<o:p></o:p></sp=
an></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">This section does not actually provide any m=
eaning or indication of relationship with the SFC Control Plane element. Fu=
rthermore, &nbsp;there has been no WG consensus
 to carry source routes within the SFC encapsulation. Therefore this entire=
 section should be removed from the document.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] FWIW, there was a call ab=
out this section (<a href=3D"https://www.ietf.org/mail-archive/web/sfc/curr=
ent/msg03756.html">https://www.ietf.org/mail-archive/web/sfc/current/msg037=
56.html</a>).
 This section does not recommend nor exclude source routes.</span></p>
</div>
</div>
</div>
</div>
</div>
</span>
<div><br>
</div>
<div>Jim&gt; the title of the section is =93Encoding the exact SFF/SF seque=
nce in data packets=94 which is pretty clear what that means. The
<u>only</u> encoding of the SFF/SF sequence supported by the SFC encapsulat=
ion (taking type-2 metadata out of the equation) is the SPI &#43; SI (which=
 is actually a reference to the placement within the service path rather th=
an an encoding directly of a service
 sequence in the data plane) hence again I think this section should be rem=
oved from the document.&nbsp;</div>
<div><br>
</div>
<div>Jim</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<div lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l0 level1 lfo6">
<span style=3D"font-size: 10.5pt; font-family: Calibri, sans-serif;">Sectio=
n 4.10.5. Fully Controlled SFF/SF Sequence for a SFP<o:p></o:p></span></li>=
</ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Figure 2 lists 3 different SFP-id=92s wherea=
s the text mentions only SFP-id #1. Is this simply a typo or are you trying=
 to convey something else ?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Further you state that =93the steering polic=
ies to a SFF node for service function chain depends on if the packet comes=
 from previous SFF or comes from a specific
 SF i.e., the SFP Forwarding Table entries have to be ingress port specific=
=94 - &nbsp;this is an inaccurate statement as the combination of the SFP-i=
d and service-index determines the forwarding behavior (as specified in sec=
tion 3.3 &amp; section 7 of draft-ietf-sfc-nsh-04).
 &nbsp;This sentence should be removed from the text.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] I will defer to Linda/And=
rew to clarify this part of that text. &nbsp;&nbsp;&nbsp;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Jim<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">On 4/27/16, 12:29 AM, &quot;sfc on behalf of=
 Martin Stiemerling&quot; &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc-b=
ounces@ietf.org</a> on behalf of
<a href=3D"mailto:mls.ietf@gmail.com">mls.ietf@gmail.com</a>&gt; wrote:<o:p=
></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<blockquote style=3D"border:none;border-left:solid #B5C4DF 4.5pt;padding:0c=
m 0cm 0cm 4.0pt;margin-left:3.75pt;margin-right:0cm" id=3D"MAC_OUTLOOK_ATTR=
IBUTION_BLOCKQUOTE">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Dear all,<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">This is the start of the Working Group Last =
Call (WGLC) for<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">draft-ietf-sfc-control-plane-04.txt<o:p></o:=
p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">The WGLC lasts for 2 weeks and will end May =
11th at 10 pm PDT.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Please send your comments and reviews to the
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> list.<o:p></o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Regards,<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">&nbsp;&nbsp; Martin (SFC co-chair)<o:p></o:p=
></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">____________________________________________=
___<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">sfc mailing list<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org=
</a><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><a href=3D"https://www.ietf.org/mailman/list=
info/sfc">https://www.ietf.org/mailman/listinfo/sfc</a><o:p></o:p></span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
</blockquote>
</div>
</div>
</div>
</div>
</span>
</body>
</html>

--_000_D3478CFF4C690jguicharciscocom_--


From nobody Thu Apr 28 07:11:25 2016
Return-Path: <agmalis@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CAFDA12D7A2 for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 07:11:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y1i1OLeDaHFO for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 07:11:22 -0700 (PDT)
Received: from mail-oi0-x22b.google.com (mail-oi0-x22b.google.com [IPv6:2607:f8b0:4003:c06::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 657FD12D7A4 for <sfc@ietf.org>; Thu, 28 Apr 2016 07:11:22 -0700 (PDT)
Received: by mail-oi0-x22b.google.com with SMTP id x19so84549659oix.2 for <sfc@ietf.org>; Thu, 28 Apr 2016 07:11:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=Tx/x2SRtpmtzw+hiUFwig8kSpOrmr+h1ynKoKzs0qx4=; b=FmM1UHsN7X5ppr1ZhXobNs86F/09OKMYqE6H8dJv0kebVrm8dMwP+tmuzoLCqDr0tv 5EtjQIbgVUEGnb/x4iiSGG0uZchCwiobZnuJG8t9ethT8Z1UAwHKd6Wi75xubLif2TJ2 jtC6qNY353XzwrLRDnkwqGGMLu6qRKdPUys0jC9wC4fyWujrDJtKBeUzH3wGJA57D7kT qEIyjl/vQhTgspKYFCgOBLYIyC2fLHsGaFxAzM4S8Hk1qtDhLiTzgMpmzVUXuLGMLiLh RnVjdxZh/Ra9M603irdsEHHSSFAbS5mDGoOpn57f2QuOnTkh3pw6PqFf+AgTjLXOUap7 r6NA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=Tx/x2SRtpmtzw+hiUFwig8kSpOrmr+h1ynKoKzs0qx4=; b=dmJtx2RWvXG6jSUmVf+mgg/LfVERTsQzZoaQvMaux1SO3v1Qrr11g31yp6IVpZHa9Z DgiWr6rq8r3BonVzU6ayFj6fmKy57xKNsLT76HFQ5XCYhKNyENwC6KeCDA3RFfHqbQ4p hjzv4vIoFGADrOrX4qqQ+tJOnQ+BcaVIcWVcVl0gIXgFxYpgEwrfsN4VhLiUqWtTqx4u DGyDimWU5JyufqwL8rv+0dM/DlEZMfwkxBoptB/jYgbjQNjILV+YZFlxYe9kmYr22YTD vVMerTy5CUkq1NfOPX1nlQoHGMrrppHEEZv7jjN2n1TPIAUmyn1VyJyms1Khuw7tkEEY ACcA==
X-Gm-Message-State: AOPr4FWF/+v/VDBBYcg11rPevznBqL+VzJdg3/Nk+HGu+LhCRIsmkgkG7RkrM9bnGiUOUC6QuC95QTHcK/NTqw==
X-Received: by 10.202.91.8 with SMTP id p8mr5802664oib.99.1461852681847; Thu, 28 Apr 2016 07:11:21 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.182.216.166 with HTTP; Thu, 28 Apr 2016 07:11:00 -0700 (PDT)
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D6100C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com> <D3462926.4C3CA%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008D6100C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
From: "Andrew G. Malis" <agmalis@gmail.com>
Date: Thu, 28 Apr 2016 10:11:00 -0400
Message-ID: <CAA=duU0RN-wjXh7b52DC0chA3qJmbpg0cnFU2DR01=ijT+JvJQ@mail.gmail.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>
Content-Type: multipart/alternative; boundary=001a113d3a88d0c74705318c191a
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/tq-73dMFnF4DfRrBdpaY8vDGe04>
Cc: Martin Stiemerling <mls.ietf@gmail.com>, BOUCADAIR Mohamed IMT/OLN <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 14:11:24 -0000

--001a113d3a88d0c74705318c191a
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Jim,

Regarding your comments on section 4.10.5:



>
>    - Section 4.10.5. Fully Controlled SFF/SF Sequence for a SFP
>
> Figure 2 lists 3 different SFP-id=E2=80=99s whereas the text mentions onl=
y SFP-id
> #1. Is this simply a typo or are you trying to convey something else ?
>


Figure 2 is meant as an example of a set of steering policies. You=E2=80=99=
re
right, it=E2=80=99s confusing to refer to just #1, when we really don=E2=80=
=99t need to. I
think we can improve the introductory sentence above the figure by just
saying:

For illustration purposes, an example set of steering policies for an SFF
is depicted in Figure 2.


>
>
> Further you state that =E2=80=9Cthe steering policies to a SFF node for s=
ervice
> function chain depends on if the packet comes from previous SFF or comes
> from a specific SF i.e., the SFP Forwarding Table entries have to be
> ingress port specific=E2=80=9D -  this is an inaccurate statement as the
> combination of the SFP-id and service-index determines the forwarding
> behavior (as specified in section 3.3 & section 7 of
> draft-ietf-sfc-nsh-04).  This sentence should be removed from the text.
>
>
>
>
>
 I agree, thanks for spotting!

Cheers,
Andy

--001a113d3a88d0c74705318c191a
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Jim,<div><br></div><div>Regarding your comments on section=
 4.10.5:<br><div><br></div><div><br></div><div class=3D"gmail_extra"><div c=
lass=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 =
0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div lang=3D"FR" link=
=3D"blue" vlink=3D"purple"><div><div style=3D"border:none;border-left:solid=
 blue 1.5pt;padding:0cm 0cm 0cm 4.0pt"><div><br>
</div><span class=3D"">
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 4.10.5. Fully Controlled SFF/SF Sequence for a SFP<u><=
/u><u></u></span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Figure 2 lists 3 different =
SFP-id=E2=80=99s whereas the text mentions only SFP-id #1. Is this simply a=
 typo or are you trying to convey something else ?</span></p></div></span><=
/div></div></div></blockquote><div><br></div><div><br></div><div>Figure 2 i=
s meant as an example of a set of steering policies. You=E2=80=99re right, =
it=E2=80=99s confusing to refer to just #1, when we really don=E2=80=99t ne=
ed to. I think we can improve the introductory sentence above the figure by=
 just saying:</div><div><br></div><div>For illustration purposes, an exampl=
e set of steering policies for an SFF is depicted in Figure 2.</div><div>=
=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bo=
rder-left:1px #ccc solid;padding-left:1ex"><div lang=3D"FR" link=3D"blue" v=
link=3D"purple"><div><div style=3D"border:none;border-left:solid blue 1.5pt=
;padding:0cm 0cm 0cm 4.0pt"><span class=3D""><div><p class=3D"MsoNormal"><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-se=
rif&quot;;color:black"><u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><u></u>=C2=A0<u></u></span>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Further you state that =E2=
=80=9Cthe steering policies to a SFF node for service function chain depend=
s on if the packet comes from previous SFF or comes from a specific
 SF i.e., the SFP Forwarding Table entries have to be ingress port specific=
=E2=80=9D - =C2=A0this is an inaccurate statement as the combination of the=
 SFP-id and service-index determines the forwarding behavior (as specified =
in section 3.3 &amp; section 7 of draft-ietf-sfc-nsh-04).
 =C2=A0This sentence should be removed from the text.<u></u><u></u></span><=
/p>
</div>
</span><div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><u></u>=C2=A0<u></u></span>=
</p>
<p class=3D"MsoNormal"><br></p></div></div></div></div></blockquote><div><b=
r></div><div>=C2=A0I agree, thanks for spotting!</div><div><br></div><div>C=
heers,</div><div>Andy</div><div><br></div></div></div></div></div>

--001a113d3a88d0c74705318c191a--


From nobody Thu Apr 28 07:52:46 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6327C12B05F for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 07:52:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.618
X-Spam-Level: 
X-Spam-Status: No, score=-2.618 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CPvTFbX248NZ for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 07:52:36 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C939E12D7BA for <sfc@ietf.org>; Thu, 28 Apr 2016 07:45:51 -0700 (PDT)
Received: from omfedm06.si.francetelecom.fr (unknown [xx.xx.xx.2]) by omfedm10.si.francetelecom.fr (ESMTP service) with ESMTP id 253B32649C9; Thu, 28 Apr 2016 16:45:50 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.31]) by omfedm06.si.francetelecom.fr (ESMTP service) with ESMTP id 008C527C087; Thu, 28 Apr 2016 16:45:50 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM22.corporate.adroot.infra.ftgroup ([fe80::8c90:f4e9:be28:2a1%19]) with mapi id 14.03.0279.002; Thu, 28 Apr 2016 16:45:49 +0200
From: <mohamed.boucadair@orange.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>, Martin Stiemerling <mls.ietf@gmail.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
Thread-Index: AQHRoD1hgqCe3Pkr6EKnc83IMsxhI5+d714AgAD0McCAAJiAgP//+zUQ
Date: Thu, 28 Apr 2016 14:45:49 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D6153F@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com> <D3462926.4C3CA%jguichar@cisco.com> <787AE7BB302AE849A7480A190F8B933008D6100C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <D3478CFF.4C690%jguichar@cisco.com>
In-Reply-To: <D3478CFF.4C690%jguichar@cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.5]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B933008D6153FOPEXCLILMA3corp_"
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.28.135717
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/lE37P3yETWCeKx8mliKsDvZi7xE>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 14:52:41 -0000

--_000_787AE7BB302AE849A7480A190F8B933008D6153FOPEXCLILMA3corp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Re-,

I made the required change in my local copy to address this comment:

Jim> maybe just replace "variations" with "versions" so that it is clear wh=
at is being talked about ?

The only pending point is about Section 4.10.4. I'm neutral on this point.

Cheers,
Med

De : Jim Guichard (jguichar) [mailto:jguichar@cisco.com]
Envoy=E9 : jeudi 28 avril 2016 15:57
=C0 : BOUCADAIR Mohamed IMT/OLN; Martin Stiemerling; sfc@ietf.org
Objet : Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt

Hi Med,

Inline ..

From: "mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>" <=
mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>>
Date: Thursday, April 28, 2016 at 2:58 AM
To: Jim Guichard <jguichar@cisco.com<mailto:jguichar@cisco.com>>, Martin St=
iemerling <mls.ietf@gmail.com<mailto:mls.ietf@gmail.com>>, "sfc@ietf.org<ma=
ilto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: RE: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt

Hi Jim,

Thank you for the review.

Please see inline.

Cheers,
Med

De : sfc [mailto:sfc-bounces@ietf.org] De la part de Jim Guichard (jguichar=
)
Envoy=E9 : mercredi 27 avril 2016 16:18
=C0 : Martin Stiemerling; sfc@ietf.org<mailto:sfc@ietf.org>
Objet : Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt

Hi Martin & WG:

A few comments that I would like to see addressed in the document before it=
 can move forward to the next step.

  *   Section 2.2 SFC Control Plane Bootstrapping.
This section is too wishy washy. It makes the statement "this document assu=
mes the SFC control plane is provided with a set of information that is req=
uired for proper SFC operation" but then goes on to list bullets that are l=
ikely to be provided or may be provided. It does not actually provide any i=
nformation on what is required for proper SFC operation. In the list of lik=
ely information there is no indication of whether this information must exi=
st in the network prior to bootstrapping the SFC control plane element; thi=
s is true also for the list of may information. Surely we should provide gu=
idelines on what must be available before the SFC control plane element can=
 actually function although it is reasonable to assume that it can bootstra=
p without any information (albeit it can't actually do anything). On this p=
oint I would argue that several of the may elements are actually required s=
uch as SFF, SF, SFC-proxy locators and may exist prior to bootstrapping the=
 SFC control plane element, or may be added later through some control inte=
rface.

[Med] Fair point. I suggest to make these modifications:

(1)

OLD:
   The following information that is likely to be provided to the SFC
   control plane at bootstrapping includes (non-exhaustive list):

NEW:

   The following information that is RECOMMENDED to be provided to the SFC

   control plane prior to bootstrapping includes:

(2)

Remove this bullet from the list and insert it right after the list.


   o  Optionally, (traffic/CPU/memory) load balancing objectives at the

      SFC level or on a per node (e.g., per-SF/SFF/SFP proxy) basis.


Jim> that seems fine.

Minor point -> typo in bullet point 6 - SFP proxy should read SFC proxy
[Med] Fixed. Thanks.

  *   Section 2.3 Coherent Setup of an SFC-enabled Domain
What does the sentence "various transport encapsulation schemes and/or vari=
ations of SFC header implementations may be supported" actually mean ? Are =
we referring to the fact that the SFC header may carry type-1 or type-2 met=
adata or something else ? Note that there is only one SFC header implementa=
tion based on the WG charter so if we are referring to different SFC format=
s (meaning metadata) then please make this clear in the text, and if not, p=
lease remove this sentence.

[Med] That sentence is related to the rich set of transport encapsulation s=
chemes, but also that nsh header includes a version number.

The current nsh spec does not specify how nodes with distinct nsh versions =
are supposed to behave. Also, we don't know in 2016 (because there is no ns=
h v2) whether v0 and v2 will be backward compatible. If these versions are =
not backward compatible, this will lead to failures when two adjacent eleme=
nts in a service chain do not support the same version.

The cp is key to ensure coherent setup of an SFC-domain to avoid failures t=
hat are due to unsupported version and/or unsupported transport encapsulati=
on.

Jim> maybe just replace "variations" with "versions" so that it is clear wh=
at is being talked about ?

  *   Section 3.1 Reference Architecture
Second bullet point "mapping between service function chains and SFPs" - th=
is is a general comment for the entire document but applies here also. Ther=
e is no mention of mapping SFPs -> RSPs - in fact RSP is mentioned only onc=
e in the entire document. The architecture is explicit in that the SFP when=
 rendered into the network is an RSP and therefore the SFC control plane el=
ement needs to have information on currently deployed RSPs.

[Med] I agree RSP is not explicitly mentioned in Section 3.1, but the point=
 you raised is what is under this bullet:


   o  Determine a forwarding path in the context of a centralized

      deployment model (see Section 3.2<https://tools.ietf.org/html/draft-i=
etf-sfc-control-plane-04#section-3.2>).

Section 3.2 states the following:


      For some traffic engineering proposes, the SFP may be constrained

      by the control plane; as such, some SFPs can be fully specified

      (i.e., list all the SFF/SFs that need to be solicited) or

      partially specified (e.g., exclude some nodes, explicitly select

      which instance of a given SF needs to be invoked, etc.).



Do you think a change is still needed to the text?

Jim> no I am fine with the text as it stands.



Additionally there is no interface specified for communication between the =
SFC Control Plane Element and SF management systems. This is an important a=
spect as many SF's may require that SFC information be communicated to thei=
r management systems that will be responsible for communicating directly wi=
th their respective SF's.

[Med] Good point. I suggest this change in Section 3.3.3 that I believe is =
sufficient to take into account this comment:

OLD:


   The SFC control plane uses this interface to interact with SFC-aware

   SFs.

NEW:


   The SFC control plane uses this interface to interact with SFC-aware

   SFs. This interaction may be direct or via dedicated SF management syste=
ms.

Jim> that looks good.

  *   Section 3.1.1. C1: Interface between SFC Control Plane & SFC Classifi=
er
The sentence "The control plane may instruct the classifier about the initi=
al values of the Service Index (SI)" should be changed to say MUST as other=
wise if a classifier chooses whatever value it wants then that may not alig=
n with what is programmed into the SFFs by the SFC Control Plane element.

[Med] Makes sense. I made the change in my local copy.

  *   Section 4.10.4. Encoding the Exact SFF/SF Sequence in Data Packets
This section does not actually provide any meaning or indication of relatio=
nship with the SFC Control Plane element. Furthermore,  there has been no W=
G consensus to carry source routes within the SFC encapsulation. Therefore =
this entire section should be removed from the document.

[Med] FWIW, there was a call about this section (https://www.ietf.org/mail-=
archive/web/sfc/current/msg03756.html). This section does not recommend nor=
 exclude source routes.

Jim> the title of the section is "Encoding the exact SFF/SF sequence in dat=
a packets" which is pretty clear what that means. The only encoding of the =
SFF/SF sequence supported by the SFC encapsulation (taking type-2 metadata =
out of the equation) is the SPI + SI (which is actually a reference to the =
placement within the service path rather than an encoding directly of a ser=
vice sequence in the data plane) hence again I think this section should be=
 removed from the document.

Jim

  *   Section 4.10.5. Fully Controlled SFF/SF Sequence for a SFP
Figure 2 lists 3 different SFP-id's whereas the text mentions only SFP-id #=
1. Is this simply a typo or are you trying to convey something else ?

Further you state that "the steering policies to a SFF node for service fun=
ction chain depends on if the packet comes from previous SFF or comes from =
a specific SF i.e., the SFP Forwarding Table entries have to be ingress por=
t specific" -  this is an inaccurate statement as the combination of the SF=
P-id and service-index determines the forwarding behavior (as specified in =
section 3.3 & section 7 of draft-ietf-sfc-nsh-04).  This sentence should be=
 removed from the text.

[Med] I will defer to Linda/Andrew to clarify this part of that text.

Jim



On 4/27/16, 12:29 AM, "sfc on behalf of Martin Stiemerling" <sfc-bounces@ie=
tf.org<mailto:sfc-bounces@ietf.org> on behalf of mls.ietf@gmail.com<mailto:=
mls.ietf@gmail.com>> wrote:

Dear all,

This is the start of the Working Group Last Call (WGLC) for

draft-ietf-sfc-control-plane-04.txt

The WGLC lasts for 2 weeks and will end May 11th at 10 pm PDT.

Please send your comments and reviews to the sfc@ietf.org<mailto:sfc@ietf.o=
rg> list.

Regards,

   Martin (SFC co-chair)

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_787AE7BB302AE849A7480A190F8B933008D6153FOPEXCLILMA3corp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Texte de bulles Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:"Courier New";}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
span.TextedebullesCar
	{mso-style-name:"Texte de bulles Car";
	mso-style-priority:99;
	mso-style-link:"Texte de bulles";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle22
	{mso-style-type:personal-reply;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:70.85pt 70.85pt 70.85pt 70.85pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:286008905;
	mso-list-template-ids:-706940182;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1
	{mso-list-id:470829784;
	mso-list-template-ids:442282966;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l1:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2
	{mso-list-id:922103303;
	mso-list-template-ids:389864376;}
@list l2:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l2:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l2:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3
	{mso-list-id:1655571925;
	mso-list-template-ids:-983147934;}
@list l3:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l3:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l3:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l3:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4
	{mso-list-id:1725593478;
	mso-list-template-ids:1284937460;}
@list l4:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l4:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l4:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l4:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5
	{mso-list-id:1804037960;
	mso-list-template-ids:-1240840590;}
@list l5:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l5:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l5:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l5:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Re-,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">I made the required change in m=
y local copy to address this comment:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Jim&gt; mayb=
e just replace &#8220;variations&#8221; with &#8220;versions&#8221; so that=
 it is clear what is being talked about ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">The only pending point is about=
 Section 4.10.4. I&#8217;m neutral on this point.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><s=
pan lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;=
,&quot;sans-serif&quot;"> Jim Guichard (jguichar) [mailto:jguichar@cisco.co=
m]
<br>
<b>Envoy=E9&nbsp;:</b> jeudi 28 avril 2016 15:57<br>
<b>=C0&nbsp;:</b> BOUCADAIR Mohamed IMT/OLN; Martin Stiemerling; sfc@ietf.o=
rg<br>
<b>Objet&nbsp;:</b> </span><span style=3D"font-size:10.0pt;font-family:&quo=
t;Tahoma&quot;,&quot;sans-serif&quot;">Re: [sfc] WGLC for draft-ietf-sfc-co=
ntrol-plane-04.txt<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Hi Med,<o:p></o:p></span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Inline ..&nbsp;<o:p></o:p><=
/span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;;color:black">From:
</span></b><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,=
&quot;sans-serif&quot;;color:black">&quot;<a href=3D"mailto:mohamed.boucada=
ir@orange.com">mohamed.boucadair@orange.com</a>&quot; &lt;<a href=3D"mailto=
:mohamed.boucadair@orange.com">mohamed.boucadair@orange.com</a>&gt;<br>
<b>Date: </b>Thursday, April 28, 2016 at 2:58 AM<br>
<b>To: </b>Jim Guichard &lt;<a href=3D"mailto:jguichar@cisco.com">jguichar@=
cisco.com</a>&gt;, Martin Stiemerling &lt;<a href=3D"mailto:mls.ietf@gmail.=
com">mls.ietf@gmail.com</a>&gt;, &quot;<a href=3D"mailto:sfc@ietf.org">sfc@=
ietf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;=
<br>
<b>Subject: </b>RE: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt<o:p>=
</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Hi Jim,
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;</span><span style=3D"color:black"><o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Thank you for the review.
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;</span><span style=3D"color:black"><o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Please see inline.</span><span style=3D"color:=
black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;</span><span style=3D"color:black"><o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Cheers,</span><span style=3D"color:black"><o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Med</span><span style=3D"color:black"><o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;</span><span style=3D"color:black"><o:p>=
</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:black">De&nbsp;:</span></b><span=
 style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&=
quot;;color:black"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto:sfc=
-bounces@ietf.org</a>]
<b>De la part de</b> Jim Guichard (jguichar)<br>
<b>Envoy=E9&nbsp;:</b> mercredi 27 avril 2016 16:18<br>
<b>=C0&nbsp;:</b> Martin Stiemerling; <a href=3D"mailto:sfc@ietf.org">sfc@i=
etf.org</a><br>
<b>Objet&nbsp;:</b> Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt<=
/span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Hi Martin &amp; WG:</span><=
span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">A few comments that I would=
 like to see addressed in the document before it can move forward to the ne=
xt step.</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l1 level1 lfo1">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 2.2 SFC Control Plane Bootstrapping.</span><o:p></o:p>=
</li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">This section is too wishy w=
ashy. It makes the statement &#8220;this document assumes the SFC control p=
lane is provided with a set of information that is
<u>required</u> for proper SFC operation&#8221; but then goes on to list bu=
llets that are
<u>likely</u>&nbsp;to be provided or <u>may</u>&nbsp;be provided. It does n=
ot actually provide any information on what
<u>is required for proper SFC operation</u>. In the list of <u>likely</u>&n=
bsp;information there is no indication of whether this information must exi=
st in the network prior to bootstrapping the SFC control plane element; thi=
s is true also for the list of
<u>may</u>&nbsp;information. Surely we should provide guidelines on what <u=
>must</u>&nbsp;be available before the SFC control plane element can actual=
ly function although it is reasonable to assume that it can bootstrap witho=
ut any information (albeit it can&#8217;t actually
 do anything). On this point I would argue that several of the <u>may</u>&n=
bsp;elements are actually required such as SFF, SF, SFC-proxy locators and =
may exist prior to bootstrapping the SFC control plane element, or may be a=
dded later through some control interface.&nbsp;</span><span style=3D"color=
:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;</span><span style=3D"color:black"><o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] Fair point. I suggest to =
make these modifications:
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;</span><span style=3D"col=
or:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">(1)</span><span style=3D"color:=
black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;</span><span style=3D"col=
or:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">OLD:
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp;&nbsp;The following=
 information that is likely to be provided to the SFC</span><span style=3D"=
color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp; control plane at b=
ootstrapping includes (non-exhaustive list):</span><span style=3D"color:bla=
ck"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;</span><span style=3D"col=
or:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">NEW:</span><span style=3D"color=
:black"><o:p></o:p></span></p>
<pre><span lang=3D"EN-US" style=3D"color:black">&nbsp;&nbsp; The following =
information that is RECOMMENDED to be provided to the SFC</span><span style=
=3D"color:black"><o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"color:black">&nbsp;&nbsp; control plane =
prior to bootstrapping includes:</span><span style=3D"color:black"><o:p></o=
:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;</span><span style=3D"col=
or:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">(2)</span><span style=3D"color:=
black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;</span><span style=3D"col=
or:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Remove this bullet from the lis=
t and insert it right after the list.
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;</span><span style=3D"col=
or:black"><o:p></o:p></span></p>
<pre><span lang=3D"EN-US" style=3D"color:black">&nbsp;&nbsp; o&nbsp; Option=
ally, (traffic/CPU/memory) load balancing objectives at the</span><span sty=
le=3D"color:black"><o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"color:black">&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp; SFC level or on a per node (e.g., per-SF/SFF/SFP proxy) basis.</span><s=
pan style=3D"color:black"><o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;</span><span style=3D"col=
or:black"><o:p></o:p></span></p>
</div>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Jim&gt; that seems fine.<o:=
p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<div>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Minor point =
-&gt; typo in bullet point 6 &#8211; SFP proxy should read
<b>SFC</b>&nbsp;proxy</span><span style=3D"color:black"><o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">[Med] Fixed. Thanks.</span><span style=3D"colo=
r:black"><o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l3 level1 lfo2">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 2.3 Coherent Setup of an SFC-enabled Domain</span><o:p=
></o:p></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">What does the sentence &#82=
20;various transport encapsulation schemes and/or variations of SFC header =
implementations may be supported&#8221; actually mean ? Are we referring
 to the fact that the SFC header may carry type-1 or type-2 metadata or som=
ething else ? Note that there is only
<b>one </b>SFC header implementation based on the WG charter so if we are r=
eferring to different SFC formats (meaning metadata) then please make this =
clear in the text, and if not, please remove this sentence.&nbsp;</span><sp=
an style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;</span><span style=3D"color:black"><o:p>=
</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:5.25pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black">[M=
ed] That sentence is related to the rich set of transport encapsulation sch=
emes, but also that nsh header includes a version
 number. </span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:5.25pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black">&n=
bsp;</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:5.25pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black">Th=
e current nsh spec does not specify how nodes with distinct nsh versions ar=
e supposed to behave. Also, we don&#8217;t know in 2016
 (because there is no nsh v2) whether v0 and v2 will be backward compatible=
. If these versions are not backward compatible, this will lead to failures=
 when two adjacent elements in a service chain do not support the same vers=
ion.
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:5.25pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black">&n=
bsp;</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:5.25pt"><span lang=3D"EN-US" st=
yle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black">Th=
e cp is key to ensure coherent setup of an SFC-domain to avoid failures tha=
t are due to unsupported version and/or unsupported
 transport encapsulation.</span><span style=3D"color:black"><o:p></o:p></sp=
an></p>
</div>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Jim&gt; maybe just replace =
&#8220;variations&#8221; with &#8220;versions&#8221; so that it is clear wh=
at is being talked about ?<o:p></o:p></span></p>
</div>
<div>
<div>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l4 level1 lfo3">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 3.1 Reference Architecture</span><o:p></o:p></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Second bullet point &#8220;=
mapping between service function chains and SFPs&#8221; - this is a general=
 comment for the entire document but applies here also. There is no
 mention of mapping SFPs -&gt; RSPs &#8211; in fact RSP is mentioned only o=
nce in the entire document. The architecture is explicit in that the SFP wh=
en rendered into the network is an RSP and therefore the SFC control plane =
element needs to have information on currently
 deployed RSPs.</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;</span><span style=3D"color:black"><o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] I agree RSP is not explic=
itly mentioned in Section 3.1, but the point you raised is what is under th=
is bullet:
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;</span><span style=3D"col=
or:black"><o:p></o:p></span></p>
<pre><span lang=3D"EN-US" style=3D"color:black">&nbsp;&nbsp; o&nbsp; Determ=
ine a forwarding path in the context of a centralized</span><span style=3D"=
color:black"><o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"color:black">&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp; </span><span style=3D"color:black">deployment model (see <a href=3D"htt=
ps://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#section-3.2">Secti=
on 3.2</a>).<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;</span><span style=3D"col=
or:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Section 3.2 states the followin=
g:</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;</span><span style=3D"col=
or:black"><o:p></o:p></span></p>
<pre><span lang=3D"EN-US" style=3D"color:black">&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp; For some traffic engineering proposes, the SFP may be constrained</span=
><span style=3D"color:black"><o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"color:black">&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp; by the control plane; as such, some SFPs can be fully specified</span><=
span style=3D"color:black"><o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"color:black">&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp; (i.e., list all the SFF/SFs that need to be solicited) or</span><span s=
tyle=3D"color:black"><o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"color:black">&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp; partially specified (e.g., exclude some nodes, explicitly select</span>=
<span style=3D"color:black"><o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"color:black">&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp; which instance of a given SF needs to be invoked, etc.).</span><span st=
yle=3D"color:black"><o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></pre>
</div>
<div>
<pre><span lang=3D"EN-US" style=3D"color:black">Do you think a change is st=
ill needed to the text? </span><span style=3D"color:black"><o:p></o:p></spa=
n></pre>
</div>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Jim&gt; no I am fine with t=
he text as it stands.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<div>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<pre><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D"co=
lor:black"><o:p></o:p></span></pre>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Additionally=
 there is no interface specified for communication between the SFC Control =
Plane Element and SF management systems.
</span><span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;;color:black">This is an important aspect as many SF&#821=
7;s may require that SFC information be communicated to their management sy=
stems that will be responsible for communicating directly with
 their respective SF&#8217;s.&nbsp;</span><span style=3D"color:black"><o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;</span><span style=3D"color:black"><o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] Good point. I suggest thi=
s change in Section 3.3.3 that I believe is sufficient to take into account=
 this comment:
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;</span><span style=3D"col=
or:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">OLD:</span><span style=3D"color=
:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;</span><span style=3D"col=
or:black"><o:p></o:p></span></p>
<pre><span lang=3D"EN-US" style=3D"color:black">&nbsp;&nbsp; The SFC contro=
l plane uses this interface to interact with SFC-aware</span><span style=3D=
"color:black"><o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"color:black">&nbsp;&nbsp; </span><span s=
tyle=3D"color:black">SFs.<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;</span><span style=3D"col=
or:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">NEW:</span><span style=3D"color=
:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;</span><span style=3D"col=
or:black"><o:p></o:p></span></p>
<pre><span lang=3D"EN-US" style=3D"color:black">&nbsp;&nbsp; The SFC contro=
l plane uses this interface to interact with SFC-aware</span><span style=3D=
"color:black"><o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"color:black">&nbsp;&nbsp; SFs. This inte=
raction may be direct or via dedicated SF management systems.</span><span s=
tyle=3D"color:black"><o:p></o:p></span></pre>
</div>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Jim&gt; that looks good.<o:=
p></o:p></span></p>
</div>
<div>
<div>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l2 level1 lfo4">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 3.1.1. C1: Interface between SFC Control Plane &amp; S=
FC Classifier</span><o:p></o:p></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">The sentence &#8220;The con=
trol plane may instruct the classifier about the initial values of the Serv=
ice Index (SI)&#8221; should be changed to say
<b>MUST</b>&nbsp;as otherwise if a classifier chooses whatever value it wan=
ts then that may not align with what is programmed into the SFFs by the SFC=
 Control Plane element.</span><span style=3D"font-size:10.5pt;font-family:&=
quot;Courier New&quot;;color:black;background:#FFFDF5">&nbsp;</span><span s=
tyle=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;</span><span style=3D"color:black"><o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] Makes sense. I made the c=
hange in my local copy.</span><span style=3D"color:black"><o:p></o:p></span=
></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l5 level1 lfo5">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 4.10.4. Encoding the Exact SFF/SF Sequence in Data Pac=
kets</span><o:p></o:p></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">This section does not actua=
lly provide any meaning or indication of relationship with the SFC Control =
Plane element. Furthermore, &nbsp;there has been no WG consensus
 to carry source routes within the SFC encapsulation. Therefore this entire=
 section should be removed from the document.</span><span style=3D"color:bl=
ack"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;</span><span style=3D"color:black"><o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] FWIW, there was a call ab=
out this section (<a href=3D"https://www.ietf.org/mail-archive/web/sfc/curr=
ent/msg03756.html">https://www.ietf.org/mail-archive/web/sfc/current/msg037=
56.html</a>).
 This section does not recommend nor exclude source routes.</span><span sty=
le=3D"color:black"><o:p></o:p></span></p>
</div>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Jim&gt; the title of the se=
ction is &#8220;Encoding the exact SFF/SF sequence in data packets&#8221; w=
hich is pretty clear what that means. The
<u>only</u> encoding of the SFF/SF sequence supported by the SFC encapsulat=
ion (taking type-2 metadata out of the equation) is the SPI &#43; SI (which=
 is actually a reference to the placement within the service path rather th=
an an encoding directly of a service
 sequence in the data plane) hence again I think this section should be rem=
oved from the document.&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Jim<o:p></o:p></span></p>
</div>
<div>
<div>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l0 level1 lfo6">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 4.10.5. Fully Controlled SFF/SF Sequence for a SFP</sp=
an><o:p></o:p></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Figure 2 lists 3 different =
SFP-id&#8217;s whereas the text mentions only SFP-id #1. Is this simply a t=
ypo or are you trying to convey something else ?</span><span style=3D"color=
:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Further you state that &#82=
20;the steering policies to a SFF node for service function chain depends o=
n if the packet comes from previous SFF or comes from a specific
 SF i.e., the SFP Forwarding Table entries have to be ingress port specific=
&#8221; - &nbsp;this is an inaccurate statement as the combination of the S=
FP-id and service-index determines the forwarding behavior (as specified in=
 section 3.3 &amp; section 7 of draft-ietf-sfc-nsh-04).
 &nbsp;This sentence should be removed from the text.</span><span style=3D"=
color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] I will defer to Linda/And=
rew to clarify this part of that text. &nbsp;&nbsp;&nbsp;</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;</span><span style=3D"col=
or:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Jim</span><span style=3D"co=
lor:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">On 4/27/16, 12:29 AM, &quot=
;sfc on behalf of Martin Stiemerling&quot; &lt;<a href=3D"mailto:sfc-bounce=
s@ietf.org">sfc-bounces@ietf.org</a> on behalf of
<a href=3D"mailto:mls.ietf@gmail.com">mls.ietf@gmail.com</a>&gt; wrote:</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<blockquote style=3D"border:none;border-left:solid #B5C4DF 4.5pt;padding:0c=
m 0cm 0cm 4.0pt;margin-left:3.75pt;margin-top:5.0pt;margin-right:0cm;margin=
-bottom:5.0pt" id=3D"MAC_OUTLOOK_ATTRIBUTION_BLOCKQUOTE">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Dear all,</span><span style=
=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">This is the start of the Wo=
rking Group Last Call (WGLC) for</span><span style=3D"color:black"><o:p></o=
:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">draft-ietf-sfc-control-plan=
e-04.txt</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">The WGLC lasts for 2 weeks =
and will end May 11th at 10 pm PDT.</span><span style=3D"color:black"><o:p>=
</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Please send your comments a=
nd reviews to the
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> list.</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Regards,</span><span style=
=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;&nbsp; Martin (SFC co=
-chair)</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">___________________________=
____________________</span><span style=3D"color:black"><o:p></o:p></span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">sfc mailing list</span><spa=
n style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><a href=3D"mailto:sfc@ietf.=
org">sfc@ietf.org</a></span><span style=3D"color:black"><o:p></o:p></span><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><a href=3D"https://www.ietf=
.org/mailman/listinfo/sfc">https://www.ietf.org/mailman/listinfo/sfc</a></s=
pan><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
</blockquote>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_787AE7BB302AE849A7480A190F8B933008D6153FOPEXCLILMA3corp_--


From nobody Thu Apr 28 08:02:44 2016
Return-Path: <agmalis@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 67D5212D6A2 for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 08:02:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dLDxTqW6KBJT for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 08:02:36 -0700 (PDT)
Received: from mail-oi0-x22e.google.com (mail-oi0-x22e.google.com [IPv6:2607:f8b0:4003:c06::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 388DC12D815 for <sfc@ietf.org>; Thu, 28 Apr 2016 08:02:30 -0700 (PDT)
Received: by mail-oi0-x22e.google.com with SMTP id v145so53243942oie.0 for <sfc@ietf.org>; Thu, 28 Apr 2016 08:02:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=BbYSioZ9KsetwM4ybsDaRLTZndWMx6BikT/tG2ceaK0=; b=gDnR7758GmOzRztk0ARx9QaGNYiHb79fCUzVywnC5k0ykEbNthE6lSfNwxKRiIUTju lvIcBnCeOiZYdp6tImG5xsbaeX2civIaH7p/qQxonK8eR+1jqu7SlBMCWunCotBB8r53 cyh5J0Qm2QyiTeINYlI8jS8RQAy/qnEcGGoNOfU8WhD2kDOZkeui5o251wfKy+h1vcpb oi6iYIIAapZbWJ1lKiG/rhHxwfPRen/DF8Qn3P3O31TT9xu56khVNyjasMjhapCYUdos lZZf9ZPTDErAe1Z+59k37/n5/cnExSocul1LMSbS5deCXePWdCLgnEd2L7J97yTRwVAr euIQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=BbYSioZ9KsetwM4ybsDaRLTZndWMx6BikT/tG2ceaK0=; b=fPQ/0lEJ7PG8vLWLevIfM1Qhv4ZSXcpHDQdAAMsvVHfBKUVV0aTXoME312HkFKJLlE 6vQRH+hBJ99/A9SsCmwO+p1mASiYWGj5QrGSegFurwuW3Kzu8+hvaFdxVJHcLaa1O3SB cQtIUYECEh6aji1N7EbU0h7+6KT1iVRqiYXtSpMdhTvFOGo/HH9nSrHRIgcahiBZLl9k DXvR4EGoMeoBHKnuIjL1LHbtNmL+LI0lCaSzRoiDZK+Bh3M0nyYyexzr9NcYV4r/xvAR InACIutxZ+nw69WUxXWsk6q6WYXe3Cq1UPL98XZKxcfqOLTKa+CcbmvJYfY6HEChBgiR 9eYg==
X-Gm-Message-State: AOPr4FVSK2KgUSMhE/ixMn5mq1U76PuDTFDzc7DYmR4VZvqAHqcUKbec4xLke6ixHzH38N2Gu+LwiL0IKq5rNg==
X-Received: by 10.157.13.227 with SMTP id 90mr7553125ots.79.1461855750058; Thu, 28 Apr 2016 08:02:30 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.182.231.106 with HTTP; Thu, 28 Apr 2016 08:02:10 -0700 (PDT)
In-Reply-To: <D3478632.4C66A%jguichar@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb> <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com> <CAA=duU0cjXbTxTCqaRetajxFaJVfq8Y-HySPDrR-0AN38Wq3Zw@mail.gmail.com> <4d65232a-d4a6-a11b-c765-635cb909edbd@joelhalpern.com> <CAA=duU0PujWB0LB=wxFauPqaqbf4kFsqkzAwtNn7r3MzBUdCqA@mail.gmail.com> <D3478632.4C66A%jguichar@cisco.com>
From: "Andrew G. Malis" <agmalis@gmail.com>
Date: Thu, 28 Apr 2016 11:02:10 -0400
Message-ID: <CAA=duU1guf-VmkYV3=-JQVULm-cHir4XwTEmhm14H2Z8o7euAg@mail.gmail.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>
Content-Type: multipart/alternative; boundary=94eb2c110014b22d7005318cd06d
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/b2KBT_OkZvBkVByjuvZaYH4nDsg>
Cc: "Elzur, Uri" <uri.elzur@intel.com>, Joel Halpern Direct <jmh.direct@joelhalpern.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 15:02:42 -0000

--94eb2c110014b22d7005318cd06d
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Jim,

The way option 3 is currently worded, there=E2=80=99s no indication that th=
is is
just an example, and not a direction to use RFC 6830, section 5.4. I just
had an offline discussion with Joel, and he and I agree that a better
wording for option 3 would be "Use the fragmentation provided by the
network overlay mechanics. One example can be found in RFC 6830, section
5.4.=E2=80=9D

Thanks,
Andy

On Thu, Apr 28, 2016 at 9:22 AM, Jim Guichard (jguichar) <jguichar@cisco.co=
m
> wrote:

> Hi Andy,
>
> I think the key point is that NSH !=3D network overlay but rather utilize=
s a
>  network overlay for packet transport between SFC network elements. The
> reference is just an example of how a network overlay might deal with
> fragmentation and is not a suggestion that NSH adopt that mechanism but
> rather makes the point that it can utilize the existing network overlay
> mechanics.
>
> Jim
>
> From: sfc <sfc-bounces@ietf.org> on behalf of "Andrew G. Malis" <
> agmalis@gmail.com>
> Date: Thursday, April 28, 2016 at 8:17 AM
> To: Joel Halpern Direct <jmh.direct@joelhalpern.com>
> Cc: "Elzur, Uri" <uri.elzur@intel.com>, "mohamed.boucadair@orange.com" <
> mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda
> Dunbar <linda.dunbar@huawei.com>
> Subject: Re: [sfc] Suggested wording addtion to the Section 6
> (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
>
> Joel,
>
> The diagrams in section 6 of RFC 6830 are control plane, not data plane.
> The data plane diagrams are in section 5.
>
> But the overriding question is - without any fields in the NSH header to
> sequence fragments, how can the fragments be correctly reassembled?
>
> Cheers,
> Andy
>
> On Wed, Apr 27, 2016 at 7:46 PM, Joel Halpern Direct <
> jmh.direct@joelhalpern.com> wrote:
>
>> The LISP header does not have a fragment flag or fragment offset.  The
>> diagrams in section 6 include the outer encapsulating header (the
>> equivalent of the transport header in SFC.)  Yes, the text is a little h=
ard
>> to follow in this regard.  The LISP working group is going to be rewriti=
ng
>> RFC 6830 as part of moving to standards track.
>>
>> So there is no difference in this regard between NSH and LISP.
>>
>> Yours,
>> Joel
>>
>> On 4/27/16 7:02 PM, Andrew G. Malis wrote:
>>
>>> Joel et al,
>>>
>>> All this talk about fragmentation prompted me to re-read section 6 of
>>> the draft, which recommends (as option 3) using the procedures in
>>> section 5.4 of RFC 6830 (presumably with the =E2=80=9CNSH header=E2=80=
=9D replacing the
>>> =E2=80=9CLISP header=E2=80=9D in the description of the procedures in t=
hat section).
>>>
>>> So that led me to read that section (and the LISP header definition in
>>> section 5.1), and I see that LISP does fragmentation and reassembly
>>> identically to IPv4, using the Fragment Offset field so that fragments
>>> can be correctly reassembled in the proper order.
>>>
>>> However, the NSH Header doesn=E2=80=99t have a Fragment Offset field or=
 any
>>> other way to order the fragments.
>>>
>>> So how can the procedures in Section 5.4 of 6830 be used?
>>>
>>> Thanks,
>>> Andy
>>>
>>> On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern <jmh@joelhalpern.com
>>> <mailto:jmh@joelhalpern.com>> wrote:
>>>
>>>     Both methods are valid, and both depend upon details of the
>>>     underlying packet and the transport.  As such, I don't see why this
>>>     document benefits from describing them, much less why it should mar=
k
>>>     one method as a "should".  Implementation details are likely to be
>>>     more significant than any bit consumption difference between the tw=
o
>>>     alternatives.
>>>
>>>     Yours,
>>>     Joel
>>>
>>>
>>>     On 4/27/16 3:40 PM, Linda Dunbar wrote:
>>>
>>>         I suggest adding the following paragraphs after the Bullet 3 of
>>>         the Section 6 Fragmentation Consideration to make the process
>>>         more clear and less controversial:
>>>
>>>
>>>         --------------------------------
>>>
>>>         RFC6830 describes the fragmentation method of breaking the
>>>         original packet into two equal sub-frames and encapsulating
>>>         [LISP Header + Transport header] to each sub-frame.
>>>
>>>         If LISP fragmentation [RFC6830 Section 5.4] is used, the [SFC
>>>         Header + Transport Header] will be added to each half frame (or
>>>         the original data frame). As the Transport Header is terminated
>>>         by the next SFF node's tunnel transport layer, the combined two
>>>         sub-frames will have two SFC Headers.
>>>
>>>         Therefore, the fragmentation for NSH encapsulated data frame
>>>         should be done completely by the node tunnel transport layer,
>>>         which should break the [SFC + original packet] into two equal
>>>         sub-frames and each sub-frame being encapsulated with its
>>>         respective tunnel header.  The next SFF node's tunnel transport
>>>         layer should combine the two sub-frames before sending to the
>>>         next node.
>>>
>>>         ------------------------------------------------------
>>>
>>>
>>>         By the way, there are to typo in the Section 6:
>>>         3rd line: "In order the" =3D=3D> "In order to"
>>>         Last line of Bullet 2: extra "the" in the "utilized to ensure
>>>         the the required packet".
>>>
>>>
>>>         Hope it helps.
>>>
>>>         Linda
>>>
>>>
>>>
>>>         -----Original Message-----
>>>         From: mohamed.boucadair@orange.com
>>>         <mailto:mohamed.boucadair@orange.com>
>>>         [mailto:mohamed.boucadair@orange.com
>>>         <mailto:mohamed.boucadair@orange.com>]
>>>         Sent: Wednesday, April 27, 2016 12:40 AM
>>>         To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; sfc@ietf.org
>>>         <mailto:sfc@ietf.org>
>>>         Subject: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>>
>>>         Hi Joel, all,
>>>
>>>         Please see inline.
>>>
>>>         Cheers,
>>>         Med
>>>
>>>             -----Message d'origine-----
>>>             De : Joel M. Halpern [mailto:jmh@joelhalpern.com
>>>             <mailto:jmh@joelhalpern.com>] Envoy=C3=A9 : mardi 26
>>>             avril 2016 19:18 =C3=80 : Linda Dunbar; BOUCADAIR Mohamed
>>>             IMT/OLN; Elzur,
>>>             Uri; sfc@ietf.org <mailto:sfc@ietf.org> Objet : Re: [sfc] W=
G
>>>             last call for
>>>             draft-ietf-sfc-nsh-04.txt
>>>
>>>             With regard to Transport tunnel fragementation, that seems
>>>             an issue
>>>             for the transport protocol.  I don't actually object to a
>>>             sentence,
>>>             but it does not seem that it will accomplish anything.
>>>
>>>
>>>         [Med] I would like to see some text added to the draft.
>>>
>>>
>>>             With regard to packets fragmented by the source, I
>>>             completely disagree
>>>             with your assertion.  If an SFF were to reassemble the
>>>             packets, that
>>>             would be a violation of its job.
>>>
>>>
>>>         [Med] I agree with you.
>>>
>>>           There is no reason for an SFF to
>>>
>>>             reassemble a packet fragmented by the source.  The
>>>             classifier may have
>>>             to do some interesting things in order to properly classify
>>>             succeeding
>>>             fragments, but that is an implementation issue (most common=
ly
>>>             addressed with virtual reassembly, which doe snot delay the
>>>             fragments.)  We don't specity that.
>>>
>>>
>>>         [Med] Still, the external behavior of the classifier needs to b=
e
>>>         clear in the document. I don't find any text in the draft sayin=
g
>>>         for instance that an NSH header must be present in all
>>>         fragments. (There some processing that might be needed at the
>>>         SFF to "do its job" with regards to fragments (receive out of
>>>         order fragments + forwarding policy on the full packet).)
>>>
>>>
>>>             If an SF needs to reassemble fragments to do its job, that
>>>             is up to
>>>             the SF.  Some will need to actually reassemble.  Some will
>>>             need to
>>>             perform virtual reassembly, and some will happily process t=
he
>>>             fragments.  I can not see what the NSH document could
>>>             possibly mandate.
>>>
>>>
>>>         [Med] Fully agree.
>>>
>>>
>>>             Yours,
>>>             Joel
>>>
>>>             On 4/26/16 11:47 AM, Linda Dunbar wrote:
>>>
>>>                 Joel,
>>>
>>>                 I think the document should add the description on the
>>>                 following two
>>>                 fragmentation scenarios:
>>>
>>>                 - Transport tunnel generated fragmentation: When a pack=
et
>>>                 fragmentation is caused by transport tunnel (i.e. vario=
us
>>>                 encapsulations), the termination point of the transport
>>>                 tunnel is
>>>                 responsible for re-assembling the fragmented pieces of
>>>                 the packet.
>>>                 Since there won't be any SFF nodes in between the
>>>                 Transport Tunnel,
>>>                 the tunnel generated fragmentation does not require any
>>>                 actions by
>>>                 SFF nodes or SF nodes.
>>>
>>>
>>>                 - Source node generated fragmentation (after adding on
>>>                 the NSH
>>>                 header): When fragmentation has to be performed for a
>>>                 packet being
>>>                 encapsulated with the NSH header, either the
>>>                 intermediate SFF nodes
>>>                 or the SF nodes have to be able to reassemble the
>>>                 fragmented pieces.
>>>
>>>
>>>
>>>
>>>                 Cheers,
>>>
>>>
>>>                 Linda
>>>
>>>                 -----Original Message----- From: Joel M. Halpern
>>>                 [mailto:jmh@joelhalpern.com
>>>                 <mailto:jmh@joelhalpern.com>] Sent: Tuesday, April 26,
>>>                 2016 10:33 AM
>>>                 To: Linda Dunbar; mohamed.boucadair@orange.com
>>>                 <mailto:mohamed.boucadair@orange.com>; Elzur, Uri;
>>>                 sfc@ietf.org <mailto:sfc@ietf.org> Subject: Re: [sfc] W=
G
>>>                 last call for
>>>                 draft-ietf-sfc-nsh-04.txt
>>>
>>>                 Re-reading your note, it is possible that you are
>>>                 referring only to
>>>                 the case of transport generated fragmentation of the
>>>                 outer packet.
>>>                 I had assumed you were not talking about that, since th=
e
>>>                 resulting
>>>                 fragments will not all have NSH headers.  As with any
>>> tunnel
>>>                 technology, if the tunnel chooses to fragment at its
>>>                 layer, then the
>>>                 tunnel is responsible for reassembly.  That would be
>>>                 invisible to
>>>                 the SFF.
>>>
>>>                 Yours, Joel
>>>
>>>                 On 4/26/16 11:10 AM, Linda Dunbar wrote:
>>>
>>>                     Agree with Med.
>>>
>>>                     Even if each fragment piece of a packet with NSH
>>>                     header carries the
>>>                     NSH header, the intermediate SFF nodes still need t=
o
>>>                     put together
>>>                     all the fragments together before passing the whole
>>>                     data frame to
>>>                     the SF.
>>>
>>>                     Linda
>>>
>>>                     -----Original Message----- From: sfc
>>>                     [mailto:sfc-bounces@ietf.org
>>>                     <mailto:sfc-bounces@ietf.org>]
>>>                     On Behalf Of mohamed.boucadair@orange.com
>>>                     <mailto:mohamed.boucadair@orange.com> Sent: Monday,
>>>                     April 25,
>>>                     2016 9:42 AM To: Elzur, Uri; Joel M. Halpern;
>>>                     sfc@ietf.org <mailto:sfc@ietf.org> Subject:
>>>                     Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.tx=
t
>>>
>>>                     Re-,
>>>
>>>                     How do you instruct the transport layer to ALWAYS
>>>                     prepend an NSH
>>>                     header even for fragments? Or you don't care about
>>> that?
>>>
>>>                     Thank you.
>>>
>>>                     Cheers, Med
>>>
>>>                         -----Message d'origine----- De : Elzur, Uri
>>>                         [mailto:uri.elzur@intel.com
>>>                         <mailto:uri.elzur@intel.com>] Envoy=C3=A9 : lun=
di 25
>>>                         avril 2016 16:26 =C3=80
>>>                         : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;
>>>                         sfc@ietf.org <mailto:sfc@ietf.org> Objet
>>>                         : RE: [sfc] WG last call for
>>>                         draft-ietf-sfc-nsh-04.txt
>>>
>>>                         Hi Med
>>>
>>>                         Not to repeat my position, but I'll do it anyho=
w
>>>                         :-) As NSH is
>>>                         *NOT* a transport, dealing with fragmentation i=
s
>>>                         left to the
>>>                         Transport used.
>>>
>>>                         The model I use for NSH, is basically similar t=
o
>>>                         VXLAN . It is an
>>>                         overly.
>>>
>>>                         Thx
>>>
>>>                         Uri ("Oo-Ree") C: 949-378-7568 <tel:949-378-756=
8
>>> >
>>>
>>>
>>>                         -----Original Message----- From: sfc
>>>                         [mailto:sfc-bounces@ietf.org
>>>                         <mailto:sfc-bounces@ietf.org>]
>>>                         On Behalf Of mohamed.boucadair@orange.com
>>>                         <mailto:mohamed.boucadair@orange.com> Sent:
>>>                         Monday, April 25,
>>>                         2016 7:18 AM To: Joel M. Halpern
>>>                         <jmh@joelhalpern.com <mailto:jmh@joelhalpern.co=
m
>>> >>;
>>>                         sfc@ietf.org <mailto:sfc@ietf.org>
>>>                         Subject: Re: [sfc] WG last call for
>>>                         draft-ietf-sfc-nsh-04.txt
>>>
>>>                         Hi Joel,
>>>
>>>                         Please see inline.
>>>
>>>                         Cheers, Med
>>>
>>>                             -----Message d'origine----- De : Joel M.
>>> Halpern
>>>                             [mailto:jmh@joelhalpern.com
>>>                             <mailto:jmh@joelhalpern.com>] Envoy=C3=A9 :=
 lundi
>>>                             25 avril 2016 15:48 =C3=80
>>>                             : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org
>>>                             <mailto:sfc@ietf.org> Objet : Re: [sfc] WG
>>>                             last call for draft-ietf-sfc-nsh-04.txt
>>>
>>>                             If I am understanding you correctly Med, yo=
u
>>>                             are asking that the
>>>                             NSH draft specify how service chaining
>>>                             should cope with packets
>>>                             that have been fragmented?
>>>
>>>
>>>                         [Med] To be accurate, I'm asking to assess
>>>                         whether there are
>>>                         implications. If there are, then the draft
>>>                         should be updated
>>>                         accordingly.
>>>
>>>                             NSH, and the SFF functionality, does not
>>> care.
>>>
>>>
>>>                         [Med] I'm not that sure. Some typical
>>>                         implications are listed
>>>                         below:
>>>
>>>                         * SFF: If the NSH header is present only in the
>>>                         a fragment but SFF
>>>                         didn't maintained a state, subsequent fragments
>>>                         won't be
>>>                         appropriately processed. * SFC-aware function:
>>>                         if prepending a
>>>                         context information depends on the full packet,
>>>                         not only a
>>>                         fragment.
>>>
>>>                         It just does its job.
>>>
>>>                         [Med] which may be disturbed in some situations
>>>                         as listed in the
>>>                         examples above.
>>>
>>>                             Ingress and intermediate classifiers may
>>>                             cope with fragments in
>>>                             any number of ways.
>>>
>>>                         Specifying such is clearly out of scope for thi=
s
>>>                         draft.
>>>
>>>                         [Med] The purpose is not to specify the interna=
l
>>>                         implementation
>>>                         details but the external behavior of the
>>>                         classifier function when
>>>                         it comes to handle fragments. That behavior may
>>>                         have an incidence
>>>                         on SFF, in particular. The purpose is not to
>>>                         recommend the maximum
>>>                         resources to be dedicated to out of order
>>>                         fragments nor the
>>>                         timeout to cache those; these considerations ar=
e
>>>                         of course out of
>>>                         scope. Nevertheless, an implementation should
>>>                         offer a configurable
>>>                         parameter so that an operator tweak those
>>>                         according to its
>>>                         context.
>>>
>>>                             I suppose one could write an informational
>>>                             draft on possible ways
>>>                             of coping.  The IETF has not usually
>>>                             published such.
>>>                             Service functions have to cope with
>>>                             fragmented packets just as
>>>                             they had to before the advent of NSH, so
>>>                             describing that is
>>>                             clearly not needed here.
>>>
>>>
>>>                         [Med] The advent of NSH has the following
>>>                         implications: * it
>>>                         exacerbates fragmentation. Handing over this
>>>                         issue to the
>>>                         transport layer may lead to interoperability
>>>                         issues. * the
>>>                         chaining may not be efficient if fragments are
>>>                         inappropriately
>>>                         handled.
>>>
>>>                         Introducing NSH should not degrade the overall
>>>                         service compared to
>>>                         legacy service deployment schemes.
>>>
>>>
>>>                             Yours, Joel
>>>
>>>                             On 4/25/16 3:00 AM,
>>>                             mohamed.boucadair@orange.com
>>>                             <mailto:mohamed.boucadair@orange.com> wrote=
:
>>>
>>>                                 Re-,
>>>
>>>                                 I hear you, but my comment is that we
>>>                                 need, as a WG, to decide
>>>                                 what to
>>>
>>>                             put in the draft. FWIW, I'm discussing two
>>>                             fragmentation
>>>                             issues:
>>>
>>>
>>>                                 (1) Fragmentation that is caused by
>>>                                 prepending an SFC header.
>>>                                 (2) Handling fragments at the ingress o=
f
>>>                                 an SFC-enabled domain.
>>>
>>>                                 Increasing the MTU is for sure a
>>>                                 recommendation is to be
>>>                                 explicitly
>>>
>>>                             called out in the text (see my first
>>> message).
>>>
>>>
>>>                                 There are other issues that need to be
>>>                                 discussed, e.g., how to
>>>                                 deal with
>>>
>>>                             fragments in SFFs/Classifiers?
>>>
>>>
>>>                                 It is also "prudent" to check that no
>>>                                 issues will be experienced
>>>                                 in SFF
>>>
>>>                             to handle fragments. If an SFC header is
>>>                             prepended for all
>>>                             fragments, I'm not sure there
>>>
>>>                                 is any particular issue at the SFF
>>>                                 level, except if
>>>                                 stripping/adding
>>>
>>>                             context TLVs depends on the full packet (no=
t
>>>                             just fragment). It
>>>                             is warranted to consider a little bit this
>>>                             point before declaring
>>>                             there is no issue.
>>>
>>>
>>>                                 For point (1), declaring fragmentation
>>>                                 out of scope would be
>>>                                 meant that
>>>
>>>                             an implementation must be prepared to
>>>                             receive fragments with or
>>>                             without NSH header as this is a decision
>>>                             that is left to the
>>>                             transport encapsulation. This is a
>>>                             requirement per se!
>>>
>>>
>>>                                 I won't reiterate all the comments I
>>>                                 have about the current
>>>                                 wording of
>>>
>>>                             this section.
>>>
>>>
>>>                                 Cheers, Med
>>>
>>>                                     -----Message d'origine----- De :
>>>                                     Elzur, Uri
>>>                                     [mailto:uri.elzur@intel.com
>>>                                     <mailto:uri.elzur@intel.com>] Envoy=
=C3=A9
>>>                                     : lundi 25 avril 2016
>>>                                     08:30 =C3=80 : BOUCADAIR Mohamed IM=
T/OLN;
>>>                                     Thomas Narten;
>>>                                     sfc@ietf.org <mailto:sfc@ietf.org>
>>>                                     Objet : RE: [sfc] WG last call for
>>>                                     draft-ietf-sfc-nsh-04.txt
>>>
>>>                                     Hi Med
>>>
>>>                                     My point is that Fragmentation is
>>>                                     yet another transport related
>>>                                     issue
>>>
>>>                             that
>>>
>>>                                     is beyond the scope of NSH and
>>>                                     beyond the charter of the WG, so
>>>                                     it
>>>
>>>                             doesn't
>>>
>>>                                     really belong in the draft. We are
>>>                                     providing an advice as
>>>                                     extending the size of the packet ma=
y
>>>                                     lead to fragmentation, but
>>>                                     as you check RFC 7348 VxLAN, which
>>>                                     my create the same issue,
>>>                                     you'll find it doesn't even
>>>
>>>                             relate
>>>
>>>                                     to it.
>>>
>>>                                     Thx
>>>
>>>                                     Uri ("Oo-Ree") C: 949-378-7568
>>>                                     <tel:949-378-7568>
>>>
>>>
>>>                                     -----Original Message----- From: sf=
c
>>>                                     [mailto:sfc-bounces@ietf.org
>>>                                     <mailto:sfc-bounces@ietf.org>] On
>>>                                     Behalf Of
>>>                                     mohamed.boucadair@orange.com
>>>                                     <mailto:mohamed.boucadair@orange.co=
m>
>>> Sent:
>>>                                     Sunday, April 24, 2016
>>>                                     10:32 PM To: Elzur, Uri
>>>                                     <uri.elzur@intel.com
>>>                                     <mailto:uri.elzur@intel.com>>;
>>>                                     Thomas Narten
>>>
>>>                             <narten@us.ibm.com <mailto:narten@us.ibm.co=
m
>>> >>;
>>>
>>>                                     sfc@ietf.org <mailto:sfc@ietf.org>
>>>                                     Subject: Re: [sfc] WG last call for
>>>                                     draft-ietf-sfc-nsh-04.txt
>>>
>>>                                     Hi Uri,
>>>
>>>                                     That's another option that needs to
>>>                                     be discussed/investigated.
>>>                                     I'm
>>>
>>>                             afraid
>>>
>>>                                     this is not the rationale adopted i=
n
>>>                                     -04 since it includes some
>>>                                     text
>>>
>>>                             that
>>>
>>>                                     is far to be sufficient to ensure
>>>                                     interoperable
>>>                                     implementations.
>>>
>>>                                     BTW, saying that nsh does not need
>>>                                     to deal with fragmentation
>>>                                     because
>>>
>>>                             it
>>>
>>>                                     is transport-independent is not IMH=
O
>>>                                     a good strategy to adopt
>>>                                     here
>>>
>>>                             because
>>>
>>>                                     it opens the door for interoperable
>>>                                     issues, it may lead to
>>>                                     sub-optimal implementations if the
>>>                                     sfc information is present
>>>                                     only in one
>>>
>>>                             fragments,
>>>
>>>                                     etc.
>>>
>>>                                     My comments are related to the
>>>                                     current text in the -04.
>>>                                     This text needs
>>>
>>>                             to
>>>
>>>                                     be fixed somehow.
>>>
>>>                                     Cheers, Med
>>>
>>>                                         -----Message d'origine----- De =
:
>>>                                         Elzur, Uri
>>>                                         [mailto:uri.elzur@intel.com
>>>                                         <mailto:uri.elzur@intel.com>]
>>>                                         Envoy=C3=A9 : dimanche 24 avril
>>>                                         2016 17:36 =C3=80 : BOUCADAIR M=
ohamed
>>>                                         IMT/OLN; Thomas Narten;
>>>                                         sfc@ietf.org
>>>                                         <mailto:sfc@ietf.org> Objet :
>>>                                         RE: [sfc] WG last call for
>>>                                         draft-ietf-sfc-nsh-04.txt
>>>
>>>                                         Hi Med
>>>
>>>                                         I see no need to specify the
>>>                                         exact behavior as NSH is
>>>                                         transport independent i.e. like
>>>                                         NSH interaction with any other
>>>                                         Transport eh issue of
>>>                                         Fragmentation is to be dealt in
>>>                                         a way
>>>                                         that matches the mechanisms
>>>                                         supported by the Transport used
>>>                                         and do not belong in the NSH
>>> draft
>>>
>>>                                         Thx
>>>
>>>                                         Uri ("Oo-Ree") C: 949-378-7568
>>>                                         <tel:949-378-7568>
>>>
>>>
>>>                                         -----Original Message----- From=
:
>>> sfc
>>>                                         [mailto:sfc-bounces@ietf.org
>>>                                         <mailto:sfc-bounces@ietf.org>]
>>>                                         On Behalf Of
>>>                                         mohamed.boucadair@orange.com
>>>                                         <mailto:
>>> mohamed.boucadair@orange.com>
>>>                                         Sent: Thursday, April 14,
>>>                                         2016 12:43 AM To: Thomas Narten
>>>                                         <narten@us.ibm.com
>>>                                         <mailto:narten@us.ibm.com>>;
>>>                                         sfc@ietf.org
>>>                                         <mailto:sfc@ietf.org> Subject:
>>>                                         Re: [sfc] WG last call for
>>>                                         draft-ietf-sfc-nsh-04.txt
>>>
>>>                                         R-,
>>>
>>>                                         In addition to other pending
>>>                                         issues raised for this draft, I
>>>                                         would like to raise this
>>>                                         additional one about Section 6.
>>>
>>>                                         =3D=3D 6.  Fragmentation
>>> Considerations
>>>
>>>                                         NSH and the associated transpor=
t
>>>                                         header are "added" to the
>>>                                         encapsulated packet/frame.  Thi=
s
>>>                                         additional information
>>>                                         increases
>>>
>>>                             the
>>>
>>>                                         size of the packet.  In order
>>>                                         the ensure proper forwarding of
>>>                                         NSH data, several options for
>>>                                         handling fragmentation and
>>>                                         re-assembly exist:
>>>
>>>                                         1.  Jumbo Frames, when
>>>                                         supported, enable the transport
>>>                                         of NSH
>>>                                         and associated transport packet=
s
>>>                                         without requiring
>>>                                         fragmentation.
>>>
>>>                                         2.  Path MTU Discovery
>>>                                         [RFC1191]"describes a technique
>>> for
>>>                                         dynamically discovering the
>>>                                         maximum transmission unit (MTU)
>>> of
>>>
>>>                             an
>>>
>>>                                         arbitrary internet path" and ca=
n
>>>                                         be utilized to ensure the
>>>
>>>                         the
>>>
>>>                                         required packet size is used.
>>>
>>>                                         3.  [RFC6830] describes two
>>>                                         schemes for fragmentation and
>>>                                         re-
>>>
>>>                             assembly
>>>
>>>                                         in section 5.4. =3D=3D
>>>
>>>                                         * The text is weak for a
>>>                                         Standard track document that is
>>>                                         intended to solve the problem i=
n
>>>
>>> https://tools.ietf.org/html/rfc7498#section-
>>>
>>>                         2.12.
>>>
>>>                                         There should be a clear behavio=
r
>>>                                         to be followed by an
>>>
>>>                         implementation.
>>>
>>>                                         Further, I would avoid the use
>>>                                         of words such as "can".
>>>
>>>                                         * The text covers only
>>>                                         fragmentation when it is induce=
d
>>>                                         by SFC
>>>                                         operations, it does not discuss
>>>                                         the treatment of a fragment
>>>                                         when received in an SFC domain.
>>>                                         IMHO, the draft should also
>>>                                         specify the behavior of the
>>>                                         Classifier with regards to
>>>                                         fragments for the sake of prope=
r
>>>                                         SFC operation. Applying
>>>                                         classification policies may
>>>                                         require the
>>>
>>>                                     full packet, not only a fragment.
>>>
>>>                                         In particular, dedicated
>>>                                         resources should dedicated for
>>>                                         handling out of order fragments=
.
>>>                                         Of course, it is out of scope
>>>                                         of this document to describe ho=
w
>>>                                         SFs handle fragments.
>>>
>>>                                         * If an SFC header is prepended
>>>                                         for all fragments, I'm not
>>>                                         sure there is any particular
>>>                                         issue at the SFF level...except
>>>                                         if stripping/adding context TLV=
s
>>>                                         depends on the full packet
>>>                                         (not just fragment). It is
>>>                                         warranted to consider a little
>>> bit
>>>                                         this point before declaring the=
re
>>>
>>>                             is
>>>
>>>                                     no issue.
>>>
>>>
>>>                                         * The text states "several
>>>                                         options". This may be interpret=
ed
>>>                                         as if implementing one of them
>>>                                         is sufficient...which is not
>>>                                         true. The first two points
>>>                                         contribute to minimize the
>>>                                         fragmentation risk, but
>>>                                         fragmentation may still be
>>>                                         experienced
>>>                                         (e.g., other shims are prepende=
d
>>>                                         by other nodes for some other
>>>                                         purposes, nested nsh, etc.)
>>>
>>>                                         * The first two points have
>>>                                         nothing to do with reassembly.
>>>
>>>                                         * The support of jumbo frames b=
y
>>>                                         a router/device does not mean
>>>                                         that it can make use of it.
>>>                                         Appropriate MTU configuration
>>>                                         should be undertaken in a
>>>                                         consistent manner within an SFC
>>>                                         domain. The text should be
>>>                                         updated to make it is about
>>>                                         (consistent) MTU
>>>
>>>                         configuration.
>>>
>>>
>>>                                         * BTW, shouldn't the text be
>>>                                         reworded to recommended to
>>>                                         increase the MTU of **all
>>>                                         nodes** of an SFC-enabled domai=
n
>>> by
>>>                                         at least the length of SFC
>>>                                         header + transport header?
>>>
>>>                                         * Bullet 2, how PMTU discovery
>>>                                         is actually used in this
>>>                                         context? Do you assume that all
>>>                                         SFC-aware nodes will issue
>>>                                         such messages towards other
>>>                                         SFC-aware node, arbitrary
>>>                                         destination, else?
>>>
>>>                                         * Bullet 2, I would drop
>>>                                         "describes a technique for
>>>                                         dynamically discovering the
>>>                                         maximum transmission unit
>>>                                         (MTU) of an arbitrary internet
>>>                                         path".
>>>
>>>                                         * Bullet 2, s/ the the/the.
>>>
>>>                                         * The reference to the LISP
>>>                                         specification raises two concer=
ns
>>>                                         and one comment:
>>>
>>>                                         (1) I don't think it is a good
>>>                                         approach that fragments induced
>>>                                         by the network are passed to
>>>                                         their ultimate destinations as
>>>                                         such
>>>
>>>                         (stateless).
>>>
>>>                                         IMO, reassembly should be done
>>>                                         within the SFC domain
>>>                                         (responsible for fragmentation)
>>>                                         not passed away. (2) Does the
>>>                                         stateful mode require all SFC
>>>                                         data plane elements maintain a
>>>                                         full list of MTU for the any
>>>                                         SFF/SF instance of the SFC
>>>
>>>                                     domain?
>>>
>>>
>>>                                         The current text suggests that
>>>                                         [RFC6830] should be listed as
>>>                                         normative reference (not an
>>>                                         informative one). I would
>>>                                         personally favor removing the
>>>                                         reference to LISP (as it is an
>>>                                         Experimental RFC).
>>>
>>>                                         * The security section of the
>>>                                         draft may be augmented with
>>>                                         informational
>>>                                         fragmentation-related pointers
>>> to:
>>>                                         e.g., RFC1858 (Security
>>>                                         Considerations for IP Fragment
>>>                                         Filtering), RFC3128 (Protection
>>>                                         Against a Variant of the Tiny
>>>                                         Fragment Attack), and RFC 4963
>>>                                         (IPv4 Reassembly Errors at High
>>>                                         Data Rates).
>>>
>>>                                         Cheers, Med
>>>
>>>                                             -----Message d'origine-----
>>>                                             De : sfc
>>>                                             [mailto:sfc-bounces@ietf.or=
g
>>>                                             <mailto:sfc-bounces@ietf.or=
g
>>> >]
>>>                                             De la part de
>>>                                             mohamed.boucadair@orange.co=
m
>>>                                             <mailto:
>>> mohamed.boucadair@orange.com>
>>>                                             Envoy=C3=A9 : lundi 11 avri=
l
>>>                                             2016 13:14 =C3=80 : Thomas
>>>                                             Narten; sfc@ietf.org
>>>                                             <mailto:sfc@ietf.org> Objet
>>>                                             : Re:
>>>                                             [sfc] WG last call for
>>>                                             draft-ietf-sfc-nsh-04.txt
>>>
>>>                                             Dear Thomas, all,
>>>
>>>                                             As I mentioned during the
>>>                                             meeting, there are several
>>>                                             issues
>>>                                             that are not covered in the
>>>                                             last version of the draft. =
I
>>>                                             already provided examples o=
f
>>>                                             the issues offline as
>>> requested
>>>                                             by Martin.
>>>
>>>                                             Cheers, Med
>>>
>>>                                                 -----Message
>>>                                                 d'origine----- De : sfc
>>>                                                 [mailto:
>>> sfc-bounces@ietf.org
>>>                                                 <mailto:
>>> sfc-bounces@ietf.org>]
>>>                                                 De la part de Thomas
>>> Narten
>>>                                                 Envoy=C3=A9 : jeudi 31 =
mars
>>>                                                 2016 04:48 =C3=80 :
>>>                                                 sfc@ietf.org
>>>                                                 <mailto:sfc@ietf.org>
>>>                                                 Objet : [sfc] WG last
>>>                                                 call for
>>>                                                 draft-ietf-sfc-nsh-04.t=
xt
>>>
>>>                                                 Dear WG:
>>>
>>>                                                 This note begins a WG
>>>                                                 last call on
>>>                                                 draft-ietf-sfc-nsh-04.t=
xt
>>>                                                 (
>>> https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>
>>>
>>>
>>>             The editors of the NSH document have indicated that they ha=
ve
>>>
>>>                                                 addressed all known
>>>                                                 comments and that there
>>>                                                 are no open
>>>                                                 issues with the current
>>>                                                 version of the document=
.
>>>
>>>                                                 Substantive comments to
>>>                                                 the list please,
>>>                                                 editorial comments
>>>                                                 can go directly to the
>>>                                                 document editors.
>>>
>>>                                                 We'll also get a brief
>>>                                                 update from the editors
>>>                                                 at next
>>>                                                 week's meeting. If ther=
e
>>>                                                 are any remaining issue=
s
>>>                                                 with the
>>>                                                 document, raising them
>>>                                                 before the meeting woul=
d
>>> be
>>>                                                 especially helpful.
>>>
>>>                                                 For the chairs, Thomas
>>>
>>>
>>> _______________________________________________
>>>                                                 sfc mailing
>>>                                                 list sfc@ietf.org
>>>                                                 <mailto:sfc@ietf.org>
>>>
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>>
>>>
>>> _______________________________________________
>>>                                             sfc mailing
>>>                                             list sfc@ietf.org
>>>                                             <mailto:sfc@ietf.org>
>>>
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>>
>>>
>>> _______________________________________________
>>>                                         sfc mailing
>>>                                         list sfc@ietf.org
>>>                                         <mailto:sfc@ietf.org>
>>>
>>> https://www.ietf.org/mailman/listinfo/sfc
>>>
>>>
>>>
>>> _______________________________________________
>>>                                     sfc mailing
>>
>>
>

--94eb2c110014b22d7005318cd06d
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: base64
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--94eb2c110014b22d7005318cd06d--


From nobody Thu Apr 28 08:05:59 2016
Return-Path: <jmh.direct@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3933612D6A2 for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 08:05:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rVDDUOIJM_qU for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 08:05:51 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 32C1912D1A4 for <sfc@ietf.org>; Thu, 28 Apr 2016 08:05:51 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id D1AFE240F47; Thu, 28 Apr 2016 08:05:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461855950; bh=QRFmRzHQN9ST3hVGyoJCNsfe8bvd/aiHk4phw4A6Mxk=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=V2OWVd37EtkYzbrQ0qDxLBxf6d6tHAFajRysqTwwyZfZvGWJjnRMEO3Ddlg8pglJj K5KijNBO/SY5fd7iS7IiDCFLa600SRzhVk8NJTnTbTYOKJ1tGYxbSsvXJHWHj+eSql PpAURGOoXvy4tR4UPIz3fJTxYSQYbmM+MgkjuILs=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id ADBB1240609; Thu, 28 Apr 2016 08:05:48 -0700 (PDT)
To: "Andrew G. Malis" <agmalis@gmail.com>, "Jim Guichard (jguichar)" <jguichar@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb> <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com> <CAA=duU0cjXbTxTCqaRetajxFaJVfq8Y-HySPDrR-0AN38Wq3Zw@mail.gmail.com> <4d65232a-d4a6-a11b-c765-635cb909edbd@joelhalpern.com> <CAA=duU0PujWB0LB=wxFauPqaqbf4kFsqkzAwtNn7r3MzBUdCqA@mail.gmail.com> <D3478632.4C66A%jguichar@cisco.com> <CAA=duU1guf-VmkYV3=-JQVULm-cHir4XwTEmhm14H2Z8o7euAg@mail.gmail.com>
From: Joel Halpern Direct <jmh.direct@joelhalpern.com>
Message-ID: <888c5567-c459-f29f-6f20-02aad39f1f76@joelhalpern.com>
Date: Thu, 28 Apr 2016 11:05:35 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <CAA=duU1guf-VmkYV3=-JQVULm-cHir4XwTEmhm14H2Z8o7euAg@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/8Vv05P1w3Ws_jbZQ5RT80Lfucj8>
Cc: "Elzur, Uri" <uri.elzur@intel.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 15:05:58 -0000

Thanks Andy.  That wording would indeed work for me.
Yours,
Joel

On 4/28/16 11:02 AM, Andrew G. Malis wrote:
> Jim,
>
> The way option 3 is currently worded, thereâ€™s no indication that this is
> just an example, and not a direction to use RFC 6830, section 5.4. I
> just had an offline discussion with Joel, and he and I agree that a
> better wording for option 3 would be "Use the fragmentation provided by
> the network overlay mechanics. One example can be found in RFC 6830,
> section 5.4.â€
>
> Thanks,
> Andy
>
> On Thu, Apr 28, 2016 at 9:22 AM, Jim Guichard (jguichar)
> <jguichar@cisco.com <mailto:jguichar@cisco.com>> wrote:
>
>     Hi Andy,
>
>     I think the key point is that NSH != network overlay but rather
>     utilizes a network overlay for packet transport between SFC network
>     elements. The reference is just an example of how a network overlay
>     might deal with fragmentation and is not a suggestion that NSH adopt
>     that mechanism but rather makes the point that it can utilize the
>     existing network overlay mechanics.
>
>     Jim
>
>     From: sfc <sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>> on
>     behalf of "Andrew G. Malis" <agmalis@gmail.com
>     <mailto:agmalis@gmail.com>>
>     Date: Thursday, April 28, 2016 at 8:17 AM
>     To: Joel Halpern Direct <jmh.direct@joelhalpern.com
>     <mailto:jmh.direct@joelhalpern.com>>
>     Cc: "Elzur, Uri" <uri.elzur@intel.com <mailto:uri.elzur@intel.com>>,
>     "mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>"
>     <mohamed.boucadair@orange.com
>     <mailto:mohamed.boucadair@orange.com>>, "sfc@ietf.org
>     <mailto:sfc@ietf.org>" <sfc@ietf.org <mailto:sfc@ietf.org>>, Linda
>     Dunbar <linda.dunbar@huawei.com <mailto:linda.dunbar@huawei.com>>
>     Subject: Re: [sfc] Suggested wording addtion to the Section 6
>     (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
>
>     Joel,
>
>     The diagrams in section 6 of RFC 6830 are control plane, not data
>     plane. The data plane diagrams are in section 5.
>
>     But the overriding question is - without any fields in the NSH
>     header to sequence fragments, how can the fragments be correctly
>     reassembled?
>
>     Cheers,
>     Andy
>
>     On Wed, Apr 27, 2016 at 7:46 PM, Joel Halpern Direct
>     <jmh.direct@joelhalpern.com <mailto:jmh.direct@joelhalpern.com>> wrote:
>
>         The LISP header does not have a fragment flag or fragment
>         offset.  The diagrams in section 6 include the outer
>         encapsulating header (the equivalent of the transport header in
>         SFC.)  Yes, the text is a little hard to follow in this regard.
>         The LISP working group is going to be rewriting RFC 6830 as part
>         of moving to standards track.
>
>         So there is no difference in this regard between NSH and LISP.
>
>         Yours,
>         Joel
>
>         On 4/27/16 7:02 PM, Andrew G. Malis wrote:
>
>             Joel et al,
>
>             All this talk about fragmentation prompted me to re-read
>             section 6 of
>             the draft, which recommends (as option 3) using the
>             procedures in
>             section 5.4 of RFC 6830 (presumably with the â€œNSH headerâ€
>             replacing the
>             â€œLISP headerâ€ in the description of the procedures in that
>             section).
>
>             So that led me to read that section (and the LISP header
>             definition in
>             section 5.1), and I see that LISP does fragmentation and
>             reassembly
>             identically to IPv4, using the Fragment Offset field so that
>             fragments
>             can be correctly reassembled in the proper order.
>
>             However, the NSH Header doesnâ€™t have a Fragment Offset field
>             or any
>             other way to order the fragments.
>
>             So how can the procedures in Section 5.4 of 6830 be used?
>
>             Thanks,
>             Andy
>
>             On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern
>             <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>
>             <mailto:jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>>>
>             wrote:
>
>                 Both methods are valid, and both depend upon details of the
>                 underlying packet and the transport.  As such, I don't
>             see why this
>                 document benefits from describing them, much less why it
>             should mark
>                 one method as a "should".  Implementation details are
>             likely to be
>                 more significant than any bit consumption difference
>             between the two
>                 alternatives.
>
>                 Yours,
>                 Joel
>
>
>                 On 4/27/16 3:40 PM, Linda Dunbar wrote:
>
>                     I suggest adding the following paragraphs after the
>             Bullet 3 of
>                     the Section 6 Fragmentation Consideration to make
>             the process
>                     more clear and less controversial:
>
>
>                     --------------------------------
>
>                     RFC6830 describes the fragmentation method of
>             breaking the
>                     original packet into two equal sub-frames and
>             encapsulating
>                     [LISP Header + Transport header] to each sub-frame.
>
>                     If LISP fragmentation [RFC6830 Section 5.4] is used,
>             the [SFC
>                     Header + Transport Header] will be added to each
>             half frame (or
>                     the original data frame). As the Transport Header is
>             terminated
>                     by the next SFF node's tunnel transport layer, the
>             combined two
>                     sub-frames will have two SFC Headers.
>
>                     Therefore, the fragmentation for NSH encapsulated
>             data frame
>                     should be done completely by the node tunnel
>             transport layer,
>                     which should break the [SFC + original packet] into
>             two equal
>                     sub-frames and each sub-frame being encapsulated
>             with its
>                     respective tunnel header.  The next SFF node's
>             tunnel transport
>                     layer should combine the two sub-frames before
>             sending to the
>                     next node.
>
>                     ------------------------------------------------------
>
>
>                     By the way, there are to typo in the Section 6:
>                     3rd line: "In order the" ==> "In order to"
>                     Last line of Bullet 2: extra "the" in the "utilized
>             to ensure
>                     the the required packet".
>
>
>                     Hope it helps.
>
>                     Linda
>
>
>
>                     -----Original Message-----
>                     From: mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>
>                     <mailto:mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>>
>                     [mailto:mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>
>                     <mailto:mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>>]
>                     Sent: Wednesday, April 27, 2016 12:40 AM
>                     To: Joel M. Halpern; Linda Dunbar; Elzur, Uri;
>             sfc@ietf.org <mailto:sfc@ietf.org>
>                     <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>                     Subject: RE: [sfc] WG last call for
>             draft-ietf-sfc-nsh-04.txt
>
>                     Hi Joel, all,
>
>                     Please see inline.
>
>                     Cheers,
>                     Med
>
>                         -----Message d'origine-----
>                         De : Joel M. Halpern [mailto:jmh@joelhalpern.com
>             <mailto:jmh@joelhalpern.com>
>                         <mailto:jmh@joelhalpern.com
>             <mailto:jmh@joelhalpern.com>>] EnvoyÃ© : mardi 26
>                         avril 2016 19:18 Ã€ : Linda Dunbar; BOUCADAIR Mohamed
>                         IMT/OLN; Elzur,
>                         Uri; sfc@ietf.org <mailto:sfc@ietf.org>
>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Objet : Re: [sfc] WG
>                         last call for
>                         draft-ietf-sfc-nsh-04.txt
>
>                         With regard to Transport tunnel fragementation,
>             that seems
>                         an issue
>                         for the transport protocol.  I don't actually
>             object to a
>                         sentence,
>                         but it does not seem that it will accomplish
>             anything.
>
>
>                     [Med] I would like to see some text added to the draft.
>
>
>                         With regard to packets fragmented by the source, I
>                         completely disagree
>                         with your assertion.  If an SFF were to
>             reassemble the
>                         packets, that
>                         would be a violation of its job.
>
>
>                     [Med] I agree with you.
>
>                       There is no reason for an SFF to
>
>                         reassemble a packet fragmented by the source.  The
>                         classifier may have
>                         to do some interesting things in order to
>             properly classify
>                         succeeding
>                         fragments, but that is an implementation issue
>             (most commonly
>                         addressed with virtual reassembly, which doe
>             snot delay the
>                         fragments.)  We don't specity that.
>
>
>                     [Med] Still, the external behavior of the classifier
>             needs to be
>                     clear in the document. I don't find any text in the
>             draft saying
>                     for instance that an NSH header must be present in all
>                     fragments. (There some processing that might be
>             needed at the
>                     SFF to "do its job" with regards to fragments
>             (receive out of
>                     order fragments + forwarding policy on the full
>             packet).)
>
>
>                         If an SF needs to reassemble fragments to do its
>             job, that
>                         is up to
>                         the SF.  Some will need to actually reassemble.
>             Some will
>                         need to
>                         perform virtual reassembly, and some will
>             happily process the
>                         fragments.  I can not see what the NSH document
>             could
>                         possibly mandate.
>
>
>                     [Med] Fully agree.
>
>
>                         Yours,
>                         Joel
>
>                         On 4/26/16 11:47 AM, Linda Dunbar wrote:
>
>                             Joel,
>
>                             I think the document should add the
>             description on the
>                             following two
>                             fragmentation scenarios:
>
>                             - Transport tunnel generated fragmentation:
>             When a packet
>                             fragmentation is caused by transport tunnel
>             (i.e. various
>                             encapsulations), the termination point of
>             the transport
>                             tunnel is
>                             responsible for re-assembling the fragmented
>             pieces of
>                             the packet.
>                             Since there won't be any SFF nodes in
>             between the
>                             Transport Tunnel,
>                             the tunnel generated fragmentation does not
>             require any
>                             actions by
>                             SFF nodes or SF nodes.
>
>
>                             - Source node generated fragmentation (after
>             adding on
>                             the NSH
>                             header): When fragmentation has to be
>             performed for a
>                             packet being
>                             encapsulated with the NSH header, either the
>                             intermediate SFF nodes
>                             or the SF nodes have to be able to
>             reassemble the
>                             fragmented pieces.
>
>
>
>
>                             Cheers,
>
>
>                             Linda
>
>                             -----Original Message----- From: Joel M. Halpern
>                             [mailto:jmh@joelhalpern.com
>             <mailto:jmh@joelhalpern.com>
>                             <mailto:jmh@joelhalpern.com
>             <mailto:jmh@joelhalpern.com>>] Sent: Tuesday, April 26,
>                             2016 10:33 AM
>                             To: Linda Dunbar;
>             mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>
>                             <mailto:mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>>; Elzur, Uri;
>                             sfc@ietf.org <mailto:sfc@ietf.org>
>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Subject: Re:
>             [sfc] WG
>                             last call for
>                             draft-ietf-sfc-nsh-04.txt
>
>                             Re-reading your note, it is possible that
>             you are
>                             referring only to
>                             the case of transport generated
>             fragmentation of the
>                             outer packet.
>                             I had assumed you were not talking about
>             that, since the
>                             resulting
>                             fragments will not all have NSH headers.  As
>             with any tunnel
>                             technology, if the tunnel chooses to
>             fragment at its
>                             layer, then the
>                             tunnel is responsible for reassembly.  That
>             would be
>                             invisible to
>                             the SFF.
>
>                             Yours, Joel
>
>                             On 4/26/16 11:10 AM, Linda Dunbar wrote:
>
>                                 Agree with Med.
>
>                                 Even if each fragment piece of a packet
>             with NSH
>                                 header carries the
>                                 NSH header, the intermediate SFF nodes
>             still need to
>                                 put together
>                                 all the fragments together before
>             passing the whole
>                                 data frame to
>                                 the SF.
>
>                                 Linda
>
>                                 -----Original Message----- From: sfc
>                                 [mailto:sfc-bounces@ietf.org
>             <mailto:sfc-bounces@ietf.org>
>                                 <mailto:sfc-bounces@ietf.org
>             <mailto:sfc-bounces@ietf.org>>]
>                                 On Behalf Of
>             mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>
>                                 <mailto:mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>> Sent: Monday,
>                                 April 25,
>                                 2016 9:42 AM To: Elzur, Uri; Joel M.
>             Halpern;
>                                 sfc@ietf.org <mailto:sfc@ietf.org>
>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Subject:
>                                 Re: [sfc] WG last call for
>             draft-ietf-sfc-nsh-04.txt
>
>                                 Re-,
>
>                                 How do you instruct the transport layer
>             to ALWAYS
>                                 prepend an NSH
>                                 header even for fragments? Or you don't
>             care about that?
>
>                                 Thank you.
>
>                                 Cheers, Med
>
>                                     -----Message d'origine----- De :
>             Elzur, Uri
>                                     [mailto:uri.elzur@intel.com
>             <mailto:uri.elzur@intel.com>
>                                     <mailto:uri.elzur@intel.com
>             <mailto:uri.elzur@intel.com>>] EnvoyÃ© : lundi 25
>                                     avril 2016 16:26 Ã€
>                                     : BOUCADAIR Mohamed IMT/OLN; Joel M.
>             Halpern;
>                                     sfc@ietf.org <mailto:sfc@ietf.org>
>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Objet
>                                     : RE: [sfc] WG last call for
>                                     draft-ietf-sfc-nsh-04.txt
>
>                                     Hi Med
>
>                                     Not to repeat my position, but I'll
>             do it anyhow
>                                     :-) As NSH is
>                                     *NOT* a transport, dealing with
>             fragmentation is
>                                     left to the
>                                     Transport used.
>
>                                     The model I use for NSH, is
>             basically similar to
>                                     VXLAN . It is an
>                                     overly.
>
>                                     Thx
>
>                                     Uri ("Oo-Ree") C: 949-378-7568
>             <tel:949-378-7568> <tel:949-378-7568 <tel:949-378-7568>>
>
>
>                                     -----Original Message----- From: sfc
>                                     [mailto:sfc-bounces@ietf.org
>             <mailto:sfc-bounces@ietf.org>
>                                     <mailto:sfc-bounces@ietf.org
>             <mailto:sfc-bounces@ietf.org>>]
>                                     On Behalf Of
>             mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>
>                                     <mailto:mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>> Sent:
>                                     Monday, April 25,
>                                     2016 7:18 AM To: Joel M. Halpern
>                                     <jmh@joelhalpern.com
>             <mailto:jmh@joelhalpern.com> <mailto:jmh@joelhalpern.com
>             <mailto:jmh@joelhalpern.com>>>;
>                                     sfc@ietf.org <mailto:sfc@ietf.org>
>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>                                     Subject: Re: [sfc] WG last call for
>                                     draft-ietf-sfc-nsh-04.txt
>
>                                     Hi Joel,
>
>                                     Please see inline.
>
>                                     Cheers, Med
>
>                                         -----Message d'origine----- De :
>             Joel M. Halpern
>                                         [mailto:jmh@joelhalpern.com
>             <mailto:jmh@joelhalpern.com>
>                                         <mailto:jmh@joelhalpern.com
>             <mailto:jmh@joelhalpern.com>>] EnvoyÃ© : lundi
>                                         25 avril 2016 15:48 Ã€
>                                         : BOUCADAIR Mohamed IMT/OLN;
>             sfc@ietf.org <mailto:sfc@ietf.org>
>                                         <mailto:sfc@ietf.org
>             <mailto:sfc@ietf.org>> Objet : Re: [sfc] WG
>                                         last call for
>             draft-ietf-sfc-nsh-04.txt
>
>                                         If I am understanding you
>             correctly Med, you
>                                         are asking that the
>                                         NSH draft specify how service
>             chaining
>                                         should cope with packets
>                                         that have been fragmented?
>
>
>                                     [Med] To be accurate, I'm asking to
>             assess
>                                     whether there are
>                                     implications. If there are, then the
>             draft
>                                     should be updated
>                                     accordingly.
>
>                                         NSH, and the SFF functionality,
>             does not care.
>
>
>                                     [Med] I'm not that sure. Some typical
>                                     implications are listed
>                                     below:
>
>                                     * SFF: If the NSH header is present
>             only in the
>                                     a fragment but SFF
>                                     didn't maintained a state,
>             subsequent fragments
>                                     won't be
>                                     appropriately processed. * SFC-aware
>             function:
>                                     if prepending a
>                                     context information depends on the
>             full packet,
>                                     not only a
>                                     fragment.
>
>                                     It just does its job.
>
>                                     [Med] which may be disturbed in some
>             situations
>                                     as listed in the
>                                     examples above.
>
>                                         Ingress and intermediate
>             classifiers may
>                                         cope with fragments in
>                                         any number of ways.
>
>                                     Specifying such is clearly out of
>             scope for this
>                                     draft.
>
>                                     [Med] The purpose is not to specify
>             the internal
>                                     implementation
>                                     details but the external behavior of the
>                                     classifier function when
>                                     it comes to handle fragments. That
>             behavior may
>                                     have an incidence
>                                     on SFF, in particular. The purpose
>             is not to
>                                     recommend the maximum
>                                     resources to be dedicated to out of
>             order
>                                     fragments nor the
>                                     timeout to cache those; these
>             considerations are
>                                     of course out of
>                                     scope. Nevertheless, an
>             implementation should
>                                     offer a configurable
>                                     parameter so that an operator tweak
>             those
>                                     according to its
>                                     context.
>
>                                         I suppose one could write an
>             informational
>                                         draft on possible ways
>                                         of coping.  The IETF has not usually
>                                         published such.
>                                         Service functions have to cope with
>                                         fragmented packets just as
>                                         they had to before the advent of
>             NSH, so
>                                         describing that is
>                                         clearly not needed here.
>
>
>                                     [Med] The advent of NSH has the
>             following
>                                     implications: * it
>                                     exacerbates fragmentation. Handing
>             over this
>                                     issue to the
>                                     transport layer may lead to
>             interoperability
>                                     issues. * the
>                                     chaining may not be efficient if
>             fragments are
>                                     inappropriately
>                                     handled.
>
>                                     Introducing NSH should not degrade
>             the overall
>                                     service compared to
>                                     legacy service deployment schemes.
>
>
>                                         Yours, Joel
>
>                                         On 4/25/16 3:00 AM,
>                                         mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>
>
>             <mailto:mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>> wrote:
>
>                                             Re-,
>
>                                             I hear you, but my comment
>             is that we
>                                             need, as a WG, to decide
>                                             what to
>
>                                         put in the draft. FWIW, I'm
>             discussing two
>                                         fragmentation
>                                         issues:
>
>
>                                             (1) Fragmentation that is
>             caused by
>                                             prepending an SFC header.
>                                             (2) Handling fragments at
>             the ingress of
>                                             an SFC-enabled domain.
>
>                                             Increasing the MTU is for sure a
>                                             recommendation is to be
>                                             explicitly
>
>                                         called out in the text (see my
>             first message).
>
>
>                                             There are other issues that
>             need to be
>                                             discussed, e.g., how to
>                                             deal with
>
>                                         fragments in SFFs/Classifiers?
>
>
>                                             It is also "prudent" to
>             check that no
>                                             issues will be experienced
>                                             in SFF
>
>                                         to handle fragments. If an SFC
>             header is
>                                         prepended for all
>                                         fragments, I'm not sure there
>
>                                             is any particular issue at
>             the SFF
>                                             level, except if
>                                             stripping/adding
>
>                                         context TLVs depends on the full
>             packet (not
>                                         just fragment). It
>                                         is warranted to consider a
>             little bit this
>                                         point before declaring
>                                         there is no issue.
>
>
>                                             For point (1), declaring
>             fragmentation
>                                             out of scope would be
>                                             meant that
>
>                                         an implementation must be
>             prepared to
>                                         receive fragments with or
>                                         without NSH header as this is a
>             decision
>                                         that is left to the
>                                         transport encapsulation. This is a
>                                         requirement per se!
>
>
>                                             I won't reiterate all the
>             comments I
>                                             have about the current
>                                             wording of
>
>                                         this section.
>
>
>                                             Cheers, Med
>
>                                                 -----Message
>             d'origine----- De :
>                                                 Elzur, Uri
>
>             [mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>
>
>             <mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>>]
>             EnvoyÃ©
>                                                 : lundi 25 avril 2016
>                                                 08:30 Ã€ : BOUCADAIR
>             Mohamed IMT/OLN;
>                                                 Thomas Narten;
>                                                 sfc@ietf.org
>             <mailto:sfc@ietf.org> <mailto:sfc@ietf.org
>             <mailto:sfc@ietf.org>>
>                                                 Objet : RE: [sfc] WG
>             last call for
>                                                 draft-ietf-sfc-nsh-04.txt
>
>                                                 Hi Med
>
>                                                 My point is that
>             Fragmentation is
>                                                 yet another transport
>             related
>                                                 issue
>
>                                         that
>
>                                                 is beyond the scope of
>             NSH and
>                                                 beyond the charter of
>             the WG, so
>                                                 it
>
>                                         doesn't
>
>                                                 really belong in the
>             draft. We are
>                                                 providing an advice as
>                                                 extending the size of
>             the packet may
>                                                 lead to fragmentation, but
>                                                 as you check RFC 7348
>             VxLAN, which
>                                                 my create the same issue,
>                                                 you'll find it doesn't even
>
>                                         relate
>
>                                                 to it.
>
>                                                 Thx
>
>                                                 Uri ("Oo-Ree") C:
>             949-378-7568 <tel:949-378-7568>
>                                                 <tel:949-378-7568
>             <tel:949-378-7568>>
>
>
>                                                 -----Original
>             Message----- From: sfc
>
>             [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>
>
>             <mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>>] On
>                                                 Behalf Of
>
>             mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>
>
>             <mailto:mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>> Sent:
>                                                 Sunday, April 24, 2016
>                                                 10:32 PM To: Elzur, Uri
>                                                 <uri.elzur@intel.com
>             <mailto:uri.elzur@intel.com>
>
>             <mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>>>;
>                                                 Thomas Narten
>
>                                         <narten@us.ibm.com
>             <mailto:narten@us.ibm.com> <mailto:narten@us.ibm.com
>             <mailto:narten@us.ibm.com>>>;
>
>                                                 sfc@ietf.org
>             <mailto:sfc@ietf.org> <mailto:sfc@ietf.org
>             <mailto:sfc@ietf.org>>
>                                                 Subject: Re: [sfc] WG
>             last call for
>                                                 draft-ietf-sfc-nsh-04.txt
>
>                                                 Hi Uri,
>
>                                                 That's another option
>             that needs to
>                                                 be discussed/investigated.
>                                                 I'm
>
>                                         afraid
>
>                                                 this is not the
>             rationale adopted in
>                                                 -04 since it includes some
>                                                 text
>
>                                         that
>
>                                                 is far to be sufficient
>             to ensure
>                                                 interoperable
>                                                 implementations.
>
>                                                 BTW, saying that nsh
>             does not need
>                                                 to deal with fragmentation
>                                                 because
>
>                                         it
>
>                                                 is transport-independent
>             is not IMHO
>                                                 a good strategy to adopt
>                                                 here
>
>                                         because
>
>                                                 it opens the door for
>             interoperable
>                                                 issues, it may lead to
>                                                 sub-optimal
>             implementations if the
>                                                 sfc information is present
>                                                 only in one
>
>                                         fragments,
>
>                                                 etc.
>
>                                                 My comments are related
>             to the
>                                                 current text in the -04.
>                                                 This text needs
>
>                                         to
>
>                                                 be fixed somehow.
>
>                                                 Cheers, Med
>
>                                                     -----Message
>             d'origine----- De :
>                                                     Elzur, Uri
>
>             [mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>
>
>             <mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>>]
>                                                     EnvoyÃ© : dimanche 24
>             avril
>                                                     2016 17:36 Ã€ :
>             BOUCADAIR Mohamed
>                                                     IMT/OLN; Thomas Narten;
>                                                     sfc@ietf.org
>             <mailto:sfc@ietf.org>
>                                                     <mailto:sfc@ietf.org
>             <mailto:sfc@ietf.org>> Objet :
>                                                     RE: [sfc] WG last
>             call for
>
>             draft-ietf-sfc-nsh-04.txt
>
>                                                     Hi Med
>
>                                                     I see no need to
>             specify the
>                                                     exact behavior as NSH is
>                                                     transport
>             independent i.e. like
>                                                     NSH interaction with
>             any other
>                                                     Transport eh issue of
>                                                     Fragmentation is to
>             be dealt in
>                                                     a way
>                                                     that matches the
>             mechanisms
>                                                     supported by the
>             Transport used
>                                                     and do not belong in
>             the NSH draft
>
>                                                     Thx
>
>                                                     Uri ("Oo-Ree") C:
>             949-378-7568 <tel:949-378-7568>
>                                                     <tel:949-378-7568
>             <tel:949-378-7568>>
>
>
>                                                     -----Original
>             Message----- From: sfc
>
>             [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>
>
>             <mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>>]
>                                                     On Behalf Of
>
>             mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>
>
>             <mailto:mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>>
>                                                     Sent: Thursday,
>             April 14,
>                                                     2016 12:43 AM To:
>             Thomas Narten
>                                                     <narten@us.ibm.com
>             <mailto:narten@us.ibm.com>
>
>             <mailto:narten@us.ibm.com <mailto:narten@us.ibm.com>>>;
>                                                     sfc@ietf.org
>             <mailto:sfc@ietf.org>
>                                                     <mailto:sfc@ietf.org
>             <mailto:sfc@ietf.org>> Subject:
>                                                     Re: [sfc] WG last
>             call for
>
>             draft-ietf-sfc-nsh-04.txt
>
>                                                     R-,
>
>                                                     In addition to other
>             pending
>                                                     issues raised for
>             this draft, I
>                                                     would like to raise this
>                                                     additional one about
>             Section 6.
>
>                                                     == 6.  Fragmentation
>             Considerations
>
>                                                     NSH and the
>             associated transport
>                                                     header are "added"
>             to the
>                                                     encapsulated
>             packet/frame.  This
>                                                     additional information
>                                                     increases
>
>                                         the
>
>                                                     size of the packet.
>             In order
>                                                     the ensure proper
>             forwarding of
>                                                     NSH data, several
>             options for
>                                                     handling
>             fragmentation and
>                                                     re-assembly exist:
>
>                                                     1.  Jumbo Frames, when
>                                                     supported, enable
>             the transport
>                                                     of NSH
>                                                     and associated
>             transport packets
>                                                     without requiring
>                                                     fragmentation.
>
>                                                     2.  Path MTU Discovery
>                                                     [RFC1191]"describes
>             a technique for
>                                                     dynamically
>             discovering the
>                                                     maximum transmission
>             unit (MTU) of
>
>                                         an
>
>                                                     arbitrary internet
>             path" and can
>                                                     be utilized to
>             ensure the
>
>                                     the
>
>                                                     required packet size
>             is used.
>
>                                                     3.  [RFC6830]
>             describes two
>                                                     schemes for
>             fragmentation and
>                                                     re-
>
>                                         assembly
>
>                                                     in section 5.4. ==
>
>                                                     * The text is weak for a
>                                                     Standard track
>             document that is
>                                                     intended to solve
>             the problem in
>
>             https://tools.ietf.org/html/rfc7498#section-
>
>                                     2.12.
>
>                                                     There should be a
>             clear behavior
>                                                     to be followed by an
>
>                                     implementation.
>
>                                                     Further, I would
>             avoid the use
>                                                     of words such as "can".
>
>                                                     * The text covers only
>                                                     fragmentation when
>             it is induced
>                                                     by SFC
>                                                     operations, it does
>             not discuss
>                                                     the treatment of a
>             fragment
>                                                     when received in an
>             SFC domain.
>                                                     IMHO, the draft
>             should also
>                                                     specify the behavior
>             of the
>                                                     Classifier with
>             regards to
>                                                     fragments for the
>             sake of proper
>                                                     SFC operation. Applying
>                                                     classification
>             policies may
>                                                     require the
>
>                                                 full packet, not only a
>             fragment.
>
>                                                     In particular, dedicated
>                                                     resources should
>             dedicated for
>                                                     handling out of
>             order fragments.
>                                                     Of course, it is out
>             of scope
>                                                     of this document to
>             describe how
>                                                     SFs handle fragments.
>
>                                                     * If an SFC header
>             is prepended
>                                                     for all fragments,
>             I'm not
>                                                     sure there is any
>             particular
>                                                     issue at the SFF
>             level...except
>                                                     if stripping/adding
>             context TLVs
>                                                     depends on the full
>             packet
>                                                     (not just fragment).
>             It is
>                                                     warranted to
>             consider a little bit
>                                                     this point before
>             declaring there
>
>                                         is
>
>                                                 no issue.
>
>
>                                                     * The text states
>             "several
>                                                     options". This may
>             be interpreted
>                                                     as if implementing
>             one of them
>                                                     is
>             sufficient...which is not
>                                                     true. The first two
>             points
>                                                     contribute to
>             minimize the
>                                                     fragmentation risk, but
>                                                     fragmentation may
>             still be
>                                                     experienced
>                                                     (e.g., other shims
>             are prepended
>                                                     by other nodes for
>             some other
>                                                     purposes, nested
>             nsh, etc.)
>
>                                                     * The first two
>             points have
>                                                     nothing to do with
>             reassembly.
>
>                                                     * The support of
>             jumbo frames by
>                                                     a router/device does
>             not mean
>                                                     that it can make use
>             of it.
>                                                     Appropriate MTU
>             configuration
>                                                     should be undertaken
>             in a
>                                                     consistent manner
>             within an SFC
>                                                     domain. The text
>             should be
>                                                     updated to make it
>             is about
>                                                     (consistent) MTU
>
>                                     configuration.
>
>
>                                                     * BTW, shouldn't the
>             text be
>                                                     reworded to
>             recommended to
>                                                     increase the MTU of
>             **all
>                                                     nodes** of an
>             SFC-enabled domain by
>                                                     at least the length
>             of SFC
>                                                     header + transport
>             header?
>
>                                                     * Bullet 2, how PMTU
>             discovery
>                                                     is actually used in this
>                                                     context? Do you
>             assume that all
>                                                     SFC-aware nodes will
>             issue
>                                                     such messages
>             towards other
>                                                     SFC-aware node,
>             arbitrary
>                                                     destination, else?
>
>                                                     * Bullet 2, I would drop
>                                                     "describes a
>             technique for
>                                                     dynamically
>             discovering the
>                                                     maximum transmission
>             unit
>                                                     (MTU) of an
>             arbitrary internet
>                                                     path".
>
>                                                     * Bullet 2, s/ the
>             the/the.
>
>                                                     * The reference to
>             the LISP
>                                                     specification raises
>             two concerns
>                                                     and one comment:
>
>                                                     (1) I don't think it
>             is a good
>                                                     approach that
>             fragments induced
>                                                     by the network are
>             passed to
>                                                     their ultimate
>             destinations as
>                                                     such
>
>                                     (stateless).
>
>                                                     IMO, reassembly
>             should be done
>                                                     within the SFC domain
>                                                     (responsible for
>             fragmentation)
>                                                     not passed away. (2)
>             Does the
>                                                     stateful mode
>             require all SFC
>                                                     data plane elements
>             maintain a
>                                                     full list of MTU for
>             the any
>                                                     SFF/SF instance of
>             the SFC
>
>                                                 domain?
>
>
>                                                     The current text
>             suggests that
>                                                     [RFC6830] should be
>             listed as
>                                                     normative reference
>             (not an
>                                                     informative one). I
>             would
>                                                     personally favor
>             removing the
>                                                     reference to LISP
>             (as it is an
>                                                     Experimental RFC).
>
>                                                     * The security
>             section of the
>                                                     draft may be
>             augmented with
>                                                     informational
>
>             fragmentation-related pointers to:
>                                                     e.g., RFC1858 (Security
>                                                     Considerations for
>             IP Fragment
>                                                     Filtering), RFC3128
>             (Protection
>                                                     Against a Variant of
>             the Tiny
>                                                     Fragment Attack),
>             and RFC 4963
>                                                     (IPv4 Reassembly
>             Errors at High
>                                                     Data Rates).
>
>                                                     Cheers, Med
>
>                                                         -----Message
>             d'origine-----
>                                                         De : sfc
>
>             [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>
>
>             <mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>>]
>                                                         De la part de
>
>             mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>
>
>             <mailto:mohamed.boucadair@orange.com
>             <mailto:mohamed.boucadair@orange.com>>
>                                                         EnvoyÃ© : lundi
>             11 avril
>                                                         2016 13:14 Ã€ :
>             Thomas
>                                                         Narten;
>             sfc@ietf.org <mailto:sfc@ietf.org>
>
>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Objet
>                                                         : Re:
>                                                         [sfc] WG last
>             call for
>
>             draft-ietf-sfc-nsh-04.txt
>
>                                                         Dear Thomas, all,
>
>                                                         As I mentioned
>             during the
>                                                         meeting, there
>             are several
>                                                         issues
>                                                         that are not
>             covered in the
>                                                         last version of
>             the draft. I
>                                                         already provided
>             examples of
>                                                         the issues
>             offline as requested
>                                                         by Martin.
>
>                                                         Cheers, Med
>
>                                                             -----Message
>
>             d'origine----- De : sfc
>
>             [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>
>
>             <mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>>]
>                                                             De la part
>             de Thomas Narten
>                                                             EnvoyÃ© :
>             jeudi 31 mars
>                                                             2016 04:48 Ã€ :
>                                                             sfc@ietf.org
>             <mailto:sfc@ietf.org>
>
>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>                                                             Objet :
>             [sfc] WG last
>                                                             call for
>
>             draft-ietf-sfc-nsh-04.txt
>
>                                                             Dear WG:
>
>                                                             This note
>             begins a WG
>                                                             last call on
>
>             draft-ietf-sfc-nsh-04.txt
>
>             (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>
>
>
>                         The editors of the NSH document have indicated
>             that they have
>
>                                                             addressed
>             all known
>                                                             comments and
>             that there
>                                                             are no open
>                                                             issues with
>             the current
>                                                             version of
>             the document.
>
>                                                             Substantive
>             comments to
>                                                             the list please,
>                                                             editorial
>             comments
>                                                             can go
>             directly to the
>                                                             document
>             editors.
>
>                                                             We'll also
>             get a brief
>                                                             update from
>             the editors
>                                                             at next
>                                                             week's
>             meeting. If there
>                                                             are any
>             remaining issues
>                                                             with the
>                                                             document,
>             raising them
>                                                             before the
>             meeting would be
>                                                             especially
>             helpful.
>
>                                                             For the
>             chairs, Thomas
>
>
>             _______________________________________________
>                                                             sfc mailing
>                                                             list
>             sfc@ietf.org <mailto:sfc@ietf.org>
>
>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>
>             https://www.ietf.org/mailman/listinfo/sfc
>
>
>
>             _______________________________________________
>                                                         sfc mailing
>                                                         list
>             sfc@ietf.org <mailto:sfc@ietf.org>
>
>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>
>             https://www.ietf.org/mailman/listinfo/sfc
>
>
>
>             _______________________________________________
>                                                     sfc mailing
>                                                     list sfc@ietf.org
>             <mailto:sfc@ietf.org>
>                                                     <mailto:sfc@ietf.org
>             <mailto:sfc@ietf.org>>
>
>             https://www.ietf.org/mailman/listinfo/sfc
>
>
>
>             _______________________________________________
>                                                 sfc mailing
>
>
>


From nobody Thu Apr 28 10:11:24 2016
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C694D12B047 for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 10:11:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M_BZm7-H4urY for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 10:11:19 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D75C112B031 for <sfc@ietf.org>; Thu, 28 Apr 2016 10:11:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=63378; q=dns/txt; s=iport; t=1461863478; x=1463073078; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=NIfDxkmdmp4ywgxxgh9+FCiDkr2k2+nQ37augSy08G8=; b=EH+FuMz7Sp9LLHSYBahLZ7yqYXocIBP1gtTs8drF95U+99i1ExJV/yzs A+QKmflGzgkRKgjCs0uS/SzHQYjQsX60LtffEFCetLn2IaoiOrN9maFKb gTs9cIiQ8eUfBtr/GLTBJmu0waoiI14QbQ3+vKhddqEPqV/X6JeUjuub7 c=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ATAgD1QiJX/4MNJK1bA4M4U30GrhSLX?= =?us-ascii?q?gENgXIEFwuFbQKBKTgUAQEBAQEBAWUnhEEBAQEDAQEBARcDSgcLDAQCAQgRAwE?= =?us-ascii?q?BAQEjBAchBgsUCQgCBAENBYgVAwoIDr51DYRLAQEBAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBEQSGIYRLgkGBfCEmhQ8Fh3SGGIUThEAxAYV7gneDLoF2gWeETYMphTSGJIE?= =?us-ascii?q?th14BHgEBQoI2gTVshml/AQEB?=
X-IronPort-AV: E=Sophos;i="5.24,547,1454976000"; d="scan'208";a="98825637"
Received: from alln-core-1.cisco.com ([173.36.13.131]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 28 Apr 2016 17:11:16 +0000
Received: from XCH-RCD-007.cisco.com (xch-rcd-007.cisco.com [173.37.102.17]) by alln-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id u3SHBGo6010705 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 28 Apr 2016 17:11:16 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-007.cisco.com (173.37.102.17) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 28 Apr 2016 12:11:15 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Thu, 28 Apr 2016 12:11:15 -0500
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: Joel Halpern Direct <jmh.direct@joelhalpern.com>, "Andrew G. Malis" <agmalis@gmail.com>
Thread-Topic: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRoLy5gODJbPprtEyKsV065fH5RJ+elnwAgAAtrACAAAwigIAA0eUA///PIYCAAF7oAIAAAPWA///gC4A=
Date: Thu, 28 Apr 2016 17:11:15 +0000
Message-ID: <D347BBAE.4C704%jguichar@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb> <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com> <CAA=duU0cjXbTxTCqaRetajxFaJVfq8Y-HySPDrR-0AN38Wq3Zw@mail.gmail.com> <4d65232a-d4a6-a11b-c765-635cb909edbd@joelhalpern.com> <CAA=duU0PujWB0LB=wxFauPqaqbf4kFsqkzAwtNn7r3MzBUdCqA@mail.gmail.com> <D3478632.4C66A%jguichar@cisco.com> <CAA=duU1guf-VmkYV3=-JQVULm-cHir4XwTEmhm14H2Z8o7euAg@mail.gmail.com> <888c5567-c459-f29f-6f20-02aad39f1f76@joelhalpern.com>
In-Reply-To: <888c5567-c459-f29f-6f20-02aad39f1f76@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.131.77.177]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <D787D94625367B4498DD4339D0420FCD@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/sZNKZIpJlObdx6r6wiKOCEldp68>
Cc: "Elzur, Uri" <uri.elzur@intel.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 17:11:23 -0000

That wording works for me.

Paul/Uri, as editors of draft-ietf-sfc-nsh-04, unless there are any
objections from the WG or yourselves, can you please make the suggested
change to the text?

Jim

On 4/28/16, 11:05 AM, "Joel Halpern Direct" <jmh.direct@joelhalpern.com>
wrote:

>Thanks Andy.  That wording would indeed work for me.
>Yours,
>Joel
>
>On 4/28/16 11:02 AM, Andrew G. Malis wrote:
>> Jim,
>>
>> The way option 3 is currently worded, there=B9s no indication that this =
is
>> just an example, and not a direction to use RFC 6830, section 5.4. I
>> just had an offline discussion with Joel, and he and I agree that a
>> better wording for option 3 would be "Use the fragmentation provided by
>> the network overlay mechanics. One example can be found in RFC 6830,
>> section 5.4.=B2
>>
>> Thanks,
>> Andy
>>
>> On Thu, Apr 28, 2016 at 9:22 AM, Jim Guichard (jguichar)
>> <jguichar@cisco.com <mailto:jguichar@cisco.com>> wrote:
>>
>>     Hi Andy,
>>
>>     I think the key point is that NSH !=3D network overlay but rather
>>     utilizes a network overlay for packet transport between SFC network
>>     elements. The reference is just an example of how a network overlay
>>     might deal with fragmentation and is not a suggestion that NSH adopt
>>     that mechanism but rather makes the point that it can utilize the
>>     existing network overlay mechanics.
>>
>>     Jim
>>
>>     From: sfc <sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>> on
>>     behalf of "Andrew G. Malis" <agmalis@gmail.com
>>     <mailto:agmalis@gmail.com>>
>>     Date: Thursday, April 28, 2016 at 8:17 AM
>>     To: Joel Halpern Direct <jmh.direct@joelhalpern.com
>>     <mailto:jmh.direct@joelhalpern.com>>
>>     Cc: "Elzur, Uri" <uri.elzur@intel.com <mailto:uri.elzur@intel.com>>,
>>     "mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>"
>>     <mohamed.boucadair@orange.com
>>     <mailto:mohamed.boucadair@orange.com>>, "sfc@ietf.org
>>     <mailto:sfc@ietf.org>" <sfc@ietf.org <mailto:sfc@ietf.org>>, Linda
>>     Dunbar <linda.dunbar@huawei.com <mailto:linda.dunbar@huawei.com>>
>>     Subject: Re: [sfc] Suggested wording addtion to the Section 6
>>     (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
>>
>>     Joel,
>>
>>     The diagrams in section 6 of RFC 6830 are control plane, not data
>>     plane. The data plane diagrams are in section 5.
>>
>>     But the overriding question is - without any fields in the NSH
>>     header to sequence fragments, how can the fragments be correctly
>>     reassembled?
>>
>>     Cheers,
>>     Andy
>>
>>     On Wed, Apr 27, 2016 at 7:46 PM, Joel Halpern Direct
>>     <jmh.direct@joelhalpern.com <mailto:jmh.direct@joelhalpern.com>>
>>wrote:
>>
>>         The LISP header does not have a fragment flag or fragment
>>         offset.  The diagrams in section 6 include the outer
>>         encapsulating header (the equivalent of the transport header in
>>         SFC.)  Yes, the text is a little hard to follow in this regard.
>>         The LISP working group is going to be rewriting RFC 6830 as part
>>         of moving to standards track.
>>
>>         So there is no difference in this regard between NSH and LISP.
>>
>>         Yours,
>>         Joel
>>
>>         On 4/27/16 7:02 PM, Andrew G. Malis wrote:
>>
>>             Joel et al,
>>
>>             All this talk about fragmentation prompted me to re-read
>>             section 6 of
>>             the draft, which recommends (as option 3) using the
>>             procedures in
>>             section 5.4 of RFC 6830 (presumably with the =B3NSH header=
=B2
>>             replacing the
>>             =B3LISP header=B2 in the description of the procedures in th=
at
>>             section).
>>
>>             So that led me to read that section (and the LISP header
>>             definition in
>>             section 5.1), and I see that LISP does fragmentation and
>>             reassembly
>>             identically to IPv4, using the Fragment Offset field so that
>>             fragments
>>             can be correctly reassembled in the proper order.
>>
>>             However, the NSH Header doesn=B9t have a Fragment Offset fie=
ld
>>             or any
>>             other way to order the fragments.
>>
>>             So how can the procedures in Section 5.4 of 6830 be used?
>>
>>             Thanks,
>>             Andy
>>
>>             On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern
>>             <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>
>>             <mailto:jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>>>
>>             wrote:
>>
>>                 Both methods are valid, and both depend upon details of
>>the
>>                 underlying packet and the transport.  As such, I don't
>>             see why this
>>                 document benefits from describing them, much less why it
>>             should mark
>>                 one method as a "should".  Implementation details are
>>             likely to be
>>                 more significant than any bit consumption difference
>>             between the two
>>                 alternatives.
>>
>>                 Yours,
>>                 Joel
>>
>>
>>                 On 4/27/16 3:40 PM, Linda Dunbar wrote:
>>
>>                     I suggest adding the following paragraphs after the
>>             Bullet 3 of
>>                     the Section 6 Fragmentation Consideration to make
>>             the process
>>                     more clear and less controversial:
>>
>>
>>                     --------------------------------
>>
>>                     RFC6830 describes the fragmentation method of
>>             breaking the
>>                     original packet into two equal sub-frames and
>>             encapsulating
>>                     [LISP Header + Transport header] to each sub-frame.
>>
>>                     If LISP fragmentation [RFC6830 Section 5.4] is used,
>>             the [SFC
>>                     Header + Transport Header] will be added to each
>>             half frame (or
>>                     the original data frame). As the Transport Header is
>>             terminated
>>                     by the next SFF node's tunnel transport layer, the
>>             combined two
>>                     sub-frames will have two SFC Headers.
>>
>>                     Therefore, the fragmentation for NSH encapsulated
>>             data frame
>>                     should be done completely by the node tunnel
>>             transport layer,
>>                     which should break the [SFC + original packet] into
>>             two equal
>>                     sub-frames and each sub-frame being encapsulated
>>             with its
>>                     respective tunnel header.  The next SFF node's
>>             tunnel transport
>>                     layer should combine the two sub-frames before
>>             sending to the
>>                     next node.
>>
>>                =20
>>------------------------------------------------------
>>
>>
>>                     By the way, there are to typo in the Section 6:
>>                     3rd line: "In order the" =3D=3D> "In order to"
>>                     Last line of Bullet 2: extra "the" in the "utilized
>>             to ensure
>>                     the the required packet".
>>
>>
>>                     Hope it helps.
>>
>>                     Linda
>>
>>
>>
>>                     -----Original Message-----
>>                     From: mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>
>>                     <mailto:mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>>
>>                     [mailto:mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>
>>                     <mailto:mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>>]
>>                     Sent: Wednesday, April 27, 2016 12:40 AM
>>                     To: Joel M. Halpern; Linda Dunbar; Elzur, Uri;
>>             sfc@ietf.org <mailto:sfc@ietf.org>
>>                     <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>>                     Subject: RE: [sfc] WG last call for
>>             draft-ietf-sfc-nsh-04.txt
>>
>>                     Hi Joel, all,
>>
>>                     Please see inline.
>>
>>                     Cheers,
>>                     Med
>>
>>                         -----Message d'origine-----
>>                         De : Joel M. Halpern [mailto:jmh@joelhalpern.com
>>             <mailto:jmh@joelhalpern.com>
>>                         <mailto:jmh@joelhalpern.com
>>             <mailto:jmh@joelhalpern.com>>] Envoy=E9 : mardi 26
>>                         avril 2016 19:18 =C0 : Linda Dunbar; BOUCADAIR
>>Mohamed
>>                         IMT/OLN; Elzur,
>>                         Uri; sfc@ietf.org <mailto:sfc@ietf.org>
>>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Objet : Re:
>>[sfc] WG
>>                         last call for
>>                         draft-ietf-sfc-nsh-04.txt
>>
>>                         With regard to Transport tunnel fragementation,
>>             that seems
>>                         an issue
>>                         for the transport protocol.  I don't actually
>>             object to a
>>                         sentence,
>>                         but it does not seem that it will accomplish
>>             anything.
>>
>>
>>                     [Med] I would like to see some text added to the
>>draft.
>>
>>
>>                         With regard to packets fragmented by the
>>source, I
>>                         completely disagree
>>                         with your assertion.  If an SFF were to
>>             reassemble the
>>                         packets, that
>>                         would be a violation of its job.
>>
>>
>>                     [Med] I agree with you.
>>
>>                       There is no reason for an SFF to
>>
>>                         reassemble a packet fragmented by the source.
>>The
>>                         classifier may have
>>                         to do some interesting things in order to
>>             properly classify
>>                         succeeding
>>                         fragments, but that is an implementation issue
>>             (most commonly
>>                         addressed with virtual reassembly, which doe
>>             snot delay the
>>                         fragments.)  We don't specity that.
>>
>>
>>                     [Med] Still, the external behavior of the classifier
>>             needs to be
>>                     clear in the document. I don't find any text in the
>>             draft saying
>>                     for instance that an NSH header must be present in
>>all
>>                     fragments. (There some processing that might be
>>             needed at the
>>                     SFF to "do its job" with regards to fragments
>>             (receive out of
>>                     order fragments + forwarding policy on the full
>>             packet).)
>>
>>
>>                         If an SF needs to reassemble fragments to do its
>>             job, that
>>                         is up to
>>                         the SF.  Some will need to actually reassemble.
>>             Some will
>>                         need to
>>                         perform virtual reassembly, and some will
>>             happily process the
>>                         fragments.  I can not see what the NSH document
>>             could
>>                         possibly mandate.
>>
>>
>>                     [Med] Fully agree.
>>
>>
>>                         Yours,
>>                         Joel
>>
>>                         On 4/26/16 11:47 AM, Linda Dunbar wrote:
>>
>>                             Joel,
>>
>>                             I think the document should add the
>>             description on the
>>                             following two
>>                             fragmentation scenarios:
>>
>>                             - Transport tunnel generated fragmentation:
>>             When a packet
>>                             fragmentation is caused by transport tunnel
>>             (i.e. various
>>                             encapsulations), the termination point of
>>             the transport
>>                             tunnel is
>>                             responsible for re-assembling the fragmented
>>             pieces of
>>                             the packet.
>>                             Since there won't be any SFF nodes in
>>             between the
>>                             Transport Tunnel,
>>                             the tunnel generated fragmentation does not
>>             require any
>>                             actions by
>>                             SFF nodes or SF nodes.
>>
>>
>>                             - Source node generated fragmentation (after
>>             adding on
>>                             the NSH
>>                             header): When fragmentation has to be
>>             performed for a
>>                             packet being
>>                             encapsulated with the NSH header, either the
>>                             intermediate SFF nodes
>>                             or the SF nodes have to be able to
>>             reassemble the
>>                             fragmented pieces.
>>
>>
>>
>>
>>                             Cheers,
>>
>>
>>                             Linda
>>
>>                             -----Original Message----- From: Joel M.
>>Halpern
>>                             [mailto:jmh@joelhalpern.com
>>             <mailto:jmh@joelhalpern.com>
>>                             <mailto:jmh@joelhalpern.com
>>             <mailto:jmh@joelhalpern.com>>] Sent: Tuesday, April 26,
>>                             2016 10:33 AM
>>                             To: Linda Dunbar;
>>             mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>
>>                             <mailto:mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>>; Elzur, Uri;
>>                             sfc@ietf.org <mailto:sfc@ietf.org>
>>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Subject: Re:
>>             [sfc] WG
>>                             last call for
>>                             draft-ietf-sfc-nsh-04.txt
>>
>>                             Re-reading your note, it is possible that
>>             you are
>>                             referring only to
>>                             the case of transport generated
>>             fragmentation of the
>>                             outer packet.
>>                             I had assumed you were not talking about
>>             that, since the
>>                             resulting
>>                             fragments will not all have NSH headers.  As
>>             with any tunnel
>>                             technology, if the tunnel chooses to
>>             fragment at its
>>                             layer, then the
>>                             tunnel is responsible for reassembly.  That
>>             would be
>>                             invisible to
>>                             the SFF.
>>
>>                             Yours, Joel
>>
>>                             On 4/26/16 11:10 AM, Linda Dunbar wrote:
>>
>>                                 Agree with Med.
>>
>>                                 Even if each fragment piece of a packet
>>             with NSH
>>                                 header carries the
>>                                 NSH header, the intermediate SFF nodes
>>             still need to
>>                                 put together
>>                                 all the fragments together before
>>             passing the whole
>>                                 data frame to
>>                                 the SF.
>>
>>                                 Linda
>>
>>                                 -----Original Message----- From: sfc
>>                                 [mailto:sfc-bounces@ietf.org
>>             <mailto:sfc-bounces@ietf.org>
>>                                 <mailto:sfc-bounces@ietf.org
>>             <mailto:sfc-bounces@ietf.org>>]
>>                                 On Behalf Of
>>             mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>
>>                                 <mailto:mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>> Sent: Monday,
>>                                 April 25,
>>                                 2016 9:42 AM To: Elzur, Uri; Joel M.
>>             Halpern;
>>                                 sfc@ietf.org <mailto:sfc@ietf.org>
>>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Subject:
>>                                 Re: [sfc] WG last call for
>>             draft-ietf-sfc-nsh-04.txt
>>
>>                                 Re-,
>>
>>                                 How do you instruct the transport layer
>>             to ALWAYS
>>                                 prepend an NSH
>>                                 header even for fragments? Or you don't
>>             care about that?
>>
>>                                 Thank you.
>>
>>                                 Cheers, Med
>>
>>                                     -----Message d'origine----- De :
>>             Elzur, Uri
>>                                     [mailto:uri.elzur@intel.com
>>             <mailto:uri.elzur@intel.com>
>>                                     <mailto:uri.elzur@intel.com
>>             <mailto:uri.elzur@intel.com>>] Envoy=E9 : lundi 25
>>                                     avril 2016 16:26 =C0
>>                                     : BOUCADAIR Mohamed IMT/OLN; Joel M.
>>             Halpern;
>>                                     sfc@ietf.org <mailto:sfc@ietf.org>
>>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Objet
>>                                     : RE: [sfc] WG last call for
>>                                     draft-ietf-sfc-nsh-04.txt
>>
>>                                     Hi Med
>>
>>                                     Not to repeat my position, but I'll
>>             do it anyhow
>>                                     :-) As NSH is
>>                                     *NOT* a transport, dealing with
>>             fragmentation is
>>                                     left to the
>>                                     Transport used.
>>
>>                                     The model I use for NSH, is
>>             basically similar to
>>                                     VXLAN . It is an
>>                                     overly.
>>
>>                                     Thx
>>
>>                                     Uri ("Oo-Ree") C: 949-378-7568
>>             <tel:949-378-7568> <tel:949-378-7568 <tel:949-378-7568>>
>>
>>
>>                                     -----Original Message----- From: sfc
>>                                     [mailto:sfc-bounces@ietf.org
>>             <mailto:sfc-bounces@ietf.org>
>>                                     <mailto:sfc-bounces@ietf.org
>>             <mailto:sfc-bounces@ietf.org>>]
>>                                     On Behalf Of
>>             mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>
>>                                     <mailto:mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>> Sent:
>>                                     Monday, April 25,
>>                                     2016 7:18 AM To: Joel M. Halpern
>>                                     <jmh@joelhalpern.com
>>             <mailto:jmh@joelhalpern.com> <mailto:jmh@joelhalpern.com
>>             <mailto:jmh@joelhalpern.com>>>;
>>                                     sfc@ietf.org <mailto:sfc@ietf.org>
>>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>>                                     Subject: Re: [sfc] WG last call for
>>                                     draft-ietf-sfc-nsh-04.txt
>>
>>                                     Hi Joel,
>>
>>                                     Please see inline.
>>
>>                                     Cheers, Med
>>
>>                                         -----Message d'origine----- De :
>>             Joel M. Halpern
>>                                         [mailto:jmh@joelhalpern.com
>>             <mailto:jmh@joelhalpern.com>
>>                                         <mailto:jmh@joelhalpern.com
>>             <mailto:jmh@joelhalpern.com>>] Envoy=E9 : lundi
>>                                         25 avril 2016 15:48 =C0
>>                                         : BOUCADAIR Mohamed IMT/OLN;
>>             sfc@ietf.org <mailto:sfc@ietf.org>
>>                                         <mailto:sfc@ietf.org
>>             <mailto:sfc@ietf.org>> Objet : Re: [sfc] WG
>>                                         last call for
>>             draft-ietf-sfc-nsh-04.txt
>>
>>                                         If I am understanding you
>>             correctly Med, you
>>                                         are asking that the
>>                                         NSH draft specify how service
>>             chaining
>>                                         should cope with packets
>>                                         that have been fragmented?
>>
>>
>>                                     [Med] To be accurate, I'm asking to
>>             assess
>>                                     whether there are
>>                                     implications. If there are, then the
>>             draft
>>                                     should be updated
>>                                     accordingly.
>>
>>                                         NSH, and the SFF functionality,
>>             does not care.
>>
>>
>>                                     [Med] I'm not that sure. Some
>>typical
>>                                     implications are listed
>>                                     below:
>>
>>                                     * SFF: If the NSH header is present
>>             only in the
>>                                     a fragment but SFF
>>                                     didn't maintained a state,
>>             subsequent fragments
>>                                     won't be
>>                                     appropriately processed. * SFC-aware
>>             function:
>>                                     if prepending a
>>                                     context information depends on the
>>             full packet,
>>                                     not only a
>>                                     fragment.
>>
>>                                     It just does its job.
>>
>>                                     [Med] which may be disturbed in some
>>             situations
>>                                     as listed in the
>>                                     examples above.
>>
>>                                         Ingress and intermediate
>>             classifiers may
>>                                         cope with fragments in
>>                                         any number of ways.
>>
>>                                     Specifying such is clearly out of
>>             scope for this
>>                                     draft.
>>
>>                                     [Med] The purpose is not to specify
>>             the internal
>>                                     implementation
>>                                     details but the external behavior
>>of the
>>                                     classifier function when
>>                                     it comes to handle fragments. That
>>             behavior may
>>                                     have an incidence
>>                                     on SFF, in particular. The purpose
>>             is not to
>>                                     recommend the maximum
>>                                     resources to be dedicated to out of
>>             order
>>                                     fragments nor the
>>                                     timeout to cache those; these
>>             considerations are
>>                                     of course out of
>>                                     scope. Nevertheless, an
>>             implementation should
>>                                     offer a configurable
>>                                     parameter so that an operator tweak
>>             those
>>                                     according to its
>>                                     context.
>>
>>                                         I suppose one could write an
>>             informational
>>                                         draft on possible ways
>>                                         of coping.  The IETF has not
>>usually
>>                                         published such.
>>                                         Service functions have to cope
>>with
>>                                         fragmented packets just as
>>                                         they had to before the advent of
>>             NSH, so
>>                                         describing that is
>>                                         clearly not needed here.
>>
>>
>>                                     [Med] The advent of NSH has the
>>             following
>>                                     implications: * it
>>                                     exacerbates fragmentation. Handing
>>             over this
>>                                     issue to the
>>                                     transport layer may lead to
>>             interoperability
>>                                     issues. * the
>>                                     chaining may not be efficient if
>>             fragments are
>>                                     inappropriately
>>                                     handled.
>>
>>                                     Introducing NSH should not degrade
>>             the overall
>>                                     service compared to
>>                                     legacy service deployment schemes.
>>
>>
>>                                         Yours, Joel
>>
>>                                         On 4/25/16 3:00 AM,
>>                                         mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>
>>
>>             <mailto:mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>> wrote:
>>
>>                                             Re-,
>>
>>                                             I hear you, but my comment
>>             is that we
>>                                             need, as a WG, to decide
>>                                             what to
>>
>>                                         put in the draft. FWIW, I'm
>>             discussing two
>>                                         fragmentation
>>                                         issues:
>>
>>
>>                                             (1) Fragmentation that is
>>             caused by
>>                                             prepending an SFC header.
>>                                             (2) Handling fragments at
>>             the ingress of
>>                                             an SFC-enabled domain.
>>
>>                                             Increasing the MTU is for
>>sure a
>>                                             recommendation is to be
>>                                             explicitly
>>
>>                                         called out in the text (see my
>>             first message).
>>
>>
>>                                             There are other issues that
>>             need to be
>>                                             discussed, e.g., how to
>>                                             deal with
>>
>>                                         fragments in SFFs/Classifiers?
>>
>>
>>                                             It is also "prudent" to
>>             check that no
>>                                             issues will be experienced
>>                                             in SFF
>>
>>                                         to handle fragments. If an SFC
>>             header is
>>                                         prepended for all
>>                                         fragments, I'm not sure there
>>
>>                                             is any particular issue at
>>             the SFF
>>                                             level, except if
>>                                             stripping/adding
>>
>>                                         context TLVs depends on the full
>>             packet (not
>>                                         just fragment). It
>>                                         is warranted to consider a
>>             little bit this
>>                                         point before declaring
>>                                         there is no issue.
>>
>>
>>                                             For point (1), declaring
>>             fragmentation
>>                                             out of scope would be
>>                                             meant that
>>
>>                                         an implementation must be
>>             prepared to
>>                                         receive fragments with or
>>                                         without NSH header as this is a
>>             decision
>>                                         that is left to the
>>                                         transport encapsulation. This
>>is a
>>                                         requirement per se!
>>
>>
>>                                             I won't reiterate all the
>>             comments I
>>                                             have about the current
>>                                             wording of
>>
>>                                         this section.
>>
>>
>>                                             Cheers, Med
>>
>>                                                 -----Message
>>             d'origine----- De :
>>                                                 Elzur, Uri
>>
>>             [mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>
>>
>>             <mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>>]
>>             Envoy=E9
>>                                                 : lundi 25 avril 2016
>>                                                 08:30 =C0 : BOUCADAIR
>>             Mohamed IMT/OLN;
>>                                                 Thomas Narten;
>>                                                 sfc@ietf.org
>>             <mailto:sfc@ietf.org> <mailto:sfc@ietf.org
>>             <mailto:sfc@ietf.org>>
>>                                                 Objet : RE: [sfc] WG
>>             last call for
>>                =20
>>draft-ietf-sfc-nsh-04.txt
>>
>>                                                 Hi Med
>>
>>                                                 My point is that
>>             Fragmentation is
>>                                                 yet another transport
>>             related
>>                                                 issue
>>
>>                                         that
>>
>>                                                 is beyond the scope of
>>             NSH and
>>                                                 beyond the charter of
>>             the WG, so
>>                                                 it
>>
>>                                         doesn't
>>
>>                                                 really belong in the
>>             draft. We are
>>                                                 providing an advice as
>>                                                 extending the size of
>>             the packet may
>>                                                 lead to fragmentation,
>>but
>>                                                 as you check RFC 7348
>>             VxLAN, which
>>                                                 my create the same
>>issue,
>>                                                 you'll find it doesn't
>>even
>>
>>                                         relate
>>
>>                                                 to it.
>>
>>                                                 Thx
>>
>>                                                 Uri ("Oo-Ree") C:
>>             949-378-7568 <tel:949-378-7568>
>>                                                 <tel:949-378-7568
>>             <tel:949-378-7568>>
>>
>>
>>                                                 -----Original
>>             Message----- From: sfc
>>
>>             [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>
>>
>>             <mailto:sfc-bounces@ietf.org=20
>><mailto:sfc-bounces@ietf.org>>] On
>>                                                 Behalf Of
>>
>>             mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>
>>
>>             <mailto:mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>> Sent:
>>                                                 Sunday, April 24, 2016
>>                                                 10:32 PM To: Elzur, Uri
>>                                                 <uri.elzur@intel.com
>>             <mailto:uri.elzur@intel.com>
>>
>>             <mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>>>;
>>                                                 Thomas Narten
>>
>>                                         <narten@us.ibm.com
>>             <mailto:narten@us.ibm.com> <mailto:narten@us.ibm.com
>>             <mailto:narten@us.ibm.com>>>;
>>
>>                                                 sfc@ietf.org
>>             <mailto:sfc@ietf.org> <mailto:sfc@ietf.org
>>             <mailto:sfc@ietf.org>>
>>                                                 Subject: Re: [sfc] WG
>>             last call for
>>                                                =20
>>draft-ietf-sfc-nsh-04.txt
>>
>>                                                 Hi Uri,
>>
>>                                                 That's another option
>>             that needs to
>>                                                 be=20
>>discussed/investigated.
>>                                                 I'm
>>
>>                                         afraid
>>
>>                                                 this is not the
>>             rationale adopted in
>>                                                 -04 since it includes=20
>>some
>>                                                 text
>>
>>                                         that
>>
>>                                                 is far to be sufficient
>>             to ensure
>>                                                 interoperable
>>                                                 implementations.
>>
>>                                                 BTW, saying that nsh
>>             does not need
>>                                                 to deal with=20
>>fragmentation
>>                                                 because
>>
>>                                         it
>>
>>                                                 is transport-independent
>>             is not IMHO
>>                                                 a good strategy to adopt
>>                                                 here
>>
>>                                         because
>>
>>                                                 it opens the door for
>>             interoperable
>>                                                 issues, it may lead to
>>                                                 sub-optimal
>>             implementations if the
>>                                                 sfc information is=20
>>present
>>                                                 only in one
>>
>>                                         fragments,
>>
>>                                                 etc.
>>
>>                                                 My comments are related
>>             to the
>>                                                 current text in the -04.
>>                                                 This text needs
>>
>>                                         to
>>
>>                                                 be fixed somehow.
>>
>>                                                 Cheers, Med
>>
>>                                                     -----Message
>>             d'origine----- De :
>>                                                     Elzur, Uri
>>
>>             [mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>
>>
>>             <mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>>]
>>                                                     Envoy=E9 : dimanche =
24
>>             avril
>>                                                     2016 17:36 =C0 :
>>             BOUCADAIR Mohamed
>>                                                     IMT/OLN; Thomas=20
>>Narten;
>>                                                     sfc@ietf.org
>>             <mailto:sfc@ietf.org>
>>                                                     <mailto:sfc@ietf.org
>>             <mailto:sfc@ietf.org>> Objet :
>>                                                     RE: [sfc] WG last
>>             call for
>>
>>             draft-ietf-sfc-nsh-04.txt
>>
>>                                                     Hi Med
>>
>>                                                     I see no need to
>>             specify the
>>                                                     exact behavior as=20
>>NSH is
>>                                                     transport
>>             independent i.e. like
>>                                                     NSH interaction with
>>             any other
>>                                                     Transport eh issue=20
>>of
>>                                                     Fragmentation is to
>>             be dealt in
>>                                                     a way
>>                                                     that matches the
>>             mechanisms
>>                                                     supported by the
>>             Transport used
>>                                                     and do not belong in
>>             the NSH draft
>>
>>                                                     Thx
>>
>>                                                     Uri ("Oo-Ree") C:
>>             949-378-7568 <tel:949-378-7568>
>>                                                     <tel:949-378-7568
>>             <tel:949-378-7568>>
>>
>>
>>                                                     -----Original
>>             Message----- From: sfc
>>
>>             [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>
>>
>>             <mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>>]
>>                                                     On Behalf Of
>>
>>             mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>
>>
>>             <mailto:mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>>
>>                                                     Sent: Thursday,
>>             April 14,
>>                                                     2016 12:43 AM To:
>>             Thomas Narten
>>                                                     <narten@us.ibm.com
>>             <mailto:narten@us.ibm.com>
>>
>>             <mailto:narten@us.ibm.com <mailto:narten@us.ibm.com>>>;
>>                                                     sfc@ietf.org
>>             <mailto:sfc@ietf.org>
>>                                                     <mailto:sfc@ietf.org
>>             <mailto:sfc@ietf.org>> Subject:
>>                                                     Re: [sfc] WG last
>>             call for
>>
>>             draft-ietf-sfc-nsh-04.txt
>>
>>                                                     R-,
>>
>>                                                     In addition to other
>>             pending
>>                                                     issues raised for
>>             this draft, I
>>                                                     would like to raise=
=20
>>this
>>                                                     additional one about
>>             Section 6.
>>
>>                                                     =3D=3D 6.  Fragmenta=
tion
>>             Considerations
>>
>>                                                     NSH and the
>>             associated transport
>>                                                     header are "added"
>>             to the
>>                                                     encapsulated
>>             packet/frame.  This
>>                                                     additional=20
>>information
>>                                                     increases
>>
>>                                         the
>>
>>                                                     size of the packet.
>>             In order
>>                                                     the ensure proper
>>             forwarding of
>>                                                     NSH data, several
>>             options for
>>                                                     handling
>>             fragmentation and
>>                                                     re-assembly exist:
>>
>>                                                     1.  Jumbo Frames,=20
>>when
>>                                                     supported, enable
>>             the transport
>>                                                     of NSH
>>                                                     and associated
>>             transport packets
>>                                                     without requiring
>>                                                     fragmentation.
>>
>>                                                     2.  Path MTU=20
>>Discovery
>>                                                     [RFC1191]"describes
>>             a technique for
>>                                                     dynamically
>>             discovering the
>>                                                     maximum transmission
>>             unit (MTU) of
>>
>>                                         an
>>
>>                                                     arbitrary internet
>>             path" and can
>>                                                     be utilized to
>>             ensure the
>>
>>                                     the
>>
>>                                                     required packet size
>>             is used.
>>
>>                                                     3.  [RFC6830]
>>             describes two
>>                                                     schemes for
>>             fragmentation and
>>                                                     re-
>>
>>                                         assembly
>>
>>                                                     in section 5.4. =3D=
=3D
>>
>>                                                     * The text is weak=20
>>for a
>>                                                     Standard track
>>             document that is
>>                                                     intended to solve
>>             the problem in
>>
>>             https://tools.ietf.org/html/rfc7498#section-
>>
>>                                     2.12.
>>
>>                                                     There should be a
>>             clear behavior
>>                                                     to be followed by an
>>
>>                                     implementation.
>>
>>                                                     Further, I would
>>             avoid the use
>>                                                     of words such as=20
>>"can".
>>
>>                                                     * The text covers=20
>>only
>>                                                     fragmentation when
>>             it is induced
>>                                                     by SFC
>>                                                     operations, it does
>>             not discuss
>>                                                     the treatment of a
>>             fragment
>>                                                     when received in an
>>             SFC domain.
>>                                                     IMHO, the draft
>>             should also
>>                                                     specify the behavior
>>             of the
>>                                                     Classifier with
>>             regards to
>>                                                     fragments for the
>>             sake of proper
>>                                                     SFC operation.=20
>>Applying
>>                                                     classification
>>             policies may
>>                                                     require the
>>
>>                                                 full packet, not only a
>>             fragment.
>>
>>                                                     In particular,=20
>>dedicated
>>                                                     resources should
>>             dedicated for
>>                                                     handling out of
>>             order fragments.
>>                                                     Of course, it is out
>>             of scope
>>                                                     of this document to
>>             describe how
>>                                                     SFs handle=20
>>fragments.
>>
>>                                                     * If an SFC header
>>             is prepended
>>                                                     for all fragments,
>>             I'm not
>>                                                     sure there is any
>>             particular
>>                                                     issue at the SFF
>>             level...except
>>                                                     if stripping/adding
>>             context TLVs
>>                                                     depends on the full
>>             packet
>>                                                     (not just fragment).
>>             It is
>>                                                     warranted to
>>             consider a little bit
>>                                                     this point before
>>             declaring there
>>
>>                                         is
>>
>>                                                 no issue.
>>
>>
>>                                                     * The text states
>>             "several
>>                                                     options". This may
>>             be interpreted
>>                                                     as if implementing
>>             one of them
>>                                                     is
>>             sufficient...which is not
>>                                                     true. The first two
>>             points
>>                                                     contribute to
>>             minimize the
>>                                                     fragmentation risk,=
=20
>>but
>>                                                     fragmentation may
>>             still be
>>                                                     experienced
>>                                                     (e.g., other shims
>>             are prepended
>>                                                     by other nodes for
>>             some other
>>                                                     purposes, nested
>>             nsh, etc.)
>>
>>                                                     * The first two
>>             points have
>>                                                     nothing to do with
>>             reassembly.
>>
>>                                                     * The support of
>>             jumbo frames by
>>                                                     a router/device does
>>             not mean
>>                                                     that it can make use
>>             of it.
>>                                                     Appropriate MTU
>>             configuration
>>                                                     should be undertaken
>>             in a
>>                                                     consistent manner
>>             within an SFC
>>                                                     domain. The text
>>             should be
>>                                                     updated to make it
>>             is about
>>                                                     (consistent) MTU
>>
>>                                     configuration.
>>
>>
>>                                                     * BTW, shouldn't the
>>             text be
>>                                                     reworded to
>>             recommended to
>>                                                     increase the MTU of
>>             **all
>>                                                     nodes** of an
>>             SFC-enabled domain by
>>                                                     at least the length
>>             of SFC
>>                                                     header + transport
>>             header?
>>
>>                                                     * Bullet 2, how PMTU
>>             discovery
>>                                                     is actually used in=
=20
>>this
>>                                                     context? Do you
>>             assume that all
>>                                                     SFC-aware nodes will
>>             issue
>>                                                     such messages
>>             towards other
>>                                                     SFC-aware node,
>>             arbitrary
>>                                                     destination, else?
>>
>>                                                     * Bullet 2, I would=
=20
>>drop
>>                                                     "describes a
>>             technique for
>>                                                     dynamically
>>             discovering the
>>                                                     maximum transmission
>>             unit
>>                                                     (MTU) of an
>>             arbitrary internet
>>                                                     path".
>>
>>                                                     * Bullet 2, s/ the
>>             the/the.
>>
>>                                                     * The reference to
>>             the LISP
>>                                                     specification raises
>>             two concerns
>>                                                     and one comment:
>>
>>                                                     (1) I don't think it
>>             is a good
>>                                                     approach that
>>             fragments induced
>>                                                     by the network are
>>             passed to
>>                                                     their ultimate
>>             destinations as
>>                                                     such
>>
>>                                     (stateless).
>>
>>                                                     IMO, reassembly
>>             should be done
>>                                                     within the SFC=20
>>domain
>>                                                     (responsible for
>>             fragmentation)
>>                                                     not passed away. (2)
>>             Does the
>>                                                     stateful mode
>>             require all SFC
>>                                                     data plane elements
>>             maintain a
>>                                                     full list of MTU for
>>             the any
>>                                                     SFF/SF instance of
>>             the SFC
>>
>>                                                 domain?
>>
>>
>>                                                     The current text
>>             suggests that
>>                                                     [RFC6830] should be
>>             listed as
>>                                                     normative reference
>>             (not an
>>                                                     informative one). I
>>             would
>>                                                     personally favor
>>             removing the
>>                                                     reference to LISP
>>             (as it is an
>>                                                     Experimental RFC).
>>
>>                                                     * The security
>>             section of the
>>                                                     draft may be
>>             augmented with
>>                                                     informational
>>
>>             fragmentation-related pointers to:
>>                                                     e.g., RFC1858=20
>>(Security
>>                                                     Considerations for
>>             IP Fragment
>>                                                     Filtering), RFC3128
>>             (Protection
>>                                                     Against a Variant of
>>             the Tiny
>>                                                     Fragment Attack),
>>             and RFC 4963
>>                                                     (IPv4 Reassembly
>>             Errors at High
>>                                                     Data Rates).
>>
>>                                                     Cheers, Med
>>
>>                                                         -----Message
>>             d'origine-----
>>                                                         De : sfc
>>
>>             [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>
>>
>>             <mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>>]
>>                                                         De la part de
>>
>>             mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>
>>
>>             <mailto:mohamed.boucadair@orange.com
>>             <mailto:mohamed.boucadair@orange.com>>
>>                                                         Envoy=E9 : lundi
>>             11 avril
>>                                                         2016 13:14 =C0 :
>>             Thomas
>>                                                         Narten;
>>             sfc@ietf.org <mailto:sfc@ietf.org>
>>
>>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Objet
>>                                                         : Re:
>>                                                         [sfc] WG last
>>             call for
>>
>>             draft-ietf-sfc-nsh-04.txt
>>
>>                                                         Dear Thomas,=20
>>all,
>>
>>                                                         As I mentioned
>>             during the
>>                                                         meeting, there
>>             are several
>>                                                         issues
>>                                                         that are not
>>             covered in the
>>                                                         last version of
>>             the draft. I
>>                                                         already provided
>>             examples of
>>                                                         the issues
>>             offline as requested
>>                                                         by Martin.
>>
>>                                                         Cheers, Med
>>
>>                                                             -----Message
>>
>>             d'origine----- De : sfc
>>
>>             [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>
>>
>>             <mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>>]
>>                                                             De la part
>>             de Thomas Narten
>>                                                             Envoy=E9 :
>>             jeudi 31 mars
>>                                                             2016 04:48=20
>>=C0 :
>>                                                             sfc@ietf.org
>>             <mailto:sfc@ietf.org>
>>
>>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>>                                                             Objet :
>>             [sfc] WG last
>>                                                             call for
>>
>>             draft-ietf-sfc-nsh-04.txt
>>
>>                                                             Dear WG:
>>
>>                                                             This note
>>             begins a WG
>>                                                             last call on
>>
>>             draft-ietf-sfc-nsh-04.txt
>>
>>             (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>
>>
>>
>>                         The editors of the NSH document have indicated
>>             that they have
>>
>>                                                             addressed
>>             all known
>>                                                             comments and
>>             that there
>>                                                             are no open
>>                                                             issues with
>>             the current
>>                                                             version of
>>             the document.
>>
>>                                                             Substantive
>>             comments to
>>                                                             the list=20
>>please,
>>                                                             editorial
>>             comments
>>                                                             can go
>>             directly to the
>>                                                             document
>>             editors.
>>
>>                                                             We'll also
>>             get a brief
>>                                                             update from
>>             the editors
>>                                                             at next
>>                                                             week's
>>             meeting. If there
>>                                                             are any
>>             remaining issues
>>                                                             with the
>>                                                             document,
>>             raising them
>>                                                             before the
>>             meeting would be
>>                                                             especially
>>             helpful.
>>
>>                                                             For the
>>             chairs, Thomas
>>
>>
>>             _______________________________________________
>>                                                             sfc mailing
>>                                                             list
>>             sfc@ietf.org <mailto:sfc@ietf.org>
>>
>>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>>
>>             https://www.ietf.org/mailman/listinfo/sfc
>>
>>
>>
>>             _______________________________________________
>>                                                         sfc mailing
>>                                                         list
>>             sfc@ietf.org <mailto:sfc@ietf.org>
>>
>>             <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>>
>>             https://www.ietf.org/mailman/listinfo/sfc
>>
>>
>>
>>             _______________________________________________
>>                                                     sfc mailing
>>                                                     list sfc@ietf.org
>>             <mailto:sfc@ietf.org>
>>                                                     <mailto:sfc@ietf.org
>>             <mailto:sfc@ietf.org>>
>>
>>             https://www.ietf.org/mailman/listinfo/sfc
>>
>>
>>
>>             _______________________________________________
>>                                                 sfc mailing
>>
>>
>>


From nobody Thu Apr 28 10:56:06 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C8C6D12D8D6 for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 10:56:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.895
X-Spam-Level: 
X-Spam-Status: No, score=-2.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xXRpBn0C9u9I for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 10:55:59 -0700 (PDT)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id 4E42012D90F for <sfc@ietf.org>; Thu, 28 Apr 2016 10:55:59 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Thu, 28 Apr 2016 13:55:58 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: draft-ietf-sfc-control-plane -- C2 interface
Thread-Index: AdGhdzeqsff0+F4JRSWm8k5GYfJj0Q==
Date: Thu, 28 Apr 2016 17:55:57 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F44097@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830F44097wtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/re4bsdWi2TdV0BVi916HbzDbqS0>
Subject: [sfc] draft-ietf-sfc-control-plane -- C2 interface
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 17:56:04 -0000

--_000_E8355113905631478EFF04F5AA706E9830F44097wtlexchp2sandvi_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

In section 3.3.2, https://tools.ietf.org/html/draft-ietf-sfc-control-plane-=
04#section-3.3.2
the section is: C2: Interface between SFC Control Plane & SFF

- There is no mention of being able to instruct the SFF to load-balance an =
SFP across multiple (functionally equivalent) SFs
This is the service-function-group-name concept in OpenDaylight and in draf=
t-penno-sfc-yang-14, as I understand it.
Identifying members of a group and identifying a group as a next-hop would =
be in the scope of the C2 interface, correct?


- Regarding chain (path?) termination, there should be some mention of how =
to forward packets per path after the NSH header is removed.
For example, it may be that different paths terminate at different physical=
 interfaces or at different routing tables.
This isn't always relevant, but I would expect it to be in the scope of C2,=
 no?
E.g., for IP encapsulation,  "if SPI=3D101 and SI=3D251 then terminate to r=
outing table T1"
Or, e.g., for Ethernet encapsulation "if SPI=3D200 and SI=3D252 then termin=
ate to Ethernet interface eth1"


David Dolson
Senior Software Architect, Sandvine Inc.


--_000_E8355113905631478EFF04F5AA706E9830F44097wtlexchp2sandvi_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">In section 3.3.2, <a href=3D"https://tools.ietf.org/=
html/draft-ietf-sfc-control-plane-04#section-3.3.2">
https://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#section-3.3.2</=
a><o:p></o:p></p>
<p class=3D"MsoNormal">the section is: C2: Interface between SFC Control Pl=
ane &amp; SFF<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">- There is no mention of being able to instruct the =
SFF to load-balance an SFP across multiple (functionally equivalent) SFs<o:=
p></o:p></p>
<p class=3D"MsoNormal">This is the service-function-group-name concept in O=
penDaylight and in draft-penno-sfc-yang-14, as I understand it.<o:p></o:p><=
/p>
<p class=3D"MsoNormal">Identifying members of a group and identifying a gro=
up as a next-hop would be in the scope of the C2 interface, correct?<o:p></=
o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">- Regarding chain (path?) termination, there should =
be some mention of how to forward packets per path after the NSH header is =
removed.<o:p></o:p></p>
<p class=3D"MsoNormal">For example, it may be that different paths terminat=
e at different physical interfaces or at different routing tables.<o:p></o:=
p></p>
<p class=3D"MsoNormal">This isn&#8217;t always relevant, but I would expect=
 it to be in the scope of C2, no?<o:p></o:p></p>
<p class=3D"MsoNormal">E.g., for IP encapsulation, &nbsp;&#8220;if SPI=3D10=
1 and SI=3D251 then terminate to routing table T1&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal">Or, e.g., for Ethernet encapsulation &#8220;if SPI=
=3D200 and SI=3D252 then terminate to Ethernet interface eth1&#8221;<o:p></=
o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">David Dolson<o:p></o:p></p>
<p class=3D"MsoNormal">Senior Software Architect, Sandvine Inc.<o:p></o:p><=
/p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_E8355113905631478EFF04F5AA706E9830F44097wtlexchp2sandvi_--


From nobody Thu Apr 28 10:57:33 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F10B612D926 for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 10:57:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.895
X-Spam-Level: 
X-Spam-Status: No, score=-2.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YogGDkAlUInj for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 10:57:30 -0700 (PDT)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id 59E7912D92D for <sfc@ietf.org>; Thu, 28 Apr 2016 10:57:28 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Thu, 28 Apr 2016 13:57:27 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: draft-ietf-sfc-control-plane -- C3 interface
Thread-Index: AdGhd20GlIfr42rfQei+e06aOHat/g==
Date: Thu, 28 Apr 2016 17:57:27 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F440D9@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830F440D9wtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/QIaQqShBz3TkyEf-GEs69Ihw_2c>
Subject: [sfc] draft-ietf-sfc-control-plane -- C3 interface
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 17:57:32 -0000

--_000_E8355113905631478EFF04F5AA706E9830F440D9wtlexchp2sandvi_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Regarding https://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#secti=
on-3.3.3
C3: Interface between SFC Control Plane & SFC-aware SFs

Shouldn't information about bidirectional paths be in scope for C3 ?
E.g., as in section 5.1 of https://www.ietf.org/archive/id/draft-penno-sfc-=
packet-02.txt
Maybe add this paragraph:
"This interface informs the SFC-aware SF about the method for handling bidi=
rectional paths,
either by conveying the algorithmic method to use, or by providing forward/=
reverse path
mapping."
The alternative, in my opinion, is to standardize on an algorithmic method =
for computing bidirectional paths.


I'm uneasy about C3 carrying information specific to applications, such as
    "a threat-detecting  SF can periodically send the threat characteristic=
s via this
      interface, such as high probability of threat with packet of a
      given size."
This seems like it should be out of scope of C3. Instead I think there woul=
d be an application on top of the controller.
Thoughts?


In this paragraph, does "context information" mean metadata? If so, can tha=
t be made clear that the SFC is being asked to add metadata to the packet?
   This interface is also used to instruct an SFC-aware SF about any
   context information it needs to supply in the context of a given SFC.


Regarding this paragraph, I think it would be cleaner if this behavior actu=
ally requires the C2 interface into the SF.
(Because although the statement is that the SF doesn't have an SFF in the n=
ode, it actually does have the SFF behavior. So call it what it is, an SFF.=
)
  Multiple SFs may be located within the same physical node, and no SFF
   is enabled in that same node, means to unambiguously forward the
   traffic to the appropriate SF must be supported.  Concretely, each SF
   must have a unique locator for unambiguous forwarding.





David Dolson
Senior Software Architect, Sandvine Inc.


--_000_E8355113905631478EFF04F5AA706E9830F440D9wtlexchp2sandvi_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Regarding <a href=3D"https://tools.ietf.org/html/dra=
ft-ietf-sfc-control-plane-04#section-3.3.3">
https://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#section-3.3.3</=
a><o:p></o:p></p>
<p class=3D"MsoNormal">C3: Interface between SFC Control Plane &amp; SFC-aw=
are SFs<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Shouldn&#8217;t information about bidirectional path=
s be in scope for C3 ?<o:p></o:p></p>
<p class=3D"MsoNormal">E.g., as in section 5.1 of <a href=3D"https://www.ie=
tf.org/archive/id/draft-penno-sfc-packet-02.txt">
https://www.ietf.org/archive/id/draft-penno-sfc-packet-02.txt</a> <o:p></o:=
p></p>
<p class=3D"MsoNormal">Maybe add this paragraph:<o:p></o:p></p>
<p class=3D"MsoNormal">&#8220;This interface informs the SFC-aware SF about=
 the method for handling bidirectional paths,<o:p></o:p></p>
<p class=3D"MsoNormal">either by conveying the algorithmic method to use, o=
r by providing forward/reverse path
<o:p></o:p></p>
<p class=3D"MsoNormal">mapping.&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal">The alternative, in my opinion, is to standardize on=
 an algorithmic method for computing bidirectional paths.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I&#8217;m uneasy about C3 carrying information speci=
fic to applications, such as
<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&#8220;<span style=3D"font-s=
ize:10.0pt;font-family:&quot;Courier New&quot;">a threat-detecting&nbsp; SF=
 can periodically send the threat characteristics via this<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; interface, such as high pro=
bability of threat with packet of a<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; given size.&#8221;<o:p></o:=
p></span></p>
<p class=3D"MsoNormal">This seems like it should be out of scope of C3. Ins=
tead I think there would be an application on top of the controller.<o:p></=
o:p></p>
<p class=3D"MsoNormal">Thoughts?<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">In this paragraph, does &#8220;context information&#=
8221; mean metadata? If so, can that be made clear that the SFC is being as=
ked to add metadata to the packet?<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
&nbsp;&nbsp; This interface is also used to instruct an SFC-aware SF about =
any<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
&nbsp;&nbsp; context information it needs to supply in the context of a giv=
en SFC.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Regarding this paragraph, I think it would be cleane=
r if this behavior actually requires the C2 interface into the SF.<o:p></o:=
p></p>
<p class=3D"MsoNormal">(Because although the statement is that the SF doesn=
&#8217;t have an SFF in the node, it actually does have the SFF behavior. S=
o call it what it is, an SFF.)<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp;Multiple SFs may be located within the same ph=
ysical node, and no SFF<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp; is enabled in that same node, means to unambi=
guously forward the<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp; traffic to the appropriate SF must be support=
ed.&nbsp; Concretely, each SF<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp; must have a unique locator for unambiguous fo=
rwarding.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">David Dolson<o:p></o:p></p>
<p class=3D"MsoNormal">Senior Software Architect, Sandvine Inc.<o:p></o:p><=
/p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_E8355113905631478EFF04F5AA706E9830F440D9wtlexchp2sandvi_--


From nobody Thu Apr 28 11:12:56 2016
Return-Path: <prvs=9198f1465=sunilvk@f5.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7013A12D510 for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 11:12:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.017
X-Spam-Level: 
X-Spam-Status: No, score=-8.017 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=f5.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Mv7ptGzzD45W for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 11:12:52 -0700 (PDT)
Received: from mail.f5.com (mail.f5.com [208.85.209.139]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BF9F412B047 for <sfc@ietf.org>; Thu, 28 Apr 2016 11:12:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=f5.com; i=@f5.com; q=dns/txt; s=seattle; t=1461867173; x=1493403173; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=JpZ1KD+/oJW35NMqEoOzZRccnoY3PUEJ6wQSXIV1+3E=; b=xLV2aL8X4Re85JExD11a4CAp6PtfghVZ29zeFffAcqmi37vksRn15BG5 U7sBp1HKeQjQH9TOaQhPzSsJ8Jnvg4n9OCw/OqqlfhdjthgifaqaNvX6N tHDrqd8DHrUeaAbFG404JrMJx6PhDEjOfZPD/KB8ehlEbpOtgG1alOrDI 8=;
X-IronPort-AV: E=Sophos;i="5.24,547,1454976000"; d="scan'208";a="216235468"
Received: from oracle-apps.f5net.com (HELO exchmail.f5net.com) ([192.168.10.235]) by mail.f5.com with ESMTP/TLS/AES256-SHA; 28 Apr 2016 18:12:52 +0000
Received: from SEAEXCHMBX06.olympus.F5Net.com (192.168.15.49) by seaexchmbx03.olympus.F5Net.com (192.168.15.225) with Microsoft SMTP Server (TLS) id 15.0.1156.6; Thu, 28 Apr 2016 11:12:52 -0700
Received: from SEAEXCHMBX06.olympus.F5Net.com ([fe80::b921:c8e9:b9b2:3e8a]) by SEAEXCHMBX06.olympus.F5Net.com ([fe80::b921:c8e9:b9b2:3e8a%12]) with mapi id 15.00.1156.000; Thu, 28 Apr 2016 11:12:52 -0700
From: Sunil Vallamkonda <sunilvk@f5.com>
To: Linda Dunbar <linda.dunbar@huawei.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: Questions to  SFC-Metadata-model
Thread-Index: AQHRn94+xc2w9iJn1EuQbXESQ+5+m5+frOug
Date: Thu, 28 Apr 2016 18:12:52 +0000
Message-ID: <46b013de584a4a898ecb34d32cccd04e@SEAEXCHMBX06.olympus.F5Net.com>
References: <E8355113905631478EFF04F5AA706E9830F0AC6D@wtl-exchp-2.sandvine.com> <1460042865963.25707@F5.com>, <E8355113905631478EFF04F5AA706E9830F11EA7@wtl-exchp-2.sandvine.com>, <1460091126273.230@F5.com> <1D15709113D6B34BAE5E128F392059CA01268568BE@blr-exch-1.sandvine.com>, <TU4PR84MB01596CB74B2CC2D7395C545BFE910@TU4PR84MB0159.NAMPRD84.PROD.OUTLOOK.COM> <1460738575691.54747@F5.com> <E8355113905631478EFF04F5AA706E9830F2432E@wtl-exchp-2.sandvine.com> <f64d98220bfa471b900e6557ff27b506@SEAEXCHMBX06.olympus.F5Net.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CEE6@dfweml501-mbb>
In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657E7CEE6@dfweml501-mbb>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.168.15.239]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/kaBqkjFJlasoQ-qFHrD_9DT5KHc>
Subject: Re: [sfc] Questions to  SFC-Metadata-model
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 18:12:55 -0000
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From nobody Thu Apr 28 11:43:06 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 685E112D0DD for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 11:43:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.895
X-Spam-Level: 
X-Spam-Status: No, score=-2.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xj1OHVTQIPMF for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 11:43:03 -0700 (PDT)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id 9B0EC12D17B for <sfc@ietf.org>; Thu, 28 Apr 2016 11:43:02 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Thu, 28 Apr 2016 14:43:01 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
Thread-Index: AQHRoD1fSI1yPp+UQ0KhY1xrwASm1p+eIaqAgAGXhUA=
Date: Thu, 28 Apr 2016 18:43:01 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F44359@wtl-exchp-2.sandvine.com>
References: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com> <D3462926.4C3CA%jguichar@cisco.com>
In-Reply-To: <D3462926.4C3CA%jguichar@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830F44359wtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ArWP4tTDqqpPRqxDmUanaWxELqY>
Cc: "Jim Guichard \(jguichar\)" <jguichar@cisco.com>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 18:43:05 -0000

--_000_E8355113905631478EFF04F5AA706E9830F44359wtlexchp2sandvi_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Further to Jim's points about section 4.10.5, do I read it correctly that t=
he SFF can be configured to steer traffic on the basis of these?
   o  Destination MAC address
   o  Source MAC address
   o  VLAN-ID,
   o  Destination IP address
   o  Source IP address
   o  Source port number
   o  Destination port number
   o  DSCP
   o  Packet size, etc., or any combination thereof.

This comes totally unexpected to me, thinking that the SFF steers traffic b=
ased exclusively on Service Path Identifier and Service Index (SPI/SI), whi=
ch oddly aren't in the above list.

I can guess that maybe this is about reclassification, but "classification"=
 isn't mentioned in 4.10.5.
Can someone explain?

-Dave



From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Jim Guichard (jguichar=
)
Sent: Wednesday, April 27, 2016 10:18 AM
To: Martin Stiemerling; sfc@ietf.org
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt

Hi Martin & WG:

A few comments that I would like to see addressed in the document before it=
 can move forward to the next step.

  *   Section 2.2 SFC Control Plane Bootstrapping.
This section is too wishy washy. It makes the statement "this document assu=
mes the SFC control plane is provided with a set of information that is req=
uired for proper SFC operation" but then goes on to list bullets that are l=
ikely to be provided or may be provided. It does not actually provide any i=
nformation on what is required for proper SFC operation. In the list of lik=
ely information there is no indication of whether this information must exi=
st in the network prior to bootstrapping the SFC control plane element; thi=
s is true also for the list of may information. Surely we should provide gu=
idelines on what must be available before the SFC control plane element can=
 actually function although it is reasonable to assume that it can bootstra=
p without any information (albeit it can't actually do anything). On this p=
oint I would argue that several of the may elements are actually required s=
uch as SFF, SF, SFC-proxy locators and may exist prior to bootstrapping the=
 SFC control plane element, or may be added later through some control inte=
rface.

Minor point -> typo in bullet point 6 - SFP proxy should read SFC proxy

  *   Section 2.3 Coherent Setup of an SFC-enabled Domain
What does the sentence "various transport encapsulation schemes and/or vari=
ations of SFC header implementations may be supported" actually mean ? Are =
we referring to the fact that the SFC header may carry type-1 or type-2 met=
adata or something else ? Note that there is only one SFC header implementa=
tion based on the WG charter so if we are referring to different SFC format=
s (meaning metadata) then please make this clear in the text, and if not, p=
lease remove this sentence.

  *   Section 3.1 Reference Architecture
Second bullet point "mapping between service function chains and SFPs" - th=
is is a general comment for the entire document but applies here also. Ther=
e is no mention of mapping SFPs -> RSPs - in fact RSP is mentioned only onc=
e in the entire document. The architecture is explicit in that the SFP when=
 rendered into the network is an RSP and therefore the SFC control plane el=
ement needs to have information on currently deployed RSPs.

Additionally there is no interface specified for communication between the =
SFC Control Plane Element and SF management systems. This is an important a=
spect as many SF's may require that SFC information be communicated to thei=
r management systems that will be responsible for communicating directly wi=
th their respective SF's.

  *   Section 3.1.1. C1: Interface between SFC Control Plane & SFC Classifi=
er
The sentence "The control plane may instruct the classifier about the initi=
al values of the Service Index (SI)" should be changed to say MUST as other=
wise if a classifier chooses whatever value it wants then that may not alig=
n with what is programmed into the SFFs by the SFC Control Plane element.

  *   Section 4.10.4. Encoding the Exact SFF/SF Sequence in Data Packets
This section does not actually provide any meaning or indication of relatio=
nship with the SFC Control Plane element. Furthermore,  there has been no W=
G consensus to carry source routes within the SFC encapsulation. Therefore =
this entire section should be removed from the document.

  *   Section 4.10.5. Fully Controlled SFF/SF Sequence for a SFP
Figure 2 lists 3 different SFP-id's whereas the text mentions only SFP-id #=
1. Is this simply a typo or are you trying to convey something else ?

Further you state that "the steering policies to a SFF node for service fun=
ction chain depends on if the packet comes from previous SFF or comes from =
a specific SF i.e., the SFP Forwarding Table entries have to be ingress por=
t specific" -  this is an inaccurate statement as the combination of the SF=
P-id and service-index determines the forwarding behavior (as specified in =
section 3.3 & section 7 of draft-ietf-sfc-nsh-04).  This sentence should be=
 removed from the text.

Jim



On 4/27/16, 12:29 AM, "sfc on behalf of Martin Stiemerling" <sfc-bounces@ie=
tf.org<mailto:sfc-bounces@ietf.org> on behalf of mls.ietf@gmail.com<mailto:=
mls.ietf@gmail.com>> wrote:

Dear all,

This is the start of the Working Group Last Call (WGLC) for

draft-ietf-sfc-control-plane-04.txt

The WGLC lasts for 2 weeks and will end May 11th at 10 pm PDT.

Please send your comments and reviews to the sfc@ietf.org<mailto:sfc@ietf.o=
rg> list.

Regards,

   Martin (SFC co-chair)

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_E8355113905631478EFF04F5AA706E9830F44359wtlexchp2sandvi_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:230770460;
	mso-list-template-ids:-1941270348;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1
	{mso-list-id:690574246;
	mso-list-template-ids:-1856087508;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l2
	{mso-list-id:987511089;
	mso-list-template-ids:-1442053110;}
@list l2:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l3
	{mso-list-id:1096512944;
	mso-list-template-ids:1086358294;}
@list l3:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l4
	{mso-list-id:1606425333;
	mso-list-template-ids:-1146958400;}
@list l4:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l5
	{mso-list-id:2131781065;
	mso-list-template-ids:362426664;}
@list l5:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Further to Jim&#8217;s po=
ints about section 4.10.5, do I read it correctly that the SFF can be confi=
gured to steer traffic on the basis of these?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; Dest=
ination MAC address<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; Sour=
ce MAC address<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; VLAN=
-ID,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; Dest=
ination IP address<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; Sour=
ce IP address<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; Sour=
ce port number<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; Dest=
ination port number<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; DSCP=
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; Pack=
et size, etc., or any combination thereof.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">This comes totally unexpe=
cted to me, thinking that the SFF steers traffic based exclusively on Servi=
ce Path Identifier and Service Index (SPI/SI), which oddly
 aren&#8217;t in the above list.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I can guess that maybe th=
is is about reclassification, but &#8220;classification&#8221; isn&#8217;t =
mentioned in 4.10.5.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Can someone explain?<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">-Dave<o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc [mai=
lto:sfc-bounces@ietf.org]
<b>On Behalf Of </b>Jim Guichard (jguichar)<br>
<b>Sent:</b> Wednesday, April 27, 2016 10:18 AM<br>
<b>To:</b> Martin Stiemerling; sfc@ietf.org<br>
<b>Subject:</b> Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt<o:p>=
</o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Hi Martin &amp; WG:<o:p></o=
:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">A few comments that I would=
 like to see addressed in the document before it can move forward to the ne=
xt step.<o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l4 level1 lfo1">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 2.2 SFC Control Plane Bootstrapping.<o:p></o:p></span>=
</li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">This section is too wishy w=
ashy. It makes the statement &#8220;this document assumes the SFC control p=
lane is provided with a set of information that is
<u>required</u> for proper SFC operation&#8221; but then goes on to list bu=
llets that are
<u>likely</u>&nbsp;to be provided or <u>may</u>&nbsp;be provided. It does n=
ot actually provide any information on what
<u>is required for proper SFC operation</u>. In the list of <u>likely</u>&n=
bsp;information there is no indication of whether this information must exi=
st in the network prior to bootstrapping the SFC control plane element; thi=
s is true also for the list of
<u>may</u>&nbsp;information. Surely we should provide guidelines on what <u=
>must</u>&nbsp;be available before the SFC control plane element can actual=
ly function although it is reasonable to assume that it can bootstrap witho=
ut any information (albeit it can&#8217;t actually
 do anything). On this point I would argue that several of the <u>may</u>&n=
bsp;elements are actually required such as SFF, SF, SFC-proxy locators and =
may exist prior to bootstrapping the SFC control plane element, or may be a=
dded later through some control interface.&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Minor point -&gt; typo in b=
ullet point 6 &#8211; SFP proxy should read
<b>SFC</b>&nbsp;proxy<o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l5 level1 lfo2">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 2.3 Coherent Setup of an SFC-enabled Domain<o:p></o:p>=
</span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">What does the sentence &#82=
20;various transport encapsulation schemes and/or variations of SFC header =
implementations may be supported&#8221; actually mean ? Are we referring
 to the fact that the SFC header may carry type-1 or type-2 metadata or som=
ething else ? Note that there is only
<b>one </b>SFC header implementation based on the WG charter so if we are r=
eferring to different SFC formats (meaning metadata) then please make this =
clear in the text, and if not, please remove this sentence.&nbsp;<o:p></o:p=
></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l3 level1 lfo3">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 3.1 Reference Architecture<o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Second bullet point &#8220;=
mapping between service function chains and SFPs&#8221; - this is a general=
 comment for the entire document but applies here also. There is no
 mention of mapping SFPs -&gt; RSPs &#8211; in fact RSP is mentioned only o=
nce in the entire document. The architecture is explicit in that the SFP wh=
en rendered into the network is an RSP and therefore the SFC control plane =
element needs to have information on currently
 deployed RSPs.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Additionally there is no in=
terface specified for communication between the SFC Control Plane Element a=
nd SF management systems. This is an important aspect as
 many SF&#8217;s may require that SFC information be communicated to their =
management systems that will be responsible for communicating directly with=
 their respective SF&#8217;s.&nbsp;<o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l2 level1 lfo4">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 3.1.1. C1: Interface between SFC Control Plane &amp; S=
FC Classifier<o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">The sentence &#8220;The con=
trol plane may instruct the classifier about the initial values of the Serv=
ice Index (SI)&#8221; should be changed to say
<b>MUST</b>&nbsp;as otherwise if a classifier chooses whatever value it wan=
ts then that may not align with what is programmed into the SFFs by the SFC=
 Control Plane element.</span><span style=3D"font-size:10.5pt;font-family:&=
quot;Courier New&quot;;color:black;background:#FFFDF5">&nbsp;</span><span s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:black"><o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l1 level1 lfo5">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 4.10.4. Encoding the Exact SFF/SF Sequence in Data Pac=
kets<o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">This section does not actua=
lly provide any meaning or indication of relationship with the SFC Control =
Plane element. Furthermore, &nbsp;there has been no WG consensus
 to carry source routes within the SFC encapsulation. Therefore this entire=
 section should be removed from the document.<o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l0 level1 lfo6">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 4.10.5. Fully Controlled SFF/SF Sequence for a SFP<o:p=
></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Figure 2 lists 3 different =
SFP-id&#8217;s whereas the text mentions only SFP-id #1. Is this simply a t=
ypo or are you trying to convey something else ?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Further you state that &#82=
20;the steering policies to a SFF node for service function chain depends o=
n if the packet comes from previous SFF or comes from a specific
 SF i.e., the SFP Forwarding Table entries have to be ingress port specific=
&#8221; - &nbsp;this is an inaccurate statement as the combination of the S=
FP-id and service-index determines the forwarding behavior (as specified in=
 section 3.3 &amp; section 7 of draft-ietf-sfc-nsh-04).
 &nbsp;This sentence should be removed from the text.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Jim<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">On 4/27/16, 12:29 AM, &quot=
;sfc on behalf of Martin Stiemerling&quot; &lt;<a href=3D"mailto:sfc-bounce=
s@ietf.org">sfc-bounces@ietf.org</a> on behalf of
<a href=3D"mailto:mls.ietf@gmail.com">mls.ietf@gmail.com</a>&gt; wrote:<o:p=
></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<blockquote style=3D"border:none;border-left:solid #B5C4DF 4.5pt;padding:0i=
n 0in 0in 4.0pt;margin-left:3.75pt;margin-right:0in" id=3D"MAC_OUTLOOK_ATTR=
IBUTION_BLOCKQUOTE">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Dear all,<o:p></o:p></span>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">This is the start of the Wo=
rking Group Last Call (WGLC) for<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">draft-ietf-sfc-control-plan=
e-04.txt<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">The WGLC lasts for 2 weeks =
and will end May 11th at 10 pm PDT.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Please send your comments a=
nd reviews to the
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> list.<o:p></o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Regards,<o:p></o:p></span><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;&nbsp; Martin (SFC co=
-chair)<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">___________________________=
____________________<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">sfc mailing list<o:p></o:p>=
</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><a href=3D"mailto:sfc@ietf.=
org">sfc@ietf.org</a><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><a href=3D"https://www.ietf=
.org/mailman/listinfo/sfc">https://www.ietf.org/mailman/listinfo/sfc</a><o:=
p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p=
>
</div>
</blockquote>
</div>
</body>
</html>

--_000_E8355113905631478EFF04F5AA706E9830F44359wtlexchp2sandvi_--


From nobody Thu Apr 28 11:47:51 2016
Return-Path: <prvs=9198f1465=sunilvk@f5.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9E78112D76A for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 11:47:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.017
X-Spam-Level: 
X-Spam-Status: No, score=-8.017 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=f5.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gd-do_nCprBf for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 11:47:47 -0700 (PDT)
Received: from mail.f5.com (mail.f5.com [208.85.209.139]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7872312D7FE for <sfc@ietf.org>; Thu, 28 Apr 2016 11:47:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=f5.com; i=@f5.com; q=dns/txt; s=seattle; t=1461869267; x=1493405267; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=JvfkOMlOw3aMJiU38l4jQlerVW6FUtZ3jj47eRcQ3K4=; b=C+8qEqaQ3kE6cIS2rEUSA6Q2ZvyqFL8SmQmu3Bkr8AHnT7IqeCrx/1uc pm0XqG9tbJcusf5BEC1SxbPB24EoZsQChHrdfS2O3NJbib0kn24iMdZPU u2XRrF5/3e5DTYpLaL6dwPaUbUKsxIUJRj7xwxm8zkiEb2iCKJCzp5ZuU U=;
X-IronPort-AV: E=Sophos;i="5.24,547,1454976000"; d="scan'208";a="216243145"
Received: from oracle-apps.f5net.com (HELO exchmail.f5net.com) ([192.168.10.235]) by mail.f5.com with ESMTP/TLS/AES256-SHA; 28 Apr 2016 18:47:47 +0000
Received: from SEAEXCHMBX06.olympus.F5Net.com (192.168.15.49) by seaexchmbx01.olympus.F5Net.com (192.168.15.223) with Microsoft SMTP Server (TLS) id 15.0.1156.6; Thu, 28 Apr 2016 11:47:46 -0700
Received: from SEAEXCHMBX06.olympus.F5Net.com ([fe80::b921:c8e9:b9b2:3e8a]) by SEAEXCHMBX06.olympus.F5Net.com ([fe80::b921:c8e9:b9b2:3e8a%12]) with mapi id 15.00.1156.000; Thu, 28 Apr 2016 11:47:46 -0700
From: Sunil Vallamkonda <sunilvk@f5.com>
To: "Paul Quinn (paulq)" <paulq@cisco.com>, Ron Parker <Ron_Parker@affirmednetworks.com>
Thread-Topic: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRivfiCTJ8b8qeo0249+QoeHMadZ+HQqWAgAADV4CAAFnsgIAYQhKA
Date: Thu, 28 Apr 2016 18:47:46 +0000
Message-ID: <2f48dd8a8c8141b394cef2ff70473b08@SEAEXCHMBX06.olympus.F5Net.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <E8355113905631478EFF04F5AA706E9830F1BBAC@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D77F0B6@MBX021-W3-CA-2.exch021.domain.local> <14F8542B-9EE1-40DF-8DA2-E6E5048A16A3@cisco.com>
In-Reply-To: <14F8542B-9EE1-40DF-8DA2-E6E5048A16A3@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.168.15.239]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/ijLhDx-gt-RxrHdr0oL4fO5YVso>
Cc: Thomas Narten <narten@us.ibm.com>, Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 18:47:49 -0000

Paul, Ron,

As we see the below exposes the requirement of a specification framework to=
 address interoperability and scale across domains both for MDType 1 and 2 =
metadata.
The use case scenarios can be challenging without this making it hard for m=
assive deployments and NSH as a pure traffic steering solution while other =
solutions used in production today.
The semantics document proposal: draft-vallamkonda-sfc-metadata-model-00 pr=
ecisely addresses this requirement and eliminates ambiguity with IANA regis=
try.
It also aligns well with draft-ietf-sfc-control-plane-04.txt, with draft-ie=
tf-sfc-nsh-04 and RFC7665.


Thank you,
Sunil.
-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Paul Quinn (paulq)
Sent: Tuesday, April 12, 2016 6:03 PM
To: Ron Parker <Ron_Parker@affirmednetworks.com>
Cc: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org; Dave Dolson <ddolson@s=
andvine.com>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

Ron, Dave,

The draft describes the metadata as opaque, and really NSH is just the enve=
lop for it.  The same can be said for the TLV as well -- there's no spec in=
 NSH, not should there be.  In both cases, the metadata can/should/(must?) =
be define in auxiliary drafts.  There are several drafts re: metadata that =
can be discussed and eventually standardized.  It also bears mentioning tha=
t the control plane, today in opensource, defines the type 1 semantics.  Th=
at schemes works well, and mixed implementations can play together.

So, perhaps the best way forward:

1.  Agree on the envelop and the use of that envelop 2.  As a WG, adopt -->=
 standardize the opaque data, and the TLVs 3.  As a WG, work on more detail=
ed of use of the control plane to, when needed, define semantics

Thoughts?

Thanks,
Paul


> On Apr 12, 2016, at 3:41 PM, Ron Parker <Ron_Parker@affirmednetworks.com>=
 wrote:
>=20
> Dave,
>=20
> I, too, have raised this issue on the thread.   I think you hit the nail =
on the head regarding interoperability, which is the primary reason for hav=
ing a specification, at all.    My mental model for the type-1 mandatory co=
ntext headers is that of a composite 16-byte locally defined scratchpad.   =
I struggle with having its definition completely undefined in the document =
and still making it mandatory.   =20
>=20
> Much of the justification offered has been to be friendly to hardware.   =
Surely hardware needs to know the exact format and meaning of these 16 byte=
s.
>=20
>   Ron
>=20
>=20
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
> Sent: Tuesday, April 12, 2016 3:29 PM
> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
>=20
> The NSH draft indicates that MD-Type 1 MUST be supported, yet the Mandato=
ry Context Header fields are not defined in the document.
>=20
> Issues with metadata semantics have been raised various times on this lis=
t and in drafts, and never satisfactorily addressed.
> Examples:
> https://tools.ietf.org/html/draft-vallamkonda-sfc-metadata-model-00.tx
> t https://www.ietf.org/archive/id/draft-wang-sfc-md-type-issues-00.txt
> https://www.ietf.org/archive/id/draft-penno-sfc-packet-02.txt
> https://mailarchive.ietf.org/arch/msg/sfc/2YvBakDgJ_hjY-BGvgWdcTTUDIs
>=20
>=20
> So I don't feel this draft sufficiently explains the MD-Type 1 metadata w=
ell enough to explain how one can make an interoperable implementation.
>=20
> The draft references metadata allocation drafts, but they have not been a=
dopted yet, so (as I understand it) these "works in progress" cannot suppor=
t draft-ietf-sfc-nsh.
>=20
>=20
> I think it might be acceptable to say that the metadata must be undirecti=
onally clonable (or better phrase).
> In other words,
>=20
>   Metadata used in NSH headers must been the condition that
>   a transport-layer-stateful Service Function can save away
>   metadata values that it has witnessed.  An injected packet can
>   therefore be assigned a clone of metadata taken from an earlier
>   packet going in the same direction.  For example, a Service Function
>   can send a TCP packet using metadata cloned from another TCP packet
>   of the same connection and direction.
>=20
>   Note that the Service Function need not know the meaning of the
>   metadata; it just needs to know it is safe to clone in this manner.
>=20
>=20
>=20
> Another alternative would be to import one of the metadata allocation sch=
emes into this draft as MD-Type 1, and allow IANA to allocate MD-types for =
other schemes.
>=20
>=20
>=20
> -Dave
>=20
>=20
>=20
>=20
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
> Sent: Wednesday, March 30, 2016 10:48 PM
> To: sfc@ietf.org
> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>=20
> Dear WG:
>=20
> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt (https://dat=
atracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>=20
> The editors of the NSH document have indicated that they have addressed a=
ll known comments and that there are no open issues with the current versio=
n of the document.
>=20
> Substantive comments to the list please, editorial comments can go direct=
ly to the document editors.
>=20
> We'll also get a brief update from the editors at next week's meeting. If=
 there are any remaining issues with the document, raising them before the =
meeting would be especially helpful.
>=20
> For the chairs,
> Thomas
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Apr 28 11:51:12 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A19112D54B for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 11:51:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level: 
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4Wej4fbuqijE for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 11:51:09 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3AF8212D53E for <sfc@ietf.org>; Thu, 28 Apr 2016 11:51:08 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id F233125096B; Thu, 28 Apr 2016 11:51:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1461869467; bh=oUWkA4dProo90HpYC67lL+P2fKU+H+NUd6RRSfrhPFs=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=dUBZqiBUq43VwdR9CZYhPrfe5OnWMgTzoVZlVWWtt3jVxzXINialDJ8kWhUW2Zr86 5PsTx8Q7iglgSc8HFl1jyZIUyJx84/l89CxSw5zuof1FgQdeweGzwugTVIt5vBHTzk gO/ogCRCRPcPImCQDNfDlMW4n+VGJSN+BhFkGyRU=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 0964B2409DB; Thu, 28 Apr 2016 11:51:06 -0700 (PDT)
To: Sunil Vallamkonda <sunilvk@f5.com>, "Paul Quinn (paulq)" <paulq@cisco.com>, Ron Parker <Ron_Parker@affirmednetworks.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <E8355113905631478EFF04F5AA706E9830F1BBAC@wtl-exchp-2.sandvine.com> <CDF2F015F4429F458815ED2A6C2B6B0B6D77F0B6@MBX021-W3-CA-2.exch021.domain.local> <14F8542B-9EE1-40DF-8DA2-E6E5048A16A3@cisco.com> <2f48dd8a8c8141b394cef2ff70473b08@SEAEXCHMBX06.olympus.F5Net.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <ed5f4959-465e-64e9-8a77-bd9779973ab5@joelhalpern.com>
Date: Thu, 28 Apr 2016 14:50:53 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
In-Reply-To: <2f48dd8a8c8141b394cef2ff70473b08@SEAEXCHMBX06.olympus.F5Net.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/xZsm5XxHCYYCoyEFjuKUUhbvMUg>
Cc: Thomas Narten <narten@us.ibm.com>, "sfc@ietf.org" <sfc@ietf.org>, Dave Dolson <ddolson@sandvine.com>
Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 18:51:11 -0000

As has been discussed in several contexts, we need (and will have) a 
registry for MD-2 Type values (as called for in the draft.)

I am still unable to see what this framework adds beyond that registry, 
or where the YANG model would be used.

Yours,
Joel

On 4/28/16 2:47 PM, Sunil Vallamkonda wrote:
> Paul, Ron,
>
> As we see the below exposes the requirement of a specification framework to address interoperability and scale across domains both for MDType 1 and 2 metadata.
> The use case scenarios can be challenging without this making it hard for massive deployments and NSH as a pure traffic steering solution while other solutions used in production today.
> The semantics document proposal: draft-vallamkonda-sfc-metadata-model-00 precisely addresses this requirement and eliminates ambiguity with IANA registry.
> It also aligns well with draft-ietf-sfc-control-plane-04.txt, with draft-ietf-sfc-nsh-04 and RFC7665.
>
>
> Thank you,
> Sunil.
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Paul Quinn (paulq)
> Sent: Tuesday, April 12, 2016 6:03 PM
> To: Ron Parker <Ron_Parker@affirmednetworks.com>
> Cc: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org; Dave Dolson <ddolson@sandvine.com>
> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>
> Ron, Dave,
>
> The draft describes the metadata as opaque, and really NSH is just the envelop for it.  The same can be said for the TLV as well -- there's no spec in NSH, not should there be.  In both cases, the metadata can/should/(must?) be define in auxiliary drafts.  There are several drafts re: metadata that can be discussed and eventually standardized.  It also bears mentioning that the control plane, today in opensource, defines the type 1 semantics.  That schemes works well, and mixed implementations can play together.
>
> So, perhaps the best way forward:
>
> 1.  Agree on the envelop and the use of that envelop 2.  As a WG, adopt --> standardize the opaque data, and the TLVs 3.  As a WG, work on more detailed of use of the control plane to, when needed, define semantics
>
> Thoughts?
>
> Thanks,
> Paul
>
>
>> On Apr 12, 2016, at 3:41 PM, Ron Parker <Ron_Parker@affirmednetworks.com> wrote:
>>
>> Dave,
>>
>> I, too, have raised this issue on the thread.   I think you hit the nail on the head regarding interoperability, which is the primary reason for having a specification, at all.    My mental model for the type-1 mandatory context headers is that of a composite 16-byte locally defined scratchpad.   I struggle with having its definition completely undefined in the document and still making it mandatory.
>>
>> Much of the justification offered has been to be friendly to hardware.   Surely hardware needs to know the exact format and meaning of these 16 bytes.
>>
>>   Ron
>>
>>
>>
>>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Dave Dolson
>> Sent: Tuesday, April 12, 2016 3:29 PM
>> To: Thomas Narten <narten@us.ibm.com>; sfc@ietf.org
>> Subject: Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>>
>> The NSH draft indicates that MD-Type 1 MUST be supported, yet the Mandatory Context Header fields are not defined in the document.
>>
>> Issues with metadata semantics have been raised various times on this list and in drafts, and never satisfactorily addressed.
>> Examples:
>> https://tools.ietf.org/html/draft-vallamkonda-sfc-metadata-model-00.tx
>> t https://www.ietf.org/archive/id/draft-wang-sfc-md-type-issues-00.txt
>> https://www.ietf.org/archive/id/draft-penno-sfc-packet-02.txt
>> https://mailarchive.ietf.org/arch/msg/sfc/2YvBakDgJ_hjY-BGvgWdcTTUDIs
>>
>>
>> So I don't feel this draft sufficiently explains the MD-Type 1 metadata well enough to explain how one can make an interoperable implementation.
>>
>> The draft references metadata allocation drafts, but they have not been adopted yet, so (as I understand it) these "works in progress" cannot support draft-ietf-sfc-nsh.
>>
>>
>> I think it might be acceptable to say that the metadata must be undirectionally clonable (or better phrase).
>> In other words,
>>
>>   Metadata used in NSH headers must been the condition that
>>   a transport-layer-stateful Service Function can save away
>>   metadata values that it has witnessed.  An injected packet can
>>   therefore be assigned a clone of metadata taken from an earlier
>>   packet going in the same direction.  For example, a Service Function
>>   can send a TCP packet using metadata cloned from another TCP packet
>>   of the same connection and direction.
>>
>>   Note that the Service Function need not know the meaning of the
>>   metadata; it just needs to know it is safe to clone in this manner.
>>
>>
>>
>> Another alternative would be to import one of the metadata allocation schemes into this draft as MD-Type 1, and allow IANA to allocate MD-types for other schemes.
>>
>>
>>
>> -Dave
>>
>>
>>
>>
>> -----Original Message-----
>> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Thomas Narten
>> Sent: Wednesday, March 30, 2016 10:48 PM
>> To: sfc@ietf.org
>> Subject: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt
>>
>> Dear WG:
>>
>> This note begins a WG last call on draft-ietf-sfc-nsh-04.txt (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>
>> The editors of the NSH document have indicated that they have addressed all known comments and that there are no open issues with the current version of the document.
>>
>> Substantive comments to the list please, editorial comments can go directly to the document editors.
>>
>> We'll also get a brief update from the editors at next week's meeting. If there are any remaining issues with the document, raising them before the meeting would be especially helpful.
>>
>> For the chairs,
>> Thomas
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>


From nobody Thu Apr 28 11:54:41 2016
Return-Path: <prvs=9198f1465=sunilvk@f5.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36EFA12D51E for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 11:54:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.016
X-Spam-Level: 
X-Spam-Status: No, score=-8.016 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=f5.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yJNPYCn_pzZN for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 11:54:34 -0700 (PDT)
Received: from mail.f5.com (mail.f5.com [208.85.209.139]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1945212D0DD for <sfc@ietf.org>; Thu, 28 Apr 2016 11:54:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=f5.com; i=@f5.com; q=dns/txt; s=seattle; t=1461869675; x=1493405675; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=fxh49aUhT4IZKtY70Q1Pyec32HIURkdsg24rvqwKdKA=; b=OmzQOpNLwGxb86GRh/D+c6jtnaB9piQ0nh8GJVhilzI4ZzhVRIGYr/WE 7RiRUpRTY5w9WyvfltVhaXSmifYmBVoScRdCKtz7OeA7NoR0d6BIZuNIY DJmU8+yn7MoMiKxJLP2ntUzih+3xtxKr4GPwrMu8L9JACzEtV44E1ELlN g=;
X-IronPort-AV: E=Sophos;i="5.24,547,1454976000";  d="scan'208,217";a="215415533"
Received: from oracle-apps.f5net.com (HELO exchmail.f5net.com) ([192.168.10.235]) by mail.f5.com with ESMTP; 28 Apr 2016 18:54:33 +0000
Received: from SEAEXCHMBX06.olympus.F5Net.com (192.168.15.49) by seaexchmbx03.olympus.F5Net.com (192.168.15.225) with Microsoft SMTP Server (TLS) id 15.0.1156.6; Thu, 28 Apr 2016 11:54:32 -0700
Received: from SEAEXCHMBX06.olympus.F5Net.com ([fe80::b921:c8e9:b9b2:3e8a]) by SEAEXCHMBX06.olympus.F5Net.com ([fe80::b921:c8e9:b9b2:3e8a%12]) with mapi id 15.00.1156.000; Thu, 28 Apr 2016 11:54:32 -0700
From: Sunil Vallamkonda <sunilvk@f5.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>, "Andrew G. Malis" <agmalis@gmail.com>, Joel Halpern Direct <jmh.direct@joelhalpern.com>
Thread-Topic: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRoLy1NwdBMc0D4UalW6unQUylS5+euAMAgAAtrACAAAwigIAA0eUAgAASMoD//+WxMA==
Date: Thu, 28 Apr 2016 18:54:32 +0000
Message-ID: <a320cf42a7c64ca2a7b5438043174908@SEAEXCHMBX06.olympus.F5Net.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb> <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com> <CAA=duU0cjXbTxTCqaRetajxFaJVfq8Y-HySPDrR-0AN38Wq3Zw@mail.gmail.com> <4d65232a-d4a6-a11b-c765-635cb909edbd@joelhalpern.com> <CAA=duU0PujWB0LB=wxFauPqaqbf4kFsqkzAwtNn7r3MzBUdCqA@mail.gmail.com> <D3478632.4C66A%jguichar@cisco.com>
In-Reply-To: <D3478632.4C66A%jguichar@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.168.15.239]
Content-Type: multipart/alternative; boundary="_000_a320cf42a7c64ca2a7b5438043174908SEAEXCHMBX06olympusF5Ne_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/HYKUDGrFG6zoevUGI_8vizHdkDA>
Cc: "Elzur, Uri" <uri.elzur@intel.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 18:54:39 -0000

--_000_a320cf42a7c64ca2a7b5438043174908SEAEXCHMBX06olympusF5Ne_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Jim,

I agree, the confusion being NSH treated as a network overlay.
Would it be possible for the document to have wording on this ?
This could also clarify interpretations how NSH to be used with ARP, DHCP a=
nd encapsulations.


Thank you,
Sunil

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Jim Guichard (jguichar=
)
Sent: Thursday, April 28, 2016 6:23 AM
To: Andrew G. Malis <agmalis@gmail.com>; Joel Halpern Direct <jmh.direct@jo=
elhalpern.com>
Cc: Elzur, Uri <uri.elzur@intel.com>; mohamed.boucadair@orange.com; sfc@iet=
f.org; Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentatio=
n Consideration) of the draft-ietf-sfc-nsh-04.txt

Hi Andy,

I think the key point is that NSH !=3D network overlay but rather utilizes =
a network overlay for packet transport between SFC network elements. The re=
ference is just an example of how a network overlay might deal with fragmen=
tation and is not a suggestion that NSH adopt that mechanism but rather mak=
es the point that it can utilize the existing network overlay mechanics.

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Andrew G. Malis" <agmalis@gmail.com<mailto:agmalis@gmail.com>>
Date: Thursday, April 28, 2016 at 8:17 AM
To: Joel Halpern Direct <jmh.direct@joelhalpern.com<mailto:jmh.direct@joelh=
alpern.com>>
Cc: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "mohame=
d.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>" <mohamed.bouca=
dair@orange.com<mailto:mohamed.boucadair@orange.com>>, "sfc@ietf.org<mailto=
:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>, Linda Dunbar <linda.du=
nbar@huawei.com<mailto:linda.dunbar@huawei.com>>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentatio=
n Consideration) of the draft-ietf-sfc-nsh-04.txt

Joel,

The diagrams in section 6 of RFC 6830 are control plane, not data plane. Th=
e data plane diagrams are in section 5.

But the overriding question is - without any fields in the NSH header to se=
quence fragments, how can the fragments be correctly reassembled?

Cheers,
Andy

On Wed, Apr 27, 2016 at 7:46 PM, Joel Halpern Direct <jmh.direct@joelhalper=
n.com<mailto:jmh.direct@joelhalpern.com>> wrote:
The LISP header does not have a fragment flag or fragment offset.  The diag=
rams in section 6 include the outer encapsulating header (the equivalent of=
 the transport header in SFC.)  Yes, the text is a little hard to follow in=
 this regard.  The LISP working group is going to be rewriting RFC 6830 as =
part of moving to standards track.

So there is no difference in this regard between NSH and LISP.

Yours,
Joel

On 4/27/16 7:02 PM, Andrew G. Malis wrote:
Joel et al,

All this talk about fragmentation prompted me to re-read section 6 of
the draft, which recommends (as option 3) using the procedures in
section 5.4 of RFC 6830 (presumably with the "NSH header" replacing the
"LISP header" in the description of the procedures in that section).

So that led me to read that section (and the LISP header definition in
section 5.1), and I see that LISP does fragmentation and reassembly
identically to IPv4, using the Fragment Offset field so that fragments
can be correctly reassembled in the proper order.

However, the NSH Header doesn't have a Fragment Offset field or any
other way to order the fragments.

So how can the procedures in Section 5.4 of 6830 be used?

Thanks,
Andy

On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern <jmh@joelhalpern.com<mailt=
o:jmh@joelhalpern.com>
<mailto:jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>> wrote:

    Both methods are valid, and both depend upon details of the
    underlying packet and the transport.  As such, I don't see why this
    document benefits from describing them, much less why it should mark
    one method as a "should".  Implementation details are likely to be
    more significant than any bit consumption difference between the two
    alternatives.

    Yours,
    Joel


    On 4/27/16 3:40 PM, Linda Dunbar wrote:

        I suggest adding the following paragraphs after the Bullet 3 of
        the Section 6 Fragmentation Consideration to make the process
        more clear and less controversial:


        --------------------------------

        RFC6830 describes the fragmentation method of breaking the
        original packet into two equal sub-frames and encapsulating
        [LISP Header + Transport header] to each sub-frame.

        If LISP fragmentation [RFC6830 Section 5.4] is used, the [SFC
        Header + Transport Header] will be added to each half frame (or
        the original data frame). As the Transport Header is terminated
        by the next SFF node's tunnel transport layer, the combined two
        sub-frames will have two SFC Headers.

        Therefore, the fragmentation for NSH encapsulated data frame
        should be done completely by the node tunnel transport layer,
        which should break the [SFC + original packet] into two equal
        sub-frames and each sub-frame being encapsulated with its
        respective tunnel header.  The next SFF node's tunnel transport
        layer should combine the two sub-frames before sending to the
        next node.

        ------------------------------------------------------


        By the way, there are to typo in the Section 6:
        3rd line: "In order the" =3D=3D> "In order to"
        Last line of Bullet 2: extra "the" in the "utilized to ensure
        the the required packet".


        Hope it helps.

        Linda



        -----Original Message-----
        From: mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.=
com>
        <mailto:mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orang=
e.com>>
        [mailto:mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orang=
e.com>
        <mailto:mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orang=
e.com>>]
        Sent: Wednesday, April 27, 2016 12:40 AM
        To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; sfc@ietf.org<mailto:=
sfc@ietf.org>
        <mailto:sfc@ietf.org<mailto:sfc@ietf.org>>
        Subject: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

        Hi Joel, all,

        Please see inline.

        Cheers,
        Med

            -----Message d'origine-----
            De : Joel M. Halpern [mailto:jmh@joelhalpern.com<mailto:jmh@joe=
lhalpern.com>
            <mailto:jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>] Envoy=
=E9 : mardi 26
            avril 2016 19:18 =C0 : Linda Dunbar; BOUCADAIR Mohamed
            IMT/OLN; Elzur,
            Uri; sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.org<mai=
lto:sfc@ietf.org>> Objet : Re: [sfc] WG
            last call for
            draft-ietf-sfc-nsh-04.txt

            With regard to Transport tunnel fragementation, that seems
            an issue
            for the transport protocol.  I don't actually object to a
            sentence,
            but it does not seem that it will accomplish anything.


        [Med] I would like to see some text added to the draft.


            With regard to packets fragmented by the source, I
            completely disagree
            with your assertion.  If an SFF were to reassemble the
            packets, that
            would be a violation of its job.


        [Med] I agree with you.

          There is no reason for an SFF to

            reassemble a packet fragmented by the source.  The
            classifier may have
            to do some interesting things in order to properly classify
            succeeding
            fragments, but that is an implementation issue (most commonly
            addressed with virtual reassembly, which doe snot delay the
            fragments.)  We don't specity that.


        [Med] Still, the external behavior of the classifier needs to be
        clear in the document. I don't find any text in the draft saying
        for instance that an NSH header must be present in all
        fragments. (There some processing that might be needed at the
        SFF to "do its job" with regards to fragments (receive out of
        order fragments + forwarding policy on the full packet).)


            If an SF needs to reassemble fragments to do its job, that
            is up to
            the SF.  Some will need to actually reassemble.  Some will
            need to
            perform virtual reassembly, and some will happily process the
            fragments.  I can not see what the NSH document could
            possibly mandate.


        [Med] Fully agree.


            Yours,
            Joel

            On 4/26/16 11:47 AM, Linda Dunbar wrote:

                Joel,

                I think the document should add the description on the
                following two
                fragmentation scenarios:

                - Transport tunnel generated fragmentation: When a packet
                fragmentation is caused by transport tunnel (i.e. various
                encapsulations), the termination point of the transport
                tunnel is
                responsible for re-assembling the fragmented pieces of
                the packet.
                Since there won't be any SFF nodes in between the
                Transport Tunnel,
                the tunnel generated fragmentation does not require any
                actions by
                SFF nodes or SF nodes.


                - Source node generated fragmentation (after adding on
                the NSH
                header): When fragmentation has to be performed for a
                packet being
                encapsulated with the NSH header, either the
                intermediate SFF nodes
                or the SF nodes have to be able to reassemble the
                fragmented pieces.




                Cheers,


                Linda

                -----Original Message----- From: Joel M. Halpern
                [mailto:jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>
                <mailto:jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>] S=
ent: Tuesday, April 26,
                2016 10:33 AM
                To: Linda Dunbar; mohamed.boucadair@orange.com<mailto:moham=
ed.boucadair@orange.com>
                <mailto:mohamed.boucadair@orange.com<mailto:mohamed.boucada=
ir@orange.com>>; Elzur, Uri;
                sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.org<mail=
to:sfc@ietf.org>> Subject: Re: [sfc] WG
                last call for
                draft-ietf-sfc-nsh-04.txt

                Re-reading your note, it is possible that you are
                referring only to
                the case of transport generated fragmentation of the
                outer packet.
                I had assumed you were not talking about that, since the
                resulting
                fragments will not all have NSH headers.  As with any tunne=
l
                technology, if the tunnel chooses to fragment at its
                layer, then the
                tunnel is responsible for reassembly.  That would be
                invisible to
                the SFF.

                Yours, Joel

                On 4/26/16 11:10 AM, Linda Dunbar wrote:

                    Agree with Med.

                    Even if each fragment piece of a packet with NSH
                    header carries the
                    NSH header, the intermediate SFF nodes still need to
                    put together
                    all the fragments together before passing the whole
                    data frame to
                    the SF.

                    Linda

                    -----Original Message----- From: sfc
                    [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.or=
g>
                    <mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.or=
g>>]
                    On Behalf Of mohamed.boucadair@orange.com<mailto:mohame=
d.boucadair@orange.com>
                    <mailto:mohamed.boucadair@orange.com<mailto:mohamed.bou=
cadair@orange.com>> Sent: Monday,
                    April 25,
                    2016 9:42 AM To: Elzur, Uri; Joel M. Halpern;
                    sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.org<=
mailto:sfc@ietf.org>> Subject:
                    Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

                    Re-,

                    How do you instruct the transport layer to ALWAYS
                    prepend an NSH
                    header even for fragments? Or you don't care about that=
?

                    Thank you.

                    Cheers, Med

                        -----Message d'origine----- De : Elzur, Uri
                        [mailto:uri.elzur@intel.com<mailto:uri.elzur@intel.=
com>
                        <mailto:uri.elzur@intel.com<mailto:uri.elzur@intel.=
com>>] Envoy=E9 : lundi 25
                        avril 2016 16:26 =C0
                        : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;
                        sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.=
org<mailto:sfc@ietf.org>> Objet
                        : RE: [sfc] WG last call for
                        draft-ietf-sfc-nsh-04.txt

                        Hi Med

                        Not to repeat my position, but I'll do it anyhow
                        :-) As NSH is
                        *NOT* a transport, dealing with fragmentation is
                        left to the
                        Transport used.

                        The model I use for NSH, is basically similar to
                        VXLAN . It is an
                        overly.

                        Thx

                        Uri ("Oo-Ree") C: 949-378-7568<tel:949-378-7568> <t=
el:949-378-7568<tel:949-378-7568>>


                        -----Original Message----- From: sfc
                        [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@iet=
f.org>
                        <mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@iet=
f.org>>]
                        On Behalf Of mohamed.boucadair@orange.com<mailto:mo=
hamed.boucadair@orange.com>
                        <mailto:mohamed.boucadair@orange.com<mailto:mohamed=
.boucadair@orange.com>> Sent:
                        Monday, April 25,
                        2016 7:18 AM To: Joel M. Halpern
                        <jmh@joelhalpern.com<mailto:jmh@joelhalpern.com> <m=
ailto:jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>>;
                        sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.=
org<mailto:sfc@ietf.org>>
                        Subject: Re: [sfc] WG last call for
                        draft-ietf-sfc-nsh-04.txt

                        Hi Joel,

                        Please see inline.

                        Cheers, Med

                            -----Message d'origine----- De : Joel M. Halper=
n
                            [mailto:jmh@joelhalpern.com<mailto:jmh@joelhalp=
ern.com>
                            <mailto:jmh@joelhalpern.com<mailto:jmh@joelhalp=
ern.com>>] Envoy=E9 : lundi
                            25 avril 2016 15:48 =C0
                            : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org<mailt=
o:sfc@ietf.org>
                            <mailto:sfc@ietf.org<mailto:sfc@ietf.org>> Obje=
t : Re: [sfc] WG
                            last call for draft-ietf-sfc-nsh-04.txt

                            If I am understanding you correctly Med, you
                            are asking that the
                            NSH draft specify how service chaining
                            should cope with packets
                            that have been fragmented?


                        [Med] To be accurate, I'm asking to assess
                        whether there are
                        implications. If there are, then the draft
                        should be updated
                        accordingly.

                            NSH, and the SFF functionality, does not care.


                        [Med] I'm not that sure. Some typical
                        implications are listed
                        below:

                        * SFF: If the NSH header is present only in the
                        a fragment but SFF
                        didn't maintained a state, subsequent fragments
                        won't be
                        appropriately processed. * SFC-aware function:
                        if prepending a
                        context information depends on the full packet,
                        not only a
                        fragment.

                        It just does its job.

                        [Med] which may be disturbed in some situations
                        as listed in the
                        examples above.

                            Ingress and intermediate classifiers may
                            cope with fragments in
                            any number of ways.

                        Specifying such is clearly out of scope for this
                        draft.

                        [Med] The purpose is not to specify the internal
                        implementation
                        details but the external behavior of the
                        classifier function when
                        it comes to handle fragments. That behavior may
                        have an incidence
                        on SFF, in particular. The purpose is not to
                        recommend the maximum
                        resources to be dedicated to out of order
                        fragments nor the
                        timeout to cache those; these considerations are
                        of course out of
                        scope. Nevertheless, an implementation should
                        offer a configurable
                        parameter so that an operator tweak those
                        according to its
                        context.

                            I suppose one could write an informational
                            draft on possible ways
                            of coping.  The IETF has not usually
                            published such.
                            Service functions have to cope with
                            fragmented packets just as
                            they had to before the advent of NSH, so
                            describing that is
                            clearly not needed here.


                        [Med] The advent of NSH has the following
                        implications: * it
                        exacerbates fragmentation. Handing over this
                        issue to the
                        transport layer may lead to interoperability
                        issues. * the
                        chaining may not be efficient if fragments are
                        inappropriately
                        handled.

                        Introducing NSH should not degrade the overall
                        service compared to
                        legacy service deployment schemes.


                            Yours, Joel

                            On 4/25/16 3:00 AM,
                            mohamed.boucadair@orange.com<mailto:mohamed.bou=
cadair@orange.com>
                            <mailto:mohamed.boucadair@orange.com<mailto:moh=
amed.boucadair@orange.com>> wrote:

                                Re-,

                                I hear you, but my comment is that we
                                need, as a WG, to decide
                                what to

                            put in the draft. FWIW, I'm discussing two
                            fragmentation
                            issues:


                                (1) Fragmentation that is caused by
                                prepending an SFC header.
                                (2) Handling fragments at the ingress of
                                an SFC-enabled domain.

                                Increasing the MTU is for sure a
                                recommendation is to be
                                explicitly

                            called out in the text (see my first message).


                                There are other issues that need to be
                                discussed, e.g., how to
                                deal with

                            fragments in SFFs/Classifiers?


                                It is also "prudent" to check that no
                                issues will be experienced
                                in SFF

                            to handle fragments. If an SFC header is
                            prepended for all
                            fragments, I'm not sure there

                                is any particular issue at the SFF
                                level, except if
                                stripping/adding

                            context TLVs depends on the full packet (not
                            just fragment). It
                            is warranted to consider a little bit this
                            point before declaring
                            there is no issue.


                                For point (1), declaring fragmentation
                                out of scope would be
                                meant that

                            an implementation must be prepared to
                            receive fragments with or
                            without NSH header as this is a decision
                            that is left to the
                            transport encapsulation. This is a
                            requirement per se!


                                I won't reiterate all the comments I
                                have about the current
                                wording of

                            this section.


                                Cheers, Med

                                    -----Message d'origine----- De :
                                    Elzur, Uri
                                    [mailto:uri.elzur@intel.com<mailto:uri.=
elzur@intel.com>
                                    <mailto:uri.elzur@intel.com<mailto:uri.=
elzur@intel.com>>] Envoy=E9
                                    : lundi 25 avril 2016
                                    08:30 =C0 : BOUCADAIR Mohamed IMT/OLN;
                                    Thomas Narten;
                                    sfc@ietf.org<mailto:sfc@ietf.org> <mail=
to:sfc@ietf.org<mailto:sfc@ietf.org>>
                                    Objet : RE: [sfc] WG last call for
                                    draft-ietf-sfc-nsh-04.txt

                                    Hi Med

                                    My point is that Fragmentation is
                                    yet another transport related
                                    issue

                            that

                                    is beyond the scope of NSH and
                                    beyond the charter of the WG, so
                                    it

                            doesn't

                                    really belong in the draft. We are
                                    providing an advice as
                                    extending the size of the packet may
                                    lead to fragmentation, but
                                    as you check RFC 7348 VxLAN, which
                                    my create the same issue,
                                    you'll find it doesn't even

                            relate

                                    to it.

                                    Thx

                                    Uri ("Oo-Ree") C: 949-378-7568<tel:949-=
378-7568>
                                    <tel:949-378-7568<tel:949-378-7568>>


                                    -----Original Message----- From: sfc
                                    [mailto:sfc-bounces@ietf.org<mailto:sfc=
-bounces@ietf.org>
                                    <mailto:sfc-bounces@ietf.org<mailto:sfc=
-bounces@ietf.org>>] On
                                    Behalf Of
                                    mohamed.boucadair@orange.com<mailto:moh=
amed.boucadair@orange.com>
                                    <mailto:mohamed.boucadair@orange.com<ma=
ilto:mohamed.boucadair@orange.com>> Sent:
                                    Sunday, April 24, 2016
                                    10:32 PM To: Elzur, Uri
                                    <uri.elzur@intel.com<mailto:uri.elzur@i=
ntel.com>
                                    <mailto:uri.elzur@intel.com<mailto:uri.=
elzur@intel.com>>>;
                                    Thomas Narten

                            <narten@us.ibm.com<mailto:narten@us.ibm.com> <m=
ailto:narten@us.ibm.com<mailto:narten@us.ibm.com>>>;

                                    sfc@ietf.org<mailto:sfc@ietf.org> <mail=
to:sfc@ietf.org<mailto:sfc@ietf.org>>
                                    Subject: Re: [sfc] WG last call for
                                    draft-ietf-sfc-nsh-04.txt

                                    Hi Uri,

                                    That's another option that needs to
                                    be discussed/investigated.
                                    I'm

                            afraid

                                    this is not the rationale adopted in
                                    -04 since it includes some
                                    text

                            that

                                    is far to be sufficient to ensure
                                    interoperable
                                    implementations.

                                    BTW, saying that nsh does not need
                                    to deal with fragmentation
                                    because

                            it

                                    is transport-independent is not IMHO
                                    a good strategy to adopt
                                    here

                            because

                                    it opens the door for interoperable
                                    issues, it may lead to
                                    sub-optimal implementations if the
                                    sfc information is present
                                    only in one

                            fragments,

                                    etc.

                                    My comments are related to the
                                    current text in the -04.
                                    This text needs

                            to

                                    be fixed somehow.

                                    Cheers, Med

                                        -----Message d'origine----- De :
                                        Elzur, Uri
                                        [mailto:uri.elzur@intel.com<mailto:=
uri.elzur@intel.com>
                                        <mailto:uri.elzur@intel.com<mailto:=
uri.elzur@intel.com>>]
                                        Envoy=E9 : dimanche 24 avril
                                        2016 17:36 =C0 : BOUCADAIR Mohamed
                                        IMT/OLN; Thomas Narten;
                                        sfc@ietf.org<mailto:sfc@ietf.org>
                                        <mailto:sfc@ietf.org<mailto:sfc@iet=
f.org>> Objet :
                                        RE: [sfc] WG last call for
                                        draft-ietf-sfc-nsh-04.txt

                                        Hi Med

                                        I see no need to specify the
                                        exact behavior as NSH is
                                        transport independent i.e. like
                                        NSH interaction with any other
                                        Transport eh issue of
                                        Fragmentation is to be dealt in
                                        a way
                                        that matches the mechanisms
                                        supported by the Transport used
                                        and do not belong in the NSH draft

                                        Thx

                                        Uri ("Oo-Ree") C: 949-378-7568<tel:=
949-378-7568>
                                        <tel:949-378-7568<tel:949-378-7568>=
>


                                        -----Original Message----- From: sf=
c
                                        [mailto:sfc-bounces@ietf.org<mailto=
:sfc-bounces@ietf.org>
                                        <mailto:sfc-bounces@ietf.org<mailto=
:sfc-bounces@ietf.org>>]
                                        On Behalf Of
                                        mohamed.boucadair@orange.com<mailto=
:mohamed.boucadair@orange.com>
                                        <mailto:mohamed.boucadair@orange.co=
m<mailto:mohamed.boucadair@orange.com>>
                                        Sent: Thursday, April 14,
                                        2016 12:43 AM To: Thomas Narten
                                        <narten@us.ibm.com<mailto:narten@us=
.ibm.com>
                                        <mailto:narten@us.ibm.com<mailto:na=
rten@us.ibm.com>>>;
                                        sfc@ietf.org<mailto:sfc@ietf.org>
                                        <mailto:sfc@ietf.org<mailto:sfc@iet=
f.org>> Subject:
                                        Re: [sfc] WG last call for
                                        draft-ietf-sfc-nsh-04.txt

                                        R-,

                                        In addition to other pending
                                        issues raised for this draft, I
                                        would like to raise this
                                        additional one about Section 6.

                                        =3D=3D 6.  Fragmentation Considerat=
ions

                                        NSH and the associated transport
                                        header are "added" to the
                                        encapsulated packet/frame.  This
                                        additional information
                                        increases

                            the

                                        size of the packet.  In order
                                        the ensure proper forwarding of
                                        NSH data, several options for
                                        handling fragmentation and
                                        re-assembly exist:

                                        1.  Jumbo Frames, when
                                        supported, enable the transport
                                        of NSH
                                        and associated transport packets
                                        without requiring
                                        fragmentation.

                                        2.  Path MTU Discovery
                                        [RFC1191]"describes a technique for
                                        dynamically discovering the
                                        maximum transmission unit (MTU) of

                            an

                                        arbitrary internet path" and can
                                        be utilized to ensure the

                        the

                                        required packet size is used.

                                        3.  [RFC6830] describes two
                                        schemes for fragmentation and
                                        re-

                            assembly

                                        in section 5.4. =3D=3D

                                        * The text is weak for a
                                        Standard track document that is
                                        intended to solve the problem in
                                        https://tools.ietf.org/html/rfc7498=
#section-

                        2.12.

                                        There should be a clear behavior
                                        to be followed by an

                        implementation.

                                        Further, I would avoid the use
                                        of words such as "can".

                                        * The text covers only
                                        fragmentation when it is induced
                                        by SFC
                                        operations, it does not discuss
                                        the treatment of a fragment
                                        when received in an SFC domain.
                                        IMHO, the draft should also
                                        specify the behavior of the
                                        Classifier with regards to
                                        fragments for the sake of proper
                                        SFC operation. Applying
                                        classification policies may
                                        require the

                                    full packet, not only a fragment.

                                        In particular, dedicated
                                        resources should dedicated for
                                        handling out of order fragments.
                                        Of course, it is out of scope
                                        of this document to describe how
                                        SFs handle fragments.

                                        * If an SFC header is prepended
                                        for all fragments, I'm not
                                        sure there is any particular
                                        issue at the SFF level...except
                                        if stripping/adding context TLVs
                                        depends on the full packet
                                        (not just fragment). It is
                                        warranted to consider a little bit
                                        this point before declaring there

                            is

                                    no issue.


                                        * The text states "several
                                        options". This may be interpreted
                                        as if implementing one of them
                                        is sufficient...which is not
                                        true. The first two points
                                        contribute to minimize the
                                        fragmentation risk, but
                                        fragmentation may still be
                                        experienced
                                        (e.g., other shims are prepended
                                        by other nodes for some other
                                        purposes, nested nsh, etc.)

                                        * The first two points have
                                        nothing to do with reassembly.

                                        * The support of jumbo frames by
                                        a router/device does not mean
                                        that it can make use of it.
                                        Appropriate MTU configuration
                                        should be undertaken in a
                                        consistent manner within an SFC
                                        domain. The text should be
                                        updated to make it is about
                                        (consistent) MTU

                        configuration.


                                        * BTW, shouldn't the text be
                                        reworded to recommended to
                                        increase the MTU of **all
                                        nodes** of an SFC-enabled domain by
                                        at least the length of SFC
                                        header + transport header?

                                        * Bullet 2, how PMTU discovery
                                        is actually used in this
                                        context? Do you assume that all
                                        SFC-aware nodes will issue
                                        such messages towards other
                                        SFC-aware node, arbitrary
                                        destination, else?

                                        * Bullet 2, I would drop
                                        "describes a technique for
                                        dynamically discovering the
                                        maximum transmission unit
                                        (MTU) of an arbitrary internet
                                        path".

                                        * Bullet 2, s/ the the/the.

                                        * The reference to the LISP
                                        specification raises two concerns
                                        and one comment:

                                        (1) I don't think it is a good
                                        approach that fragments induced
                                        by the network are passed to
                                        their ultimate destinations as
                                        such

                        (stateless).

                                        IMO, reassembly should be done
                                        within the SFC domain
                                        (responsible for fragmentation)
                                        not passed away. (2) Does the
                                        stateful mode require all SFC
                                        data plane elements maintain a
                                        full list of MTU for the any
                                        SFF/SF instance of the SFC

                                    domain?


                                        The current text suggests that
                                        [RFC6830] should be listed as
                                        normative reference (not an
                                        informative one). I would
                                        personally favor removing the
                                        reference to LISP (as it is an
                                        Experimental RFC).

                                        * The security section of the
                                        draft may be augmented with
                                        informational
                                        fragmentation-related pointers to:
                                        e.g., RFC1858 (Security
                                        Considerations for IP Fragment
                                        Filtering), RFC3128 (Protection
                                        Against a Variant of the Tiny
                                        Fragment Attack), and RFC 4963
                                        (IPv4 Reassembly Errors at High
                                        Data Rates).

                                        Cheers, Med

                                            -----Message d'origine-----
                                            De : sfc
                                            [mailto:sfc-bounces@ietf.org<ma=
ilto:sfc-bounces@ietf.org>
                                            <mailto:sfc-bounces@ietf.org<ma=
ilto:sfc-bounces@ietf.org>>]
                                            De la part de
                                            mohamed.boucadair@orange.com<ma=
ilto:mohamed.boucadair@orange.com>
                                            <mailto:mohamed.boucadair@orang=
e.com<mailto:mohamed.boucadair@orange.com>>
                                            Envoy=E9 : lundi 11 avril
                                            2016 13:14 =C0 : Thomas
                                            Narten; sfc@ietf.org<mailto:sfc=
@ietf.org>
                                            <mailto:sfc@ietf.org<mailto:sfc=
@ietf.org>> Objet
                                            : Re:
                                            [sfc] WG last call for
                                            draft-ietf-sfc-nsh-04.txt

                                            Dear Thomas, all,

                                            As I mentioned during the
                                            meeting, there are several
                                            issues
                                            that are not covered in the
                                            last version of the draft. I
                                            already provided examples of
                                            the issues offline as requested
                                            by Martin.

                                            Cheers, Med

                                                -----Message
                                                d'origine----- De : sfc
                                                [mailto:sfc-bounces@ietf.or=
g<mailto:sfc-bounces@ietf.org>
                                                <mailto:sfc-bounces@ietf.or=
g<mailto:sfc-bounces@ietf.org>>]
                                                De la part de Thomas Narten
                                                Envoy=E9 : jeudi 31 mars
                                                2016 04:48 =C0 :
                                                sfc@ietf.org<mailto:sfc@iet=
f.org>
                                                <mailto:sfc@ietf.org<mailto=
:sfc@ietf.org>>
                                                Objet : [sfc] WG last
                                                call for
                                                draft-ietf-sfc-nsh-04.txt

                                                Dear WG:

                                                This note begins a WG
                                                last call on
                                                draft-ietf-sfc-nsh-04.txt
                                                (https://datatracker.ietf.o=
rg/doc/draft-ietf-sfc-nsh/).



            The editors of the NSH document have indicated that they have

                                                addressed all known
                                                comments and that there
                                                are no open
                                                issues with the current
                                                version of the document.

                                                Substantive comments to
                                                the list please,
                                                editorial comments
                                                can go directly to the
                                                document editors.

                                                We'll also get a brief
                                                update from the editors
                                                at next
                                                week's meeting. If there
                                                are any remaining issues
                                                with the
                                                document, raising them
                                                before the meeting would be
                                                especially helpful.

                                                For the chairs, Thomas

                                                ___________________________=
____________________
                                                sfc mailing
                                                list sfc@ietf.org<mailto:sf=
c@ietf.org>
                                                <mailto:sfc@ietf.org<mailto=
:sfc@ietf.org>>
                                                https://www.ietf.org/mailma=
n/listinfo/sfc


                                            _______________________________=
________________
                                            sfc mailing
                                            list sfc@ietf.org<mailto:sfc@ie=
tf.org>
                                            <mailto:sfc@ietf.org<mailto:sfc=
@ietf.org>>
                                            https://www.ietf.org/mailman/li=
stinfo/sfc


                                        ___________________________________=
____________
                                        sfc mailing
                                        list sfc@ietf.org<mailto:sfc@ietf.o=
rg>
                                        <mailto:sfc@ietf.org<mailto:sfc@iet=
f.org>>
                                        https://www.ietf.org/mailman/listin=
fo/sfc


                                    _______________________________________=
________
                                    sfc mailing


--_000_a320cf42a7c64ca2a7b5438043174908SEAEXCHMBX06olympusF5Ne_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Jim,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">I agree, the confusion being NSH trea=
ted as a network overlay.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Would it be possible for the document=
 to have wording on this ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">This could also clarify interpretatio=
ns how NSH to be used with ARP, DHCP and encapsulations.<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Thank you,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Sunil<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,sans-serif">From:</span></b><span style=3D"font-size:11.0pt;=
font-family:&quot;Calibri&quot;,sans-serif"> sfc [mailto:sfc-bounces@ietf.o=
rg]
<b>On Behalf Of </b>Jim Guichard (jguichar)<br>
<b>Sent:</b> Thursday, April 28, 2016 6:23 AM<br>
<b>To:</b> Andrew G. Malis &lt;agmalis@gmail.com&gt;; Joel Halpern Direct &=
lt;jmh.direct@joelhalpern.com&gt;<br>
<b>Cc:</b> Elzur, Uri &lt;uri.elzur@intel.com&gt;; mohamed.boucadair@orange=
.com; sfc@ietf.org; Linda Dunbar &lt;linda.dunbar@huawei.com&gt;<br>
<b>Subject:</b> Re: [sfc] Suggested wording addtion to the Section 6 (Fragm=
entation Consideration) of the draft-ietf-sfc-nsh-04.txt<o:p></o:p></span><=
/p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">Hi Andy,<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">I think the key point is that NSH !=3D =
network overlay but rather utilizes a<b>&nbsp;</b>network overlay for packe=
t transport between SFC network elements. The reference
 is just an example of how a network overlay might deal with fragmentation =
and is not a suggestion that NSH adopt that mechanism but rather makes the =
point that it can utilize the existing network overlay mechanics.&nbsp;<o:p=
></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">Jim<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,sans-serif;color:black">From:
</span></b><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,=
sans-serif;color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of &quot;Andrew G. Malis&quot; &lt;<a h=
ref=3D"mailto:agmalis@gmail.com">agmalis@gmail.com</a>&gt;<br>
<b>Date: </b>Thursday, April 28, 2016 at 8:17 AM<br>
<b>To: </b>Joel Halpern Direct &lt;<a href=3D"mailto:jmh.direct@joelhalpern=
.com">jmh.direct@joelhalpern.com</a>&gt;<br>
<b>Cc: </b>&quot;Elzur, Uri&quot; &lt;<a href=3D"mailto:uri.elzur@intel.com=
">uri.elzur@intel.com</a>&gt;, &quot;<a href=3D"mailto:mohamed.boucadair@or=
ange.com">mohamed.boucadair@orange.com</a>&quot; &lt;<a href=3D"mailto:moha=
med.boucadair@orange.com">mohamed.boucadair@orange.com</a>&gt;, &quot;<a hr=
ef=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot;
 &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;, Linda Dunbar &lt=
;<a href=3D"mailto:linda.dunbar@huawei.com">linda.dunbar@huawei.com</a>&gt;=
<br>
<b>Subject: </b>Re: [sfc] Suggested wording addtion to the Section 6 (Fragm=
entation Consideration) of the draft-ietf-sfc-nsh-04.txt<o:p></o:p></span><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">Joel,
<o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">The diagrams in section 6 of RFC 6830 a=
re control plane, not data plane. The data plane diagrams are in section 5.=
<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">But the overriding question is - withou=
t any fields in the NSH header to sequence fragments, how can the fragments=
 be correctly reassembled?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">Cheers,<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">Andy<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">On Wed, Apr 27, 2016 at 7:46 PM, Joel H=
alpern Direct &lt;<a href=3D"mailto:jmh.direct@joelhalpern.com" target=3D"_=
blank">jmh.direct@joelhalpern.com</a>&gt; wrote:<o:p></o:p></span></p>
<blockquote style=3D"border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">The LISP header does not have a fragmen=
t flag or fragment offset.&nbsp; The diagrams in section 6 include the oute=
r encapsulating header (the equivalent of the transport
 header in SFC.)&nbsp; Yes, the text is a little hard to follow in this reg=
ard.&nbsp; The LISP working group is going to be rewriting RFC 6830 as part=
 of moving to standards track.<br>
<br>
So there is no difference in this regard between NSH and LISP.<br>
<br>
Yours,<br>
Joel<br>
<br>
On 4/27/16 7:02 PM, Andrew G. Malis wrote:<o:p></o:p></span></p>
<blockquote style=3D"border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">Joel et al,<br>
<br>
All this talk about fragmentation prompted me to re-read section 6 of<br>
the draft, which recommends (as option 3) using the procedures in<br>
section 5.4 of RFC 6830 (presumably with the &#8220;NSH header&#8221; repla=
cing the<br>
&#8220;LISP header&#8221; in the description of the procedures in that sect=
ion).<br>
<br>
So that led me to read that section (and the LISP header definition in<br>
section 5.1), and I see that LISP does fragmentation and reassembly<br>
identically to IPv4, using the Fragment Offset field so that fragments<br>
can be correctly reassembled in the proper order.<br>
<br>
However, the NSH Header doesn&#8217;t have a Fragment Offset field or any<b=
r>
other way to order the fragments.<br>
<br>
So how can the procedures in Section 5.4 of 6830 be used?<br>
<br>
Thanks,<br>
Andy<br>
<br>
On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern &lt;<a href=3D"mailto:jmh@=
joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a><br>
&lt;mailto:<a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joe=
lhalpern.com</a>&gt;&gt; wrote:<br>
<br>
&nbsp; &nbsp; Both methods are valid, and both depend upon details of the<b=
r>
&nbsp; &nbsp; underlying packet and the transport.&nbsp; As such, I don't s=
ee why this<br>
&nbsp; &nbsp; document benefits from describing them, much less why it shou=
ld mark<br>
&nbsp; &nbsp; one method as a &quot;should&quot;.&nbsp; Implementation deta=
ils are likely to be<br>
&nbsp; &nbsp; more significant than any bit consumption difference between =
the two<br>
&nbsp; &nbsp; alternatives.<br>
<br>
&nbsp; &nbsp; Yours,<br>
&nbsp; &nbsp; Joel<br>
<br>
<br>
&nbsp; &nbsp; On 4/27/16 3:40 PM, Linda Dunbar wrote:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; I suggest adding the following paragraphs after=
 the Bullet 3 of<br>
&nbsp; &nbsp; &nbsp; &nbsp; the Section 6 Fragmentation Consideration to ma=
ke the process<br>
&nbsp; &nbsp; &nbsp; &nbsp; more clear and less controversial:<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; --------------------------------<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; RFC6830 describes the fragmentation method of b=
reaking the<br>
&nbsp; &nbsp; &nbsp; &nbsp; original packet into two equal sub-frames and e=
ncapsulating<br>
&nbsp; &nbsp; &nbsp; &nbsp; [LISP Header &#43; Transport header] to each su=
b-frame.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; If LISP fragmentation [RFC6830 Section 5.4] is =
used, the [SFC<br>
&nbsp; &nbsp; &nbsp; &nbsp; Header &#43; Transport Header] will be added to=
 each half frame (or<br>
&nbsp; &nbsp; &nbsp; &nbsp; the original data frame). As the Transport Head=
er is terminated<br>
&nbsp; &nbsp; &nbsp; &nbsp; by the next SFF node's tunnel transport layer, =
the combined two<br>
&nbsp; &nbsp; &nbsp; &nbsp; sub-frames will have two SFC Headers.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Therefore, the fragmentation for NSH encapsulat=
ed data frame<br>
&nbsp; &nbsp; &nbsp; &nbsp; should be done completely by the node tunnel tr=
ansport layer,<br>
&nbsp; &nbsp; &nbsp; &nbsp; which should break the [SFC &#43; original pack=
et] into two equal<br>
&nbsp; &nbsp; &nbsp; &nbsp; sub-frames and each sub-frame being encapsulate=
d with its<br>
&nbsp; &nbsp; &nbsp; &nbsp; respective tunnel header.&nbsp; The next SFF no=
de's tunnel transport<br>
&nbsp; &nbsp; &nbsp; &nbsp; layer should combine the two sub-frames before =
sending to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; next node.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; -----------------------------------------------=
-------<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; By the way, there are to typo in the Section 6:=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; 3rd line: &quot;In order the&quot; =3D=3D&gt; &=
quot;In order to&quot;<br>
&nbsp; &nbsp; &nbsp; &nbsp; Last line of Bullet 2: extra &quot;the&quot; in=
 the &quot;utilized to ensure<br>
&nbsp; &nbsp; &nbsp; &nbsp; the the required packet&quot;.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Hope it helps.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Linda<br>
<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; -----Original Message-----<br>
&nbsp; &nbsp; &nbsp; &nbsp; From: <a href=3D"mailto:mohamed.boucadair@orang=
e.com" target=3D"_blank">mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:mohamed.boucadair@=
orange.com" target=3D"_blank">mohamed.boucadair@orange.com</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a href=3D"mailto:mohamed.boucadair@ora=
nge.com" target=3D"_blank">mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:mohamed.boucadair@=
orange.com" target=3D"_blank">mohamed.boucadair@orange.com</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; Sent: Wednesday, April 27, 2016 12:40 AM<br>
&nbsp; &nbsp; &nbsp; &nbsp; To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; =
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" targ=
et=3D"_blank">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; Subject: RE: [sfc] WG last call for draft-ietf-=
sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Hi Joel, all,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Please see inline.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Cheers,<br>
&nbsp; &nbsp; &nbsp; &nbsp; Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Message d'origine-----<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; De : Joel M. Halpern [mailto:<a h=
ref=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a=
><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:jmh@=
joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a>&gt;] Envoy=E9 : =
mardi 26<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; avril 2016 19:18 =C0 : Linda Dunb=
ar; BOUCADAIR Mohamed<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; IMT/OLN; Elzur,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Uri; <a href=3D"mailto:sfc@ietf.o=
rg" target=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@iet=
f.org" target=3D"_blank">sfc@ietf.org</a>&gt; Objet : Re: [sfc] WG<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; With regard to Transport tunnel f=
ragementation, that seems<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; an issue<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; for the transport protocol.&nbsp;=
 I don't actually object to a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sentence,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; but it does not seem that it will=
 accomplish anything.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; [Med] I would like to see some text added to th=
e draft.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; With regard to packets fragmented=
 by the source, I<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; completely disagree<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; with your assertion.&nbsp; If an =
SFF were to reassemble the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; packets, that<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; would be a violation of its job.<=
br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; [Med] I agree with you.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; There is no reason for an SFF to<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; reassemble a packet fragmented by=
 the source.&nbsp; The<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; classifier may have<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; to do some interesting things in =
order to properly classify<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; succeeding<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragments, but that is an impleme=
ntation issue (most commonly<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; addressed with virtual reassembly=
, which doe snot delay the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragments.)&nbsp; We don't specit=
y that.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; [Med] Still, the external behavior of the class=
ifier needs to be<br>
&nbsp; &nbsp; &nbsp; &nbsp; clear in the document. I don't find any text in=
 the draft saying<br>
&nbsp; &nbsp; &nbsp; &nbsp; for instance that an NSH header must be present=
 in all<br>
&nbsp; &nbsp; &nbsp; &nbsp; fragments. (There some processing that might be=
 needed at the<br>
&nbsp; &nbsp; &nbsp; &nbsp; SFF to &quot;do its job&quot; with regards to f=
ragments (receive out of<br>
&nbsp; &nbsp; &nbsp; &nbsp; order fragments &#43; forwarding policy on the =
full packet).)<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; If an SF needs to reassemble frag=
ments to do its job, that<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is up to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the SF.&nbsp; Some will need to a=
ctually reassemble.&nbsp; Some will<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; need to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; perform virtual reassembly, and s=
ome will happily process the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragments.&nbsp; I can not see wh=
at the NSH document could<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; possibly mandate.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; [Med] Fully agree.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Yours,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Joel<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; On 4/26/16 11:47 AM, Linda Dunbar=
 wrote:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Joel,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I think the documen=
t should add the description on the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; following two<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentation scena=
rios:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; - Transport tunnel =
generated fragmentation: When a packet<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentation is ca=
used by transport tunnel (i.e. various<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; encapsulations), th=
e termination point of the transport<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; tunnel is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; responsible for re-=
assembling the fragmented pieces of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the packet.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Since there won't b=
e any SFF nodes in between the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Transport Tunnel,<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the tunnel generate=
d fragmentation does not require any<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; actions by<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFF nodes or SF nod=
es.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; - Source node gener=
ated fragmentation (after adding on<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the NSH<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; header): When fragm=
entation has to be performed for a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; packet being<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; encapsulated with t=
he NSH header, either the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; intermediate SFF no=
des<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; or the SF nodes hav=
e to be able to reassemble the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmented pieces.<=
br>
<br>
<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Cheers,<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Linda<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Original Messa=
ge----- From: Joel M. Halpern<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a href=3D"=
mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=
=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a>&g=
t;] Sent: Tuesday, April 26,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2016 10:33 AM<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; To: Linda Dunbar; <=
a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=
=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">mohamed.boucadai=
r@orange.com</a>&gt;; Elzur, Uri;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D"mailto:s=
fc@ietf.org" target=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailt=
o:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt; Subject: Re: [sfc] W=
G<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf-sfc-nsh-=
04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Re-reading your not=
e, it is possible that you are<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; referring only to<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the case of transpo=
rt generated fragmentation of the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; outer packet.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I had assumed you w=
ere not talking about that, since the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; resulting<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragments will not =
all have NSH headers.&nbsp; As with any tunnel<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; technology, if the =
tunnel chooses to fragment at its<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; layer, then the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; tunnel is responsib=
le for reassembly.&nbsp; That would be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; invisible to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the SFF.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Yours, Joel<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; On 4/26/16 11:10 AM=
, Linda Dunbar wrote:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Agree=
 with Med.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Even =
if each fragment piece of a packet with NSH<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; heade=
r carries the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; NSH h=
eader, the intermediate SFF nodes still need to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; put t=
ogether<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; all t=
he fragments together before passing the whole<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; data =
frame to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the S=
F.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Linda=
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----=
Original Message----- From: sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mail=
to:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ie=
tf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;m=
ailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces=
@ietf.org</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; On Be=
half Of <a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;m=
ailto:<a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">moh=
amed.boucadair@orange.com</a>&gt; Sent: Monday,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; April=
 25,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2016 =
9:42 AM To: Elzur, Uri; Joel M. Halpern;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a hr=
ef=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a=
 href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt; Subjec=
t:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Re: [=
sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Re-,<=
br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; How d=
o you instruct the transport layer to ALWAYS<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; prepe=
nd an NSH<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; heade=
r even for fragments? Or you don't care about that?<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Thank=
 you.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Cheer=
s, Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; -----Message d'origine----- De : Elzur, Uri<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [mailto:<a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank">u=
ri.elzur@intel.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &lt;mailto:<a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank=
">uri.elzur@intel.com</a>&gt;] Envoy=E9 : lundi 25<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; avril 2016 16:26 =C0<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>=
 &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org<=
/a>&gt; Objet<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; : RE: [sfc] WG last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Hi Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Not to repeat my position, but I'll do it anyhow<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; :-) As NSH is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; *NOT* a transport, dealing with fragmentation is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; left to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Transport used.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; The model I use for NSH, is basically similar to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; VXLAN . It is an<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; overly.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Thx<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Uri (&quot;Oo-Ree&quot;) C: <a href=3D"tel:949-378-7568" target=3D=
"_blank">
949-378-7568</a> &lt;tel:<a href=3D"tel:949-378-7568" target=3D"_blank">949=
-378-7568</a>&gt;<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; -----Original Message----- From: sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">=
sfc-bounces@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &lt;mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blan=
k">sfc-bounces@ietf.org</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; On Behalf Of <a href=3D"mailto:mohamed.boucadair@orange.com" targe=
t=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &lt;mailto:<a href=3D"mailto:mohamed.boucadair@orange.com" target=
=3D"_blank">mohamed.boucadair@orange.com</a>&gt; Sent:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Monday, April 25,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; 2016 7:18 AM To: Joel M. Halpern<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &lt;<a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@j=
oelhalpern.com</a> &lt;mailto:<a href=3D"mailto:jmh@joelhalpern.com" target=
=3D"_blank">jmh@joelhalpern.com</a>&gt;&gt;;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>=
 &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org<=
/a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Subject: Re: [sfc] WG last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Hi Joel,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Please see inline.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Cheers, Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; -----Message d'origine----- De : Joel M. Halpern<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; [mailto:<a href=3D"mailto:jmh@joelhalpern.com" targe=
t=3D"_blank">jmh@joelhalpern.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:jmh@joelhalpern.com" ta=
rget=3D"_blank">jmh@joelhalpern.com</a>&gt;] Envoy=E9 : lundi<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; 25 avril 2016 15:48 =C0<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; : BOUCADAIR Mohamed IMT/OLN; <a href=3D"mailto:sfc@i=
etf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D=
"_blank">sfc@ietf.org</a>&gt; Objet : Re: [sfc] WG<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; last call for draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; If I am understanding you correctly Med, you<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; are asking that the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; NSH draft specify how service chaining<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; should cope with packets<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; that have been fragmented?<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [Med] To be accurate, I'm asking to assess<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; whether there are<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; implications. If there are, then the draft<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; should be updated<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; accordingly.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; NSH, and the SFF functionality, does not care.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [Med] I'm not that sure. Some typical<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; implications are listed<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; below:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; * SFF: If the NSH header is present only in the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; a fragment but SFF<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; didn't maintained a state, subsequent fragments<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; won't be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; appropriately processed. * SFC-aware function:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; if prepending a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; context information depends on the full packet,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; not only a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; fragment.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; It just does its job.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [Med] which may be disturbed in some situations<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; as listed in the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; examples above.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; Ingress and intermediate classifiers may<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; cope with fragments in<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; any number of ways.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Specifying such is clearly out of scope for this<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; draft.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [Med] The purpose is not to specify the internal<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; implementation<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; details but the external behavior of the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; classifier function when<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; it comes to handle fragments. That behavior may<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; have an incidence<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; on SFF, in particular. The purpose is not to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; recommend the maximum<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; resources to be dedicated to out of order<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; fragments nor the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; timeout to cache those; these considerations are<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; of course out of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; scope. Nevertheless, an implementation should<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; offer a configurable<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; parameter so that an operator tweak those<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; according to its<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; context.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; I suppose one could write an informational<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; draft on possible ways<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; of coping.&nbsp; The IETF has not usually<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; published such.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; Service functions have to cope with<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; fragmented packets just as<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; they had to before the advent of NSH, so<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; describing that is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; clearly not needed here.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [Med] The advent of NSH has the following<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; implications: * it<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; exacerbates fragmentation. Handing over this<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; issue to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; transport layer may lead to interoperability<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; issues. * the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; chaining may not be efficient if fragments are<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; inappropriately<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; handled.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Introducing NSH should not degrade the overall<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; service compared to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; legacy service deployment schemes.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; Yours, Joel<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; On 4/25/16 3:00 AM,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; <a href=3D"mailto:mohamed.boucadair@orange.com" targ=
et=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:mohamed.boucadair@orang=
e.com" target=3D"_blank">mohamed.boucadair@orange.com</a>&gt; wrote:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Re-,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I hear you, but my comment is that we<=
br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; need, as a WG, to decide<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; what to<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; put in the draft. FWIW, I'm discussing two<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; fragmentation<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; issues:<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (1) Fragmentation that is caused by<br=
>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; prepending an SFC header.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (2) Handling fragments at the ingress =
of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; an SFC-enabled domain.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Increasing the MTU is for sure a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; recommendation is to be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; explicitly<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; called out in the text (see my first message).<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; There are other issues that need to be=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; discussed, e.g., how to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; deal with<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; fragments in SFFs/Classifiers?<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; It is also &quot;prudent&quot; to chec=
k that no<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; issues will be experienced<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; in SFF<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; to handle fragments. If an SFC header is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; prepended for all<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; fragments, I'm not sure there<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is any particular issue at the SFF<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; level, except if<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; stripping/adding<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; context TLVs depends on the full packet (not<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; just fragment). It<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; is warranted to consider a little bit this<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; point before declaring<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; there is no issue.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; For point (1), declaring fragmentation=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; out of scope would be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; meant that<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; an implementation must be prepared to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; receive fragments with or<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; without NSH header as this is a decision<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; that is left to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; transport encapsulation. This is a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; requirement per se!<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I won't reiterate all the comments I<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; have about the current<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; wording of<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; this section.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Cheers, Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Message d'origine--=
--- De :<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Elzur, Uri<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a href=3D"mailt=
o:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"ma=
ilto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel.com</a>&gt;] En=
voy=E9<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : lundi 25 avril 2016<br=
>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 08:30 =C0 : BOUCADAIR Mo=
hamed IMT/OLN;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Thomas Narten;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D"mailto:sfc@ie=
tf.org" target=3D"_blank">
sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blan=
k">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Objet : RE: [sfc] WG las=
t call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf-sfc-nsh-04.tx=
t<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Hi Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; My point is that Fragmen=
tation is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; yet another transport re=
lated<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; issue<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; that<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is beyond the scope of N=
SH and<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; beyond the charter of th=
e WG, so<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; it<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; doesn't<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; really belong in the dra=
ft. We are<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; providing an advice as<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; extending the size of th=
e packet may<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; lead to fragmentation, b=
ut<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; as you check RFC 7348 Vx=
LAN, which<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; my create the same issue=
,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; you'll find it doesn't e=
ven<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; relate<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; to it.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Thx<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Uri (&quot;Oo-Ree&quot;)=
 C: <a href=3D"tel:949-378-7568" target=3D"_blank">
949-378-7568</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;tel:<a href=3D"tel:9=
49-378-7568" target=3D"_blank">949-378-7568</a>&gt;<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Original Message---=
-- From: sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a href=3D"mailt=
o:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"ma=
ilto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ietf.org</a>&gt;] =
On<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Behalf Of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D"mailto:mohame=
d.boucadair@orange.com" target=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"ma=
ilto:mohamed.boucadair@orange.com" target=3D"_blank">mohamed.boucadair@oran=
ge.com</a>&gt; Sent:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Sunday, April 24, 2016<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 10:32 PM To: Elzur, Uri<=
br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;<a href=3D"mailto:ur=
i.elzur@intel.com" target=3D"_blank">uri.elzur@intel.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"ma=
ilto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel.com</a>&gt;&gt;=
;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Thomas Narten<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &lt;<a href=3D"mailto:narten@us.ibm.com" target=3D"_=
blank">narten@us.ibm.com</a> &lt;mailto:<a href=3D"mailto:narten@us.ibm.com=
" target=3D"_blank">narten@us.ibm.com</a>&gt;&gt;;<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D"mailto:sfc@ie=
tf.org" target=3D"_blank">
sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blan=
k">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Subject: Re: [sfc] WG la=
st call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf-sfc-nsh-04.tx=
t<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Hi Uri,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; That's another option th=
at needs to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; be discussed/investigate=
d.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I'm<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; afraid<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; this is not the rational=
e adopted in<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -04 since it includes so=
me<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; text<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; that<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is far to be sufficient =
to ensure<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; interoperable<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; implementations.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; BTW, saying that nsh doe=
s not need<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; to deal with fragmentati=
on<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; because<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; it<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is transport-independent=
 is not IMHO<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; a good strategy to adopt=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; here<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; because<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; it opens the door for in=
teroperable<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; issues, it may lead to<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sub-optimal implementati=
ons if the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sfc information is prese=
nt<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; only in one<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; fragments,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; etc.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; My comments are related =
to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; current text in the -04.=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; This text needs<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; to<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; be fixed somehow.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Cheers, Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Messa=
ge d'origine----- De :<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Elzur, Uri=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a=
 href=3D"mailto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel.com<=
/a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel.c=
om</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Envoy=E9 :=
 dimanche 24 avril<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2016 17:36=
 =C0 : BOUCADAIR Mohamed<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; IMT/OLN; T=
homas Narten;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D=
"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt; Obj=
et :<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; RE: [sfc] =
WG last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf=
-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Hi Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I see no n=
eed to specify the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; exact beha=
vior as NSH is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; transport =
independent i.e. like<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; NSH intera=
ction with any other<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Transport =
eh issue of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Fragmentat=
ion is to be dealt in<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; a way<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; that match=
es the mechanisms<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; supported =
by the Transport used<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; and do not=
 belong in the NSH draft<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Thx<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Uri (&quot=
;Oo-Ree&quot;) C: <a href=3D"tel:949-378-7568" target=3D"_blank">
949-378-7568</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;tel:<a=
 href=3D"tel:949-378-7568" target=3D"_blank">949-378-7568</a>&gt;<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Origi=
nal Message----- From: sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a=
 href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ietf.or=
g</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ietf=
.org</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; On Behalf =
Of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D=
"mailto:mohamed.boucadair@orange.com" target=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">mohamed.=
boucadair@orange.com</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Sent: Thur=
sday, April 14,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2016 12:43=
 AM To: Thomas Narten<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;<a hre=
f=3D"mailto:narten@us.ibm.com" target=3D"_blank">narten@us.ibm.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:narten@us.ibm.com" target=3D"_blank">narten@us.ibm.com</=
a>&gt;&gt;;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D=
"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt; Sub=
ject:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Re: [sfc] =
WG last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf=
-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; R-,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; In additio=
n to other pending<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; issues rai=
sed for this draft, I<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; would like=
 to raise this<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; additional=
 one about Section 6.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =3D=3D 6.&=
nbsp; Fragmentation Considerations<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; NSH and th=
e associated transport<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; header are=
 &quot;added&quot; to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; encapsulat=
ed packet/frame.&nbsp; This<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; additional=
 information<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; increases<=
br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; the<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; size of th=
e packet.&nbsp; In order<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the ensure=
 proper forwarding of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; NSH data, =
several options for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; handling f=
ragmentation and<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; re-assembl=
y exist:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 1.&nbsp; J=
umbo Frames, when<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; supported,=
 enable the transport<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; of NSH<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; and associ=
ated transport packets<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; without re=
quiring<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentat=
ion.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2.&nbsp; P=
ath MTU Discovery<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [RFC1191]&=
quot;describes a technique for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; dynamicall=
y discovering the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; maximum tr=
ansmission unit (MTU) of<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; an<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; arbitrary =
internet path&quot; and can<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; be utilize=
d to ensure the<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; the<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; required p=
acket size is used.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 3.&nbsp; [=
RFC6830] describes two<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; schemes fo=
r fragmentation and<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; re-<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; assembly<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; in section=
 5.4. =3D=3D<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The text=
 is weak for a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Standard t=
rack document that is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; intended t=
o solve the problem in<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D=
"https://tools.ietf.org/html/rfc7498#section-" target=3D"_blank">
https://tools.ietf.org/html/rfc7498#section-</a><br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; 2.12.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; There shou=
ld be a clear behavior<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; to be foll=
owed by an<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; implementation.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Further, I=
 would avoid the use<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; of words s=
uch as &quot;can&quot;.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The text=
 covers only<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentat=
ion when it is induced<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; by SFC<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; operations=
, it does not discuss<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the treatm=
ent of a fragment<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; when recei=
ved in an SFC domain.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; IMHO, the =
draft should also<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; specify th=
e behavior of the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Classifier=
 with regards to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragments =
for the sake of proper<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFC operat=
ion. Applying<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; classifica=
tion policies may<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; require th=
e<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; full packet, not only a =
fragment.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; In particu=
lar, dedicated<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; resources =
should dedicated for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; handling o=
ut of order fragments.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Of course,=
 it is out of scope<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; of this do=
cument to describe how<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFs handle=
 fragments.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * If an SF=
C header is prepended<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; for all fr=
agments, I'm not<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sure there=
 is any particular<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; issue at t=
he SFF level...except<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; if strippi=
ng/adding context TLVs<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; depends on=
 the full packet<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (not just =
fragment). It is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; warranted =
to consider a little bit<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; this point=
 before declaring there<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; is<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; no issue.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The text=
 states &quot;several<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; options&qu=
ot;. This may be interpreted<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; as if impl=
ementing one of them<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is suffici=
ent...which is not<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; true. The =
first two points<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; contribute=
 to minimize the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentat=
ion risk, but<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentat=
ion may still be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; experience=
d<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (e.g., oth=
er shims are prepended<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; by other n=
odes for some other<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; purposes, =
nested nsh, etc.)<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The firs=
t two points have<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; nothing to=
 do with reassembly.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The supp=
ort of jumbo frames by<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; a router/d=
evice does not mean<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; that it ca=
n make use of it.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Appropriat=
e MTU configuration<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; should be =
undertaken in a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; consistent=
 manner within an SFC<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; domain. Th=
e text should be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; updated to=
 make it is about<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (consisten=
t) MTU<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; configuration.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * BTW, sho=
uldn't the text be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; reworded t=
o recommended to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; increase t=
he MTU of **all<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; nodes** of=
 an SFC-enabled domain by<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; at least t=
he length of SFC<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; header &#4=
3; transport header?<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * Bullet 2=
, how PMTU discovery<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is actuall=
y used in this<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; context? D=
o you assume that all<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFC-aware =
nodes will issue<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; such messa=
ges towards other<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFC-aware =
node, arbitrary<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; destinatio=
n, else?<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * Bullet 2=
, I would drop<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &quot;desc=
ribes a technique for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; dynamicall=
y discovering the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; maximum tr=
ansmission unit<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (MTU) of a=
n arbitrary internet<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; path&quot;=
.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * Bullet 2=
, s/ the the/the.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The refe=
rence to the LISP<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; specificat=
ion raises two concerns<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; and one co=
mment:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (1) I don'=
t think it is a good<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; approach t=
hat fragments induced<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; by the net=
work are passed to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; their ulti=
mate destinations as<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; such<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; (stateless).<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; IMO, reass=
embly should be done<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; within the=
 SFC domain<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (responsib=
le for fragmentation)<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; not passed=
 away. (2) Does the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; stateful m=
ode require all SFC<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; data plane=
 elements maintain a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; full list =
of MTU for the any<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFF/SF ins=
tance of the SFC<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; domain?<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; The curren=
t text suggests that<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [RFC6830] =
should be listed as<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; normative =
reference (not an<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; informativ=
e one). I would<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; personally=
 favor removing the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; reference =
to LISP (as it is an<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Experiment=
al RFC).<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The secu=
rity section of the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft may =
be augmented with<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; informatio=
nal<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentat=
ion-related pointers to:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; e.g., RFC1=
858 (Security<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Considerat=
ions for IP Fragment<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Filtering)=
, RFC3128 (Protection<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Against a =
Variant of the Tiny<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Fragment A=
ttack), and RFC 4963<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (IPv4 Reas=
sembly Errors at High<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Data Rates=
).<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Cheers, Me=
d<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; -----Message d'origine-----<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; De : sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-b=
ounces@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &lt;mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sf=
c-bounces@ietf.org</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; De la part de<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; <a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &lt;mailto:<a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_b=
lank">mohamed.boucadair@orange.com</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; Envoy=E9 : lundi 11 avril<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; 2016 13:14 =C0 : Thomas<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; Narten; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.o=
rg</a>&gt; Objet<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; : Re:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; [sfc] WG last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; Dear Thomas, all,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; As I mentioned during the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; meeting, there are several<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; issues<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; that are not covered in the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; last version of the draft. I<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; already provided examples of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; the issues offline as requested<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; by Martin.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; Cheers, Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; -----Message<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; d'origine----- De : sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D=
"_blank">sfc-bounces@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=
=3D"_blank">sfc-bounces@ietf.org</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; De la part de Thomas Narten<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; Envoy=E9 : jeudi 31 mars<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; 2016 04:48 =C0 :<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_bla=
nk">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; Objet : [sfc] WG last<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; Dear WG:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; This note begins a WG<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; last call on<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; draft-ietf-sfc-nsh-04.txt<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; (<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-s=
fc-nsh/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-sfc-=
nsh/</a>).<br>
<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; The editors of the NSH document h=
ave indicated that they have<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; addressed all known<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; comments and that there<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; are no open<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; issues with the current<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; version of the document.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; Substantive comments to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; the list please,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; editorial comments<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; can go directly to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; document editors.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; We'll also get a brief<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; update from the editors<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; at next<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; week's meeting. If there<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; are any remaining issues<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; with the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; document, raising them<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; before the meeting would be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; especially helpful.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; For the chairs, Thomas<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; _______________________________________________<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; sfc mailing<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; list <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_bla=
nk">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" tar=
get=3D"_blank">
https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; _______________________________________________<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; sfc mailing<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; list <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.o=
rg</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank"=
>
https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; __________=
_____________________________________<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sfc mailin=
g<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; list <a hr=
ef=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D=
"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">
https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; ________________________=
_______________________<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sfc mailing<o:p></o:p></=
span></p>
</blockquote>
</blockquote>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_a320cf42a7c64ca2a7b5438043174908SEAEXCHMBX06olympusF5Ne_--


From nobody Thu Apr 28 12:02:41 2016
Return-Path: <prvs=9194b008a=S.Majee@f5.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 877F012D54B for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 12:02:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.016
X-Spam-Level: 
X-Spam-Status: No, score=-8.016 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=f5.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jrHUp1V6nYvZ for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 12:02:36 -0700 (PDT)
Received: from mail.f5.com (mail.f5.com [208.85.209.139]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AAE8C12D53D for <sfc@ietf.org>; Thu, 28 Apr 2016 12:02:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=f5.com; i=@f5.com; q=dns/txt; s=seattle; t=1461870157; x=1493406157; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=JDgNYwz3YgzmsOHffNslKghwxNiNb4ukMOBRNLDpiB4=; b=iFuxgkZaVuZjMBN6kufEnPe3IQeANCZZzCoeQfggpVNuQ/CZCkKsg32D bgqlEGZV0fYw+T7Byx3OcN+Hg9pvunaGY/nMd9R4bvwDGoBdWVfi+qsbt h4YAFGw3bgKu/zsWPNBw/ReVTqyXyQcrxnk3ojuRHSI+OINqTrm3jwga2 I=;
X-IronPort-AV: E=Sophos;i="5.24,547,1454976000";  d="scan'208,217";a="216246180"
Received: from oracle-apps.f5net.com (HELO exchmail.f5net.com) ([192.168.10.235]) by mail.f5.com with ESMTP/TLS/AES256-SHA; 28 Apr 2016 19:02:35 +0000
Received: from SEAEXCHMBX02.olympus.F5Net.com (192.168.15.224) by seaexchmbx02.olympus.F5Net.com (192.168.15.224) with Microsoft SMTP Server (TLS) id 15.0.1156.6; Thu, 28 Apr 2016 12:02:34 -0700
Received: from SEAEXCHMBX02.olympus.F5Net.com ([fe80::dd5e:c398:17d9:927f]) by seaexchmbx02.olympus.F5Net.com ([fe80::dd5e:c398:17d9:927f%13]) with mapi id 15.00.1156.000; Thu, 28 Apr 2016 12:02:34 -0700
From: Sumandra Majee <S.Majee@F5.com>
To: Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
Thread-Index: AQHRoD1dsXOC5ZyntEeCrVg5LtZQUZ+eU/SAgAHcfoD//5AdgA==
Date: Thu, 28 Apr 2016 19:02:34 +0000
Message-ID: <D347AB3A.50CC9%s.majee@f5.com>
References: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com> <D3462926.4C3CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830F44359@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F44359@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.4.150722
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.168.15.239]
Content-Type: multipart/alternative; boundary="_000_D347AB3A50CC9smajeef5com_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/g8uA3iYJa-FK5hZ1ESBAFVsgU5s>
Cc: "Jim Guichard \(jguichar\)" <jguichar@cisco.com>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 19:02:40 -0000

--_000_D347AB3A50CC9smajeef5com_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Dave,
I would also concur that SFF is a forwarding entity that uses pathID/SI to =
find the next-hop/next-sf/next-sff. This is how our SFF works.

It is absolutely possible that co resident classifier to further classify b=
ased on  l3/l4/l7/python_code and change the path. But logically that is an=
other classification and list below is certainly not exhaustive.

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
Dave Dolson <ddolson@sandvine.com<mailto:ddolson@sandvine.com>>
Date: Thursday, April 28, 2016 at 11:43 AM
To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Cc: "Jim Guichard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com=
>>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt

Further to Jim=92s points about section 4.10.5, do I read it correctly that=
 the SFF can be configured to steer traffic on the basis of these?
   o  Destination MAC address
   o  Source MAC address
   o  VLAN-ID,
   o  Destination IP address
   o  Source IP address
   o  Source port number
   o  Destination port number
   o  DSCP
   o  Packet size, etc., or any combination thereof.

This comes totally unexpected to me, thinking that the SFF steers traffic b=
ased exclusively on Service Path Identifier and Service Index (SPI/SI), whi=
ch oddly aren=92t in the above list.

I can guess that maybe this is about reclassification, but =93classificatio=
n=94 isn=92t mentioned in 4.10.5.
Can someone explain?

-Dave



From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Jim Guichard (jguichar=
)
Sent: Wednesday, April 27, 2016 10:18 AM
To: Martin Stiemerling; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt

Hi Martin & WG:

A few comments that I would like to see addressed in the document before it=
 can move forward to the next step.

  *   Section 2.2 SFC Control Plane Bootstrapping.
This section is too wishy washy. It makes the statement =93this document as=
sumes the SFC control plane is provided with a set of information that is r=
equired for proper SFC operation=94 but then goes on to list bullets that a=
re likely to be provided or may be provided. It does not actually provide a=
ny information on what is required for proper SFC operation. In the list of=
 likely information there is no indication of whether this information must=
 exist in the network prior to bootstrapping the SFC control plane element;=
 this is true also for the list of may information. Surely we should provid=
e guidelines on what must be available before the SFC control plane element=
 can actually function although it is reasonable to assume that it can boot=
strap without any information (albeit it can=92t actually do anything). On =
this point I would argue that several of the may elements are actually requ=
ired such as SFF, SF, SFC-proxy locators and may exist prior to bootstrappi=
ng the SFC control plane element, or may be added later through some contro=
l interface.

Minor point -> typo in bullet point 6 =96 SFP proxy should read SFC proxy

  *   Section 2.3 Coherent Setup of an SFC-enabled Domain
What does the sentence =93various transport encapsulation schemes and/or va=
riations of SFC header implementations may be supported=94 actually mean ? =
Are we referring to the fact that the SFC header may carry type-1 or type-2=
 metadata or something else ? Note that there is only one SFC header implem=
entation based on the WG charter so if we are referring to different SFC fo=
rmats (meaning metadata) then please make this clear in the text, and if no=
t, please remove this sentence.

  *   Section 3.1 Reference Architecture
Second bullet point =93mapping between service function chains and SFPs=94 =
- this is a general comment for the entire document but applies here also. =
There is no mention of mapping SFPs -> RSPs =96 in fact RSP is mentioned on=
ly once in the entire document. The architecture is explicit in that the SF=
P when rendered into the network is an RSP and therefore the SFC control pl=
ane element needs to have information on currently deployed RSPs.

Additionally there is no interface specified for communication between the =
SFC Control Plane Element and SF management systems. This is an important a=
spect as many SF=92s may require that SFC information be communicated to th=
eir management systems that will be responsible for communicating directly =
with their respective SF=92s.

  *   Section 3.1.1. C1: Interface between SFC Control Plane & SFC Classifi=
er
The sentence =93The control plane may instruct the classifier about the ini=
tial values of the Service Index (SI)=94 should be changed to say MUST as o=
therwise if a classifier chooses whatever value it wants then that may not =
align with what is programmed into the SFFs by the SFC Control Plane elemen=
t.

  *   Section 4.10.4. Encoding the Exact SFF/SF Sequence in Data Packets
This section does not actually provide any meaning or indication of relatio=
nship with the SFC Control Plane element. Furthermore,  there has been no W=
G consensus to carry source routes within the SFC encapsulation. Therefore =
this entire section should be removed from the document.

  *   Section 4.10.5. Fully Controlled SFF/SF Sequence for a SFP
Figure 2 lists 3 different SFP-id=92s whereas the text mentions only SFP-id=
 #1. Is this simply a typo or are you trying to convey something else ?

Further you state that =93the steering policies to a SFF node for service f=
unction chain depends on if the packet comes from previous SFF or comes fro=
m a specific SF i.e., the SFP Forwarding Table entries have to be ingress p=
ort specific=94 -  this is an inaccurate statement as the combination of th=
e SFP-id and service-index determines the forwarding behavior (as specified=
 in section 3.3 & section 7 of draft-ietf-sfc-nsh-04).  This sentence shoul=
d be removed from the text.

Jim



On 4/27/16, 12:29 AM, "sfc on behalf of Martin Stiemerling" <sfc-bounces@ie=
tf.org<mailto:sfc-bounces@ietf.org> on behalf of mls.ietf@gmail.com<mailto:=
mls.ietf@gmail.com>> wrote:

Dear all,

This is the start of the Working Group Last Call (WGLC) for

draft-ietf-sfc-control-plane-04.txt

The WGLC lasts for 2 weeks and will end May 11th at 10 pm PDT.

Please send your comments and reviews to the sfc@ietf.org<mailto:sfc@ietf.o=
rg> list.

Regards,

   Martin (SFC co-chair)

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_D347AB3A50CC9smajeef5com_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <4CF4526416BDD54981CEC9383134DB73@F5.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif;">
<div>Dave,</div>
<div>I would also concur that SFF is a forwarding entity that uses pathID/S=
I to find the next-hop/next-sf/next-sff. This is how our SFF works.</div>
<div><br>
</div>
<div>It is absolutely possible that co resident classifier to further class=
ify based on &nbsp;l3/l4/l7/python_code and change the path. But logically =
that is another classification and list below is certainly not exhaustive. =
&nbsp;</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>sfc &lt;<a href=3D"mailto:sfc=
-bounces@ietf.org">sfc-bounces@ietf.org</a>&gt; on behalf of Dave Dolson &l=
t;<a href=3D"mailto:ddolson@sandvine.com">ddolson@sandvine.com</a>&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Thursday, April 28, 2016 at 1=
1:43 AM<br>
<span style=3D"font-weight:bold">To: </span>&quot;<a href=3D"mailto:sfc@iet=
f.org">sfc@ietf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.=
org</a>&gt;<br>
<span style=3D"font-weight:bold">Cc: </span>&quot;Jim Guichard (jguichar)&q=
uot; &lt;<a href=3D"mailto:jguichar@cisco.com">jguichar@cisco.com</a>&gt;<b=
r>
<span style=3D"font-weight:bold">Subject: </span>Re: [sfc] WGLC for draft-i=
etf-sfc-control-plane-04.txt<br>
</div>
<div><br>
</div>
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:230770460;
	mso-list-template-ids:-1941270348;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1
	{mso-list-id:690574246;
	mso-list-template-ids:-1856087508;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l2
	{mso-list-id:987511089;
	mso-list-template-ids:-1442053110;}
@list l2:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l3
	{mso-list-id:1096512944;
	mso-list-template-ids:1086358294;}
@list l3:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l4
	{mso-list-id:1606425333;
	mso-list-template-ids:-1146958400;}
@list l4:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l5
	{mso-list-id:2131781065;
	mso-list-template-ids:362426664;}
@list l5:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);">Further to Jim=92s points about sec=
tion 4.10.5, do I read it correctly that the SFF can be configured to steer=
 traffic on the basis of these?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; o&nbsp; Destination MA=
C address<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; o&nbsp; Source MAC add=
ress<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; o&nbsp; VLAN-ID,<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; o&nbsp; Destination IP=
 address<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; o&nbsp; Source IP addr=
ess<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; o&nbsp; Source port nu=
mber<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; o&nbsp; Destination po=
rt number<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; o&nbsp; DSCP<o:p></o:p=
></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; o&nbsp; Packet size, e=
tc., or any combination thereof.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);">This comes totally unexpected to me=
, thinking that the SFF steers traffic based exclusively on Service Path Id=
entifier and Service Index (SPI/SI),
 which oddly aren=92t in the above list.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);">I can guess that maybe this is abou=
t reclassification, but =93classification=94 isn=92t mentioned in 4.10.5.<o=
:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);">Can someone explain?<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);">-Dave<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size: 11pt; font-family: Calibri=
, sans-serif; color: rgb(31, 73, 125);"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size: 10pt; font-family: Taho=
ma, sans-serif;">From:</span></b><span style=3D"font-size: 10pt; font-famil=
y: Tahoma, sans-serif;"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailt=
o:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Jim Guichard (jguichar)<br>
<b>Sent:</b> Wednesday, April 27, 2016 10:18 AM<br>
<b>To:</b> Martin Stiemerling; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org=
</a><br>
<b>Subject:</b> Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt<o:p>=
</o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Hi Martin &amp; WG:<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">A few comments that I would like to see addr=
essed in the document before it can move forward to the next step.<o:p></o:=
p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l4 level1 lfo1">
<span style=3D"font-size: 10.5pt; font-family: Calibri, sans-serif;">Sectio=
n 2.2 SFC Control Plane Bootstrapping.<o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">This section is too wishy washy. It makes th=
e statement =93this document assumes the SFC control plane is provided with=
 a set of information that is
<u>required</u> for proper SFC operation=94 but then goes on to list bullet=
s that are
<u>likely</u>&nbsp;to be provided or <u>may</u>&nbsp;be provided. It does n=
ot actually provide any information on what
<u>is required for proper SFC operation</u>. In the list of <u>likely</u>&n=
bsp;information there is no indication of whether this information must exi=
st in the network prior to bootstrapping the SFC control plane element; thi=
s is true also for the list of
<u>may</u>&nbsp;information. Surely we should provide guidelines on what <u=
>must</u>&nbsp;be available before the SFC control plane element can actual=
ly function although it is reasonable to assume that it can bootstrap witho=
ut any information (albeit it can=92t actually
 do anything). On this point I would argue that several of the <u>may</u>&n=
bsp;elements are actually required such as SFF, SF, SFC-proxy locators and =
may exist prior to bootstrapping the SFC control plane element, or may be a=
dded later through some control interface.&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Minor point -&gt; typo in bullet point 6 =96=
 SFP proxy should read
<b>SFC</b>&nbsp;proxy<o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l5 level1 lfo2">
<span style=3D"font-size: 10.5pt; font-family: Calibri, sans-serif;">Sectio=
n 2.3 Coherent Setup of an SFC-enabled Domain<o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">What does the sentence =93various transport =
encapsulation schemes and/or variations of SFC header implementations may b=
e supported=94 actually mean ? Are we referring
 to the fact that the SFC header may carry type-1 or type-2 metadata or som=
ething else ? Note that there is only
<b>one </b>SFC header implementation based on the WG charter so if we are r=
eferring to different SFC formats (meaning metadata) then please make this =
clear in the text, and if not, please remove this sentence.&nbsp;<o:p></o:p=
></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l3 level1 lfo3">
<span style=3D"font-size: 10.5pt; font-family: Calibri, sans-serif;">Sectio=
n 3.1 Reference Architecture<o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Second bullet point =93mapping between servi=
ce function chains and SFPs=94 - this is a general comment for the entire d=
ocument but applies here also. There is
 no mention of mapping SFPs -&gt; RSPs =96 in fact RSP is mentioned only on=
ce in the entire document. The architecture is explicit in that the SFP whe=
n rendered into the network is an RSP and therefore the SFC control plane e=
lement needs to have information on currently
 deployed RSPs.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Additionally there is no interface specified=
 for communication between the SFC Control Plane Element and SF management =
systems. This is an important aspect
 as many SF=92s may require that SFC information be communicated to their m=
anagement systems that will be responsible for communicating directly with =
their respective SF=92s.&nbsp;<o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l2 level1 lfo4">
<span style=3D"font-size: 10.5pt; font-family: Calibri, sans-serif;">Sectio=
n 3.1.1. C1: Interface between SFC Control Plane &amp; SFC Classifier<o:p><=
/o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">The sentence =93The control plane may instru=
ct the classifier about the initial values of the Service Index (SI)=94 sho=
uld be changed to say
<b>MUST</b>&nbsp;as otherwise if a classifier chooses whatever value it wan=
ts then that may not align with what is programmed into the SFFs by the SFC=
 Control Plane element.</span><span style=3D"font-size: 10.5pt; font-family=
: 'Courier New'; color: black; background-color: rgb(255, 253, 245); backgr=
ound-position: initial initial; background-repeat: initial initial;">&nbsp;=
</span><span style=3D"font-size: 10.5pt; font-family: Calibri, sans-serif; =
color: black;"><o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l1 level1 lfo5">
<span style=3D"font-size: 10.5pt; font-family: Calibri, sans-serif;">Sectio=
n 4.10.4. Encoding the Exact SFF/SF Sequence in Data Packets<o:p></o:p></sp=
an></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">This section does not actually provide any m=
eaning or indication of relationship with the SFC Control Plane element. Fu=
rthermore, &nbsp;there has been no WG consensus
 to carry source routes within the SFC encapsulation. Therefore this entire=
 section should be removed from the document.<o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l0 level1 lfo6">
<span style=3D"font-size: 10.5pt; font-family: Calibri, sans-serif;">Sectio=
n 4.10.5. Fully Controlled SFF/SF Sequence for a SFP<o:p></o:p></span></li>=
</ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Figure 2 lists 3 different SFP-id=92s wherea=
s the text mentions only SFP-id #1. Is this simply a typo or are you trying=
 to convey something else ?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Further you state that =93the steering polic=
ies to a SFF node for service function chain depends on if the packet comes=
 from previous SFF or comes from a specific
 SF i.e., the SFP Forwarding Table entries have to be ingress port specific=
=94 - &nbsp;this is an inaccurate statement as the combination of the SFP-i=
d and service-index determines the forwarding behavior (as specified in sec=
tion 3.3 &amp; section 7 of draft-ietf-sfc-nsh-04).
 &nbsp;This sentence should be removed from the text.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Jim<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">On 4/27/16, 12:29 AM, &quot;sfc on behalf of=
 Martin Stiemerling&quot; &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc-b=
ounces@ietf.org</a> on behalf of
<a href=3D"mailto:mls.ietf@gmail.com">mls.ietf@gmail.com</a>&gt; wrote:<o:p=
></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<blockquote style=3D"border:none;border-left:solid #B5C4DF 4.5pt;padding:0i=
n 0in 0in 4.0pt;margin-left:3.75pt;margin-right:0in" id=3D"MAC_OUTLOOK_ATTR=
IBUTION_BLOCKQUOTE">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Dear all,<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">This is the start of the Working Group Last =
Call (WGLC) for<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">draft-ietf-sfc-control-plane-04.txt<o:p></o:=
p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">The WGLC lasts for 2 weeks and will end May =
11th at 10 pm PDT.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Please send your comments and reviews to the
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> list.<o:p></o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">Regards,<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">&nbsp;&nbsp; Martin (SFC co-chair)<o:p></o:p=
></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">____________________________________________=
___<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;">sfc mailing list<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><a href=3D"mailto:sfc@ietf.org">sfc@ietf.org=
</a><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><a href=3D"https://www.ietf.org/mailman/list=
info/sfc">https://www.ietf.org/mailman/listinfo/sfc</a><o:p></o:p></span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size: 10.5pt; font-family: Calib=
ri, sans-serif; color: black;"><o:p>&nbsp;</o:p></span></p>
</div>
</blockquote>
</div>
</div>
</div>
</span>
</body>
</html>

--_000_D347AB3A50CC9smajeef5com_--


From nobody Thu Apr 28 13:29:13 2016
Return-Path: <paulq@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C96712D9E6 for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 13:29:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level: 
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id glSm-BrQZDgW for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 13:28:59 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5E20112D9DF for <sfc@ietf.org>; Thu, 28 Apr 2016 13:28:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=64935; q=dns/txt; s=iport; t=1461875339; x=1463084939; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=VHAHZOV0PCPBg0ZsGoVYkSKgDAaCEk/0T1yZ7NNi/8k=; b=DNKbN/mm+HKOjUJmkU7LdMl6WyQQIf+31s0qOfy3STqHhbni6LmYoVIW qu2pOxA35p80zT2dHQzpUNy146N/JJEmtlZvIi1kNpjr5RFcukdvTBFXy Mf3I/xNlc9s0C3mYXOZe0/wTnHDmS4C+5lzOLIgcm8T2P2aqXOPSg7ia4 Q=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AUAgAKciJX/4YNJK1bA4M4U24PBq19i?= =?us-ascii?q?14BDYFyBBcLhW0CgSw4FAEBAQEBAQFlJ4RBAQEBAwEBAQEXAQJKBwsFBwQCAQg?= =?us-ascii?q?RAwEBAQEjBAchBgsUCQgCBA4FiBUDCggOvyINhEsBAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQERBIYhgXUIgk6CQYF8ISaCZIIrBYd0hhiJUzEBhXuCd4MugXaBZ4RNgym?= =?us-ascii?q?FNIYkgS2HXgEeAQFCgjaBNWyGaX8BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,548,1454976000"; d="scan'208";a="267282151"
Received: from alln-core-12.cisco.com ([173.36.13.134]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 28 Apr 2016 20:28:57 +0000
Received: from XCH-ALN-006.cisco.com (xch-aln-006.cisco.com [173.36.7.16]) by alln-core-12.cisco.com (8.14.5/8.14.5) with ESMTP id u3SKSvPt012669 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 28 Apr 2016 20:28:57 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-006.cisco.com (173.36.7.16) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 28 Apr 2016 15:28:56 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Thu, 28 Apr 2016 15:28:56 -0500
From: "Paul Quinn (paulq)" <paulq@cisco.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>
Thread-Topic: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRoLy5ZShX9BUcs0qvgiEBlqhYSJ+elnwAgAAtrACAAAwigIAA0eUAgAASMoCAABvXAIAAAPWAgAAjHICAADcvAA==
Date: Thu, 28 Apr 2016 20:28:56 +0000
Message-ID: <45761271-F03F-479E-978A-53545964F455@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb> <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com> <CAA=duU0cjXbTxTCqaRetajxFaJVfq8Y-HySPDrR-0AN38Wq3Zw@mail.gmail.com> <4d65232a-d4a6-a11b-c765-635cb909edbd@joelhalpern.com> <CAA=duU0PujWB0LB=wxFauPqaqbf4kFsqkzAwtNn7r3MzBUdCqA@mail.gmail.com> <D3478632.4C66A%jguichar@cisco.com> <CAA=duU1guf-VmkYV3=-JQVULm-cHir4XwTEmhm14H2Z8o7euAg@mail.gmail.com> <888c5567-c459-f29f-6f20-02aad39f1f76@joelhalpern.com> <D347BBAE.4C704%jguichar@cisco.com>
In-Reply-To: <D347BBAE.4C704%jguichar@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.90.154]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <8F91286BF94BE84A8652626FFD014F71@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/KHAbkGwc27ZWvoVhDJ9hGDrOQrw>
Cc: "Elzur, Uri" <uri.elzur@intel.com>, Joel Halpern Direct <jmh.direct@joelhalpern.com>, "Andrew G. Malis" <agmalis@gmail.com>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 20:29:11 -0000

Jim, Andy,

That works for me.  We'll mark it for inclusion in the next revision.

Paul

> On Apr 28, 2016, at 10:11 AM, Jim Guichard (jguichar) <jguichar@cisco.com=
> wrote:
>=20
> That wording works for me.
>=20
> Paul/Uri, as editors of draft-ietf-sfc-nsh-04, unless there are any
> objections from the WG or yourselves, can you please make the suggested
> change to the text?
>=20
> Jim
>=20
> On 4/28/16, 11:05 AM, "Joel Halpern Direct" <jmh.direct@joelhalpern.com>
> wrote:
>=20
>> Thanks Andy.  That wording would indeed work for me.
>> Yours,
>> Joel
>>=20
>> On 4/28/16 11:02 AM, Andrew G. Malis wrote:
>>> Jim,
>>>=20
>>> The way option 3 is currently worded, there=B9s no indication that this=
 is
>>> just an example, and not a direction to use RFC 6830, section 5.4. I
>>> just had an offline discussion with Joel, and he and I agree that a
>>> better wording for option 3 would be "Use the fragmentation provided by
>>> the network overlay mechanics. One example can be found in RFC 6830,
>>> section 5.4.=B2
>>>=20
>>> Thanks,
>>> Andy
>>>=20
>>> On Thu, Apr 28, 2016 at 9:22 AM, Jim Guichard (jguichar)
>>> <jguichar@cisco.com <mailto:jguichar@cisco.com>> wrote:
>>>=20
>>>    Hi Andy,
>>>=20
>>>    I think the key point is that NSH !=3D network overlay but rather
>>>    utilizes a network overlay for packet transport between SFC network
>>>    elements. The reference is just an example of how a network overlay
>>>    might deal with fragmentation and is not a suggestion that NSH adopt
>>>    that mechanism but rather makes the point that it can utilize the
>>>    existing network overlay mechanics.
>>>=20
>>>    Jim
>>>=20
>>>    From: sfc <sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>> on
>>>    behalf of "Andrew G. Malis" <agmalis@gmail.com
>>>    <mailto:agmalis@gmail.com>>
>>>    Date: Thursday, April 28, 2016 at 8:17 AM
>>>    To: Joel Halpern Direct <jmh.direct@joelhalpern.com
>>>    <mailto:jmh.direct@joelhalpern.com>>
>>>    Cc: "Elzur, Uri" <uri.elzur@intel.com <mailto:uri.elzur@intel.com>>,
>>>    "mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>"
>>>    <mohamed.boucadair@orange.com
>>>    <mailto:mohamed.boucadair@orange.com>>, "sfc@ietf.org
>>>    <mailto:sfc@ietf.org>" <sfc@ietf.org <mailto:sfc@ietf.org>>, Linda
>>>    Dunbar <linda.dunbar@huawei.com <mailto:linda.dunbar@huawei.com>>
>>>    Subject: Re: [sfc] Suggested wording addtion to the Section 6
>>>    (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
>>>=20
>>>    Joel,
>>>=20
>>>    The diagrams in section 6 of RFC 6830 are control plane, not data
>>>    plane. The data plane diagrams are in section 5.
>>>=20
>>>    But the overriding question is - without any fields in the NSH
>>>    header to sequence fragments, how can the fragments be correctly
>>>    reassembled?
>>>=20
>>>    Cheers,
>>>    Andy
>>>=20
>>>    On Wed, Apr 27, 2016 at 7:46 PM, Joel Halpern Direct
>>>    <jmh.direct@joelhalpern.com <mailto:jmh.direct@joelhalpern.com>>
>>> wrote:
>>>=20
>>>        The LISP header does not have a fragment flag or fragment
>>>        offset.  The diagrams in section 6 include the outer
>>>        encapsulating header (the equivalent of the transport header in
>>>        SFC.)  Yes, the text is a little hard to follow in this regard.
>>>        The LISP working group is going to be rewriting RFC 6830 as part
>>>        of moving to standards track.
>>>=20
>>>        So there is no difference in this regard between NSH and LISP.
>>>=20
>>>        Yours,
>>>        Joel
>>>=20
>>>        On 4/27/16 7:02 PM, Andrew G. Malis wrote:
>>>=20
>>>            Joel et al,
>>>=20
>>>            All this talk about fragmentation prompted me to re-read
>>>            section 6 of
>>>            the draft, which recommends (as option 3) using the
>>>            procedures in
>>>            section 5.4 of RFC 6830 (presumably with the =B3NSH header=
=B2
>>>            replacing the
>>>            =B3LISP header=B2 in the description of the procedures in th=
at
>>>            section).
>>>=20
>>>            So that led me to read that section (and the LISP header
>>>            definition in
>>>            section 5.1), and I see that LISP does fragmentation and
>>>            reassembly
>>>            identically to IPv4, using the Fragment Offset field so that
>>>            fragments
>>>            can be correctly reassembled in the proper order.
>>>=20
>>>            However, the NSH Header doesn=B9t have a Fragment Offset fie=
ld
>>>            or any
>>>            other way to order the fragments.
>>>=20
>>>            So how can the procedures in Section 5.4 of 6830 be used?
>>>=20
>>>            Thanks,
>>>            Andy
>>>=20
>>>            On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern
>>>            <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>
>>>            <mailto:jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>>>
>>>            wrote:
>>>=20
>>>                Both methods are valid, and both depend upon details of
>>> the
>>>                underlying packet and the transport.  As such, I don't
>>>            see why this
>>>                document benefits from describing them, much less why it
>>>            should mark
>>>                one method as a "should".  Implementation details are
>>>            likely to be
>>>                more significant than any bit consumption difference
>>>            between the two
>>>                alternatives.
>>>=20
>>>                Yours,
>>>                Joel
>>>=20
>>>=20
>>>                On 4/27/16 3:40 PM, Linda Dunbar wrote:
>>>=20
>>>                    I suggest adding the following paragraphs after the
>>>            Bullet 3 of
>>>                    the Section 6 Fragmentation Consideration to make
>>>            the process
>>>                    more clear and less controversial:
>>>=20
>>>=20
>>>                    --------------------------------
>>>=20
>>>                    RFC6830 describes the fragmentation method of
>>>            breaking the
>>>                    original packet into two equal sub-frames and
>>>            encapsulating
>>>                    [LISP Header + Transport header] to each sub-frame.
>>>=20
>>>                    If LISP fragmentation [RFC6830 Section 5.4] is used,
>>>            the [SFC
>>>                    Header + Transport Header] will be added to each
>>>            half frame (or
>>>                    the original data frame). As the Transport Header is
>>>            terminated
>>>                    by the next SFF node's tunnel transport layer, the
>>>            combined two
>>>                    sub-frames will have two SFC Headers.
>>>=20
>>>                    Therefore, the fragmentation for NSH encapsulated
>>>            data frame
>>>                    should be done completely by the node tunnel
>>>            transport layer,
>>>                    which should break the [SFC + original packet] into
>>>            two equal
>>>                    sub-frames and each sub-frame being encapsulated
>>>            with its
>>>                    respective tunnel header.  The next SFF node's
>>>            tunnel transport
>>>                    layer should combine the two sub-frames before
>>>            sending to the
>>>                    next node.
>>>=20
>>>=20
>>> ------------------------------------------------------
>>>=20
>>>=20
>>>                    By the way, there are to typo in the Section 6:
>>>                    3rd line: "In order the" =3D=3D> "In order to"
>>>                    Last line of Bullet 2: extra "the" in the "utilized
>>>            to ensure
>>>                    the the required packet".
>>>=20
>>>=20
>>>                    Hope it helps.
>>>=20
>>>                    Linda
>>>=20
>>>=20
>>>=20
>>>                    -----Original Message-----
>>>                    From: mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>
>>>                    <mailto:mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>>
>>>                    [mailto:mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>
>>>                    <mailto:mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>>]
>>>                    Sent: Wednesday, April 27, 2016 12:40 AM
>>>                    To: Joel M. Halpern; Linda Dunbar; Elzur, Uri;
>>>            sfc@ietf.org <mailto:sfc@ietf.org>
>>>                    <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>>>                    Subject: RE: [sfc] WG last call for
>>>            draft-ietf-sfc-nsh-04.txt
>>>=20
>>>                    Hi Joel, all,
>>>=20
>>>                    Please see inline.
>>>=20
>>>                    Cheers,
>>>                    Med
>>>=20
>>>                        -----Message d'origine-----
>>>                        De : Joel M. Halpern [mailto:jmh@joelhalpern.com
>>>            <mailto:jmh@joelhalpern.com>
>>>                        <mailto:jmh@joelhalpern.com
>>>            <mailto:jmh@joelhalpern.com>>] Envoy=E9 : mardi 26
>>>                        avril 2016 19:18 =C0 : Linda Dunbar; BOUCADAIR
>>> Mohamed
>>>                        IMT/OLN; Elzur,
>>>                        Uri; sfc@ietf.org <mailto:sfc@ietf.org>
>>>            <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Objet : Re:
>>> [sfc] WG
>>>                        last call for
>>>                        draft-ietf-sfc-nsh-04.txt
>>>=20
>>>                        With regard to Transport tunnel fragementation,
>>>            that seems
>>>                        an issue
>>>                        for the transport protocol.  I don't actually
>>>            object to a
>>>                        sentence,
>>>                        but it does not seem that it will accomplish
>>>            anything.
>>>=20
>>>=20
>>>                    [Med] I would like to see some text added to the
>>> draft.
>>>=20
>>>=20
>>>                        With regard to packets fragmented by the
>>> source, I
>>>                        completely disagree
>>>                        with your assertion.  If an SFF were to
>>>            reassemble the
>>>                        packets, that
>>>                        would be a violation of its job.
>>>=20
>>>=20
>>>                    [Med] I agree with you.
>>>=20
>>>                      There is no reason for an SFF to
>>>=20
>>>                        reassemble a packet fragmented by the source.
>>> The
>>>                        classifier may have
>>>                        to do some interesting things in order to
>>>            properly classify
>>>                        succeeding
>>>                        fragments, but that is an implementation issue
>>>            (most commonly
>>>                        addressed with virtual reassembly, which doe
>>>            snot delay the
>>>                        fragments.)  We don't specity that.
>>>=20
>>>=20
>>>                    [Med] Still, the external behavior of the classifier
>>>            needs to be
>>>                    clear in the document. I don't find any text in the
>>>            draft saying
>>>                    for instance that an NSH header must be present in
>>> all
>>>                    fragments. (There some processing that might be
>>>            needed at the
>>>                    SFF to "do its job" with regards to fragments
>>>            (receive out of
>>>                    order fragments + forwarding policy on the full
>>>            packet).)
>>>=20
>>>=20
>>>                        If an SF needs to reassemble fragments to do its
>>>            job, that
>>>                        is up to
>>>                        the SF.  Some will need to actually reassemble.
>>>            Some will
>>>                        need to
>>>                        perform virtual reassembly, and some will
>>>            happily process the
>>>                        fragments.  I can not see what the NSH document
>>>            could
>>>                        possibly mandate.
>>>=20
>>>=20
>>>                    [Med] Fully agree.
>>>=20
>>>=20
>>>                        Yours,
>>>                        Joel
>>>=20
>>>                        On 4/26/16 11:47 AM, Linda Dunbar wrote:
>>>=20
>>>                            Joel,
>>>=20
>>>                            I think the document should add the
>>>            description on the
>>>                            following two
>>>                            fragmentation scenarios:
>>>=20
>>>                            - Transport tunnel generated fragmentation:
>>>            When a packet
>>>                            fragmentation is caused by transport tunnel
>>>            (i.e. various
>>>                            encapsulations), the termination point of
>>>            the transport
>>>                            tunnel is
>>>                            responsible for re-assembling the fragmented
>>>            pieces of
>>>                            the packet.
>>>                            Since there won't be any SFF nodes in
>>>            between the
>>>                            Transport Tunnel,
>>>                            the tunnel generated fragmentation does not
>>>            require any
>>>                            actions by
>>>                            SFF nodes or SF nodes.
>>>=20
>>>=20
>>>                            - Source node generated fragmentation (after
>>>            adding on
>>>                            the NSH
>>>                            header): When fragmentation has to be
>>>            performed for a
>>>                            packet being
>>>                            encapsulated with the NSH header, either the
>>>                            intermediate SFF nodes
>>>                            or the SF nodes have to be able to
>>>            reassemble the
>>>                            fragmented pieces.
>>>=20
>>>=20
>>>=20
>>>=20
>>>                            Cheers,
>>>=20
>>>=20
>>>                            Linda
>>>=20
>>>                            -----Original Message----- From: Joel M.
>>> Halpern
>>>                            [mailto:jmh@joelhalpern.com
>>>            <mailto:jmh@joelhalpern.com>
>>>                            <mailto:jmh@joelhalpern.com
>>>            <mailto:jmh@joelhalpern.com>>] Sent: Tuesday, April 26,
>>>                            2016 10:33 AM
>>>                            To: Linda Dunbar;
>>>            mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>
>>>                            <mailto:mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>>; Elzur, Uri;
>>>                            sfc@ietf.org <mailto:sfc@ietf.org>
>>>            <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Subject: Re:
>>>            [sfc] WG
>>>                            last call for
>>>                            draft-ietf-sfc-nsh-04.txt
>>>=20
>>>                            Re-reading your note, it is possible that
>>>            you are
>>>                            referring only to
>>>                            the case of transport generated
>>>            fragmentation of the
>>>                            outer packet.
>>>                            I had assumed you were not talking about
>>>            that, since the
>>>                            resulting
>>>                            fragments will not all have NSH headers.  As
>>>            with any tunnel
>>>                            technology, if the tunnel chooses to
>>>            fragment at its
>>>                            layer, then the
>>>                            tunnel is responsible for reassembly.  That
>>>            would be
>>>                            invisible to
>>>                            the SFF.
>>>=20
>>>                            Yours, Joel
>>>=20
>>>                            On 4/26/16 11:10 AM, Linda Dunbar wrote:
>>>=20
>>>                                Agree with Med.
>>>=20
>>>                                Even if each fragment piece of a packet
>>>            with NSH
>>>                                header carries the
>>>                                NSH header, the intermediate SFF nodes
>>>            still need to
>>>                                put together
>>>                                all the fragments together before
>>>            passing the whole
>>>                                data frame to
>>>                                the SF.
>>>=20
>>>                                Linda
>>>=20
>>>                                -----Original Message----- From: sfc
>>>                                [mailto:sfc-bounces@ietf.org
>>>            <mailto:sfc-bounces@ietf.org>
>>>                                <mailto:sfc-bounces@ietf.org
>>>            <mailto:sfc-bounces@ietf.org>>]
>>>                                On Behalf Of
>>>            mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>
>>>                                <mailto:mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>> Sent: Monday,
>>>                                April 25,
>>>                                2016 9:42 AM To: Elzur, Uri; Joel M.
>>>            Halpern;
>>>                                sfc@ietf.org <mailto:sfc@ietf.org>
>>>            <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Subject:
>>>                                Re: [sfc] WG last call for
>>>            draft-ietf-sfc-nsh-04.txt
>>>=20
>>>                                Re-,
>>>=20
>>>                                How do you instruct the transport layer
>>>            to ALWAYS
>>>                                prepend an NSH
>>>                                header even for fragments? Or you don't
>>>            care about that?
>>>=20
>>>                                Thank you.
>>>=20
>>>                                Cheers, Med
>>>=20
>>>                                    -----Message d'origine----- De :
>>>            Elzur, Uri
>>>                                    [mailto:uri.elzur@intel.com
>>>            <mailto:uri.elzur@intel.com>
>>>                                    <mailto:uri.elzur@intel.com
>>>            <mailto:uri.elzur@intel.com>>] Envoy=E9 : lundi 25
>>>                                    avril 2016 16:26 =C0
>>>                                    : BOUCADAIR Mohamed IMT/OLN; Joel M.
>>>            Halpern;
>>>                                    sfc@ietf.org <mailto:sfc@ietf.org>
>>>            <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Objet
>>>                                    : RE: [sfc] WG last call for
>>>                                    draft-ietf-sfc-nsh-04.txt
>>>=20
>>>                                    Hi Med
>>>=20
>>>                                    Not to repeat my position, but I'll
>>>            do it anyhow
>>>                                    :-) As NSH is
>>>                                    *NOT* a transport, dealing with
>>>            fragmentation is
>>>                                    left to the
>>>                                    Transport used.
>>>=20
>>>                                    The model I use for NSH, is
>>>            basically similar to
>>>                                    VXLAN . It is an
>>>                                    overly.
>>>=20
>>>                                    Thx
>>>=20
>>>                                    Uri ("Oo-Ree") C: 949-378-7568
>>>            <tel:949-378-7568> <tel:949-378-7568 <tel:949-378-7568>>
>>>=20
>>>=20
>>>                                    -----Original Message----- From: sfc
>>>                                    [mailto:sfc-bounces@ietf.org
>>>            <mailto:sfc-bounces@ietf.org>
>>>                                    <mailto:sfc-bounces@ietf.org
>>>            <mailto:sfc-bounces@ietf.org>>]
>>>                                    On Behalf Of
>>>            mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>
>>>                                    <mailto:mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>> Sent:
>>>                                    Monday, April 25,
>>>                                    2016 7:18 AM To: Joel M. Halpern
>>>                                    <jmh@joelhalpern.com
>>>            <mailto:jmh@joelhalpern.com> <mailto:jmh@joelhalpern.com
>>>            <mailto:jmh@joelhalpern.com>>>;
>>>                                    sfc@ietf.org <mailto:sfc@ietf.org>
>>>            <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>>>                                    Subject: Re: [sfc] WG last call for
>>>                                    draft-ietf-sfc-nsh-04.txt
>>>=20
>>>                                    Hi Joel,
>>>=20
>>>                                    Please see inline.
>>>=20
>>>                                    Cheers, Med
>>>=20
>>>                                        -----Message d'origine----- De :
>>>            Joel M. Halpern
>>>                                        [mailto:jmh@joelhalpern.com
>>>            <mailto:jmh@joelhalpern.com>
>>>                                        <mailto:jmh@joelhalpern.com
>>>            <mailto:jmh@joelhalpern.com>>] Envoy=E9 : lundi
>>>                                        25 avril 2016 15:48 =C0
>>>                                        : BOUCADAIR Mohamed IMT/OLN;
>>>            sfc@ietf.org <mailto:sfc@ietf.org>
>>>                                        <mailto:sfc@ietf.org
>>>            <mailto:sfc@ietf.org>> Objet : Re: [sfc] WG
>>>                                        last call for
>>>            draft-ietf-sfc-nsh-04.txt
>>>=20
>>>                                        If I am understanding you
>>>            correctly Med, you
>>>                                        are asking that the
>>>                                        NSH draft specify how service
>>>            chaining
>>>                                        should cope with packets
>>>                                        that have been fragmented?
>>>=20
>>>=20
>>>                                    [Med] To be accurate, I'm asking to
>>>            assess
>>>                                    whether there are
>>>                                    implications. If there are, then the
>>>            draft
>>>                                    should be updated
>>>                                    accordingly.
>>>=20
>>>                                        NSH, and the SFF functionality,
>>>            does not care.
>>>=20
>>>=20
>>>                                    [Med] I'm not that sure. Some
>>> typical
>>>                                    implications are listed
>>>                                    below:
>>>=20
>>>                                    * SFF: If the NSH header is present
>>>            only in the
>>>                                    a fragment but SFF
>>>                                    didn't maintained a state,
>>>            subsequent fragments
>>>                                    won't be
>>>                                    appropriately processed. * SFC-aware
>>>            function:
>>>                                    if prepending a
>>>                                    context information depends on the
>>>            full packet,
>>>                                    not only a
>>>                                    fragment.
>>>=20
>>>                                    It just does its job.
>>>=20
>>>                                    [Med] which may be disturbed in some
>>>            situations
>>>                                    as listed in the
>>>                                    examples above.
>>>=20
>>>                                        Ingress and intermediate
>>>            classifiers may
>>>                                        cope with fragments in
>>>                                        any number of ways.
>>>=20
>>>                                    Specifying such is clearly out of
>>>            scope for this
>>>                                    draft.
>>>=20
>>>                                    [Med] The purpose is not to specify
>>>            the internal
>>>                                    implementation
>>>                                    details but the external behavior
>>> of the
>>>                                    classifier function when
>>>                                    it comes to handle fragments. That
>>>            behavior may
>>>                                    have an incidence
>>>                                    on SFF, in particular. The purpose
>>>            is not to
>>>                                    recommend the maximum
>>>                                    resources to be dedicated to out of
>>>            order
>>>                                    fragments nor the
>>>                                    timeout to cache those; these
>>>            considerations are
>>>                                    of course out of
>>>                                    scope. Nevertheless, an
>>>            implementation should
>>>                                    offer a configurable
>>>                                    parameter so that an operator tweak
>>>            those
>>>                                    according to its
>>>                                    context.
>>>=20
>>>                                        I suppose one could write an
>>>            informational
>>>                                        draft on possible ways
>>>                                        of coping.  The IETF has not
>>> usually
>>>                                        published such.
>>>                                        Service functions have to cope
>>> with
>>>                                        fragmented packets just as
>>>                                        they had to before the advent of
>>>            NSH, so
>>>                                        describing that is
>>>                                        clearly not needed here.
>>>=20
>>>=20
>>>                                    [Med] The advent of NSH has the
>>>            following
>>>                                    implications: * it
>>>                                    exacerbates fragmentation. Handing
>>>            over this
>>>                                    issue to the
>>>                                    transport layer may lead to
>>>            interoperability
>>>                                    issues. * the
>>>                                    chaining may not be efficient if
>>>            fragments are
>>>                                    inappropriately
>>>                                    handled.
>>>=20
>>>                                    Introducing NSH should not degrade
>>>            the overall
>>>                                    service compared to
>>>                                    legacy service deployment schemes.
>>>=20
>>>=20
>>>                                        Yours, Joel
>>>=20
>>>                                        On 4/25/16 3:00 AM,
>>>                                        mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>
>>>=20
>>>            <mailto:mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>> wrote:
>>>=20
>>>                                            Re-,
>>>=20
>>>                                            I hear you, but my comment
>>>            is that we
>>>                                            need, as a WG, to decide
>>>                                            what to
>>>=20
>>>                                        put in the draft. FWIW, I'm
>>>            discussing two
>>>                                        fragmentation
>>>                                        issues:
>>>=20
>>>=20
>>>                                            (1) Fragmentation that is
>>>            caused by
>>>                                            prepending an SFC header.
>>>                                            (2) Handling fragments at
>>>            the ingress of
>>>                                            an SFC-enabled domain.
>>>=20
>>>                                            Increasing the MTU is for
>>> sure a
>>>                                            recommendation is to be
>>>                                            explicitly
>>>=20
>>>                                        called out in the text (see my
>>>            first message).
>>>=20
>>>=20
>>>                                            There are other issues that
>>>            need to be
>>>                                            discussed, e.g., how to
>>>                                            deal with
>>>=20
>>>                                        fragments in SFFs/Classifiers?
>>>=20
>>>=20
>>>                                            It is also "prudent" to
>>>            check that no
>>>                                            issues will be experienced
>>>                                            in SFF
>>>=20
>>>                                        to handle fragments. If an SFC
>>>            header is
>>>                                        prepended for all
>>>                                        fragments, I'm not sure there
>>>=20
>>>                                            is any particular issue at
>>>            the SFF
>>>                                            level, except if
>>>                                            stripping/adding
>>>=20
>>>                                        context TLVs depends on the full
>>>            packet (not
>>>                                        just fragment). It
>>>                                        is warranted to consider a
>>>            little bit this
>>>                                        point before declaring
>>>                                        there is no issue.
>>>=20
>>>=20
>>>                                            For point (1), declaring
>>>            fragmentation
>>>                                            out of scope would be
>>>                                            meant that
>>>=20
>>>                                        an implementation must be
>>>            prepared to
>>>                                        receive fragments with or
>>>                                        without NSH header as this is a
>>>            decision
>>>                                        that is left to the
>>>                                        transport encapsulation. This
>>> is a
>>>                                        requirement per se!
>>>=20
>>>=20
>>>                                            I won't reiterate all the
>>>            comments I
>>>                                            have about the current
>>>                                            wording of
>>>=20
>>>                                        this section.
>>>=20
>>>=20
>>>                                            Cheers, Med
>>>=20
>>>                                                -----Message
>>>            d'origine----- De :
>>>                                                Elzur, Uri
>>>=20
>>>            [mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>
>>>=20
>>>            <mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>>]
>>>            Envoy=E9
>>>                                                : lundi 25 avril 2016
>>>                                                08:30 =C0 : BOUCADAIR
>>>            Mohamed IMT/OLN;
>>>                                                Thomas Narten;
>>>                                                sfc@ietf.org
>>>            <mailto:sfc@ietf.org> <mailto:sfc@ietf.org
>>>            <mailto:sfc@ietf.org>>
>>>                                                Objet : RE: [sfc] WG
>>>            last call for
>>>=20
>>> draft-ietf-sfc-nsh-04.txt
>>>=20
>>>                                                Hi Med
>>>=20
>>>                                                My point is that
>>>            Fragmentation is
>>>                                                yet another transport
>>>            related
>>>                                                issue
>>>=20
>>>                                        that
>>>=20
>>>                                                is beyond the scope of
>>>            NSH and
>>>                                                beyond the charter of
>>>            the WG, so
>>>                                                it
>>>=20
>>>                                        doesn't
>>>=20
>>>                                                really belong in the
>>>            draft. We are
>>>                                                providing an advice as
>>>                                                extending the size of
>>>            the packet may
>>>                                                lead to fragmentation,
>>> but
>>>                                                as you check RFC 7348
>>>            VxLAN, which
>>>                                                my create the same
>>> issue,
>>>                                                you'll find it doesn't
>>> even
>>>=20
>>>                                        relate
>>>=20
>>>                                                to it.
>>>=20
>>>                                                Thx
>>>=20
>>>                                                Uri ("Oo-Ree") C:
>>>            949-378-7568 <tel:949-378-7568>
>>>                                                <tel:949-378-7568
>>>            <tel:949-378-7568>>
>>>=20
>>>=20
>>>                                                -----Original
>>>            Message----- From: sfc
>>>=20
>>>            [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>
>>>=20
>>>            <mailto:sfc-bounces@ietf.org=20
>>> <mailto:sfc-bounces@ietf.org>>] On
>>>                                                Behalf Of
>>>=20
>>>            mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>
>>>=20
>>>            <mailto:mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>> Sent:
>>>                                                Sunday, April 24, 2016
>>>                                                10:32 PM To: Elzur, Uri
>>>                                                <uri.elzur@intel.com
>>>            <mailto:uri.elzur@intel.com>
>>>=20
>>>            <mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>>>;
>>>                                                Thomas Narten
>>>=20
>>>                                        <narten@us.ibm.com
>>>            <mailto:narten@us.ibm.com> <mailto:narten@us.ibm.com
>>>            <mailto:narten@us.ibm.com>>>;
>>>=20
>>>                                                sfc@ietf.org
>>>            <mailto:sfc@ietf.org> <mailto:sfc@ietf.org
>>>            <mailto:sfc@ietf.org>>
>>>                                                Subject: Re: [sfc] WG
>>>            last call for
>>>=20
>>> draft-ietf-sfc-nsh-04.txt
>>>=20
>>>                                                Hi Uri,
>>>=20
>>>                                                That's another option
>>>            that needs to
>>>                                                be=20
>>> discussed/investigated.
>>>                                                I'm
>>>=20
>>>                                        afraid
>>>=20
>>>                                                this is not the
>>>            rationale adopted in
>>>                                                -04 since it includes=20
>>> some
>>>                                                text
>>>=20
>>>                                        that
>>>=20
>>>                                                is far to be sufficient
>>>            to ensure
>>>                                                interoperable
>>>                                                implementations.
>>>=20
>>>                                                BTW, saying that nsh
>>>            does not need
>>>                                                to deal with=20
>>> fragmentation
>>>                                                because
>>>=20
>>>                                        it
>>>=20
>>>                                                is transport-independent
>>>            is not IMHO
>>>                                                a good strategy to adopt
>>>                                                here
>>>=20
>>>                                        because
>>>=20
>>>                                                it opens the door for
>>>            interoperable
>>>                                                issues, it may lead to
>>>                                                sub-optimal
>>>            implementations if the
>>>                                                sfc information is=20
>>> present
>>>                                                only in one
>>>=20
>>>                                        fragments,
>>>=20
>>>                                                etc.
>>>=20
>>>                                                My comments are related
>>>            to the
>>>                                                current text in the -04.
>>>                                                This text needs
>>>=20
>>>                                        to
>>>=20
>>>                                                be fixed somehow.
>>>=20
>>>                                                Cheers, Med
>>>=20
>>>                                                    -----Message
>>>            d'origine----- De :
>>>                                                    Elzur, Uri
>>>=20
>>>            [mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>
>>>=20
>>>            <mailto:uri.elzur@intel.com <mailto:uri.elzur@intel.com>>]
>>>                                                    Envoy=E9 : dimanche =
24
>>>            avril
>>>                                                    2016 17:36 =C0 :
>>>            BOUCADAIR Mohamed
>>>                                                    IMT/OLN; Thomas=20
>>> Narten;
>>>                                                    sfc@ietf.org
>>>            <mailto:sfc@ietf.org>
>>>                                                    <mailto:sfc@ietf.org
>>>            <mailto:sfc@ietf.org>> Objet :
>>>                                                    RE: [sfc] WG last
>>>            call for
>>>=20
>>>            draft-ietf-sfc-nsh-04.txt
>>>=20
>>>                                                    Hi Med
>>>=20
>>>                                                    I see no need to
>>>            specify the
>>>                                                    exact behavior as=20
>>> NSH is
>>>                                                    transport
>>>            independent i.e. like
>>>                                                    NSH interaction with
>>>            any other
>>>                                                    Transport eh issue=20
>>> of
>>>                                                    Fragmentation is to
>>>            be dealt in
>>>                                                    a way
>>>                                                    that matches the
>>>            mechanisms
>>>                                                    supported by the
>>>            Transport used
>>>                                                    and do not belong in
>>>            the NSH draft
>>>=20
>>>                                                    Thx
>>>=20
>>>                                                    Uri ("Oo-Ree") C:
>>>            949-378-7568 <tel:949-378-7568>
>>>                                                    <tel:949-378-7568
>>>            <tel:949-378-7568>>
>>>=20
>>>=20
>>>                                                    -----Original
>>>            Message----- From: sfc
>>>=20
>>>            [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>
>>>=20
>>>            <mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>>]
>>>                                                    On Behalf Of
>>>=20
>>>            mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>
>>>=20
>>>            <mailto:mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>>
>>>                                                    Sent: Thursday,
>>>            April 14,
>>>                                                    2016 12:43 AM To:
>>>            Thomas Narten
>>>                                                    <narten@us.ibm.com
>>>            <mailto:narten@us.ibm.com>
>>>=20
>>>            <mailto:narten@us.ibm.com <mailto:narten@us.ibm.com>>>;
>>>                                                    sfc@ietf.org
>>>            <mailto:sfc@ietf.org>
>>>                                                    <mailto:sfc@ietf.org
>>>            <mailto:sfc@ietf.org>> Subject:
>>>                                                    Re: [sfc] WG last
>>>            call for
>>>=20
>>>            draft-ietf-sfc-nsh-04.txt
>>>=20
>>>                                                    R-,
>>>=20
>>>                                                    In addition to other
>>>            pending
>>>                                                    issues raised for
>>>            this draft, I
>>>                                                    would like to raise=
=20
>>> this
>>>                                                    additional one about
>>>            Section 6.
>>>=20
>>>                                                    =3D=3D 6.  Fragmenta=
tion
>>>            Considerations
>>>=20
>>>                                                    NSH and the
>>>            associated transport
>>>                                                    header are "added"
>>>            to the
>>>                                                    encapsulated
>>>            packet/frame.  This
>>>                                                    additional=20
>>> information
>>>                                                    increases
>>>=20
>>>                                        the
>>>=20
>>>                                                    size of the packet.
>>>            In order
>>>                                                    the ensure proper
>>>            forwarding of
>>>                                                    NSH data, several
>>>            options for
>>>                                                    handling
>>>            fragmentation and
>>>                                                    re-assembly exist:
>>>=20
>>>                                                    1.  Jumbo Frames,=20
>>> when
>>>                                                    supported, enable
>>>            the transport
>>>                                                    of NSH
>>>                                                    and associated
>>>            transport packets
>>>                                                    without requiring
>>>                                                    fragmentation.
>>>=20
>>>                                                    2.  Path MTU=20
>>> Discovery
>>>                                                    [RFC1191]"describes
>>>            a technique for
>>>                                                    dynamically
>>>            discovering the
>>>                                                    maximum transmission
>>>            unit (MTU) of
>>>=20
>>>                                        an
>>>=20
>>>                                                    arbitrary internet
>>>            path" and can
>>>                                                    be utilized to
>>>            ensure the
>>>=20
>>>                                    the
>>>=20
>>>                                                    required packet size
>>>            is used.
>>>=20
>>>                                                    3.  [RFC6830]
>>>            describes two
>>>                                                    schemes for
>>>            fragmentation and
>>>                                                    re-
>>>=20
>>>                                        assembly
>>>=20
>>>                                                    in section 5.4. =3D=
=3D
>>>=20
>>>                                                    * The text is weak=20
>>> for a
>>>                                                    Standard track
>>>            document that is
>>>                                                    intended to solve
>>>            the problem in
>>>=20
>>>            https://tools.ietf.org/html/rfc7498#section-
>>>=20
>>>                                    2.12.
>>>=20
>>>                                                    There should be a
>>>            clear behavior
>>>                                                    to be followed by an
>>>=20
>>>                                    implementation.
>>>=20
>>>                                                    Further, I would
>>>            avoid the use
>>>                                                    of words such as=20
>>> "can".
>>>=20
>>>                                                    * The text covers=20
>>> only
>>>                                                    fragmentation when
>>>            it is induced
>>>                                                    by SFC
>>>                                                    operations, it does
>>>            not discuss
>>>                                                    the treatment of a
>>>            fragment
>>>                                                    when received in an
>>>            SFC domain.
>>>                                                    IMHO, the draft
>>>            should also
>>>                                                    specify the behavior
>>>            of the
>>>                                                    Classifier with
>>>            regards to
>>>                                                    fragments for the
>>>            sake of proper
>>>                                                    SFC operation.=20
>>> Applying
>>>                                                    classification
>>>            policies may
>>>                                                    require the
>>>=20
>>>                                                full packet, not only a
>>>            fragment.
>>>=20
>>>                                                    In particular,=20
>>> dedicated
>>>                                                    resources should
>>>            dedicated for
>>>                                                    handling out of
>>>            order fragments.
>>>                                                    Of course, it is out
>>>            of scope
>>>                                                    of this document to
>>>            describe how
>>>                                                    SFs handle=20
>>> fragments.
>>>=20
>>>                                                    * If an SFC header
>>>            is prepended
>>>                                                    for all fragments,
>>>            I'm not
>>>                                                    sure there is any
>>>            particular
>>>                                                    issue at the SFF
>>>            level...except
>>>                                                    if stripping/adding
>>>            context TLVs
>>>                                                    depends on the full
>>>            packet
>>>                                                    (not just fragment).
>>>            It is
>>>                                                    warranted to
>>>            consider a little bit
>>>                                                    this point before
>>>            declaring there
>>>=20
>>>                                        is
>>>=20
>>>                                                no issue.
>>>=20
>>>=20
>>>                                                    * The text states
>>>            "several
>>>                                                    options". This may
>>>            be interpreted
>>>                                                    as if implementing
>>>            one of them
>>>                                                    is
>>>            sufficient...which is not
>>>                                                    true. The first two
>>>            points
>>>                                                    contribute to
>>>            minimize the
>>>                                                    fragmentation risk,=
=20
>>> but
>>>                                                    fragmentation may
>>>            still be
>>>                                                    experienced
>>>                                                    (e.g., other shims
>>>            are prepended
>>>                                                    by other nodes for
>>>            some other
>>>                                                    purposes, nested
>>>            nsh, etc.)
>>>=20
>>>                                                    * The first two
>>>            points have
>>>                                                    nothing to do with
>>>            reassembly.
>>>=20
>>>                                                    * The support of
>>>            jumbo frames by
>>>                                                    a router/device does
>>>            not mean
>>>                                                    that it can make use
>>>            of it.
>>>                                                    Appropriate MTU
>>>            configuration
>>>                                                    should be undertaken
>>>            in a
>>>                                                    consistent manner
>>>            within an SFC
>>>                                                    domain. The text
>>>            should be
>>>                                                    updated to make it
>>>            is about
>>>                                                    (consistent) MTU
>>>=20
>>>                                    configuration.
>>>=20
>>>=20
>>>                                                    * BTW, shouldn't the
>>>            text be
>>>                                                    reworded to
>>>            recommended to
>>>                                                    increase the MTU of
>>>            **all
>>>                                                    nodes** of an
>>>            SFC-enabled domain by
>>>                                                    at least the length
>>>            of SFC
>>>                                                    header + transport
>>>            header?
>>>=20
>>>                                                    * Bullet 2, how PMTU
>>>            discovery
>>>                                                    is actually used in=
=20
>>> this
>>>                                                    context? Do you
>>>            assume that all
>>>                                                    SFC-aware nodes will
>>>            issue
>>>                                                    such messages
>>>            towards other
>>>                                                    SFC-aware node,
>>>            arbitrary
>>>                                                    destination, else?
>>>=20
>>>                                                    * Bullet 2, I would=
=20
>>> drop
>>>                                                    "describes a
>>>            technique for
>>>                                                    dynamically
>>>            discovering the
>>>                                                    maximum transmission
>>>            unit
>>>                                                    (MTU) of an
>>>            arbitrary internet
>>>                                                    path".
>>>=20
>>>                                                    * Bullet 2, s/ the
>>>            the/the.
>>>=20
>>>                                                    * The reference to
>>>            the LISP
>>>                                                    specification raises
>>>            two concerns
>>>                                                    and one comment:
>>>=20
>>>                                                    (1) I don't think it
>>>            is a good
>>>                                                    approach that
>>>            fragments induced
>>>                                                    by the network are
>>>            passed to
>>>                                                    their ultimate
>>>            destinations as
>>>                                                    such
>>>=20
>>>                                    (stateless).
>>>=20
>>>                                                    IMO, reassembly
>>>            should be done
>>>                                                    within the SFC=20
>>> domain
>>>                                                    (responsible for
>>>            fragmentation)
>>>                                                    not passed away. (2)
>>>            Does the
>>>                                                    stateful mode
>>>            require all SFC
>>>                                                    data plane elements
>>>            maintain a
>>>                                                    full list of MTU for
>>>            the any
>>>                                                    SFF/SF instance of
>>>            the SFC
>>>=20
>>>                                                domain?
>>>=20
>>>=20
>>>                                                    The current text
>>>            suggests that
>>>                                                    [RFC6830] should be
>>>            listed as
>>>                                                    normative reference
>>>            (not an
>>>                                                    informative one). I
>>>            would
>>>                                                    personally favor
>>>            removing the
>>>                                                    reference to LISP
>>>            (as it is an
>>>                                                    Experimental RFC).
>>>=20
>>>                                                    * The security
>>>            section of the
>>>                                                    draft may be
>>>            augmented with
>>>                                                    informational
>>>=20
>>>            fragmentation-related pointers to:
>>>                                                    e.g., RFC1858=20
>>> (Security
>>>                                                    Considerations for
>>>            IP Fragment
>>>                                                    Filtering), RFC3128
>>>            (Protection
>>>                                                    Against a Variant of
>>>            the Tiny
>>>                                                    Fragment Attack),
>>>            and RFC 4963
>>>                                                    (IPv4 Reassembly
>>>            Errors at High
>>>                                                    Data Rates).
>>>=20
>>>                                                    Cheers, Med
>>>=20
>>>                                                        -----Message
>>>            d'origine-----
>>>                                                        De : sfc
>>>=20
>>>            [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>
>>>=20
>>>            <mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>>]
>>>                                                        De la part de
>>>=20
>>>            mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>
>>>=20
>>>            <mailto:mohamed.boucadair@orange.com
>>>            <mailto:mohamed.boucadair@orange.com>>
>>>                                                        Envoy=E9 : lundi
>>>            11 avril
>>>                                                        2016 13:14 =C0 :
>>>            Thomas
>>>                                                        Narten;
>>>            sfc@ietf.org <mailto:sfc@ietf.org>
>>>=20
>>>            <mailto:sfc@ietf.org <mailto:sfc@ietf.org>> Objet
>>>                                                        : Re:
>>>                                                        [sfc] WG last
>>>            call for
>>>=20
>>>            draft-ietf-sfc-nsh-04.txt
>>>=20
>>>                                                        Dear Thomas,=20
>>> all,
>>>=20
>>>                                                        As I mentioned
>>>            during the
>>>                                                        meeting, there
>>>            are several
>>>                                                        issues
>>>                                                        that are not
>>>            covered in the
>>>                                                        last version of
>>>            the draft. I
>>>                                                        already provided
>>>            examples of
>>>                                                        the issues
>>>            offline as requested
>>>                                                        by Martin.
>>>=20
>>>                                                        Cheers, Med
>>>=20
>>>                                                            -----Message
>>>=20
>>>            d'origine----- De : sfc
>>>=20
>>>            [mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>
>>>=20
>>>            <mailto:sfc-bounces@ietf.org <mailto:sfc-bounces@ietf.org>>]
>>>                                                            De la part
>>>            de Thomas Narten
>>>                                                            Envoy=E9 :
>>>            jeudi 31 mars
>>>                                                            2016 04:48=20
>>> =C0 :
>>>                                                            sfc@ietf.org
>>>            <mailto:sfc@ietf.org>
>>>=20
>>>            <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>>>                                                            Objet :
>>>            [sfc] WG last
>>>                                                            call for
>>>=20
>>>            draft-ietf-sfc-nsh-04.txt
>>>=20
>>>                                                            Dear WG:
>>>=20
>>>                                                            This note
>>>            begins a WG
>>>                                                            last call on
>>>=20
>>>            draft-ietf-sfc-nsh-04.txt
>>>=20
>>>            (https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/).
>>>=20
>>>=20
>>>=20
>>>                        The editors of the NSH document have indicated
>>>            that they have
>>>=20
>>>                                                            addressed
>>>            all known
>>>                                                            comments and
>>>            that there
>>>                                                            are no open
>>>                                                            issues with
>>>            the current
>>>                                                            version of
>>>            the document.
>>>=20
>>>                                                            Substantive
>>>            comments to
>>>                                                            the list=20
>>> please,
>>>                                                            editorial
>>>            comments
>>>                                                            can go
>>>            directly to the
>>>                                                            document
>>>            editors.
>>>=20
>>>                                                            We'll also
>>>            get a brief
>>>                                                            update from
>>>            the editors
>>>                                                            at next
>>>                                                            week's
>>>            meeting. If there
>>>                                                            are any
>>>            remaining issues
>>>                                                            with the
>>>                                                            document,
>>>            raising them
>>>                                                            before the
>>>            meeting would be
>>>                                                            especially
>>>            helpful.
>>>=20
>>>                                                            For the
>>>            chairs, Thomas
>>>=20
>>>=20
>>>            _______________________________________________
>>>                                                            sfc mailing
>>>                                                            list
>>>            sfc@ietf.org <mailto:sfc@ietf.org>
>>>=20
>>>            <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>>>=20
>>>            https://www.ietf.org/mailman/listinfo/sfc
>>>=20
>>>=20
>>>=20
>>>            _______________________________________________
>>>                                                        sfc mailing
>>>                                                        list
>>>            sfc@ietf.org <mailto:sfc@ietf.org>
>>>=20
>>>            <mailto:sfc@ietf.org <mailto:sfc@ietf.org>>
>>>=20
>>>            https://www.ietf.org/mailman/listinfo/sfc
>>>=20
>>>=20
>>>=20
>>>            _______________________________________________
>>>                                                    sfc mailing
>>>                                                    list sfc@ietf.org
>>>            <mailto:sfc@ietf.org>
>>>                                                    <mailto:sfc@ietf.org
>>>            <mailto:sfc@ietf.org>>
>>>=20
>>>            https://www.ietf.org/mailman/listinfo/sfc
>>>=20
>>>=20
>>>=20
>>>            _______________________________________________
>>>                                                sfc mailing
>>>=20
>>>=20
>>>=20
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Apr 28 14:28:34 2016
Return-Path: <louis.fourie@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD25112D9CD for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 14:28:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.216
X-Spam-Level: 
X-Spam-Status: No, score=-5.216 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fQTCzfihp5o6 for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 14:28:27 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 389E112D891 for <sfc@ietf.org>; Thu, 28 Apr 2016 14:28:26 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml702-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CIS89939; Thu, 28 Apr 2016 21:28:23 +0000 (GMT)
Received: from SJCEML702-CHM.china.huawei.com (10.218.25.35) by lhreml702-cah.china.huawei.com (10.201.5.99) with Microsoft SMTP Server (TLS) id 14.3.235.1; Thu, 28 Apr 2016 22:28:19 +0100
Received: from SJCEML701-CHM.china.huawei.com ([169.254.3.126]) by SJCEML702-CHM.china.huawei.com ([169.254.4.137]) with mapi id 14.03.0235.001;  Thu, 28 Apr 2016 14:28:14 -0700
From: Henry Fourie <louis.fourie@huawei.com>
To: Sumandra Majee <S.Majee@F5.com>, Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
Thread-Index: AQHRoD1xptygDpbcqk2x0cunxea82p+eU/SAgAHcfoCAAAV3AP//oNsQ
Date: Thu, 28 Apr 2016 21:28:13 +0000
Message-ID: <0F8583BBE82FA449A8B78417CC07559A09569109@SJCEML701-CHM.china.huawei.com>
References: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com> <D3462926.4C3CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830F44359@wtl-exchp-2.sandvine.com> <D347AB3A.50CC9%s.majee@f5.com>
In-Reply-To: <D347AB3A.50CC9%s.majee@f5.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.212.202.57]
Content-Type: multipart/alternative; boundary="_000_0F8583BBE82FA449A8B78417CC07559A09569109SJCEML701CHMchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090202.57228078.0035, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.3.126, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 9efd71f21c046270d01650c0fb1175f6
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/b87bMUeddQeIJoFAqswuxzsh-Sk>
Cc: "Jim Guichard \(jguichar\)" <jguichar@cisco.com>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Apr 2016 21:28:33 -0000

--_000_0F8583BBE82FA449A8B78417CC07559A09569109SJCEML701CHMchi_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

All,
    Comments:


1.      There is one sentence on OAM in 3.1. This probably deserves a sub-s=
ection in section 4 that covers fault management, alarms, error reporting, =
switchovers...



Note, the SFC control plane must be able to invoke SFC OAM mechanisms, and =
to determine the results of OAM operations.



2.      There is no mention of metadata in the document. Use of the term 'm=
etadata' may make some text clearer.
For example, there should be a sentence in the 3.3.x sections for SFC contr=
oller to request a particular component to insert/remove/report packet meta=
data.


3.      Last para of 3.3.2: change 'An SFF can be instructed...' to 'An SFF=
 must be instructed...'


4.      3.3.3: This paragraph does not read well:

This interface is also used to instruct an SFC-aware SF about any
context information it needs to supply in the context of a given SFC.
Suggest:
This interface may also be used to instruct an SFC-aware SF to insert, remo=
ve or
report metadata information for a given SFC.


5.      3.3.3: In several paragraphs the term 'contexts' is used. It may be=
 clearer if 'metadata' is used instead.


6.      Suggest moving this paragraph from 4.10.5 to 3.4.4 as it relates sp=
ecifically to

SFC Proxy functionality. Reworded, this can replace the last sentence in 3.=
3.4:

The C4 interface may also include information to map the SFP
Identifier carried in the packet header to a locally significant link
identifier, e.g., VLAN-ID, and a method to construct and encapsulate
the SFC header back to the packets when they come back from the attached SF=
s.


7.      Last para of 4.10.5 typo: classier -> classifier

8.      Last para of 4.10.5: This could be clearer on what the problem is. =
Not sure what SFF A and SFF B are? Would it not be better to recommend a pr=
ocedure in which the SFC Controller updates downstream SFFs before upstream=
 SFFs when constructing a new SFP. Insertion of a SF into a SFP should have=
 only local impact on the SFF it is connected to.


-        Louis


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Sumandra Majee
Sent: Thursday, April 28, 2016 12:03 PM
To: Dave Dolson; sfc@ietf.org
Cc: Jim Guichard (jguichar)
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt

Dave,
I would also concur that SFF is a forwarding entity that uses pathID/SI to =
find the next-hop/next-sf/next-sff. This is how our SFF works.

It is absolutely possible that co resident classifier to further classify b=
ased on  l3/l4/l7/python_code and change the path. But logically that is an=
other classification and list below is certainly not exhaustive.

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
Dave Dolson <ddolson@sandvine.com<mailto:ddolson@sandvine.com>>
Date: Thursday, April 28, 2016 at 11:43 AM
To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Cc: "Jim Guichard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com=
>>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt

Further to Jim's points about section 4.10.5, do I read it correctly that t=
he SFF can be configured to steer traffic on the basis of these?
   o  Destination MAC address
   o  Source MAC address
   o  VLAN-ID,
   o  Destination IP address
   o  Source IP address
   o  Source port number
   o  Destination port number
   o  DSCP
   o  Packet size, etc., or any combination thereof.

This comes totally unexpected to me, thinking that the SFF steers traffic b=
ased exclusively on Service Path Identifier and Service Index (SPI/SI), whi=
ch oddly aren't in the above list.

I can guess that maybe this is about reclassification, but "classification"=
 isn't mentioned in 4.10.5.
Can someone explain?

-Dave



From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Jim Guichard (jguichar=
)
Sent: Wednesday, April 27, 2016 10:18 AM
To: Martin Stiemerling; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt

Hi Martin & WG:

A few comments that I would like to see addressed in the document before it=
 can move forward to the next step.

  *   Section 2.2 SFC Control Plane Bootstrapping.
This section is too wishy washy. It makes the statement "this document assu=
mes the SFC control plane is provided with a set of information that is req=
uired for proper SFC operation" but then goes on to list bullets that are l=
ikely to be provided or may be provided. It does not actually provide any i=
nformation on what is required for proper SFC operation. In the list of lik=
ely information there is no indication of whether this information must exi=
st in the network prior to bootstrapping the SFC control plane element; thi=
s is true also for the list of may information. Surely we should provide gu=
idelines on what must be available before the SFC control plane element can=
 actually function although it is reasonable to assume that it can bootstra=
p without any information (albeit it can't actually do anything). On this p=
oint I would argue that several of the may elements are actually required s=
uch as SFF, SF, SFC-proxy locators and may exist prior to bootstrapping the=
 SFC control plane element, or may be added later through some control inte=
rface.

Minor point -> typo in bullet point 6 - SFP proxy should read SFC proxy

  *   Section 2.3 Coherent Setup of an SFC-enabled Domain
What does the sentence "various transport encapsulation schemes and/or vari=
ations of SFC header implementations may be supported" actually mean ? Are =
we referring to the fact that the SFC header may carry type-1 or type-2 met=
adata or something else ? Note that there is only one SFC header implementa=
tion based on the WG charter so if we are referring to different SFC format=
s (meaning metadata) then please make this clear in the text, and if not, p=
lease remove this sentence.

  *   Section 3.1 Reference Architecture
Second bullet point "mapping between service function chains and SFPs" - th=
is is a general comment for the entire document but applies here also. Ther=
e is no mention of mapping SFPs -> RSPs - in fact RSP is mentioned only onc=
e in the entire document. The architecture is explicit in that the SFP when=
 rendered into the network is an RSP and therefore the SFC control plane el=
ement needs to have information on currently deployed RSPs.

Additionally there is no interface specified for communication between the =
SFC Control Plane Element and SF management systems. This is an important a=
spect as many SF's may require that SFC information be communicated to thei=
r management systems that will be responsible for communicating directly wi=
th their respective SF's.

  *   Section 3.1.1. C1: Interface between SFC Control Plane & SFC Classifi=
er
The sentence "The control plane may instruct the classifier about the initi=
al values of the Service Index (SI)" should be changed to say MUST as other=
wise if a classifier chooses whatever value it wants then that may not alig=
n with what is programmed into the SFFs by the SFC Control Plane element.

  *   Section 4.10.4. Encoding the Exact SFF/SF Sequence in Data Packets
This section does not actually provide any meaning or indication of relatio=
nship with the SFC Control Plane element. Furthermore,  there has been no W=
G consensus to carry source routes within the SFC encapsulation. Therefore =
this entire section should be removed from the document.

  *   Section 4.10.5. Fully Controlled SFF/SF Sequence for a SFP
Figure 2 lists 3 different SFP-id's whereas the text mentions only SFP-id #=
1. Is this simply a typo or are you trying to convey something else ?

Further you state that "the steering policies to a SFF node for service fun=
ction chain depends on if the packet comes from previous SFF or comes from =
a specific SF i.e., the SFP Forwarding Table entries have to be ingress por=
t specific" -  this is an inaccurate statement as the combination of the SF=
P-id and service-index determines the forwarding behavior (as specified in =
section 3.3 & section 7 of draft-ietf-sfc-nsh-04).  This sentence should be=
 removed from the text.

Jim



On 4/27/16, 12:29 AM, "sfc on behalf of Martin Stiemerling" <sfc-bounces@ie=
tf.org<mailto:sfc-bounces@ietf.org> on behalf of mls.ietf@gmail.com<mailto:=
mls.ietf@gmail.com>> wrote:

Dear all,

This is the start of the Working Group Last Call (WGLC) for

draft-ietf-sfc-control-plane-04.txt

The WGLC lasts for 2 weeks and will end May 11th at 10 pm PDT.

Please send your comments and reviews to the sfc@ietf.org<mailto:sfc@ietf.o=
rg> list.

Regards,

   Martin (SFC co-chair)

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_0F8583BBE82FA449A8B78417CC07559A09569109SJCEML701CHMchi_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Courier;
	panose-1:2 7 4 9 2 2 5 2 4 4;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:230770460;
	mso-list-template-ids:-1941270348;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level2
	{mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level3
	{mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level4
	{mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level5
	{mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level6
	{mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level7
	{mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level8
	{mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level9
	{mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1
	{mso-list-id:690574246;
	mso-list-template-ids:-1856087508;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1:level2
	{mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level3
	{mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level4
	{mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level5
	{mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level6
	{mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level7
	{mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level8
	{mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level9
	{mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2
	{mso-list-id:987511089;
	mso-list-template-ids:-1442053110;}
@list l2:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l2:level2
	{mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2:level3
	{mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2:level4
	{mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2:level5
	{mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2:level6
	{mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2:level7
	{mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2:level8
	{mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2:level9
	{mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l3
	{mso-list-id:1035424619;
	mso-list-type:hybrid;
	mso-list-template-ids:1299595654 67698703 67698713 67698715 67698703 67698=
713 67698715 67698703 67698713 67698715;}
@list l3:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l4
	{mso-list-id:1096512944;
	mso-list-template-ids:1086358294;}
@list l4:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l4:level2
	{mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l4:level3
	{mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l4:level4
	{mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l4:level5
	{mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l4:level6
	{mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l4:level7
	{mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l4:level8
	{mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l4:level9
	{mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l5
	{mso-list-id:1158421783;
	mso-list-type:hybrid;
	mso-list-template-ids:-2035786482 921468344 67698713 67698715 67698703 676=
98713 67698715 67698703 67698713 67698715;}
@list l5:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:11.0pt;
	font-family:"Times New Roman","serif";
	mso-ascii-font-family:Calibri;
	mso-fareast-font-family:Calibri;
	mso-hansi-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";
	color:#1F497D;}
@list l6
	{mso-list-id:1582061230;
	mso-list-type:hybrid;
	mso-list-template-ids:-1619751182 1754400636 67698691 67698693 67698689 67=
698691 67698693 67698689 67698691 67698693;}
@list l6:level1
	{mso-level-start-at:4;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:20.4pt;
	text-indent:-.25in;
	font-family:"Calibri","sans-serif";
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l7
	{mso-list-id:1606425333;
	mso-list-template-ids:-1146958400;}
@list l7:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l7:level2
	{mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l7:level3
	{mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l7:level4
	{mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l7:level5
	{mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l7:level6
	{mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l7:level7
	{mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l7:level8
	{mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l7:level9
	{mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l8
	{mso-list-id:1822695770;
	mso-list-type:hybrid;
	mso-list-template-ids:-2035786482 921468344 67698713 67698715 67698703 676=
98713 67698715 67698703 67698713 67698715;}
@list l8:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:11.0pt;
	font-family:"Times New Roman","serif";
	mso-ascii-font-family:Calibri;
	mso-fareast-font-family:Calibri;
	mso-hansi-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";
	color:#1F497D;}
@list l9
	{mso-list-id:1981692403;
	mso-list-type:hybrid;
	mso-list-template-ids:-2035786482 921468344 67698713 67698715 67698703 676=
98713 67698715 67698703 67698713 67698715;}
@list l9:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:11.0pt;
	font-family:"Times New Roman","serif";
	mso-ascii-font-family:Calibri;
	mso-fareast-font-family:Calibri;
	mso-hansi-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";
	color:#1F497D;}
@list l10
	{mso-list-id:2131781065;
	mso-list-template-ids:362426664;}
@list l10:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l10:level2
	{mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l10:level3
	{mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l10:level4
	{mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l10:level5
	{mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l10:level6
	{mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l10:level7
	{mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l10:level8
	{mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l10:level9
	{mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">All,<o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp; Commen=
ts:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l9 level=
1 lfo8;text-autospace:none">
<![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&quot;Cali=
bri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-list:Ign=
ore">1.<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#215868">There is one sent=
ence on OAM in 3.1. This probably deserves a sub-section in section 4 that =
covers fault management, alarms, error reporting, switchovers&#8230;<o:p></=
o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-autospace:none"><span style=3D"=
font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;col=
or:#215868"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-autospace:none"><span style=3D"=
font-size:10.0pt;font-family:Courier">Note, the SFC control plane must be a=
ble to invoke SFC OAM mechanisms, and to determine the results of OAM opera=
tions.<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-autospace:none"><span style=3D"=
font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;col=
or:#215868"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l9 level=
1 lfo8;text-autospace:none">
<![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&quot;Cali=
bri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-list:Ign=
ore">2.<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#215868">There is no menti=
on of metadata in the document. Use of the term &#8216;metadata&#8217; may =
make some text clearer.<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:.25in;text-autospace:none"><spa=
n style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-seri=
f&quot;;color:#215868">For example, there should be a sentence in the 3.3.x=
 sections for SFC controller to request a particular component
 to insert/remove/report packet metadata.<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:.25in;text-autospace:none"><spa=
n style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-seri=
f&quot;;color:#215868"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l9 level=
1 lfo8;text-autospace:none">
<![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&quot;Cali=
bri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-list:Ign=
ore">3.<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#215868">Last para of 3.3.=
2: change &#8216;An SFF can be instructed&#8230;&#8217; to &#8216;An SFF mu=
st be instructed&#8230;&#8217;<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#215=
868"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l9 level=
1 lfo8;text-autospace:none">
<![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&quot;Cali=
bri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-list:Ign=
ore">4.<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#215868">3.3.3: This parag=
raph does not read well:<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:.25in;text-autospace:none"><spa=
n style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-seri=
f&quot;;color:#215868"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.0pt;font-family:Courier">This interface is also used to instruct an S=
FC-aware SF about any<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.0pt;font-family:Courier">context information it needs to supply in th=
e context of a given SFC.<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#215=
868">Suggest:<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.0pt;font-family:Courier">This interface may also be used to instruct =
an SFC-aware SF to insert, remove or<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.0pt;font-family:Courier">report metadata information for a given SFC.=
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;;color:#215868"><o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#215=
868"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l9 level=
1 lfo8;text-autospace:none">
<![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&quot;Cali=
bri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-list:Ign=
ore">5.<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#215868">3.3.3: In several=
 paragraphs the term &#8216;contexts&#8217; is used. It may be clearer if &=
#8216;metadata&#8217; is used instead.
<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#215=
868"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l9 level=
1 lfo8;text-autospace:none">
<![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&quot;Cali=
bri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-list:Ign=
ore">6.<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Suggest moving th=
is paragraph from 4.10.5 to 3.4.4 as it relates specifically to</span><span=
 style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#215868"><o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-autospace:none"><span style=3D"=
font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;col=
or:#1F497D">SFC Proxy functionality. Reworded, this can replace the last se=
ntence in 3.3.4:</span><span style=3D"font-size:10.0pt;font-family:Courier"=
><o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-autospace:none"><span style=3D"=
font-size:10.0pt;font-family:Courier">The C4 interface may also include inf=
ormation to map the SFP<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.0pt;font-family:Courier">Identifier carried in the packet header to a=
 locally significant link<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.0pt;font-family:Courier">identifier, e.g., VLAN-ID, and a method to c=
onstruct and encapsulate<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.0pt;font-family:Courier">the SFC header back to the packets when they=
 come back from the attached SFs.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l9 level=
1 lfo8"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-=
list:Ignore">7.<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Last para of 4.10=
.5 typo: classier -&gt; classifier<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l9 level=
1 lfo8"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-=
list:Ignore">8.<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Last para of 4.10=
.5: This could be clearer on what the problem is. Not sure what SFF A and S=
FF B are? Would it not be better to recommend a procedure
 in which the SFC Controller updates downstream SFFs before upstream SFFs w=
hen constructing a new SFP. Insertion of a SF into a SFP should have only l=
ocal impact on the SFF it is connected to.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoListParagraph" style=3D"margin-left:20.4pt;text-indent:-.25i=
n;mso-list:l6 level1 lfo11">
<![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&quot;Cali=
bri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-list:Ign=
ore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Louis<o:p></o:p><=
/span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:20.4pt"><span style=3D"f=
ont-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;colo=
r:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc [mai=
lto:sfc-bounces@ietf.org]
<b>On Behalf Of </b>Sumandra Majee<br>
<b>Sent:</b> Thursday, April 28, 2016 12:03 PM<br>
<b>To:</b> Dave Dolson; sfc@ietf.org<br>
<b>Cc:</b> Jim Guichard (jguichar)<br>
<b>Subject:</b> Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt<o:p>=
</o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:8.5pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:black">Dave,<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:8.5pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:black">I would also concur that SFF=
 is a forwarding entity that uses pathID/SI to find the next-hop/next-sf/ne=
xt-sff. This is how our SFF works.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:8.5pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:8.5pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:black">It is absolutely possible th=
at co resident classifier to further classify based on &nbsp;l3/l4/l7/pytho=
n_code and change the path. But logically that is another classification
 and list below is certainly not exhaustive. &nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:8.5pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;;color:black">From:
</span></b><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,=
&quot;sans-serif&quot;;color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@i=
etf.org">sfc-bounces@ietf.org</a>&gt; on behalf of Dave Dolson &lt;<a href=
=3D"mailto:ddolson@sandvine.com">ddolson@sandvine.com</a>&gt;<br>
<b>Date: </b>Thursday, April 28, 2016 at 11:43 AM<br>
<b>To: </b>&quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &lt=
;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<br>
<b>Cc: </b>&quot;Jim Guichard (jguichar)&quot; &lt;<a href=3D"mailto:jguich=
ar@cisco.com">jguichar@cisco.com</a>&gt;<br>
<b>Subject: </b>Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt<o:p>=
</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:8.5pt;font-family:&quot;Cal=
ibri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Further to Jim&#8217;s po=
ints about section 4.10.5, do I read it correctly that the SFF can be confi=
gured to steer traffic on the basis of these?</span><span style=3D"color:bl=
ack"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; Dest=
ination MAC address</span><span style=3D"color:black"><o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; Sour=
ce MAC address</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; VLAN=
-ID,</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; Dest=
ination IP address</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; Sour=
ce IP address</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; Sour=
ce port number</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; Dest=
ination port number</span><span style=3D"color:black"><o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; DSCP=
</span><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; o&nbsp; Pack=
et size, etc., or any combination thereof.</span><span style=3D"color:black=
"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">This comes totally unexpe=
cted to me, thinking that the SFF steers traffic based exclusively on Servi=
ce Path Identifier and Service Index (SPI/SI), which oddly
 aren&#8217;t in the above list.</span><span style=3D"color:black"><o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I can guess that maybe th=
is is about reclassification, but &#8220;classification&#8221; isn&#8217;t =
mentioned in 4.10.5.</span><span style=3D"color:black"><o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Can someone explain?</spa=
n><span style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">-Dave</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><span style=
=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:black">From:</span></b><span sty=
le=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot=
;;color:black"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto:sfc-bou=
nces@ietf.org</a>]
<b>On Behalf Of </b>Jim Guichard (jguichar)<br>
<b>Sent:</b> Wednesday, April 27, 2016 10:18 AM<br>
<b>To:</b> Martin Stiemerling; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org=
</a><br>
<b>Subject:</b> Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt</spa=
n><span style=3D"color:black"><o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:black">&nbsp;<o:p></o:p></span>=
</p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Hi Martin &amp; WG:</span><=
span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">A few comments that I would=
 like to see addressed in the document before it can move forward to the ne=
xt step.</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l7 level1 lfo1">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 2.2 SFC Control Plane Bootstrapping.</span><o:p></o:p>=
</li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">This section is too wishy w=
ashy. It makes the statement &#8220;this document assumes the SFC control p=
lane is provided with a set of information that is
<u>required</u> for proper SFC operation&#8221; but then goes on to list bu=
llets that are
<u>likely</u>&nbsp;to be provided or <u>may</u>&nbsp;be provided. It does n=
ot actually provide any information on what
<u>is required for proper SFC operation</u>. In the list of <u>likely</u>&n=
bsp;information there is no indication of whether this information must exi=
st in the network prior to bootstrapping the SFC control plane element; thi=
s is true also for the list of
<u>may</u>&nbsp;information. Surely we should provide guidelines on what <u=
>must</u>&nbsp;be available before the SFC control plane element can actual=
ly function although it is reasonable to assume that it can bootstrap witho=
ut any information (albeit it can&#8217;t actually
 do anything). On this point I would argue that several of the <u>may</u>&n=
bsp;elements are actually required such as SFF, SF, SFC-proxy locators and =
may exist prior to bootstrapping the SFC control plane element, or may be a=
dded later through some control interface.&nbsp;</span><span style=3D"color=
:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Minor point -&gt; typo in b=
ullet point 6 &#8211; SFP proxy should read
<b>SFC</b>&nbsp;proxy</span><span style=3D"color:black"><o:p></o:p></span><=
/p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l10 level1 lfo2">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 2.3 Coherent Setup of an SFC-enabled Domain</span><o:p=
></o:p></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">What does the sentence &#82=
20;various transport encapsulation schemes and/or variations of SFC header =
implementations may be supported&#8221; actually mean ? Are we referring
 to the fact that the SFC header may carry type-1 or type-2 metadata or som=
ething else ? Note that there is only
<b>one </b>SFC header implementation based on the WG charter so if we are r=
eferring to different SFC formats (meaning metadata) then please make this =
clear in the text, and if not, please remove this sentence.&nbsp;</span><sp=
an style=3D"color:black"><o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l4 level1 lfo3">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 3.1 Reference Architecture</span><o:p></o:p></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Second bullet point &#8220;=
mapping between service function chains and SFPs&#8221; - this is a general=
 comment for the entire document but applies here also. There is no
 mention of mapping SFPs -&gt; RSPs &#8211; in fact RSP is mentioned only o=
nce in the entire document. The architecture is explicit in that the SFP wh=
en rendered into the network is an RSP and therefore the SFC control plane =
element needs to have information on currently
 deployed RSPs.</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Additionally there is no in=
terface specified for communication between the SFC Control Plane Element a=
nd SF management systems. This is an important aspect as
 many SF&#8217;s may require that SFC information be communicated to their =
management systems that will be responsible for communicating directly with=
 their respective SF&#8217;s.&nbsp;</span><span style=3D"color:black"><o:p>=
</o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l2 level1 lfo4">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 3.1.1. C1: Interface between SFC Control Plane &amp; S=
FC Classifier</span><o:p></o:p></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">The sentence &#8220;The con=
trol plane may instruct the classifier about the initial values of the Serv=
ice Index (SI)&#8221; should be changed to say
<b>MUST</b>&nbsp;as otherwise if a classifier chooses whatever value it wan=
ts then that may not align with what is programmed into the SFFs by the SFC=
 Control Plane element.</span><span style=3D"font-size:10.5pt;font-family:&=
quot;Courier New&quot;;color:black;background:#FFFDF5">&nbsp;</span><span s=
tyle=3D"color:black"><o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l1 level1 lfo5">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 4.10.4. Encoding the Exact SFF/SF Sequence in Data Pac=
kets</span><o:p></o:p></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">This section does not actua=
lly provide any meaning or indication of relationship with the SFC Control =
Plane element. Furthermore, &nbsp;there has been no WG consensus
 to carry source routes within the SFC encapsulation. Therefore this entire=
 section should be removed from the document.</span><span style=3D"color:bl=
ack"><o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l0 level1 lfo6">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;">Section 4.10.5. Fully Controlled SFF/SF Sequence for a SFP</sp=
an><o:p></o:p></li></ul>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Figure 2 lists 3 different =
SFP-id&#8217;s whereas the text mentions only SFP-id #1. Is this simply a t=
ypo or are you trying to convey something else ?</span><span style=3D"color=
:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Further you state that &#82=
20;the steering policies to a SFF node for service function chain depends o=
n if the packet comes from previous SFF or comes from a specific
 SF i.e., the SFP Forwarding Table entries have to be ingress port specific=
&#8221; - &nbsp;this is an inaccurate statement as the combination of the S=
FP-id and service-index determines the forwarding behavior (as specified in=
 section 3.3 &amp; section 7 of draft-ietf-sfc-nsh-04).
 &nbsp;This sentence should be removed from the text.</span><span style=3D"=
color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Jim</span><span style=3D"co=
lor:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">On 4/27/16, 12:29 AM, &quot=
;sfc on behalf of Martin Stiemerling&quot; &lt;<a href=3D"mailto:sfc-bounce=
s@ietf.org">sfc-bounces@ietf.org</a> on behalf of
<a href=3D"mailto:mls.ietf@gmail.com">mls.ietf@gmail.com</a>&gt; wrote:</sp=
an><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<blockquote style=3D"border:none;border-left:solid #B5C4DF 4.5pt;padding:0i=
n 0in 0in 4.0pt;margin-left:3.75pt;margin-top:5.0pt;margin-right:0in;margin=
-bottom:5.0pt" id=3D"MAC_OUTLOOK_ATTRIBUTION_BLOCKQUOTE">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Dear all,</span><span style=
=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">This is the start of the Wo=
rking Group Last Call (WGLC) for</span><span style=3D"color:black"><o:p></o=
:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">draft-ietf-sfc-control-plan=
e-04.txt</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">The WGLC lasts for 2 weeks =
and will end May 11th at 10 pm PDT.</span><span style=3D"color:black"><o:p>=
</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Please send your comments a=
nd reviews to the
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> list.</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">Regards,</span><span style=
=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;&nbsp; Martin (SFC co=
-chair)</span><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">___________________________=
____________________</span><span style=3D"color:black"><o:p></o:p></span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">sfc mailing list</span><spa=
n style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><a href=3D"mailto:sfc@ietf.=
org">sfc@ietf.org</a></span><span style=3D"color:black"><o:p></o:p></span><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black"><a href=3D"https://www.ietf=
.org/mailman/listinfo/sfc">https://www.ietf.org/mailman/listinfo/sfc</a></s=
pan><span style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span><span style=3D=
"color:black"><o:p></o:p></span></p>
</div>
</blockquote>
</div>
</div>
</div>
</body>
</html>

--_000_0F8583BBE82FA449A8B78417CC07559A09569109SJCEML701CHMchi_--


From nobody Thu Apr 28 23:05:57 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C7F612B05A for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 23:05:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.914
X-Spam-Level: 
X-Spam-Status: No, score=-2.914 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TUPm38a-g6vm for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 23:05:52 -0700 (PDT)
Received: from relais-inet.orange.com (relais-nor36.orange.com [80.12.70.36]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8AEB812B008 for <sfc@ietf.org>; Thu, 28 Apr 2016 23:05:52 -0700 (PDT)
Received: from opfednr00.francetelecom.fr (unknown [xx.xx.xx.64]) by opfednr20.francetelecom.fr (ESMTP service) with ESMTP id DEBC840D02; Fri, 29 Apr 2016 08:05:50 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.75]) by opfednr00.francetelecom.fr (ESMTP service) with ESMTP id B30D21A005D; Fri, 29 Apr 2016 08:05:50 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILMA4.corporate.adroot.infra.ftgroup ([fe80::65de:2f08:41e6:ebbe%19]) with mapi id 14.03.0279.002; Fri, 29 Apr 2016 08:05:50 +0200
From: <mohamed.boucadair@orange.com>
To: Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: draft-ietf-sfc-control-plane -- C2 interface
Thread-Index: AdGhdzeqsff0+F4JRSWm8k5GYfJj0QAYB0bQ
Date: Fri, 29 Apr 2016 06:05:49 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D61B4F@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <E8355113905631478EFF04F5AA706E9830F44097@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F44097@wtl-exchp-2.sandvine.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.5]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B933008D61B4FOPEXCLILMA3corp_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/PImz-gFEzb_XGjDVCQAv4Y1PzmU>
Subject: Re: [sfc] draft-ietf-sfc-control-plane -- C2 interface
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Apr 2016 06:05:55 -0000

--_000_787AE7BB302AE849A7480A190F8B933008D61B4FOPEXCLILMA3corp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Dave,

Please see inline.

Cheers,
Med

De : Dave Dolson [mailto:ddolson@sandvine.com]
Envoy=E9 : jeudi 28 avril 2016 19:56
=C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org
Objet : draft-ietf-sfc-control-plane -- C2 interface

In section 3.3.2, https://tools.ietf.org/html/draft-ietf-sfc-control-plane-=
04#section-3.3.2
the section is: C2: Interface between SFC Control Plane & SFF

- There is no mention of being able to instruct the SFF to load-balance an =
SFP across multiple (functionally equivalent) SFs
This is the service-function-group-name concept in OpenDaylight and in draf=
t-penno-sfc-yang-14, as I understand it.
Identifying members of a group and identifying a group as a next-hop would =
be in the scope of the C2 interface, correct?

[Med] This is in scope of C2, that is responsible for populating the SFC Fo=
rwarding Policy Table. The current text cites examples of additional to be =
used for lookup purposes (excerpt from Section 1.2):


      Additional information such as a flow identifier, Service Index

      (SI), and/or other characteristics (e.g., the 5-tuple transport

      coordinates of the original packet) may be used for lookup

      purposes.  The set of information to use for lookup purposes may

      be instructed by the control plane.

Load balancing is discussed in "Additional Considerations" section. Indeed,=
 Section 4.10.1 includes the following:

   SF/SFP Load-balancing:   re-construct SFPs to distribute the workload
      among various SF instances.  Particularly, load distribution
      policies can be taken into account by the Control Element to re-
      compute an SFP or be provisioned as attributes to SFPs that will
      be installed using the control interfaces.

I suggest to make this change:

OLD:

   SF/SFP Load-balancing:   re-construct SFPs to distribute the workload

      among various SF instances.  Particularly, load distribution

      policies can be taken into account by the Control Element to re-

      compute an SFP or be provisioned as attributes to SFPs that will

      be installed using the control interfaces.

NEW:

   SF/SFP Load-balancing:   re-construct SFPs to distribute the workload

      among various SF instances.  Particularly, load distribution

      policies can be taken into account by the Control Element to re-

      compute an SFP or be provisioned as attributes to SFPs that will

      be installed using the control interfaces (C2 interface, typically).

Please let me know if further changes are required.

- Regarding chain (path?) termination, there should be some mention of how =
to forward packets per path after the NSH header is removed.
For example, it may be that different paths terminate at different physical=
 interfaces or at different routing tables.
This isn't always relevant, but I would expect it to be in the scope of C2,=
 no?
E.g., for IP encapsulation,  "if SPI=3D101 and SI=3D251 then terminate to r=
outing table T1"
Or, e.g., for Ethernet encapsulation "if SPI=3D200 and SI=3D252 then termin=
ate to Ethernet interface eth1"

[Med] What about making this change?
OLD:

   An SFF can be instructed to strip the SFC information for the chains

   it terminates.

NEW:

   An SFF can be instructed to strip the SFC information for the chains

   it terminates. Forwarding policies for handling packets bound to

   chains that are terminated by an SFF may be communicated via this interf=
ace.



That text may be completed with the following sentence to further highlight=
 that these forwarding instructions are not mandatory:



   By default, an SFF relies on legacy processing for forwarding these pack=
ets.



David Dolson
Senior Software Architect, Sandvine Inc.


--_000_787AE7BB302AE849A7480A190F8B933008D61B4FOPEXCLILMA3corp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:"Courier New";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Hi Dave,
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Please see inline.<o:p></o:p></=
span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Dave=
 Dolson [mailto:ddolson@sandvine.com]
<br>
<b>Envoy=E9&nbsp;:</b> jeudi 28 avril 2016 19:56<br>
<b>=C0&nbsp;:</b> BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org<br>
<b>Objet&nbsp;:</b> draft-ietf-sfc-control-plane -- C2 interface<o:p></o:p>=
</span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">In section 3.3.2, <a href=3D"ht=
tps://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#section-3.3.2">
https://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#section-3.3.2</=
a><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">the section is: C2: Interface b=
etween SFC Control Plane &amp; SFF<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- There is no mention of being =
able to instruct the SFF to load-balance an SFP across multiple (functional=
ly equivalent) SFs<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">This is the service-function-gr=
oup-name concept in OpenDaylight and in draft-penno-sfc-yang-14, as I under=
stand it.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Identifying members of a group =
and identifying a group as a next-hop would be in the scope of the C2 inter=
face, correct?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] This is in scope of C2, t=
hat is responsible for populating the SFC Forwarding Policy Table. The curr=
ent text cites examples of additional to be used
 for lookup purposes (excerpt from Section 1.2): <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Additional informa=
tion such as a flow identifier, Service Index<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (SI), and/or other=
 characteristics (e.g., the 5-tuple transport<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; coordinates of the=
 original packet) may be used for lookup<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;purposes.&nbsp; Th=
e set of information to use for lookup purposes may<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be instructed by t=
he control plane.<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Load balancing is discussed in =
&#8220;Additional Considerations&#8221; section. Indeed, Section 4.10.1 inc=
ludes the following:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp; SF/SFP Load-balancing:&nbsp;&n=
bsp; re-construct SFPs to distribute the workload<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; among variou=
s SF instances.&nbsp; Particularly, load distribution<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; policies can=
 be taken into account by the Control Element to re-<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; compute an S=
FP or
<b><u>be provisioned as attributes to SFPs that will<o:p></o:p></u></b></sp=
an></p>
<p class=3D"MsoNormal"><b><u><span lang=3D"EN-US" style=3D"font-size:10.0pt=
;font-family:&quot;Courier New&quot;">&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;be ins=
talled using the control interfaces</span></u></b><span lang=3D"EN-US" styl=
e=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">.<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">I suggest to make this change:
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">OLD:<o:p></o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; SF/SFP Load-balancing:&nbsp;&nbsp; r=
e-construct SFPs to distribute the workload<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; among various SF i=
nstances.&nbsp; Particularly, load distribution<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; policies can be ta=
ken into account by the Control Element to re-<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; compute an SFP or =
be provisioned as attributes to SFPs that will<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be installed using=
 the control interfaces.<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; SF/SFP Load-balancing:&nbsp;&nbsp; r=
e-construct SFPs to distribute the workload<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; among various SF i=
nstances.&nbsp; Particularly, load distribution<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; policies can be ta=
ken into account by the Control Element to re-<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; compute an SFP or =
be provisioned as attributes to SFPs that will<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be installed using=
 the control interfaces (C2 interface, typically).<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Please let me know if further c=
hanges are required.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- Regarding chain (path?) termi=
nation, there should be some mention of how to forward packets per path aft=
er the NSH header is removed.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">For example, it may be that dif=
ferent paths terminate at different physical interfaces or at different rou=
ting tables.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">This isn&#8217;t always relevan=
t, but I would expect it to be in the scope of C2, no?<o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span lang=3D"EN-US">E.g., for IP encapsulation, &nb=
sp;&#8220;if SPI=3D101 and SI=3D251 then terminate to routing table T1&#822=
1;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Or, e.g., for Ethernet encapsul=
ation &#8220;if SPI=3D200 and SI=3D252 then terminate to Ethernet interface=
 eth1&#8221;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:black"><o:p>&nbs=
p;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] What about making this ch=
ange?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">OLD:<o:p></o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; An SFF can be instructed to strip th=
e SFC information for the chains<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; it terminates.<o:p></o:p></span></pr=
e>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; An SFF can be instructed to strip th=
e SFC information for the chains<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; it terminates. Forwarding policies f=
or handling packets bound to <o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;chains that are terminated by a=
n SFF may be communicated via this interface.<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></pre>
<pre><span lang=3D"EN-US">That text may be completed with the following sen=
tence to further highlight that these forwarding instructions are not manda=
tory:<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; By default, an SFF relies on legacy =
processing for forwarding these packets.<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;<o:p></o:p></span>=
</pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:black"><o:p>&nbs=
p;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">David Dolson<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Senior Software Architect, Sand=
vine Inc.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
</div>
</body>
</html>

--_000_787AE7BB302AE849A7480A190F8B933008D61B4FOPEXCLILMA3corp_--


From nobody Thu Apr 28 23:51:13 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 92DD012D535 for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 23:51:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.618
X-Spam-Level: 
X-Spam-Status: No, score=-2.618 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oGQUH-IEjav7 for <sfc@ietfa.amsl.com>; Thu, 28 Apr 2016 23:51:08 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 26F8412D4FF for <sfc@ietf.org>; Thu, 28 Apr 2016 23:51:08 -0700 (PDT)
Received: from omfedm06.si.francetelecom.fr (unknown [xx.xx.xx.2]) by omfedm12.si.francetelecom.fr (ESMTP service) with ESMTP id 69F8818CB0A; Fri, 29 Apr 2016 08:51:06 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.18]) by omfedm06.si.francetelecom.fr (ESMTP service) with ESMTP id 46A6927C064; Fri, 29 Apr 2016 08:51:06 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM34.corporate.adroot.infra.ftgroup ([fe80::cba:56d0:a732:ef5a%19]) with mapi id 14.03.0279.002; Fri, 29 Apr 2016 08:51:06 +0200
From: <mohamed.boucadair@orange.com>
To: Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: draft-ietf-sfc-control-plane -- C3 interface
Thread-Index: AdGhd20GlIfr42rfQei+e06aOHat/gAZcYog
Date: Fri, 29 Apr 2016 06:51:04 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D61B8B@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <E8355113905631478EFF04F5AA706E9830F440D9@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F440D9@wtl-exchp-2.sandvine.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.5]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B933008D61B8BOPEXCLILMA3corp_"
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.29.61516
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/XrTgGEuLuuqYbnodfjDGDwFlXCg>
Subject: Re: [sfc] draft-ietf-sfc-control-plane -- C3 interface
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Apr 2016 06:51:11 -0000

--_000_787AE7BB302AE849A7480A190F8B933008D61B8BOPEXCLILMA3corp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Re-,

Please see inline.

Cheers,
Med

De : Dave Dolson [mailto:ddolson@sandvine.com]
Envoy=E9 : jeudi 28 avril 2016 19:57
=C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org
Objet : draft-ietf-sfc-control-plane -- C3 interface

Regarding https://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#secti=
on-3.3.3
C3: Interface between SFC Control Plane & SFC-aware SFs

Shouldn't information about bidirectional paths be in scope for C3 ?

[Med] Yes. This is actually covered in https://tools.ietf.org/html/draft-ie=
tf-sfc-control-plane-04#section-4.2. The current wording does not recommend=
 how this bidir will be ensured because this is likely to be SF-specific an=
d deployment-specific.

E.g., as in section 5.1 of https://www.ietf.org/archive/id/draft-penno-sfc-=
packet-02.txt
Maybe add this paragraph:
"This interface informs the SFC-aware SF about the method for handling bidi=
rectional paths,
either by conveying the algorithmic method to use, or by providing forward/=
reverse path
mapping."

[Med] I'm hesitating to add text about the "algorithmic method" as I don't =
have a document to cite. Note that some stateful SFs (e.g., NAT) will natur=
ally add a reverse mapping to handle incoming packets without requiring inp=
uts from the CP. What do you mean by "providing forward/reverse path mappin=
g"? Is it SF-specific mapping?

What about adding this NEW text at the end of Section 4.2?

NEW:
   Typically, C2 interface is used to ensure that the same SF instance
   is involved in both directions of a flow (including, to ensure full
   chain symmetry).


The alternative, in my opinion, is to standardize on an algorithmic method =
for computing bidirectional paths.


I'm uneasy about C3 carrying information specific to applications, such as
    "a threat-detecting  SF can periodically send the threat characteristic=
s via this
      interface, such as high probability of threat with packet of a
      given size."
This seems like it should be out of scope of C3. Instead I think there woul=
d be an application on top of the controller.

[Med] The text you quoted is an example to illustrate how a feedback loop m=
ay be useful to adjust SFPs. I do see value in having such information avai=
lable to the chaining decision engine. Obviously, this text does not exclud=
e that this information can be acquired by another dedicated application on=
 top of a control element.

Thoughts?


In this paragraph, does "context information" mean metadata? If so, can tha=
t be made clear that the SFC is being asked to add metadata to the packet?
   This interface is also used to instruct an SFC-aware SF about any
   context information it needs to supply in the context of a given SFC.

[Med] FWIW, context information is mentioned in the WG charter "communicate=
s context information between nodes that implement". What about this change=
 to avoid confusion:

OLD:
   This interface is also used to instruct an SFC-aware SF about any
   context information it needs to supply in the context of a given SFC.

NEW:
   This interface is also used to instruct an SFC-aware SF about any
   context information (a.k.a., metadata) it needs to supply
   for a given SFC.


Regarding this paragraph, I think it would be cleaner if this behavior actu=
ally requires the C2 interface into the SF.

[Med] I do think the current wording is correct. Having an SFF co-located w=
ith a set of SFs is deployment-specific according to the SFC architecture R=
FC.

(Because although the statement is that the SF doesn't have an SFF in the n=
ode, it actually does have the SFF behavior. So call it what it is, an SFF.=
)
  Multiple SFs may be located within the same physical node, and no SFF
   is enabled in that same node, means to unambiguously forward the
   traffic to the appropriate SF must be supported.  Concretely, each SF
   must have a unique locator for unambiguous forwarding.


David Dolson
Senior Software Architect, Sandvine Inc.


--_000_787AE7BB302AE849A7480A190F8B933008D61B8BOPEXCLILMA3corp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:"Courier New";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Re-,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Please see inline.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Dave=
 Dolson [mailto:ddolson@sandvine.com]
<br>
<b>Envoy=E9&nbsp;:</b> jeudi 28 avril 2016 19:57<br>
<b>=C0&nbsp;:</b> BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org<br>
<b>Objet&nbsp;:</b> draft-ietf-sfc-control-plane -- C3 interface<o:p></o:p>=
</span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Regarding <a href=3D"https://to=
ols.ietf.org/html/draft-ietf-sfc-control-plane-04#section-3.3.3">
https://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#section-3.3.3</=
a><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">C3: Interface between SFC Contr=
ol Plane &amp; SFC-aware SFs<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Shouldn&#8217;t information abo=
ut bidirectional paths be in scope for C3 ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] Yes. This is actually cov=
ered in
<a href=3D"https://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#sect=
ion-4.2">
https://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#section-4.2</a>=
. The current wording does not recommend how this bidir will be ensured bec=
ause this is likely to be SF-specific and deployment-specific.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">E.g., as in section 5.1 of <a h=
ref=3D"https://www.ietf.org/archive/id/draft-penno-sfc-packet-02.txt">
https://www.ietf.org/archive/id/draft-penno-sfc-packet-02.txt</a> <o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Maybe add this paragraph:<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&#8220;This interface informs t=
he SFC-aware SF about the method for handling bidirectional paths,<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">either by conveying the algorit=
hmic method to use, or by providing forward/reverse path
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">mapping.&#8221;<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] I&#8217;m hesitating to a=
dd text about the &#8220;algorithmic method&#8221; as I don&#8217;t have a =
document to cite. Note that some stateful SFs (e.g., NAT) will naturally
 add a reverse mapping to handle incoming packets without requiring inputs =
from the CP. What do you mean by &#8220;providing forward/reverse path mapp=
ing&#8221;? Is it SF-specific mapping?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">What about adding this NEW text=
 at the end of Section 4.2?
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp; Typically, C2 inte=
rface is used to ensure that the same SF instance
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp;&nbsp;is involved i=
n both directions of a flow (including, to ensure full
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp;&nbsp;chain symmetr=
y).
<o:p></o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;</span><span lang=3D"EN-US" sty=
le=3D"color:black"><o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The alternative, in my opinion,=
 is to standardize on an algorithmic method for computing bidirectional pat=
hs.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">I&#8217;m uneasy about C3 carry=
ing information specific to applications, such as
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&#8220;=
</span><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Cou=
rier New&quot;">a threat-detecting&nbsp; SF can periodically send the threa=
t characteristics via this<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; interface, s=
uch as high probability of threat with packet of a<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; given size.&=
#8221;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">This seems like it should be ou=
t of scope of C3. Instead I think there would be an application on top of t=
he controller.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] The text you quoted is an=
 example to illustrate how a feedback loop may be useful to adjust SFPs. I =
do see value in having such information available
 to the chaining decision engine. Obviously, this text does not exclude tha=
t this information can be acquired by another dedicated application on top =
of a control element. &nbsp;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Thoughts?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">In this paragraph, does &#8220;=
context information&#8221; mean metadata? If so, can that be made clear tha=
t the SFC is being asked to add metadata to the packet?<o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;Cour=
ier New&quot;">&nbsp;&nbsp; This interface is also used to instruct an SFC-=
aware SF about any<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;Cour=
ier New&quot;">&nbsp;&nbsp; context information it needs to supply in the c=
ontext of a given SFC.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] FWIW, context information=
 is mentioned in the WG charter &#8220;communicates context information bet=
ween nodes that implement&#8221;. What about this change to
 avoid confusion:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">OLD:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;Cour=
ier New&quot;">&nbsp;&nbsp; This interface is also used to instruct an SFC-=
aware SF about any<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;Cour=
ier New&quot;">&nbsp;&nbsp; context information it needs to supply in the c=
ontext of a given SFC.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;Cour=
ier New&quot;">&nbsp;&nbsp; This interface is also used to instruct an SFC-=
aware SF about any<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;Cour=
ier New&quot;">&nbsp;&nbsp; context information (a.k.a., metadata) it needs=
 to supply
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;Cour=
ier New&quot;">&nbsp;&nbsp;&nbsp;for a given SFC.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Regarding this paragraph, I thi=
nk it would be cleaner if this behavior actually requires the C2 interface =
into the SF.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] I do think the current wo=
rding is correct. Having an SFF co-located with a set of SFs is deployment-=
specific according to the SFC architecture RFC.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">(Because although the statement=
 is that the SF doesn&#8217;t have an SFF in the node, it actually does hav=
e the SFF behavior. So call it what it is, an SFF.)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp;Multiple SFs may be located wit=
hin the same physical node, and no SFF<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp; is enabled in that same node, =
means to unambiguously forward the<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp; traffic to the appropriate SF =
must be supported.&nbsp; Concretely, each SF<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp; must have a unique locator for=
 unambiguous forwarding.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:black"><o:p>&nbs=
p;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">David Dolson<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Senior Software Architect, Sand=
vine Inc.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
</div>
</body>
</html>

--_000_787AE7BB302AE849A7480A190F8B933008D61B8BOPEXCLILMA3corp_--


From nobody Fri Apr 29 00:53:18 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B5AA12D557 for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 00:53:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.618
X-Spam-Level: 
X-Spam-Status: No, score=-2.618 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jWNzeU50-Mp4 for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 00:53:10 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 157BC12D565 for <sfc@ietf.org>; Fri, 29 Apr 2016 00:47:02 -0700 (PDT)
Received: from omfedm05.si.francetelecom.fr (unknown [xx.xx.xx.1]) by omfedm11.si.francetelecom.fr (ESMTP service) with ESMTP id 50A2A3B4D9A; Fri, 29 Apr 2016 09:47:00 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.24]) by omfedm05.si.francetelecom.fr (ESMTP service) with ESMTP id B628F35C060; Fri, 29 Apr 2016 09:46:42 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7D.corporate.adroot.infra.ftgroup ([fe80::9044:c5ee:4dd2:4f16%19]) with mapi id 14.03.0279.002; Fri, 29 Apr 2016 09:46:42 +0200
From: <mohamed.boucadair@orange.com>
To: Henry Fourie <louis.fourie@huawei.com>, Sumandra Majee <S.Majee@F5.com>, Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
Thread-Index: AQHRoD1fSI1yPp+UQ0KhY1xrwASm1p+eIaqAgAGXhUD//+XaAIAAKLKAgAC/UcA=
Date: Fri, 29 Apr 2016 07:46:42 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D61BF4@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com> <D3462926.4C3CA%jguichar@cisco.com> <E8355113905631478EFF04F5AA706E9830F44359@wtl-exchp-2.sandvine.com> <D347AB3A.50CC9%s.majee@f5.com> <0F8583BBE82FA449A8B78417CC07559A09569109@SJCEML701-CHM.china.huawei.com>
In-Reply-To: <0F8583BBE82FA449A8B78417CC07559A09569109@SJCEML701-CHM.china.huawei.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.5]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B933008D61BF4OPEXCLILMA3corp_"
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.25.91516
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/c6pvDJ3tXzPKqp1StiHLgPN9Jzs>
Cc: "Jim Guichard \(jguichar\)" <jguichar@cisco.com>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Apr 2016 07:53:13 -0000

--_000_787AE7BB302AE849A7480A190F8B933008D61BF4OPEXCLILMA3corp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Dear Louis,

Thank you for the review.

Please see inline.

Cheers,
Med

De : sfc [mailto:sfc-bounces@ietf.org] De la part de Henry Fourie
Envoy=E9 : jeudi 28 avril 2016 23:28
=C0 : Sumandra Majee; Dave Dolson; sfc@ietf.org
Cc : Jim Guichard (jguichar)
Objet : Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt

All,
    Comments:


1.       There is one sentence on OAM in 3.1. This probably deserves a sub-=
section in section 4 that covers fault management, alarms, error reporting,=
 switchovers...



Note, the SFC control plane must be able to invoke SFC OAM mechanisms, and =
to determine the results of OAM operations.



[Med] We used to have a dedicated OAM section but the WG decided to move th=
at text from the draft (see https://trac.tools.ietf.org/wg/sfc/trac/ticket/=
12). The points you mentioned are good ones but they should be handled in t=
he OAM

document.



2.       There is no mention of metadata in the document. Use of the term '=
metadata' may make some text clearer.
For example, there should be a sentence in the 3.3.x sections for SFC contr=
oller to request a particular component to insert/remove/report packet meta=
data.

[Med] The document uses "context information" (that is called out in https:=
//datatracker.ietf.org/wg/sfc/charter/). I made a change to indicate that "=
context information" is also known as "metadata".


3.       Last para of 3.3.2: change 'An SFF can be instructed...' to 'An SF=
F must be instructed...'
[Med] Looks reasonable to me.


4.       3.3.3: This paragraph does not read well:

This interface is also used to instruct an SFC-aware SF about any
context information it needs to supply in the context of a given SFC.
Suggest:
This interface may also be used to instruct an SFC-aware SF to insert, remo=
ve or
report metadata information for a given SFC.

[Med] The modification mixes several aspects that are covered in other part=
s of this section. I made this change:

   This interface is also used to instruct an SFC-aware SF about any
   context information (a.k.a., metadata) it needs to supply for a given SF=
C.


5.       3.3.3: In several paragraphs the term 'contexts' is used. It may b=
e clearer if 'metadata' is used instead.
[Med] See above.


6.       Suggest moving this paragraph from 4.10.5 to 3.4.4 as it relates s=
pecifically to

SFC Proxy functionality. Reworded, this can replace the last sentence in 3.=
3.4:

The C4 interface may also include information to map the SFP
Identifier carried in the packet header to a locally significant link
identifier, e.g., VLAN-ID, and a method to construct and encapsulate
the SFC header back to the packets when they come back from the attached SF=
s.

[Med] There is already this text in Section 3.4.4:


   This interface may also be used to instruct the SFC proxy about the

   state and information to maintain for proper handling of packets

   received back from an SFC-unaware SF.


7.       Last para of 4.10.5 typo: classier -> classifier
[Med] Thank you for catching this. Fixed.



8.       Last para of 4.10.5: This could be clearer on what the problem is.

[Med] The problem is detailed in the example: "For example, if the SFF "A" =
and SFF "C" get flow

   steering policies at slightly different times, some packets might not

   be directed to some service functions on a chain."

Can you please indicate what is not clear in that text? Thank you.

Not sure what SFF A and SFF B are?
[Med] These are SFF examples to illustrate the problem.

Would it not be better to recommend a procedure in which the SFC Controller=
 updates downstream SFFs before upstream SFFs when constructing a new SFP. =
Insertion of a SF into a SFP should have only local impact on the SFF it is=
 connected to.
[Med] The notion of upstream and downstream SFF depends the chain under con=
sideration. So following the recommendation you propose may not be possible=
 if SFF provisioning/control is achieved for all chains at once, not per ea=
ch chain. This decision is deployment-specific.


-          Louis


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Sumandra Majee
Sent: Thursday, April 28, 2016 12:03 PM
To: Dave Dolson; sfc@ietf.org<mailto:sfc@ietf.org>
Cc: Jim Guichard (jguichar)
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt

Dave,
I would also concur that SFF is a forwarding entity that uses pathID/SI to =
find the next-hop/next-sf/next-sff. This is how our SFF works.

It is absolutely possible that co resident classifier to further classify b=
ased on  l3/l4/l7/python_code and change the path. But logically that is an=
other classification and list below is certainly not exhaustive.

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
Dave Dolson <ddolson@sandvine.com<mailto:ddolson@sandvine.com>>
Date: Thursday, April 28, 2016 at 11:43 AM
To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Cc: "Jim Guichard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com=
>>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt

Further to Jim's points about section 4.10.5, do I read it correctly that t=
he SFF can be configured to steer traffic on the basis of these?
   o  Destination MAC address
   o  Source MAC address
   o  VLAN-ID,
   o  Destination IP address
   o  Source IP address
   o  Source port number
   o  Destination port number
   o  DSCP
   o  Packet size, etc., or any combination thereof.

This comes totally unexpected to me, thinking that the SFF steers traffic b=
ased exclusively on Service Path Identifier and Service Index (SPI/SI), whi=
ch oddly aren't in the above list.

I can guess that maybe this is about reclassification, but "classification"=
 isn't mentioned in 4.10.5.
Can someone explain?

-Dave



From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Jim Guichard (jguichar=
)
Sent: Wednesday, April 27, 2016 10:18 AM
To: Martin Stiemerling; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt

Hi Martin & WG:

A few comments that I would like to see addressed in the document before it=
 can move forward to the next step.

  *   Section 2.2 SFC Control Plane Bootstrapping.
This section is too wishy washy. It makes the statement "this document assu=
mes the SFC control plane is provided with a set of information that is req=
uired for proper SFC operation" but then goes on to list bullets that are l=
ikely to be provided or may be provided. It does not actually provide any i=
nformation on what is required for proper SFC operation. In the list of lik=
ely information there is no indication of whether this information must exi=
st in the network prior to bootstrapping the SFC control plane element; thi=
s is true also for the list of may information. Surely we should provide gu=
idelines on what must be available before the SFC control plane element can=
 actually function although it is reasonable to assume that it can bootstra=
p without any information (albeit it can't actually do anything). On this p=
oint I would argue that several of the may elements are actually required s=
uch as SFF, SF, SFC-proxy locators and may exist prior to bootstrapping the=
 SFC control plane element, or may be added later through some control inte=
rface.

Minor point -> typo in bullet point 6 - SFP proxy should read SFC proxy

  *   Section 2.3 Coherent Setup of an SFC-enabled Domain
What does the sentence "various transport encapsulation schemes and/or vari=
ations of SFC header implementations may be supported" actually mean ? Are =
we referring to the fact that the SFC header may carry type-1 or type-2 met=
adata or something else ? Note that there is only one SFC header implementa=
tion based on the WG charter so if we are referring to different SFC format=
s (meaning metadata) then please make this clear in the text, and if not, p=
lease remove this sentence.

  *   Section 3.1 Reference Architecture
Second bullet point "mapping between service function chains and SFPs" - th=
is is a general comment for the entire document but applies here also. Ther=
e is no mention of mapping SFPs -> RSPs - in fact RSP is mentioned only onc=
e in the entire document. The architecture is explicit in that the SFP when=
 rendered into the network is an RSP and therefore the SFC control plane el=
ement needs to have information on currently deployed RSPs.

Additionally there is no interface specified for communication between the =
SFC Control Plane Element and SF management systems. This is an important a=
spect as many SF's may require that SFC information be communicated to thei=
r management systems that will be responsible for communicating directly wi=
th their respective SF's.

  *   Section 3.1.1. C1: Interface between SFC Control Plane & SFC Classifi=
er
The sentence "The control plane may instruct the classifier about the initi=
al values of the Service Index (SI)" should be changed to say MUST as other=
wise if a classifier chooses whatever value it wants then that may not alig=
n with what is programmed into the SFFs by the SFC Control Plane element.

  *   Section 4.10.4. Encoding the Exact SFF/SF Sequence in Data Packets
This section does not actually provide any meaning or indication of relatio=
nship with the SFC Control Plane element. Furthermore,  there has been no W=
G consensus to carry source routes within the SFC encapsulation. Therefore =
this entire section should be removed from the document.

  *   Section 4.10.5. Fully Controlled SFF/SF Sequence for a SFP
Figure 2 lists 3 different SFP-id's whereas the text mentions only SFP-id #=
1. Is this simply a typo or are you trying to convey something else ?

Further you state that "the steering policies to a SFF node for service fun=
ction chain depends on if the packet comes from previous SFF or comes from =
a specific SF i.e., the SFP Forwarding Table entries have to be ingress por=
t specific" -  this is an inaccurate statement as the combination of the SF=
P-id and service-index determines the forwarding behavior (as specified in =
section 3.3 & section 7 of draft-ietf-sfc-nsh-04).  This sentence should be=
 removed from the text.

Jim



On 4/27/16, 12:29 AM, "sfc on behalf of Martin Stiemerling" <sfc-bounces@ie=
tf.org<mailto:sfc-bounces@ietf.org> on behalf of mls.ietf@gmail.com<mailto:=
mls.ietf@gmail.com>> wrote:

Dear all,

This is the start of the Working Group Last Call (WGLC) for

draft-ietf-sfc-control-plane-04.txt

The WGLC lasts for 2 weeks and will end May 11th at 10 pm PDT.

Please send your comments and reviews to the sfc@ietf.org<mailto:sfc@ietf.o=
rg> list.

Regards,

   Martin (SFC co-chair)

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc


--_000_787AE7BB302AE849A7480A190F8B933008D61BF4OPEXCLILMA3corp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Courier;
	panose-1:2 7 4 9 2 2 5 2 4 4;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Texte de bulles Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.TextedebullesCar
	{mso-style-name:"Texte de bulles Car";
	mso-style-priority:99;
	mso-style-link:"Texte de bulles";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
p.BalloonText, li.BalloonText, div.BalloonText
	{mso-style-name:"Balloon Text";
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle24
	{mso-style-type:personal-reply;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:"Courier New";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:230770460;
	mso-list-template-ids:-1941270348;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level2
	{mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level3
	{mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level4
	{mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level5
	{mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level6
	{mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level7
	{mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level8
	{mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level9
	{mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l1
	{mso-list-id:690574246;
	mso-list-template-ids:-1856087508;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1:level2
	{mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l1:level3
	{mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l1:level4
	{mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l1:level5
	{mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l1:level6
	{mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l1:level7
	{mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l1:level8
	{mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l1:level9
	{mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l2
	{mso-list-id:783843236;
	mso-list-type:hybrid;
	mso-list-template-ids:47196270 -481144796 67895299 67895301 67895297 67895=
299 67895301 67895297 67895299 67895301;}
@list l2:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l2:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l2:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l2:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l2:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l2:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l2:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l2:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l2:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l3
	{mso-list-id:987511089;
	mso-list-template-ids:-1442053110;}
@list l3:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l3:level2
	{mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l3:level3
	{mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l3:level4
	{mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l3:level5
	{mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l3:level6
	{mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l3:level7
	{mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l3:level8
	{mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l3:level9
	{mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l4
	{mso-list-id:1096512944;
	mso-list-template-ids:1086358294;}
@list l4:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l4:level2
	{mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l4:level3
	{mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l4:level4
	{mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l4:level5
	{mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l4:level6
	{mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l4:level7
	{mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l4:level8
	{mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l4:level9
	{mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l5
	{mso-list-id:1582061230;
	mso-list-type:hybrid;
	mso-list-template-ids:-1619751182 1754400636 67698691 67698693 67698689 67=
698691 67698693 67698689 67698691 67698693;}
@list l5:level1
	{mso-level-start-at:4;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:20.4pt;
	text-indent:-18.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l5:level2
	{mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l5:level3
	{mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l5:level4
	{mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l5:level5
	{mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l5:level6
	{mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l5:level7
	{mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l5:level8
	{mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l5:level9
	{mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l6
	{mso-list-id:1606425333;
	mso-list-template-ids:-1146958400;}
@list l6:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l6:level2
	{mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l6:level3
	{mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l6:level4
	{mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l6:level5
	{mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l6:level6
	{mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l6:level7
	{mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l6:level8
	{mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l6:level9
	{mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l7
	{mso-list-id:1981692403;
	mso-list-type:hybrid;
	mso-list-template-ids:-2035786482 921468344 67698713 67698715 67698703 676=
98713 67698715 67698703 67698713 67698715;}
@list l7:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";
	color:#1F497D;}
@list l7:level2
	{mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l7:level3
	{mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l7:level4
	{mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l7:level5
	{mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l7:level6
	{mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l7:level7
	{mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l7:level8
	{mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l7:level9
	{mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l8
	{mso-list-id:2131781065;
	mso-list-template-ids:362426664;}
@list l8:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l8:level2
	{mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l8:level3
	{mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l8:level4
	{mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l8:level5
	{mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l8:level6
	{mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l8:level7
	{mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l8:level8
	{mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l8:level9
	{mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Dear Louis,
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Thank you for the review.<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Please see inline.<o:p></o:p></=
span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> sfc =
[mailto:sfc-bounces@ietf.org]
<b>De la part de</b> Henry Fourie<br>
<b>Envoy=E9&nbsp;:</b> jeudi 28 avril 2016 23:28<br>
<b>=C0&nbsp;:</b> Sumandra Majee; Dave Dolson; sfc@ietf.org<br>
<b>Cc&nbsp;:</b> Jim Guichard (jguichar)<br>
<b>Objet&nbsp;:</b> Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt<=
o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">All,<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbs=
p;&nbsp; Comments:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l7 leve=
l1 lfo1;text-autospace:none">
<![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-fa=
mily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=
=3D"mso-list:Ignore">1.<span style=3D"font:7.0pt &quot;Times New Roman&quot=
;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:11.0=
pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#215868">Th=
ere is one sentence on OAM in 3.1. This probably deserves a sub-section in =
section 4 that covers fault management, alarms, error reporting,
 switchovers&#8230;<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-autospace:none"><span lang=3D"E=
N-US" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#215868"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-autospace:none"><span lang=3D"E=
N-US" style=3D"font-size:10.0pt;font-family:Courier">Note, the SFC control =
plane must be able to invoke SFC OAM mechanisms, and to determine the resul=
ts of OAM operations.<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:0cm;text-autospace:none"=
><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Courier N=
ew&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:0cm;text-autospace:none"=
><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Courier N=
ew&quot;;color:black">[Med] We used to have a dedicated OAM section but the=
 WG decided to move that text from the draft (see
<a href=3D"https://trac.tools.ietf.org/wg/sfc/trac/ticket/12">https://trac.=
tools.ietf.org/wg/sfc/trac/ticket/12</a>). The points you mentioned are goo=
d ones but they should be handled in the OAM
<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:0cm;text-autospace:none"=
><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Courier N=
ew&quot;;color:black">document.<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-autospace:none"><span lang=3D"E=
N-US" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#215868"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l7 leve=
l1 lfo1;text-autospace:none">
<![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-fa=
mily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=
=3D"mso-list:Ignore">2.<span style=3D"font:7.0pt &quot;Times New Roman&quot=
;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:11.0=
pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#215868">Th=
ere is no mention of metadata in the document. Use of the term &#8216;metad=
ata&#8217; may make some text clearer.<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:18.0pt;text-autospace:none"><sp=
an lang=3D"EN-US" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;=
,&quot;sans-serif&quot;;color:#215868">For example, there should be a sente=
nce in the 3.3.x sections for SFC controller to request a particular
 component to insert/remove/report packet metadata.<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:18.0pt;text-autospace:none"><sp=
an lang=3D"EN-US" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;=
,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black">[=
Med] The document uses &#8220;context information&#8221; (that is called ou=
t in
<a href=3D"https://datatracker.ietf.org/wg/sfc/charter/">https://datatracke=
r.ietf.org/wg/sfc/charter/</a>). I made a change to indicate that &#8220;co=
ntext information&#8221; is also known as &#8220;metadata&#8221;. &nbsp;<o:=
p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black"><=
o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l7 leve=
l1 lfo1;text-autospace:none">
<![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-fa=
mily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=
=3D"mso-list:Ignore">3.<span style=3D"font:7.0pt &quot;Times New Roman&quot=
;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:11.0=
pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#215868">La=
st para of 3.3.2: change &#8216;An SFF can be instructed&#8230;&#8217; to &=
#8216;An SFF must be instructed&#8230;&#8217;<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black">[=
Med] Looks reasonable to me.<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#215868"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l7 leve=
l1 lfo1;text-autospace:none">
<![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-fa=
mily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=
=3D"mso-list:Ignore">4.<span style=3D"font:7.0pt &quot;Times New Roman&quot=
;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:11.0=
pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#215868">3.=
3.3: This paragraph does not read well:<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:18.0pt;text-autospace:none"><sp=
an lang=3D"EN-US" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;=
,&quot;sans-serif&quot;;color:#215868"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.0pt;font-family:Courier">This interface is also used t=
o instruct an SFC-aware SF about any<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.0pt;font-family:Courier">context information it needs =
to supply in the context of a given SFC.<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#215868">Suggest:<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.0pt;font-family:Courier">This interface may also be us=
ed to instruct an SFC-aware SF to insert, remove or<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.0pt;font-family:Courier">report metadata information f=
or a given SFC.<span style=3D"color:#215868"><o:p></o:p></span></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black"><=
o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black">[=
Med] The modification mixes several aspects that are covered in other parts=
 of this section. I made this change:<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black"><=
o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp; This interface is also used to=
 instruct an SFC-aware SF about any<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp; context information (a.k.a., m=
etadata) it needs to supply for a given SFC.</span><span lang=3D"EN-US" sty=
le=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black"><o:=
p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#215868"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l7 leve=
l1 lfo1;text-autospace:none">
<![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-fa=
mily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=
=3D"mso-list:Ignore">5.<span style=3D"font:7.0pt &quot;Times New Roman&quot=
;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:11.0=
pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#215868">3.=
3.3: In several paragraphs the term &#8216;contexts&#8217; is used. It may =
be clearer if &#8216;metadata&#8217; is used instead.
<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black">[=
Med] See above.<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#215868"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l7 leve=
l1 lfo1;text-autospace:none">
<![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-fa=
mily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=
=3D"mso-list:Ignore">6.<span style=3D"font:7.0pt &quot;Times New Roman&quot=
;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:11.0=
pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Su=
ggest moving this paragraph from 4.10.5 to 3.4.4 as it relates specifically=
 to</span><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-family:&quot;=
Calibri&quot;,&quot;sans-serif&quot;;color:#215868"><o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-autospace:none"><span lang=3D"E=
N-US" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">SFC Proxy functionality. Reworded, this can repl=
ace the last sentence in 3.3.4:</span><span lang=3D"EN-US" style=3D"font-si=
ze:10.0pt;font-family:Courier"><o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-autospace:none"><span lang=3D"E=
N-US" style=3D"font-size:10.0pt;font-family:Courier">The C4 interface may a=
lso include information to map the SFP<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.0pt;font-family:Courier">Identifier carried in the pac=
ket header to a locally significant link<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.0pt;font-family:Courier">identifier, e.g., VLAN-ID, an=
d a method to construct and encapsulate<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.0pt;font-family:Courier">the SFC header back to the pa=
ckets when they come back from the attached SFs.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;<=
/o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] There is already this tex=
t in Section 3.4.4:
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; This interface may also be used to i=
nstruct the SFC proxy about the<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; state and information to maintain fo=
r proper handling of packets<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; received back from an SFC-unaware SF=
.<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l7 leve=
l1 lfo1"><![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:11.0p=
t;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><sp=
an style=3D"mso-list:Ignore">7.<span style=3D"font:7.0pt &quot;Times New Ro=
man&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:11.0=
pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">La=
st para of 4.10.5 typo: classier -&gt; classifier<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] Thank you for catching th=
is. Fixed.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l7 leve=
l1 lfo1"><![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:11.0p=
t;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><sp=
an style=3D"mso-list:Ignore">8.<span style=3D"font:7.0pt &quot;Times New Ro=
man&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:11.0=
pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">La=
st para of 4.10.5: This could be clearer on what the problem is.<o:p></o:p>=
</span></p>
<pre><span lang=3D"EN-US" style=3D"color:black">[Med] The problem is detail=
ed in the example: &#8220;</span><span lang=3D"EN-US">For example, if the S=
FF &quot;A&quot; and SFF &quot;C&quot; get flow<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; steering policies at slightly differ=
ent times, some packets might not<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; be directed to some service function=
s on a chain.&#8221;<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Can you please indicate what is=
 not clear in that text? Thank you.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><span lang=3D"EN-US" st=
yle=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&qu=
ot;;color:#1F497D">Not sure what SFF A and SFF B are?</span><span lang=3D"E=
N-US" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] These are SFF examples to=
 illustrate the problem.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:36.0pt"><span lang=3D"EN-US" st=
yle=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&qu=
ot;;color:#1F497D">Would it not be better to recommend a procedure in which=
 the SFC Controller updates downstream SFFs before upstream
 SFFs when constructing a new SFP. Insertion of a SF into a SFP should have=
 only local impact on the SFF it is connected to.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] The notion of upstream an=
d downstream SFF depends the chain under consideration. So following the re=
commendation you propose may not be possible if
 SFF provisioning/control is achieved for all chains at once, not per each =
chain. This decision is deployment-specific.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:20.4pt;text-indent:-18.0=
pt;mso-list:l5 level1 lfo2">
<![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-fa=
mily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=
=3D"mso-list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;=
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:11.0=
pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Lo=
uis<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:20.4pt"><span lang=3D"EN=
-US" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-s=
erif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span =
lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&qu=
ot;sans-serif&quot;"> sfc [<a href=3D"mailto:sfc-bounces@ietf.org">mailto:s=
fc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Sumandra Majee<br>
<b>Sent:</b> Thursday, April 28, 2016 12:03 PM<br>
<b>To:</b> Dave Dolson; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br=
>
<b>Cc:</b> Jim Guichard (jguichar)<br>
<b>Subject:</b> Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt<o:p>=
</o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:8.5pt;font-f=
amily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Dave,<o:p></o=
:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:8.5pt;font-f=
amily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">I would also =
concur that SFF is a forwarding entity that uses pathID/SI to find the next=
-hop/next-sf/next-sff. This is how our SFF works.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:8.5pt;font-f=
amily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</=
o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:8.5pt;font-f=
amily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">It is absolut=
ely possible that co resident classifier to further classify based on &nbsp=
;l3/l4/l7/python_code and change the path. But logically that is
 another classification and list below is certainly not exhaustive. &nbsp;<=
o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:8.5pt;font-f=
amily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</=
o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:11.0pt;fo=
nt-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">From:
</span></b><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;;color:black">sfc &lt;<a href=3D"mailt=
o:sfc-bounces@ietf.org">sfc-bounces@ietf.org</a>&gt; on behalf of Dave Dols=
on &lt;<a href=3D"mailto:ddolson@sandvine.com">ddolson@sandvine.com</a>&gt;=
<br>
<b>Date: </b>Thursday, April 28, 2016 at 11:43 AM<br>
<b>To: </b>&quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &lt=
;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;<br>
<b>Cc: </b>&quot;Jim Guichard (jguichar)&quot; &lt;<a href=3D"mailto:jguich=
ar@cisco.com">jguichar@cisco.com</a>&gt;<br>
<b>Subject: </b>Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt<o:p>=
</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:8.5pt;font-f=
amily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</=
o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Further to=
 Jim&#8217;s points about section 4.10.5, do I read it correctly that the S=
FF can be configured to steer traffic on the basis of these?</span><span la=
ng=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbs=
p; o&nbsp; Destination MAC address</span><span lang=3D"EN-US" style=3D"colo=
r:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbs=
p; o&nbsp; Source MAC address</span><span lang=3D"EN-US" style=3D"color:bla=
ck"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbs=
p; o&nbsp; VLAN-ID,</span><span lang=3D"EN-US" style=3D"color:black"><o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbs=
p; o&nbsp; Destination IP address</span><span lang=3D"EN-US" style=3D"color=
:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbs=
p; o&nbsp; Source IP address</span><span lang=3D"EN-US" style=3D"color:blac=
k"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbs=
p; o&nbsp; Source port number</span><span lang=3D"EN-US" style=3D"color:bla=
ck"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbs=
p; o&nbsp; Destination port number</span><span lang=3D"EN-US" style=3D"colo=
r:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbs=
p; o&nbsp; DSCP</span><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p=
></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbs=
p; o&nbsp; Packet size, etc., or any combination thereof.</span><span lang=
=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">This comes=
 totally unexpected to me, thinking that the SFF steers traffic based exclu=
sively on Service Path Identifier and Service Index (SPI/SI),
 which oddly aren&#8217;t in the above list.</span><span lang=3D"EN-US" sty=
le=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">I can gues=
s that maybe this is about reclassification, but &#8220;classification&#822=
1; isn&#8217;t mentioned in 4.10.5.</span><span lang=3D"EN-US" style=3D"col=
or:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Can someon=
e explain?</span><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">-Dave</spa=
n><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:black">From:</spa=
n></b><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Taho=
ma&quot;,&quot;sans-serif&quot;;color:black"> sfc [<a href=3D"mailto:sfc-bo=
unces@ietf.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Jim Guichard (jguichar)<br>
<b>Sent:</b> Wednesday, April 27, 2016 10:18 AM<br>
<b>To:</b> Martin Stiemerling; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org=
</a><br>
<b>Subject:</b> Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt</spa=
n><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:black">&nbsp;<o:=
p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Hi Martin &a=
mp; WG:</span><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span=
><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">A few commen=
ts that I would like to see addressed in the document before it can move fo=
rward to the next step.</span><span lang=3D"EN-US" style=3D"color:black"><o=
:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l6 level1 lfo3">
<span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;">Section 2.2 SFC Control Plane Bootstrapping.</s=
pan><span lang=3D"EN-US"><o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">This section=
 is too wishy washy. It makes the statement &#8220;this document assumes th=
e SFC control plane is provided with a set of information that is
<u>required</u> for proper SFC operation&#8221; but then goes on to list bu=
llets that are
<u>likely</u>&nbsp;to be provided or <u>may</u>&nbsp;be provided. It does n=
ot actually provide any information on what
<u>is required for proper SFC operation</u>. In the list of <u>likely</u>&n=
bsp;information there is no indication of whether this information must exi=
st in the network prior to bootstrapping the SFC control plane element; thi=
s is true also for the list of
<u>may</u>&nbsp;information. Surely we should provide guidelines on what <u=
>must</u>&nbsp;be available before the SFC control plane element can actual=
ly function although it is reasonable to assume that it can bootstrap witho=
ut any information (albeit it can&#8217;t actually
 do anything). On this point I would argue that several of the <u>may</u>&n=
bsp;elements are actually required such as SFF, SF, SFC-proxy locators and =
may exist prior to bootstrapping the SFC control plane element, or may be a=
dded later through some control interface.&nbsp;</span><span lang=3D"EN-US"=
 style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span=
><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Minor point =
-&gt; typo in bullet point 6 &#8211; SFP proxy should read
<b>SFC</b>&nbsp;proxy</span><span lang=3D"EN-US" style=3D"color:black"><o:p=
></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l8 level1 lfo4">
<span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;">Section 2.3 Coherent Setup of an SFC-enabled Do=
main</span><span lang=3D"EN-US"><o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">What does th=
e sentence &#8220;various transport encapsulation schemes and/or variations=
 of SFC header implementations may be supported&#8221; actually mean ?
 Are we referring to the fact that the SFC header may carry type-1 or type-=
2 metadata or something else ? Note that there is only
<b>one </b>SFC header implementation based on the WG charter so if we are r=
eferring to different SFC formats (meaning metadata) then please make this =
clear in the text, and if not, please remove this sentence.&nbsp;</span><sp=
an lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l4 level1 lfo5">
<span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;">Section 3.1 Reference Architecture</span><span =
lang=3D"EN-US"><o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Second bulle=
t point &#8220;mapping between service function chains and SFPs&#8221; - th=
is is a general comment for the entire document but applies here also.
 There is no mention of mapping SFPs -&gt; RSPs &#8211; in fact RSP is ment=
ioned only once in the entire document. The architecture is explicit in tha=
t the SFP when rendered into the network is an RSP and therefore the SFC co=
ntrol plane element needs to have information
 on currently deployed RSPs.</span><span lang=3D"EN-US" style=3D"color:blac=
k"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span=
><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Additionally=
 there is no interface specified for communication between the SFC Control =
Plane Element and SF management systems. This is an important
 aspect as many SF&#8217;s may require that SFC information be communicated=
 to their management systems that will be responsible for communicating dir=
ectly with their respective SF&#8217;s.&nbsp;</span><span lang=3D"EN-US" st=
yle=3D"color:black"><o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l3 level1 lfo6">
<span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;">Section 3.1.1. C1: Interface between SFC Contro=
l Plane &amp; SFC Classifier</span><span lang=3D"EN-US"><o:p></o:p></span><=
/li></ul>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">The sentence=
 &#8220;The control plane may instruct the classifier about the initial val=
ues of the Service Index (SI)&#8221; should be changed to say
<b>MUST</b>&nbsp;as otherwise if a classifier chooses whatever value it wan=
ts then that may not align with what is programmed into the SFFs by the SFC=
 Control Plane element.</span><span lang=3D"EN-US" style=3D"font-size:10.5p=
t;font-family:&quot;Courier New&quot;;color:black;background:#FFFDF5">&nbsp=
;</span><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l1 level1 lfo7">
<span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;">Section 4.10.4. Encoding the Exact SFF/SF Seque=
nce in Data Packets</span><span lang=3D"EN-US"><o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">This section=
 does not actually provide any meaning or indication of relationship with t=
he SFC Control Plane element. Furthermore, &nbsp;there has been
 no WG consensus to carry source routes within the SFC encapsulation. There=
fore this entire section should be removed from the document.</span><span l=
ang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:black;mso-margin-top-alt:auto;mso-ma=
rgin-bottom-alt:auto;mso-list:l0 level1 lfo8">
<span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;">Section 4.10.5. Fully Controlled SFF/SF Sequenc=
e for a SFP</span><span lang=3D"EN-US"><o:p></o:p></span></li></ul>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Figure 2 lis=
ts 3 different SFP-id&#8217;s whereas the text mentions only SFP-id #1. Is =
this simply a typo or are you trying to convey something else ?</span><span=
 lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span=
><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Further you =
state that &#8220;the steering policies to a SFF node for service function =
chain depends on if the packet comes from previous SFF or comes
 from a specific SF i.e., the SFP Forwarding Table entries have to be ingre=
ss port specific&#8221; - &nbsp;this is an inaccurate statement as the comb=
ination of the SFP-id and service-index determines the forwarding behavior =
(as specified in section 3.3 &amp; section 7 of
 draft-ietf-sfc-nsh-04). &nbsp;This sentence should be removed from the tex=
t.</span><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span=
><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Jim</span><s=
pan lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span=
><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span=
><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span=
><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">On 4/27/16, =
12:29 AM, &quot;sfc on behalf of Martin Stiemerling&quot; &lt;<a href=3D"ma=
ilto:sfc-bounces@ietf.org">sfc-bounces@ietf.org</a> on behalf of
<a href=3D"mailto:mls.ietf@gmail.com">mls.ietf@gmail.com</a>&gt; wrote:</sp=
an><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span=
><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<blockquote style=3D"border:none;border-left:solid #B5C4DF 4.5pt;padding:0c=
m 0cm 0cm 4.0pt;margin-left:3.75pt;margin-top:5.0pt;margin-right:0cm;margin=
-bottom:5.0pt" id=3D"MAC_OUTLOOK_ATTRIBUTION_BLOCKQUOTE">
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Dear all,</s=
pan><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span=
><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">This is the =
start of the Working Group Last Call (WGLC) for</span><span lang=3D"EN-US" =
style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span=
><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">draft-ietf-s=
fc-control-plane-04.txt</span><span lang=3D"EN-US" style=3D"color:black"><o=
:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span=
><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">The WGLC las=
ts for 2 weeks and will end May 11th at 10 pm PDT.</span><span lang=3D"EN-U=
S" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span=
><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Please send =
your comments and reviews to the
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a> list.</span><span lang=3D"=
EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span=
><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">Regards,</sp=
an><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span=
><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;&nbsp;=
 Martin (SFC co-chair)</span><span lang=3D"EN-US" style=3D"color:black"><o:=
p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span=
><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">____________=
___________________________________</span><span lang=3D"EN-US" style=3D"col=
or:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">sfc mailing =
list</span><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black"><a href=3D"m=
ailto:sfc@ietf.org">sfc@ietf.org</a></span><span lang=3D"EN-US" style=3D"co=
lor:black"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black"><a href=3D"h=
ttps://www.ietf.org/mailman/listinfo/sfc">https://www.ietf.org/mailman/list=
info/sfc</a></span><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></=
span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:black">&nbsp;</span=
><span lang=3D"EN-US" style=3D"color:black"><o:p></o:p></span></p>
</div>
</blockquote>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_787AE7BB302AE849A7480A190F8B933008D61BF4OPEXCLILMA3corp_--


From nobody Fri Apr 29 00:55:21 2016
Return-Path: <bill.wu@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5FFAD12D59C for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 00:55:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.217
X-Spam-Level: 
X-Spam-Status: No, score=-5.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ow8lAxaopPp6 for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 00:55:17 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BD22012D6E7 for <sfc@ietf.org>; Fri, 29 Apr 2016 00:53:59 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml708-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CNN80342; Fri, 29 Apr 2016 07:53:57 +0000 (GMT)
Received: from NKGEML412-HUB.china.huawei.com (10.98.56.73) by lhreml708-cah.china.huawei.com (10.201.5.202) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 29 Apr 2016 08:53:56 +0100
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.56]) by nkgeml412-hub.china.huawei.com ([10.98.56.73]) with mapi id 14.03.0235.001; Fri, 29 Apr 2016 15:53:45 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "Huangyong (Oliver)" <oliver.huang@huawei.com>, Martin Stiemerling <mls.ietf@gmail.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] RE:  WGLC for draft-ietf-sfc-control-plane-04.txt
Thread-Index: AQHRoexABGAcurNnsku+qCdV5uGkeQ==
Date: Fri, 29 Apr 2016 07:53:44 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABA8531BEAA@nkgeml513-mbx.china.huawei.com>
References: <65e5a067-8d94-2632-506f-9f2d60dabeaf@gmail.com> <8172B566C79A4A4C8EB6C7B1F6529EFC8B7435C1@szxema506-mbx.china.huawei.com>
In-Reply-To: <8172B566C79A4A4C8EB6C7B1F6529EFC8B7435C1@szxema506-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.200.217.183]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090202.57231315.00E4, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.1.56, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: ce719da7d1a4693c6ea2fcec8d81a96d
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/cya-bA_V0O7yTpkkReeRXca2AKM>
Subject: Re: [sfc] WGLC for draft-ietf-sfc-control-plane-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Apr 2016 07:55:19 -0000

KzEuDQotLS0tLdPKvP7Urbz+LS0tLS0NCreivP7Iyzogc2ZjIFttYWlsdG86c2ZjLWJvdW5jZXNA
aWV0Zi5vcmddILT6se0gSHVhbmd5b25nIChPbGl2ZXIpDQq3osvNyrG85DogMjAxNsTqNNTCMjjI
1SA5OjA2DQrK1bz+yMs6IE1hcnRpbiBTdGllbWVybGluZzsgc2ZjQGlldGYub3JnDQrW98ziOiBb
c2ZjXSC08Li0OiBXR0xDIGZvciBkcmFmdC1pZXRmLXNmYy1jb250cm9sLXBsYW5lLTA0LnR4dA0K
DQpEZWFyIE1hcnRpbiwNCg0KICAgIEFzIHRoZSBlYXJseSB2ZXJzaW9uIGF1dGhvciBvZiB0aGUg
ZHJhZnQuICBJIHN1cHBvcnQgcHVibGljYXRpb24gb2YgdGhpcyBkcmFmdC4NCg0KQlINCk9saXZl
cg0KDQotLS0tLdPKvP7Urbz+LS0tLS0NCreivP7Iyzogc2ZjIFttYWlsdG86c2ZjLWJvdW5jZXNA
aWV0Zi5vcmddILT6se0gTWFydGluIFN0aWVtZXJsaW5nDQq3osvNyrG85DogMjAxNsTqNNTCMjfI
1SAxMjoyOQ0KytW8/sjLOiBzZmNAaWV0Zi5vcmcNCtb3zOI6IFtzZmNdIFdHTEMgZm9yIGRyYWZ0
LWlldGYtc2ZjLWNvbnRyb2wtcGxhbmUtMDQudHh0DQoNCkRlYXIgYWxsLA0KDQpUaGlzIGlzIHRo
ZSBzdGFydCBvZiB0aGUgV29ya2luZyBHcm91cCBMYXN0IENhbGwgKFdHTEMpIGZvcg0KDQpkcmFm
dC1pZXRmLXNmYy1jb250cm9sLXBsYW5lLTA0LnR4dA0KDQpUaGUgV0dMQyBsYXN0cyBmb3IgMiB3
ZWVrcyBhbmQgd2lsbCBlbmQgTWF5IDExdGggYXQgMTAgcG0gUERULg0KDQpQbGVhc2Ugc2VuZCB5
b3VyIGNvbW1lbnRzIGFuZCByZXZpZXdzIHRvIHRoZSBzZmNAaWV0Zi5vcmcgbGlzdC4NCg0KUmVn
YXJkcywNCg0KICAgTWFydGluIChTRkMgY28tY2hhaXIpDQoNCl9fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fDQpzZmMgbWFpbGluZyBsaXN0DQpzZmNAaWV0Zi5v
cmcNCmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjDQpfX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0Kc2ZjIG1haWxpbmcgbGlzdA0K
c2ZjQGlldGYub3JnDQpodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL3NmYw0K


From nobody Fri Apr 29 05:56:07 2016
Return-Path: <mls.ietf@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6ABA312D12B for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 05:56:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hE54q-_uVZZW for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 05:56:04 -0700 (PDT)
Received: from mail-wm0-x22c.google.com (mail-wm0-x22c.google.com [IPv6:2a00:1450:400c:c09::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D911A12B01A for <sfc@ietf.org>; Fri, 29 Apr 2016 05:56:03 -0700 (PDT)
Received: by mail-wm0-x22c.google.com with SMTP id a17so34987707wme.0 for <sfc@ietf.org>; Fri, 29 Apr 2016 05:56:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=to:from:subject:message-id:date:user-agent:mime-version :content-transfer-encoding; bh=OWsfTryStnjH7gjnlZadEukJ7uiYuZ/ah1uE4rnhOus=; b=CDvRDyj1aXwJn7/5bEt08ZxyNtms2LBDrmNdCJ5SFeX1d4QDziNrfE+C246qCuhWl0 HDKCgYqseyk5OY+pmUsnTomtvAtefKZwKGYXx6ZPkQuE37IGiXuMlCBqbdk2k7npBTxY zFR1VQ658yYs0B8xBqxzHRMVx1/qheA06+Kvjw+eHlBpolSWp28bh+7HYc0gkLoOEfc5 SlBGXTlVJsYfcW4+toccF3Mkn6Y4/j/526I37ZSz+PAYO9m/NYooUdPU4KUOHV2Grne8 fE2o6eVqvXx8fts/7m9puCQd5NKHW+3Buu3ZUwZWamueG3XwUN6vw2984mh+xbVCLPeb 6mvA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:to:from:subject:message-id:date:user-agent :mime-version:content-transfer-encoding; bh=OWsfTryStnjH7gjnlZadEukJ7uiYuZ/ah1uE4rnhOus=; b=jp7Q/d4TsSVuhG2uaiZ7gF73IfSO8bf+ZfTYzrXu63Ga8xVM+7UJYwfugH9KAOy6en Npk8drwACWE10OfghRvmfwVXjGZHBqL0wc9pb7x3rRex4+E4X/yHRjMUNqlG8WZ9JN0Y d3g010GTBeaFDh2+z2pMR5pmF3F/5wcf5u95/peevq70jKHo4DD8oOkT+iT8kM2cSIyL 14oKQ+md99f9AIoYO5bkQi2Pq1d/JaGQO8KlHbOukhpxhT4k2QX/7xA8hdz8AHoiLwOL cf3wC0xO3mHmatwiZka0C8k7cumBMpoym7+8HEth2ygG7zV+yUtqCcmWjFZYJxOReLoL PiPg==
X-Gm-Message-State: AOPr4FWTpp63UvJ8/zLvj32dTJhCSdApwHlpFO0p6j5f1V9+gEkhm9ut27Iq6VR5oKx/Ig==
X-Received: by 10.28.5.85 with SMTP id 82mr4058283wmf.26.1461934562508; Fri, 29 Apr 2016 05:56:02 -0700 (PDT)
Received: from mn-mn0F.local (tmo-099-74.customers.d1-online.com. [80.187.99.74]) by smtp.googlemail.com with ESMTPSA id jr8sm14711664wjb.15.2016.04.29.05.56.00 for <sfc@ietf.org> (version=TLSv1/SSLv3 cipher=OTHER); Fri, 29 Apr 2016 05:56:01 -0700 (PDT)
To: sfc@ietf.org
From: Martin Stiemerling <mls.ietf@gmail.com>
Message-ID: <fae0cf77-8f9f-d8bf-651f-0e6a35714663@gmail.com>
Date: Fri, 29 Apr 2016 14:55:59 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:45.0) Gecko/20100101 Thunderbird/45.0
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/KeBLbuQDGDrXvTxlDoAet_tgddo>
Subject: [sfc] Draft minutes SFC session @ IETF-95 in Buenos Airs
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Apr 2016 12:56:06 -0000

Dear all,

Please find the draft minutes of the SFC session @ IETF-95 in
Buenos Aires online:
https://www.ietf.org/proceedings/95/minutes/minutes-95-sfc

Let us know if something is missing, etc.

Thanks to Dhruv Dhody for taking the notes!

Regards,

  Martin


From nobody Fri Apr 29 06:57:53 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4FA6D12D69C for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 06:57:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.895
X-Spam-Level: 
X-Spam-Status: No, score=-2.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bUZTerLWNbwC for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 06:57:48 -0700 (PDT)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id 0171712D6A1 for <sfc@ietf.org>; Fri, 29 Apr 2016 06:57:30 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Fri, 29 Apr 2016 09:57:30 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: draft-ietf-sfc-control-plane -- C2 interface
Thread-Index: AdGhdzeqsff0+F4JRSWm8k5GYfJj0QAYB0bQABE7GWA=
Date: Fri, 29 Apr 2016 13:57:30 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F45AAD@wtl-exchp-2.sandvine.com>
References: <E8355113905631478EFF04F5AA706E9830F44097@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008D61B4F@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D61B4F@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830F45AADwtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/bpTgDsWZ2bd7YMoZdiN_3-aghwo>
Subject: Re: [sfc] draft-ietf-sfc-control-plane -- C2 interface
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Apr 2016 13:57:51 -0000

--_000_E8355113905631478EFF04F5AA706E9830F45AADwtlexchp2sandvi_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Med,
Please see inline [DD]


From: mohamed.boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
Sent: Friday, April 29, 2016 2:06 AM
To: Dave Dolson; sfc@ietf.org
Subject: RE: draft-ietf-sfc-control-plane -- C2 interface

Hi Dave,

Please see inline.

Cheers,
Med

De : Dave Dolson [mailto:ddolson@sandvine.com]
Envoy=E9 : jeudi 28 avril 2016 19:56
=C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org<mailto:sfc@ietf.org>
Objet : draft-ietf-sfc-control-plane -- C2 interface

In section 3.3.2, https://tools.ietf.org/html/draft-ietf-sfc-control-plane-=
04#section-3.3.2
the section is: C2: Interface between SFC Control Plane & SFF

- There is no mention of being able to instruct the SFF to load-balance an =
SFP across multiple (functionally equivalent) SFs
This is the service-function-group-name concept in OpenDaylight and in draf=
t-penno-sfc-yang-14, as I understand it.
Identifying members of a group and identifying a group as a next-hop would =
be in the scope of the C2 interface, correct?

[Med] This is in scope of C2, that is responsible for populating the SFC Fo=
rwarding Policy Table. The current text cites examples of additional to be =
used for lookup purposes (excerpt from Section 1.2):


      Additional information such as a flow identifier, Service Index

      (SI), and/or other characteristics (e.g., the 5-tuple transport

      coordinates of the original packet) may be used for lookup

      purposes.  The set of information to use for lookup purposes may

      be instructed by the control plane.

Load balancing is discussed in "Additional Considerations" section. Indeed,=
 Section 4.10.1 includes the following:

   SF/SFP Load-balancing:   re-construct SFPs to distribute the workload
      among various SF instances.  Particularly, load distribution
      policies can be taken into account by the Control Element to re-
      compute an SFP or be provisioned as attributes to SFPs that will
      be installed using the control interfaces.
[DD] This is in a section that seems to be about the controller making adju=
stments to move work-load to different paths. I'm concerned with the case w=
hen traffic of a single path is load-balanced across multiple workers in a =
dynamic manner that doesn't require controller micro-management.
[DD] To help clarify, it might be useful to think of the SFF having multipl=
e next-hop entries for the same SPI/SI pair; as with ECMP routing or LAG, a=
 local decision selects which to use.

I suggest to make this change:

OLD:

   SF/SFP Load-balancing:   re-construct SFPs to distribute the workload

      among various SF instances.  Particularly, load distribution

      policies can be taken into account by the Control Element to re-

      compute an SFP or be provisioned as attributes to SFPs that will

      be installed using the control interfaces.

NEW:

   SF/SFP Load-balancing:   re-construct SFPs to distribute the workload

      among various SF instances.  Particularly, load distribution

      policies can be taken into account by the Control Element to re-

      compute an SFP or be provisioned as attributes to SFPs that will

      be installed using the control interfaces (C2 interface, typically).

Please let me know if further changes are required.
[DD] Although this change is correct, it doesn't address my concern. I woul=
d like to see language in section 3.3.2.
[DD] Perhaps, "The C2 interface may be used to configure groups of function=
ally equivalent SFs that may service a path."

- Regarding chain (path?) termination, there should be some mention of how =
to forward packets per path after the NSH header is removed.
For example, it may be that different paths terminate at different physical=
 interfaces or at different routing tables.
This isn't always relevant, but I would expect it to be in the scope of C2,=
 no?
E.g., for IP encapsulation,  "if SPI=3D101 and SI=3D251 then terminate to r=
outing table T1"
Or, e.g., for Ethernet encapsulation "if SPI=3D200 and SI=3D252 then termin=
ate to Ethernet interface eth1"

[Med] What about making this change?
OLD:

   An SFF can be instructed to strip the SFC information for the chains

   it terminates.

NEW:

   An SFF can be instructed to strip the SFC information for the chains

   it terminates. Forwarding policies for handling packets bound to

   chains that are terminated by an SFF may be communicated via this interf=
ace.



That text may be completed with the following sentence to further highlight=
 that these forwarding instructions are not mandatory:



   By default, an SFF relies on legacy processing for forwarding these pack=
ets.

[DD] OK, looks good.

David Dolson
Senior Software Architect, Sandvine Inc.


--_000_E8355113905631478EFF04F5AA706E9830F45AADwtlexchp2sandvi_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
p.PrformatHTML, li.PrformatHTML, div.PrformatHTML
	{mso-style-name:"Pr=E9format=E9 HTML";
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:"Courier New";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle25
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Med,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Please see inline [DD]=
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> mohamed.=
boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
<br>
<b>Sent:</b> Friday, April 29, 2016 2:06 AM<br>
<b>To:</b> Dave Dolson; sfc@ietf.org<br>
<b>Subject:</b> RE: draft-ietf-sfc-control-plane -- C2 interface<o:p></o:p>=
</span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Hi Dave,
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Please see inline.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span=
 lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot=
;sans-serif&quot;"> Dave Dolson [<a href=3D"mailto:ddolson@sandvine.com">ma=
ilto:ddolson@sandvine.com</a>]
<br>
<b>Envoy=E9&nbsp;:</b> jeudi 28 avril 2016 19:56<br>
<b>=C0&nbsp;:</b> BOUCADAIR Mohamed IMT/OLN; <a href=3D"mailto:sfc@ietf.org=
">sfc@ietf.org</a><br>
<b>Objet&nbsp;:</b> draft-ietf-sfc-control-plane -- C2 interface<o:p></o:p>=
</span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"FR"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal">In section 3.3.2, <a href=3D"https://tools.ietf.org/=
html/draft-ietf-sfc-control-plane-04#section-3.3.2">
https://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#section-3.3.2</=
a><o:p></o:p></p>
<p class=3D"MsoNormal">the section is: C2: Interface between SFC Control Pl=
ane &amp; SFF<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">- There is no mention of being able to instruct the =
SFF to load-balance an SFP across multiple (functionally equivalent) SFs<o:=
p></o:p></p>
<p class=3D"MsoNormal">This is the service-function-group-name concept in O=
penDaylight and in draft-penno-sfc-yang-14, as I understand it.<o:p></o:p><=
/p>
<p class=3D"MsoNormal">Identifying members of a group and identifying a gro=
up as a next-hop would be in the scope of the C2 interface, correct?<o:p></=
o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">[Med] This is in scope of C2, that is responsi=
ble for populating the SFC Forwarding Policy Table. The current text cites =
examples of additional to be used for lookup purposes
 (excerpt from Section 1.2): <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Additional information such as a flow i=
dentifier, Service Index<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (SI), and/or other characteristics (e.g=
., the 5-tuple transport<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; coordinates of the original packet) may=
 be used for lookup<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;purposes.&nbsp; The set of information =
to use for lookup purposes may<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be instructed by the control plane.<o:p=
></o:p></pre>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Load balancing is discussed in &#8220;Addition=
al Considerations&#8221; section. Indeed, Section 4.10.1 includes the follo=
wing:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp; SF/SFP Load-balancing:&nbsp;&nbsp; re-constru=
ct SFPs to distribute the workload<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; among various SF instances.=
&nbsp; Particularly, load distribution<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; policies can be taken into =
account by the Control Element to re-<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; compute an SFP or
<b><u>be provisioned as attributes to SFPs that will<o:p></o:p></u></b></sp=
an></p>
<p class=3D"MsoNormal"><b><u><span style=3D"font-size:10.0pt;font-family:&q=
uot;Courier New&quot;">&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;be installed using th=
e control interfaces</span></u></b><span style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;">.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] This is in a sect=
ion that seems to be about the controller making adjustments to move work-l=
oad to different paths. I&#8217;m concerned with the case when traffic of a=
 single path is load-balanced across multiple
 workers in a dynamic manner that doesn&#8217;t require controller micro-ma=
nagement.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] To help clarify, =
it might be useful to think of the SFF having multiple next-hop entries for=
 the same SPI/SI pair; as with ECMP routing or LAG, a local decision select=
s which to use.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">I suggest to make this change:
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">OLD:<o:p></o:p></span></p>
<pre>&nbsp;&nbsp; SF/SFP Load-balancing:&nbsp;&nbsp; re-construct SFPs to d=
istribute the workload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; among various SF instances.&nbsp; Parti=
cularly, load distribution<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; policies can be taken into account by t=
he Control Element to re-<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; compute an SFP or be provisioned as att=
ributes to SFPs that will<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be installed using the control interfac=
es.<o:p></o:p></pre>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<pre>&nbsp;&nbsp; SF/SFP Load-balancing:&nbsp;&nbsp; re-construct SFPs to d=
istribute the workload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; among various SF instances.&nbsp; Parti=
cularly, load distribution<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; policies can be taken into account by t=
he Control Element to re-<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; compute an SFP or be provisioned as att=
ributes to SFPs that will<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be installed using the control interfac=
es (C2 interface, typically).<o:p></o:p></pre>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Please let me know if further changes are requ=
ired.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] Although this cha=
nge is correct, it doesn&#8217;t address my concern. I would like to see la=
nguage in section 3.3.2.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] Perhaps, &#8220;T=
he C2 interface may be used to configure groups of functionally equivalent =
SFs that may service a path.&#8221;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">- Regarding chain (path?) termination, there should =
be some mention of how to forward packets per path after the NSH header is =
removed.<o:p></o:p></p>
<p class=3D"MsoNormal">For example, it may be that different paths terminat=
e at different physical interfaces or at different routing tables.<o:p></o:=
p></p>
<p class=3D"MsoNormal">This isn&#8217;t always relevant, but I would expect=
 it to be in the scope of C2, no?<o:p></o:p></p>
<p class=3D"MsoNormal">E.g., for IP encapsulation, &nbsp;&#8220;if SPI=3D10=
1 and SI=3D251 then terminate to routing table T1&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal">Or, e.g., for Ethernet encapsulation &#8220;if SPI=
=3D200 and SI=3D252 then terminate to Ethernet interface eth1&#8221;<o:p></=
o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:black"><o:p>&nbsp;</o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">[Med] What about making this change?<o:p></o:p=
></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">OLD:<o:p></o:p></span></p>
<pre>&nbsp;&nbsp; An SFF can be instructed to strip the SFC information for=
 the chains<o:p></o:p></pre>
<pre>&nbsp;&nbsp; it terminates.<o:p></o:p></pre>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<pre>&nbsp;&nbsp; An SFF can be instructed to strip the SFC information for=
 the chains<o:p></o:p></pre>
<pre>&nbsp;&nbsp; it terminates. Forwarding policies for handling packets b=
ound to <o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;chains that are terminated by an SFF may be communic=
ated via this interface.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>That text may be completed with the following sentence to further high=
light that these forwarding instructions are not mandatory:<o:p></o:p></pre=
>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; By default, an SFF relies on legacy processing for forwar=
ding these packets.<o:p></o:p></pre>
<pre><span style=3D"color:#1F497D">[DD] OK, looks good.</span>&nbsp;&nbsp; =
&nbsp;&nbsp;&nbsp;<o:p></o:p></pre>
<p class=3D"MsoNormal"><span style=3D"color:black"><o:p>&nbsp;</o:p></span>=
</p>
<p class=3D"MsoNormal">David Dolson<o:p></o:p></p>
<p class=3D"MsoNormal">Senior Software Architect, Sandvine Inc.<o:p></o:p><=
/p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_E8355113905631478EFF04F5AA706E9830F45AADwtlexchp2sandvi_--


From nobody Fri Apr 29 07:24:22 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2CD0B12D64E for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 07:24:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.895
X-Spam-Level: 
X-Spam-Status: No, score=-2.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fFKJYR2U29jG for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 07:24:17 -0700 (PDT)
Received: from mail1.sandvine.com (mail1.sandvine.com [64.7.137.165]) by ietfa.amsl.com (Postfix) with ESMTP id 1016B12D0EF for <sfc@ietf.org>; Fri, 29 Apr 2016 07:24:17 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by WTL-EXCHP-3.sandvine.com ([::1]) with mapi id 14.03.0195.001; Fri, 29 Apr 2016 10:24:16 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: draft-ietf-sfc-control-plane -- C3 interface
Thread-Index: AdGhd20GlIfr42rfQei+e06aOHat/gAZcYogABCNidA=
Date: Fri, 29 Apr 2016 14:24:15 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F45BFE@wtl-exchp-2.sandvine.com>
References: <E8355113905631478EFF04F5AA706E9830F440D9@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008D61B8B@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D61B8B@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830F45BFEwtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/qtGNaaqwX7pjDOZ3isXDPMX1LZc>
Subject: Re: [sfc] draft-ietf-sfc-control-plane -- C3 interface
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Apr 2016 14:24:20 -0000

--_000_E8355113905631478EFF04F5AA706E9830F45BFEwtlexchp2sandvi_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Please see inline [DD]

From: mohamed.boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
Sent: Friday, April 29, 2016 2:51 AM
To: Dave Dolson; sfc@ietf.org
Subject: RE: draft-ietf-sfc-control-plane -- C3 interface

Re-,

Please see inline.

Cheers,
Med

De : Dave Dolson [mailto:ddolson@sandvine.com]
Envoy=E9 : jeudi 28 avril 2016 19:57
=C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org<mailto:sfc@ietf.org>
Objet : draft-ietf-sfc-control-plane -- C3 interface

Regarding https://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#secti=
on-3.3.3
C3: Interface between SFC Control Plane & SFC-aware SFs

Shouldn't information about bidirectional paths be in scope for C3 ?

[Med] Yes. This is actually covered in https://tools.ietf.org/html/draft-ie=
tf-sfc-control-plane-04#section-4.2. The current wording does not recommend=
 how this bidir will be ensured because this is likely to be SF-specific an=
d deployment-specific.

E.g., as in section 5.1 of https://www.ietf.org/archive/id/draft-penno-sfc-=
packet-02.txt
Maybe add this paragraph:
"This interface informs the SFC-aware SF about the method for handling bidi=
rectional paths,
either by conveying the algorithmic method to use, or by providing forward/=
reverse path
mapping."

[Med] I'm hesitating to add text about the "algorithmic method" as I don't =
have a document to cite. Note that some stateful SFs (e.g., NAT) will natur=
ally add a reverse mapping to handle incoming packets without requiring inp=
uts from the CP. What do you mean by "providing forward/reverse path mappin=
g"? Is it SF-specific mapping?

[DD] I agree there is a lack of material to cite...
[DD] What I mean is informing the SF that "path X is the complementary path=
 of path Y". E.g., "Paths 100 (upstream) and 101 (downstream) are pairs. Re=
spond to a path-100 packet on path 101."

What about adding this NEW text at the end of Section 4.2?

NEW:
   Typically, C2 interface is used to ensure that the same SF instance
   is involved in both directions of a flow (including, to ensure full
   chain symmetry).
[DD] I disagree that C2 has anything to do with this. Instead, C1 must be u=
sed to provide consistent classification.
[DD] How about adding the generic statement to section 3.3.3, "Some SFs may=
 need to be configured regarding the rules for packet reversal on a path. T=
he controller may use the C3 interface to specify how packets on a path may=
 be placed on the reverse path."


The alternative, in my opinion, is to standardize on an algorithmic method =
for computing bidirectional paths.


I'm uneasy about C3 carrying information specific to applications, such as
    "a threat-detecting  SF can periodically send the threat characteristic=
s via this
      interface, such as high probability of threat with packet of a
      given size."
This seems like it should be out of scope of C3. Instead I think there woul=
d be an application on top of the controller.

[Med] The text you quoted is an example to illustrate how a feedback loop m=
ay be useful to adjust SFPs. I do see value in having such information avai=
lable to the chaining decision engine. Obviously, this text does not exclud=
e that this information can be acquired by another dedicated application on=
 top of a control element.

Thoughts?


In this paragraph, does "context information" mean metadata? If so, can tha=
t be made clear that the SFC is being asked to add metadata to the packet?
   This interface is also used to instruct an SFC-aware SF about any
   context information it needs to supply in the context of a given SFC.

[Med] FWIW, context information is mentioned in the WG charter "communicate=
s context information between nodes that implement". What about this change=
 to avoid confusion:

OLD:
   This interface is also used to instruct an SFC-aware SF about any
   context information it needs to supply in the context of a given SFC.

NEW:
   This interface is also used to instruct an SFC-aware SF about any
   context information (a.k.a., metadata) it needs to supply
   for a given SFC.
[DD] Again, is this intended to mean adding information to a packet? Or is =
"supply" intentionally vague about the delivery mechanism?


Regarding this paragraph, I think it would be cleaner if this behavior actu=
ally requires the C2 interface into the SF.

[Med] I do think the current wording is correct. Having an SFF co-located w=
ith a set of SFs is deployment-specific according to the SFC architecture R=
FC.
[DD] I agree with that statement. However, I think the case being described=
 is when there *is* a co-located SFF, but the text is pretending there isn'=
t. If the following text remains, C3 will need to include all the functiona=
lity of C2.
(Because although the statement is that the SF doesn't have an SFF in the n=
ode, it actually does have the SFF behavior. So call it what it is, an SFF.=
)
  Multiple SFs may be located within the same physical node, and no SFF
   is enabled in that same node, means to unambiguously forward the
   traffic to the appropriate SF must be supported.  Concretely, each SF
   must have a unique locator for unambiguous forwarding.


David Dolson
Senior Software Architect, Sandvine Inc.


--_000_E8355113905631478EFF04F5AA706E9830F45BFEwtlexchp2sandvi_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
p.PrformatHTML, li.PrformatHTML, div.PrformatHTML
	{mso-style-name:"Pr=E9format=E9 HTML";
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:"Courier New";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle25
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Please see inline [DD]=
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> mohamed.=
boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
<br>
<b>Sent:</b> Friday, April 29, 2016 2:51 AM<br>
<b>To:</b> Dave Dolson; sfc@ietf.org<br>
<b>Subject:</b> RE: draft-ietf-sfc-control-plane -- C3 interface<o:p></o:p>=
</span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black">Re-,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black">Please see inline.<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span=
 lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot=
;sans-serif&quot;"> Dave Dolson [<a href=3D"mailto:ddolson@sandvine.com">ma=
ilto:ddolson@sandvine.com</a>]
<br>
<b>Envoy=E9&nbsp;:</b> jeudi 28 avril 2016 19:57<br>
<b>=C0&nbsp;:</b> BOUCADAIR Mohamed IMT/OLN; <a href=3D"mailto:sfc@ietf.org=
">sfc@ietf.org</a><br>
<b>Objet&nbsp;:</b> draft-ietf-sfc-control-plane -- C3 interface<o:p></o:p>=
</span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"FR"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal">Regarding <a href=3D"https://tools.ietf.org/html/dra=
ft-ietf-sfc-control-plane-04#section-3.3.3">
https://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#section-3.3.3</=
a><o:p></o:p></p>
<p class=3D"MsoNormal">C3: Interface between SFC Control Plane &amp; SFC-aw=
are SFs<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Shouldn&#8217;t information about bidirectional path=
s be in scope for C3 ?<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">[Med] Yes. This is actually covered in
<a href=3D"https://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#sect=
ion-4.2">
https://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#section-4.2</a>=
. The current wording does not recommend how this bidir will be ensured bec=
ause this is likely to be SF-specific and deployment-specific.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal">E.g., as in section 5.1 of <a href=3D"https://www.ie=
tf.org/archive/id/draft-penno-sfc-packet-02.txt">
https://www.ietf.org/archive/id/draft-penno-sfc-packet-02.txt</a> <o:p></o:=
p></p>
<p class=3D"MsoNormal">Maybe add this paragraph:<o:p></o:p></p>
<p class=3D"MsoNormal">&#8220;This interface informs the SFC-aware SF about=
 the method for handling bidirectional paths,<o:p></o:p></p>
<p class=3D"MsoNormal">either by conveying the algorithmic method to use, o=
r by providing forward/reverse path
<o:p></o:p></p>
<p class=3D"MsoNormal">mapping.&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">[Med] I&#8217;m hesitating to add text about t=
he &#8220;algorithmic method&#8221; as I don&#8217;t have a document to cit=
e. Note that some stateful SFs (e.g., NAT) will naturally add a reverse
 mapping to handle incoming packets without requiring inputs from the CP. W=
hat do you mean by &#8220;providing forward/reverse path mapping&#8221;? Is=
 it SF-specific mapping?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] I agree there is =
a lack of material to cite&#8230;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] What I mean is in=
forming the SF that &#8220;path X is the complementary path of path Y&#8221=
;. E.g., &#8220;Paths 100 (upstream) and 101 (downstream) are pairs. Respon=
d to a path-100 packet on path 101.&#8221;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">What about adding this NEW text at the end of =
Section 4.2?
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;&nbsp; Typically, C2 interface is used t=
o ensure that the same SF instance
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;&nbsp;&nbsp;is involved in both directio=
ns of a flow (including, to ensure full
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;&nbsp;&nbsp;chain symmetry).
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] I disagree that C=
2 has anything to do with this. Instead, C1 must be used to provide consist=
ent classification.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] How about adding =
the generic statement to section 3.3.3, &#8220;Some SFs may need to be conf=
igured regarding the rules for packet reversal on a path. The controller ma=
y use the C3 interface to specify how packets
 on a path may be placed on the reverse path.&#8221;<o:p></o:p></span></p>
<pre>&nbsp;&nbsp;&nbsp;<span style=3D"color:black"><o:p></o:p></span></pre>
<p class=3D"MsoNormal">The alternative, in my opinion, is to standardize on=
 an algorithmic method for computing bidirectional paths.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I&#8217;m uneasy about C3 carrying information speci=
fic to applications, such as
<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&#8220;<span style=3D"font-s=
ize:10.0pt;font-family:&quot;Courier New&quot;">a threat-detecting&nbsp; SF=
 can periodically send the threat characteristics via this<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; interface, such as high pro=
bability of threat with packet of a<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; given size.&#8221;<o:p></o:=
p></span></p>
<p class=3D"MsoNormal">This seems like it should be out of scope of C3. Ins=
tead I think there would be an application on top of the controller.<o:p></=
o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">[Med] The text you quoted is an example to ill=
ustrate how a feedback loop may be useful to adjust SFPs. I do see value in=
 having such information available to the chaining
 decision engine. Obviously, this text does not exclude that this informati=
on can be acquired by another dedicated application on top of a control ele=
ment. &nbsp;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal">Thoughts?<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">In this paragraph, does &#8220;context information&#=
8221; mean metadata? If so, can that be made clear that the SFC is being as=
ked to add metadata to the packet?<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
&nbsp;&nbsp; This interface is also used to instruct an SFC-aware SF about =
any<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
&nbsp;&nbsp; context information it needs to supply in the context of a giv=
en SFC.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">[Med] FWIW, context information is mentioned i=
n the WG charter &#8220;communicates context information between nodes that=
 implement&#8221;. What about this change to avoid confusion:<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">OLD:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
&nbsp;&nbsp; This interface is also used to instruct an SFC-aware SF about =
any<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
&nbsp;&nbsp; context information it needs to supply in the context of a giv=
en SFC.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
&nbsp;&nbsp; This interface is also used to instruct an SFC-aware SF about =
any<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
&nbsp;&nbsp; context information (a.k.a., metadata) it needs to supply
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
&nbsp;&nbsp;&nbsp;for a given SFC.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] Again, is this in=
tended to mean adding information to a packet? Or is &#8220;supply&#8221; i=
ntentionally vague about the delivery mechanism?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Regarding this paragraph, I think it would be cleane=
r if this behavior actually requires the C2 interface into the SF.<o:p></o:=
p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">[Med] I do think the current wording is correc=
t. Having an SFF co-located with a set of SFs is deployment-specific accord=
ing to the SFC architecture RFC.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] I agree with that=
 statement. However, I think the case being described is when there *<b>is<=
/b>* a co-located SFF, but the text is pretending there isn&#8217;t. If the=
 following text remains, C3 will need to include
 all the functionality of C2.</span><span style=3D"color:black"><o:p></o:p>=
</span></p>
<p class=3D"MsoNormal">(Because although the statement is that the SF doesn=
&#8217;t have an SFF in the node, it actually does have the SFF behavior. S=
o call it what it is, an SFF.)<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp;Multiple SFs may be located within the same ph=
ysical node, and no SFF<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp; is enabled in that same node, means to unambi=
guously forward the<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp; traffic to the appropriate SF must be support=
ed.&nbsp; Concretely, each SF<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp; must have a unique locator for unambiguous fo=
rwarding.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:black"><o:p>&nbsp;</o:p></span>=
</p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">David Dolson<o:p></o:p></p>
<p class=3D"MsoNormal">Senior Software Architect, Sandvine Inc.<o:p></o:p><=
/p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_E8355113905631478EFF04F5AA706E9830F45BFEwtlexchp2sandvi_--


From nobody Fri Apr 29 07:32:20 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F0D512D178 for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 07:32:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.914
X-Spam-Level: 
X-Spam-Status: No, score=-2.914 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GxXNxjCNFbX7 for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 07:32:15 -0700 (PDT)
Received: from relais-inet.orange.com (relais-nor36.orange.com [80.12.70.36]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4C12712D14D for <sfc@ietf.org>; Fri, 29 Apr 2016 07:32:15 -0700 (PDT)
Received: from opfednr02.francetelecom.fr (unknown [xx.xx.xx.66]) by opfednr26.francetelecom.fr (ESMTP service) with ESMTP id 7D1D120F2B; Fri, 29 Apr 2016 16:32:13 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.2]) by opfednr02.francetelecom.fr (ESMTP service) with ESMTP id 49DAF120059; Fri, 29 Apr 2016 16:32:13 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM21.corporate.adroot.infra.ftgroup ([fe80::e92a:c932:907e:8f06%19]) with mapi id 14.03.0279.002; Fri, 29 Apr 2016 16:32:13 +0200
From: <mohamed.boucadair@orange.com>
To: Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: draft-ietf-sfc-control-plane -- C2 interface
Thread-Index: AdGhdzeqsff0+F4JRSWm8k5GYfJj0QAYB0bQABE7GWAAAcgu4A==
Date: Fri, 29 Apr 2016 14:32:12 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D61FA2@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <E8355113905631478EFF04F5AA706E9830F44097@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008D61B4F@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <E8355113905631478EFF04F5AA706E9830F45AAD@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E9830F45AAD@wtl-exchp-2.sandvine.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B933008D61FA2OPEXCLILMA3corp_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/HtW9x8BQkiLyVPTT3fXnllY44_Y>
Subject: Re: [sfc] draft-ietf-sfc-control-plane -- C2 interface
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Apr 2016 14:32:18 -0000

--_000_787AE7BB302AE849A7480A190F8B933008D61FA2OPEXCLILMA3corp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Re-,

Please see inline.

Cheers,
Med

De : Dave Dolson [mailto:ddolson@sandvine.com]
Envoy=E9 : vendredi 29 avril 2016 15:57
=C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org
Objet : RE: draft-ietf-sfc-control-plane -- C2 interface

Med,
Please see inline [DD]


From: mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> [ma=
ilto:mohamed.boucadair@orange.com]
Sent: Friday, April 29, 2016 2:06 AM
To: Dave Dolson; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: RE: draft-ietf-sfc-control-plane -- C2 interface

Hi Dave,

Please see inline.

Cheers,
Med

De : Dave Dolson [mailto:ddolson@sandvine.com]
Envoy=E9 : jeudi 28 avril 2016 19:56
=C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org<mailto:sfc@ietf.org>
Objet : draft-ietf-sfc-control-plane -- C2 interface

In section 3.3.2, https://tools.ietf.org/html/draft-ietf-sfc-control-plane-=
04#section-3.3.2
the section is: C2: Interface between SFC Control Plane & SFF

- There is no mention of being able to instruct the SFF to load-balance an =
SFP across multiple (functionally equivalent) SFs
This is the service-function-group-name concept in OpenDaylight and in draf=
t-penno-sfc-yang-14, as I understand it.
Identifying members of a group and identifying a group as a next-hop would =
be in the scope of the C2 interface, correct?

[Med] This is in scope of C2, that is responsible for populating the SFC Fo=
rwarding Policy Table. The current text cites examples of additional to be =
used for lookup purposes (excerpt from Section 1.2):


      Additional information such as a flow identifier, Service Index

      (SI), and/or other characteristics (e.g., the 5-tuple transport

      coordinates of the original packet) may be used for lookup

      purposes.  The set of information to use for lookup purposes may

      be instructed by the control plane.

Load balancing is discussed in "Additional Considerations" section. Indeed,=
 Section 4.10.1 includes the following:

   SF/SFP Load-balancing:   re-construct SFPs to distribute the workload
      among various SF instances.  Particularly, load distribution
      policies can be taken into account by the Control Element to re-
      compute an SFP or be provisioned as attributes to SFPs that will
      be installed using the control interfaces.
[DD] This is in a section that seems to be about the controller making adju=
stments to move work-load to different paths. I'm concerned with the case w=
hen traffic of a single path is load-balanced across multiple workers in a =
dynamic manner that doesn't require controller micro-management.
[DD] To help clarify, it might be useful to think of the SFF having multipl=
e next-hop entries for the same SPI/SI pair; as with ECMP routing or LAG, a=
 local decision selects which to use.

I suggest to make this change:

OLD:

   SF/SFP Load-balancing:   re-construct SFPs to distribute the workload

      among various SF instances.  Particularly, load distribution

      policies can be taken into account by the Control Element to re-

      compute an SFP or be provisioned as attributes to SFPs that will

      be installed using the control interfaces.

NEW:

   SF/SFP Load-balancing:   re-construct SFPs to distribute the workload

      among various SF instances.  Particularly, load distribution

      policies can be taken into account by the Control Element to re-

      compute an SFP or be provisioned as attributes to SFPs that will

      be installed using the control interfaces (C2 interface, typically).

Please let me know if further changes are required.
[DD] Although this change is correct, it doesn't address my concern. I woul=
d like to see language in section 3.3.2.
[DD] Perhaps, "The C2 interface may be used to configure groups of function=
ally equivalent SFs that may service a path."

[Med] Ok, what about this NEW text?

   The C2 interface may be used to configure groups of functionally
   equivalent SFs.  In particular, this group may be used for load-
   balancing purposes.



--_000_787AE7BB302AE849A7480A190F8B933008D61FA2OPEXCLILMA3corp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Texte de bulles Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:"Courier New";}
span.TextedebullesCar
	{mso-style-name:"Texte de bulles Car";
	mso-style-priority:99;
	mso-style-link:"Texte de bulles";
	font-family:"Tahoma","sans-serif";}
p.HTMLPreformatted, li.HTMLPreformatted, div.HTMLPreformatted
	{mso-style-name:"HTML Preformatted";
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
p.BalloonText, li.BalloonText, div.BalloonText
	{mso-style-name:"Balloon Text";
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle27
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle28
	{mso-style-type:personal-reply;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
span.insert
	{mso-style-name:insert;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Re-,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Please see inline.<o:p></o:p></=
span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Dave=
 Dolson [mailto:ddolson@sandvine.com]
<br>
<b>Envoy=E9&nbsp;:</b> vendredi 29 avril 2016 15:57<br>
<b>=C0&nbsp;:</b> BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org<br>
<b>Objet&nbsp;:</b> RE: draft-ietf-sfc-control-plane -- C2 interface<o:p></=
o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">Med,<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">Please =
see inline [DD]<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span =
lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&qu=
ot;sans-serif&quot;">
<a href=3D"mailto:mohamed.boucadair@orange.com">mohamed.boucadair@orange.co=
m</a> [<a href=3D"mailto:mohamed.boucadair@orange.com">mailto:mohamed.bouca=
dair@orange.com</a>]
<br>
<b>Sent:</b> Friday, April 29, 2016 2:06 AM<br>
<b>To:</b> Dave Dolson; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br=
>
<b>Subject:</b> RE: draft-ietf-sfc-control-plane -- C2 interface<o:p></o:p>=
</span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Hi Dave,
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Please see inline.<o:p></o:p></=
span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Dave=
 Dolson [<a href=3D"mailto:ddolson@sandvine.com">mailto:ddolson@sandvine.co=
m</a>]
<br>
<b>Envoy=E9&nbsp;:</b> jeudi 28 avril 2016 19:56<br>
<b>=C0&nbsp;:</b> BOUCADAIR Mohamed IMT/OLN; <a href=3D"mailto:sfc@ietf.org=
">sfc@ietf.org</a><br>
<b>Objet&nbsp;:</b> draft-ietf-sfc-control-plane -- C2 interface<o:p></o:p>=
</span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">In section 3.3.2, <a href=3D"ht=
tps://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#section-3.3.2">
https://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#section-3.3.2</=
a><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">the section is: C2: Interface b=
etween SFC Control Plane &amp; SFF<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">- There is no mention of being =
able to instruct the SFF to load-balance an SFP across multiple (functional=
ly equivalent) SFs<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">This is the service-function-gr=
oup-name concept in OpenDaylight and in draft-penno-sfc-yang-14, as I under=
stand it.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Identifying members of a group =
and identifying a group as a next-hop would be in the scope of the C2 inter=
face, correct?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] This is in scope of C2, t=
hat is responsible for populating the SFC Forwarding Policy Table. The curr=
ent text cites examples of additional to be used
 for lookup purposes (excerpt from Section 1.2): <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<pre><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Couri=
er New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Additional information such as=
 a flow identifier, Service Index<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Couri=
er New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (SI), and/or other characteris=
tics (e.g., the 5-tuple transport<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Couri=
er New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; coordinates of the original pa=
cket) may be used for lookup<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Couri=
er New&quot;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;purposes.&nbsp; The set of inf=
ormation to use for lookup purposes may<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Couri=
er New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be instructed by the control p=
lane.<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Load balancing is discussed in =
&#8220;Additional Considerations&#8221; section. Indeed, Section 4.10.1 inc=
ludes the following:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp; SF/SFP Load-balancing:&nbsp;&n=
bsp; re-construct SFPs to distribute the workload<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; among variou=
s SF instances.&nbsp; Particularly, load distribution<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; policies can=
 be taken into account by the Control Element to re-<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; compute an S=
FP or
<b><u>be provisioned as attributes to SFPs that will<o:p></o:p></u></b></sp=
an></p>
<p class=3D"MsoNormal"><b><u><span lang=3D"EN-US" style=3D"font-size:10.0pt=
;font-family:&quot;Courier New&quot;">&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;be ins=
talled using the control interfaces</span></u></b><span lang=3D"EN-US" styl=
e=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">.<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">[DD] Th=
is is in a section that seems to be about the controller making adjustments=
 to move work-load to different paths. I&#8217;m concerned with the case wh=
en traffic of a single path is load-balanced
 across multiple workers in a dynamic manner that doesn&#8217;t require con=
troller micro-management.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">[DD] To=
 help clarify, it might be useful to think of the SFF having multiple next-=
hop entries for the same SPI/SI pair; as with ECMP routing or LAG, a local =
decision selects which to use.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">I suggest to make this change:
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">OLD:<o:p></o:p></span></p>
<pre><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Couri=
er New&quot;">&nbsp;&nbsp; SF/SFP Load-balancing:&nbsp;&nbsp; re-construct =
SFPs to distribute the workload<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Couri=
er New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; among various SF instances.&nb=
sp; Particularly, load distribution<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Couri=
er New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; policies can be taken into acc=
ount by the Control Element to re-<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Couri=
er New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; compute an SFP or be provision=
ed as attributes to SFPs that will<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Couri=
er New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be installed using the control=
 interfaces.<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<pre><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Couri=
er New&quot;">&nbsp;&nbsp; SF/SFP Load-balancing:&nbsp;&nbsp; re-construct =
SFPs to distribute the workload<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Couri=
er New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; among various SF instances.&nb=
sp; Particularly, load distribution<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Couri=
er New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; policies can be taken into acc=
ount by the Control Element to re-<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Couri=
er New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; compute an SFP or be provision=
ed as attributes to SFPs that will<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Couri=
er New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be installed using the control=
 interfaces (C2 interface, typically).<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Please let me know if further c=
hanges are required.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">[DD] Al=
though this change is correct, it doesn&#8217;t address my concern. I would=
 like to see language in section 3.3.2.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">[DD] Pe=
rhaps, &#8220;The C2 interface may be used to configure groups of functiona=
lly equivalent SFs that may service a path.&#8221;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] Ok, what about this NEW t=
ext?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp; &nbsp;The C2 interface may be used t=
o configure groups of functionally<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp; equivalent SFs.&nbsp; In parti=
cular, this group may be used for load-<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;">&nbsp;&nbsp;
</span><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;"=
>balancing purposes.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
</div>
</div>
</body>
</html>

--_000_787AE7BB302AE849A7480A190F8B933008D61FA2OPEXCLILMA3corp_--


From nobody Fri Apr 29 08:06:46 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9ECE112D173 for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 08:06:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.895
X-Spam-Level: 
X-Spam-Status: No, score=-2.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ABcxmb709tDf for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 08:06:42 -0700 (PDT)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) by ietfa.amsl.com (Postfix) with ESMTP id B2D3E12D0A5 for <sfc@ietf.org>; Fri, 29 Apr 2016 08:06:41 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by wtl-exchp-1.sandvine.com ([::1]) with mapi id 14.03.0195.001; Fri, 29 Apr 2016 11:06:40 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: draft-ietf-sfc-control-plane -- C2 interface
Thread-Index: AdGhdzeqsff0+F4JRSWm8k5GYfJj0QAYB0bQABE7GWAAAcgu4AABUcsQ
Date: Fri, 29 Apr 2016 15:06:39 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F45F0E@wtl-exchp-2.sandvine.com>
References: <E8355113905631478EFF04F5AA706E9830F44097@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008D61B4F@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <E8355113905631478EFF04F5AA706E9830F45AAD@wtl-exchp-2.sandvine.com> <787AE7BB302AE849A7480A190F8B933008D61FA2@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D61FA2@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830F45F0Ewtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/7Y1LShQmHtiTRBNHAeK9C-kBYhU>
Subject: Re: [sfc] draft-ietf-sfc-control-plane -- C2 interface
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Apr 2016 15:06:44 -0000

--_000_E8355113905631478EFF04F5AA706E9830F45F0Ewtlexchp2sandvi_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Looks good, thank you.

From: mohamed.boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
Sent: Friday, April 29, 2016 10:32 AM
To: Dave Dolson; sfc@ietf.org
Subject: RE: draft-ietf-sfc-control-plane -- C2 interface

Re-,

Please see inline.

Cheers,
Med

De : Dave Dolson [mailto:ddolson@sandvine.com]
Envoy=E9 : vendredi 29 avril 2016 15:57
=C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org<mailto:sfc@ietf.org>
Objet : RE: draft-ietf-sfc-control-plane -- C2 interface

Med,
Please see inline [DD]


From: mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> [ma=
ilto:mohamed.boucadair@orange.com]
Sent: Friday, April 29, 2016 2:06 AM
To: Dave Dolson; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: RE: draft-ietf-sfc-control-plane -- C2 interface

Hi Dave,

Please see inline.

Cheers,
Med

De : Dave Dolson [mailto:ddolson@sandvine.com]
Envoy=E9 : jeudi 28 avril 2016 19:56
=C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org<mailto:sfc@ietf.org>
Objet : draft-ietf-sfc-control-plane -- C2 interface

In section 3.3.2, https://tools.ietf.org/html/draft-ietf-sfc-control-plane-=
04#section-3.3.2
the section is: C2: Interface between SFC Control Plane & SFF

- There is no mention of being able to instruct the SFF to load-balance an =
SFP across multiple (functionally equivalent) SFs
This is the service-function-group-name concept in OpenDaylight and in draf=
t-penno-sfc-yang-14, as I understand it.
Identifying members of a group and identifying a group as a next-hop would =
be in the scope of the C2 interface, correct?

[Med] This is in scope of C2, that is responsible for populating the SFC Fo=
rwarding Policy Table. The current text cites examples of additional to be =
used for lookup purposes (excerpt from Section 1.2):


      Additional information such as a flow identifier, Service Index

      (SI), and/or other characteristics (e.g., the 5-tuple transport

      coordinates of the original packet) may be used for lookup

      purposes.  The set of information to use for lookup purposes may

      be instructed by the control plane.

Load balancing is discussed in "Additional Considerations" section. Indeed,=
 Section 4.10.1 includes the following:

   SF/SFP Load-balancing:   re-construct SFPs to distribute the workload
      among various SF instances.  Particularly, load distribution
      policies can be taken into account by the Control Element to re-
      compute an SFP or be provisioned as attributes to SFPs that will
      be installed using the control interfaces.
[DD] This is in a section that seems to be about the controller making adju=
stments to move work-load to different paths. I'm concerned with the case w=
hen traffic of a single path is load-balanced across multiple workers in a =
dynamic manner that doesn't require controller micro-management.
[DD] To help clarify, it might be useful to think of the SFF having multipl=
e next-hop entries for the same SPI/SI pair; as with ECMP routing or LAG, a=
 local decision selects which to use.

I suggest to make this change:

OLD:

   SF/SFP Load-balancing:   re-construct SFPs to distribute the workload

      among various SF instances.  Particularly, load distribution

      policies can be taken into account by the Control Element to re-

      compute an SFP or be provisioned as attributes to SFPs that will

      be installed using the control interfaces.

NEW:

   SF/SFP Load-balancing:   re-construct SFPs to distribute the workload

      among various SF instances.  Particularly, load distribution

      policies can be taken into account by the Control Element to re-

      compute an SFP or be provisioned as attributes to SFPs that will

      be installed using the control interfaces (C2 interface, typically).

Please let me know if further changes are required.
[DD] Although this change is correct, it doesn't address my concern. I woul=
d like to see language in section 3.3.2.
[DD] Perhaps, "The C2 interface may be used to configure groups of function=
ally equivalent SFs that may service a path."

[Med] Ok, what about this NEW text?

   The C2 interface may be used to configure groups of functionally
   equivalent SFs.  In particular, this group may be used for load-
   balancing purposes.



--_000_E8355113905631478EFF04F5AA706E9830F45F0Ewtlexchp2sandvi_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
p.PrformatHTML, li.PrformatHTML, div.PrformatHTML
	{mso-style-name:"Pr=E9format=E9 HTML";
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:"Courier New";}
p.Textedebulles, li.Textedebulles, div.Textedebulles
	{mso-style-name:"Texte de bulles";
	mso-style-link:"Texte de bulles Car";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.TextedebullesCar
	{mso-style-name:"Texte de bulles Car";
	mso-style-priority:99;
	mso-style-link:"Texte de bulles";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle27
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle28
	{mso-style-type:personal;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
span.insert
	{mso-style-name:insert;}
span.EmailStyle30
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Looks good, thank you.=
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> mohamed.=
boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
<br>
<b>Sent:</b> Friday, April 29, 2016 10:32 AM<br>
<b>To:</b> Dave Dolson; sfc@ietf.org<br>
<b>Subject:</b> RE: draft-ietf-sfc-control-plane -- C2 interface<o:p></o:p>=
</span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Re-,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Please see inline.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span=
 lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot=
;sans-serif&quot;"> Dave Dolson [<a href=3D"mailto:ddolson@sandvine.com">ma=
ilto:ddolson@sandvine.com</a>]
<br>
<b>Envoy=E9&nbsp;:</b> vendredi 29 avril 2016 15:57<br>
<b>=C0&nbsp;:</b> BOUCADAIR Mohamed IMT/OLN; <a href=3D"mailto:sfc@ietf.org=
">sfc@ietf.org</a><br>
<b>Objet&nbsp;:</b> RE: draft-ietf-sfc-control-plane -- C2 interface<o:p></=
o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"FR"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Med,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Please see inline [DD]=
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
<a href=3D"mailto:mohamed.boucadair@orange.com">mohamed.boucadair@orange.co=
m</a> [<a href=3D"mailto:mohamed.boucadair@orange.com">mailto:mohamed.bouca=
dair@orange.com</a>]
<br>
<b>Sent:</b> Friday, April 29, 2016 2:06 AM<br>
<b>To:</b> Dave Dolson; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br=
>
<b>Subject:</b> RE: draft-ietf-sfc-control-plane -- C2 interface<o:p></o:p>=
</span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Hi Dave,
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Please see inline.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span=
 lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot=
;sans-serif&quot;"> Dave Dolson [<a href=3D"mailto:ddolson@sandvine.com">ma=
ilto:ddolson@sandvine.com</a>]
<br>
<b>Envoy=E9&nbsp;:</b> jeudi 28 avril 2016 19:56<br>
<b>=C0&nbsp;:</b> BOUCADAIR Mohamed IMT/OLN; <a href=3D"mailto:sfc@ietf.org=
">sfc@ietf.org</a><br>
<b>Objet&nbsp;:</b> draft-ietf-sfc-control-plane -- C2 interface<o:p></o:p>=
</span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"FR"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal">In section 3.3.2, <a href=3D"https://tools.ietf.org/=
html/draft-ietf-sfc-control-plane-04#section-3.3.2">
https://tools.ietf.org/html/draft-ietf-sfc-control-plane-04#section-3.3.2</=
a><o:p></o:p></p>
<p class=3D"MsoNormal">the section is: C2: Interface between SFC Control Pl=
ane &amp; SFF<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">- There is no mention of being able to instruct the =
SFF to load-balance an SFP across multiple (functionally equivalent) SFs<o:=
p></o:p></p>
<p class=3D"MsoNormal">This is the service-function-group-name concept in O=
penDaylight and in draft-penno-sfc-yang-14, as I understand it.<o:p></o:p><=
/p>
<p class=3D"MsoNormal">Identifying members of a group and identifying a gro=
up as a next-hop would be in the scope of the C2 interface, correct?<o:p></=
o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">[Med] This is in scope of C2, that is responsi=
ble for populating the SFC Forwarding Policy Table. The current text cites =
examples of additional to be used for lookup purposes
 (excerpt from Section 1.2): <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<pre><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Additional information such as a flow identif=
ier, Service Index<o:p></o:p></span></pre>
<pre><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (SI), and/or other characteristics (e.g., the=
 5-tuple transport<o:p></o:p></span></pre>
<pre><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; coordinates of the original packet) may be us=
ed for lookup<o:p></o:p></span></pre>
<pre><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">&=
nbsp;&nbsp;&nbsp; &nbsp;&nbsp;purposes.&nbsp; The set of information to use=
 for lookup purposes may<o:p></o:p></span></pre>
<pre><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be instructed by the control plane.<o:p></o:p=
></span></pre>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Load balancing is discussed in &#8220;Addition=
al Considerations&#8221; section. Indeed, Section 4.10.1 includes the follo=
wing:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp; SF/SFP Load-balancing:&nbsp;&nbsp; re-constru=
ct SFPs to distribute the workload<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; among various SF instances.=
&nbsp; Particularly, load distribution<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; policies can be taken into =
account by the Control Element to re-<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; compute an SFP or
<b><u>be provisioned as attributes to SFPs that will<o:p></o:p></u></b></sp=
an></p>
<p class=3D"MsoNormal"><b><u><span style=3D"font-size:10.0pt;font-family:&q=
uot;Courier New&quot;">&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;be installed using th=
e control interfaces</span></u></b><span style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;">.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] This is in a sect=
ion that seems to be about the controller making adjustments to move work-l=
oad to different paths. I&#8217;m concerned with the case when traffic of a=
 single path is load-balanced across multiple
 workers in a dynamic manner that doesn&#8217;t require controller micro-ma=
nagement.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] To help clarify, =
it might be useful to think of the SFF having multiple next-hop entries for=
 the same SPI/SI pair; as with ECMP routing or LAG, a local decision select=
s which to use.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">I suggest to make this change:
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">OLD:<o:p></o:p></span></p>
<pre><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">&=
nbsp;&nbsp; SF/SFP Load-balancing:&nbsp;&nbsp; re-construct SFPs to distrib=
ute the workload<o:p></o:p></span></pre>
<pre><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; among various SF instances.&nbsp; Particularl=
y, load distribution<o:p></o:p></span></pre>
<pre><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; policies can be taken into account by the Con=
trol Element to re-<o:p></o:p></span></pre>
<pre><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; compute an SFP or be provisioned as attribute=
s to SFPs that will<o:p></o:p></span></pre>
<pre><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be installed using the control interfaces.<o:=
p></o:p></span></pre>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<pre><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">&=
nbsp;&nbsp; SF/SFP Load-balancing:&nbsp;&nbsp; re-construct SFPs to distrib=
ute the workload<o:p></o:p></span></pre>
<pre><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; among various SF instances.&nbsp; Particularl=
y, load distribution<o:p></o:p></span></pre>
<pre><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; policies can be taken into account by the Con=
trol Element to re-<o:p></o:p></span></pre>
<pre><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; compute an SFP or be provisioned as attribute=
s to SFPs that will<o:p></o:p></span></pre>
<pre><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be installed using the control interfaces (C2=
 interface, typically).<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Please let me know if further changes are requ=
ired.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] Although this cha=
nge is correct, it doesn&#8217;t address my concern. I would like to see la=
nguage in section 3.3.2.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] Perhaps, &#8220;T=
he C2 interface may be used to configure groups of functionally equivalent =
SFs that may service a path.&#8221;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">[Med] Ok, what about this NEW text?<o:p></o:p>=
</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp; &nbsp;The C2 interface may be used to configure gro=
ups of functionally<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp; equivalent SFs.&nbsp; In particular, this gro=
up may be used for load-<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&nbsp;&nbsp; </span>
<span lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;Courier New&q=
uot;">balancing purposes.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
</div>
</div>
</body>
</html>

--_000_E8355113905631478EFF04F5AA706E9830F45F0Ewtlexchp2sandvi_--


From nobody Fri Apr 29 08:18:19 2016
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7174612B062 for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 08:18:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.618
X-Spam-Level: 
X-Spam-Status: No, score=-2.618 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kkwEmBxiM7pV for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 08:18:11 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 55D2F12B03A for <sfc@ietf.org>; Fri, 29 Apr 2016 08:18:10 -0700 (PDT)
Received: from omfedm05.si.francetelecom.fr (unknown [xx.xx.xx.1]) by omfedm10.si.francetelecom.fr (ESMTP service) with ESMTP id 78EA5264BE3; Fri, 29 Apr 2016 17:18:08 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.60]) by omfedm05.si.francetelecom.fr (ESMTP service) with ESMTP id 55BDA35C045; Fri, 29 Apr 2016 17:18:08 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM7F.corporate.adroot.infra.ftgroup ([fe80::c1d7:e278:e357:11ad%19]) with mapi id 14.03.0279.002; Fri, 29 Apr 2016 17:18:08 +0200
From: <mohamed.boucadair@orange.com>
To: Dave Dolson <ddolson@sandvine.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: draft-ietf-sfc-control-plane -- C3 interface
Thread-Index: AdGiKlPyCGamlj3aSpeV/2k+/ATTtw==
Date: Fri, 29 Apr 2016 15:18:07 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B933008D6201C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.3]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B933008D6201COPEXCLILMA3corp_"
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.4.29.145415
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/qEAXcXnV6W50i1qJ80mww3V9AzQ>
Subject: Re: [sfc] draft-ietf-sfc-control-plane -- C3 interface
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Apr 2016 15:18:18 -0000

--_000_787AE7BB302AE849A7480A190F8B933008D6201COPEXCLILMA3corp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Re-,

Please see inline.

Cheers,
Med


De : Dave Dolson [mailto:ddolson@sandvine.com]
Envoy=E9 : vendredi 29 avril 2016 16:24
=C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org
Objet : RE: draft-ietf-sfc-control-plane -- C3 interface

[..]

E.g., as in section 5.1 of https://www.ietf.org/archive/id/draft-penno-sfc-=
packet-02.txt
Maybe add this paragraph:
"This interface informs the SFC-aware SF about the method for handling bidi=
rectional paths,
either by conveying the algorithmic method to use, or by providing forward/=
reverse path
mapping."

[Med] I'm hesitating to add text about the "algorithmic method" as I don't =
have a document to cite. Note that some stateful SFs (e.g., NAT) will natur=
ally add a reverse mapping to handle incoming packets without requiring inp=
uts from the CP. What do you mean by "providing forward/reverse path mappin=
g"? Is it SF-specific mapping?

[DD] I agree there is a lack of material to cite...
[DD] What I mean is informing the SF that "path X is the complementary path=
 of path Y". E.g., "Paths 100 (upstream) and 101 (downstream) are pairs. Re=
spond to a path-100 packet on path 101."
[Med] Thank you for the clarification. What would be the added value of pro=
viding that information (X complementary of Y) if we assume that two classi=
fication rules are installed to handle both directions?

What about adding this NEW text at the end of Section 4.2?

NEW:
   Typically, C2 interface is used to ensure that the same SF instance
   is involved in both directions of a flow (including, to ensure full
   chain symmetry).
[DD] I disagree that C2 has anything to do with this. Instead, C1 must be u=
sed to provide consistent classification.
[Med] The example I have in mind is an a statefull NAT that is attached to =
a given SFF while the Classifier hasn't the visibility on the full forwardi=
ng path. The classifier in such case has no means to force that the same SF=
 instance will be invoked for both direction. Wouldn't C2 be involved in su=
ch case?

[DD] How about adding the generic statement to section 3.3.3, "Some SFs may=
 need to be configured regarding the rules for packet reversal on a path. T=
he controller may use the C3 interface to specify how packets on a path may=
 be placed on the reverse path."
[Med] What is specific in this case compared to configuring two classificat=
ion rules; one for each direction? Is there something the classifier is sup=
posed to do?


...

[Med] FWIW, context information is mentioned in the WG charter "communicate=
s context information between nodes that implement". What about this change=
 to avoid confusion:

OLD:
   This interface is also used to instruct an SFC-aware SF about any
   context information it needs to supply in the context of a given SFC.

NEW:
   This interface is also used to instruct an SFC-aware SF about any
   context information (a.k.a., metadata) it needs to supply
   for a given SFC.
[DD] Again, is this intended to mean adding information to a packet? Or is =
"supply" intentionally vague about the delivery mechanism?
[Med] "Supply" is intentional here as this covers both cases: (1) add a new=
 information to a packer (e.g., a new TLV), (2) update the context of an ex=
isting TLV.


Regarding this paragraph, I think it would be cleaner if this behavior actu=
ally requires the C2 interface into the SF.

[Med] I do think the current wording is correct. Having an SFF co-located w=
ith a set of SFs is deployment-specific according to the SFC architecture R=
FC.
[DD] I agree with that statement. However, I think the case being described=
 is when there *is* a co-located SFF, but the text is pretending there isn'=
t. If the following text remains, C3 will need to include all the functiona=
lity of C2.
[Med] I re-confirm that the initial case we wanted to cover by this text is=
 an SFF servicing a group of SFs that are embedded in a distinct physical n=
ode. This scenario suppose that once an SF is consumed it sends back the pa=
cket to the SFF that may undertake another hook to another SF in that node =
and so on. The packet is not handed from an SF to another one without solic=
iting the external SFF. That's sub-optimal, I agree. The text is currently =
silent whether the distinct locators are configured using the C2 interface =
(assuming that a distinct management interface is used between the control =
element and an SFC-aware SF).


--_000_787AE7BB302AE849A7480A190F8B933008D6201COPEXCLILMA3corp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Texte de bulles Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:"Courier New";}
span.TextedebullesCar
	{mso-style-name:"Texte de bulles Car";
	mso-style-priority:99;
	mso-style-link:"Texte de bulles";
	font-family:"Tahoma","sans-serif";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;}
p.HTMLPreformatted, li.HTMLPreformatted, div.HTMLPreformatted
	{mso-style-name:"HTML Preformatted";
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
p.BalloonText, li.BalloonText, div.BalloonText
	{mso-style-name:"Balloon Text";
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle27
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle28
	{mso-style-type:personal-reply;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Re-,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Please see inline.<o:p></o:p></=
span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span style=3D"fo=
nt-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Dave=
 Dolson [mailto:ddolson@sandvine.com]
<br>
<b>Envoy=E9&nbsp;:</b> vendredi 29 avril 2016 16:24<br>
<b>=C0&nbsp;:</b> BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org<br>
<b>Objet&nbsp;:</b> RE: draft-ietf-sfc-control-plane -- C3 interface<o:p></=
o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">[..]</s=
pan><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Courie=
r New&quot;;color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">E.g., as in section 5.1 of </sp=
an><a href=3D"https://www.ietf.org/archive/id/draft-penno-sfc-packet-02.txt=
"><span lang=3D"EN-US">https://www.ietf.org/archive/id/draft-penno-sfc-pack=
et-02.txt</span></a>
<span lang=3D"EN-US"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Maybe add this paragraph:<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&#8220;This interface informs t=
he SFC-aware SF about the method for handling bidirectional paths,<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">either by conveying the algorit=
hmic method to use, or by providing forward/reverse path
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">mapping.&#8221;<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] I&#8217;m hesitating to a=
dd text about the &#8220;algorithmic method&#8221; as I don&#8217;t have a =
document to cite. Note that some stateful SFs (e.g., NAT) will naturally
 add a reverse mapping to handle incoming packets without requiring inputs =
from the CP. What do you mean by &#8220;providing forward/reverse path mapp=
ing&#8221;? Is it SF-specific mapping?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">[DD] I =
agree there is a lack of material to cite&#8230;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">[DD] Wh=
at I mean is informing the SF that &#8220;path X is the complementary path =
of path Y&#8221;. E.g., &#8220;Paths 100 (upstream) and 101 (downstream) ar=
e pairs. Respond to a path-100 packet on path 101.&#8221;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:red">[Med] Thank you for the clarifica=
tion. What would be the added value of providing that information (X comple=
mentary of Y) if we assume that two classification
 rules are installed to handle both directions?&nbsp;&nbsp; <o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">What about adding this NEW text=
 at the end of Section 4.2?
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp; Typically, C2 inte=
rface is used to ensure that the same SF instance
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp;&nbsp;is involved i=
n both directions of a flow (including, to ensure full
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&nbsp;&nbsp;&nbsp;chain symmetr=
y).
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">[DD] I =
disagree that C2 has anything to do with this. Instead, C1 must be used to =
provide consistent classification.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:red">[Med] The example I have in mind =
is an a statefull NAT that is attached to a given SFF while the Classifier =
hasn&#8217;t the visibility on the full forwarding path.
 The classifier in such case has no means to force that the same SF instanc=
e will be invoked for both direction. Wouldn&#8217;t C2 be involved in such=
 case?&nbsp;&nbsp;
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">[DD] Ho=
w about adding the generic statement to section 3.3.3, &#8220;Some SFs may =
need to be configured regarding the rules for packet reversal on a path. Th=
e controller may use the C3 interface to specify
 how packets on a path may be placed on the reverse path.&#8221;<o:p></o:p>=
</span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:red">[Med] What is specific in this ca=
se compared to configuring two classification rules; one for each direction=
? Is there something the classifier is supposed
 to do?&nbsp; <o:p></o:p></span></p>
<pre><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Couri=
er New&quot;">&nbsp;&nbsp;&nbsp;<span style=3D"color:black"><o:p></o:p></sp=
an></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">&#8230;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] FWIW, context information=
 is mentioned in the WG charter &#8220;communicates context information bet=
ween nodes that implement&#8221;. What about this change to
 avoid confusion:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">OLD:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;Cour=
ier New&quot;">&nbsp;&nbsp; This interface is also used to instruct an SFC-=
aware SF about any<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;Cour=
ier New&quot;">&nbsp;&nbsp; context information it needs to supply in the c=
ontext of a given SFC.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;Cour=
ier New&quot;">&nbsp;&nbsp; This interface is also used to instruct an SFC-=
aware SF about any<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;Cour=
ier New&quot;">&nbsp;&nbsp; context information (a.k.a., metadata) it needs=
 to supply
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-family:&quot;Cour=
ier New&quot;">&nbsp;&nbsp;&nbsp;for a given SFC.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">[DD] Ag=
ain, is this intended to mean adding information to a packet? Or is &#8220;=
supply&#8221; intentionally vague about the delivery mechanism?<o:p></o:p><=
/span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:red">[Med] &#8220;Supply&#8221; is int=
entional here as this covers both cases: (1) add a new information to a pac=
ker (e.g., a new TLV), (2) update the context of an existing
 TLV. <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Regarding this paragraph, I thi=
nk it would be cleaner if this behavior actually requires the C2 interface =
into the SF.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black">[Med] I do think the current wo=
rding is correct. Having an SFF co-located with a set of SFs is deployment-=
specific according to the SFC architecture RFC.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">[DD] I =
agree with that statement. However, I think the case being described is whe=
n there *<b>is</b>* a co-located SFF, but the text is pretending there isn&=
#8217;t. If the following text remains, C3 will
 need to include all the functionality of C2.</span><span lang=3D"EN-US" st=
yle=3D"color:black"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:red">[Med] I re-confirm that the initi=
al case we wanted to cover by this text is an SFF servicing a group of SFs =
that are embedded in a distinct physical node. This
 scenario suppose that once an SF is consumed it sends back the packet to t=
he SFF that may undertake another hook to another SF in that node and so on=
. The packet is not handed from an SF to another one without soliciting the=
 external SFF. That&#8217;s sub-optimal,
 I agree. The text is currently silent whether the distinct locators are co=
nfigured using the C2 interface (assuming that a distinct management interf=
ace is used between the control element and an SFC-aware SF). &nbsp;&nbsp;&=
nbsp;&nbsp;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-=
family:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
</div>
</div>
</body>
</html>

--_000_787AE7BB302AE849A7480A190F8B933008D6201COPEXCLILMA3corp_--


From nobody Fri Apr 29 08:48:14 2016
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9159E12B03A for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 08:48:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9EdaWi6mXYfR for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 08:48:07 -0700 (PDT)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A01B212D187 for <sfc@ietf.org>; Fri, 29 Apr 2016 08:47:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=168770; q=dns/txt; s=iport; t=1461944857; x=1463154457; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=m56Bqyb1+45IhDDO7lVl13ank2Ht/eQV+mxFARON0xQ=; b=kJUtQleLqtmubwsBc3hBCKp0l+5q0rIP2bsPJI6OZpNoYMwiR6Q4gd8L z6u/Wel5ub0SsXx3vn6QZOxCcQglw97NjT/VQgkv7GFIFXhvy7RC340xY hLxpE3XbRdvzULGUkuETq06BcHNddPkTOuPga+vx/5OlwsAIX0NRCzYTH E=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AMAgAAgSNX/4ENJK1aA4JsTFN9Bq4Li?= =?us-ascii?q?2ABDYFyBBcBCoVuAoEqOBQBAQEBAQEBZSeEQQEBAQQBAQEXAQIQOgcLDAQCAQg?= =?us-ascii?q?RAwEBASEBAgQHIQYLFAkIAgQBDQWIFQMSDr9/DYROAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBEQSGIYRMgkGCHAEVEYUPBYd2iyyEQDEBhXuCd4MugXaBZ4RNgymFNIY?= =?us-ascii?q?kgS2HXgEeAQFCgjaBNWyIAn8BAQE?=
X-IronPort-AV: E=Sophos;i="5.24,552,1454976000";  d="scan'208,217";a="266245842"
Received: from alln-core-9.cisco.com ([173.36.13.129]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 29 Apr 2016 15:47:35 +0000
Received: from XCH-ALN-007.cisco.com (xch-aln-007.cisco.com [173.36.7.17]) by alln-core-9.cisco.com (8.14.5/8.14.5) with ESMTP id u3TFlZ0V015480 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 29 Apr 2016 15:47:35 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-007.cisco.com (173.36.7.17) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 29 Apr 2016 10:47:34 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Fri, 29 Apr 2016 10:47:34 -0500
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: Sunil Vallamkonda <sunilvk@f5.com>, "Andrew G. Malis" <agmalis@gmail.com>,  Joel Halpern Direct <jmh.direct@joelhalpern.com>
Thread-Topic: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
Thread-Index: AQHRoLy5gODJbPprtEyKsV065fH5RJ+elnwAgAAtrACAAAwigIAA0eUA///PIYCAAJ/UAIABGwgA
Date: Fri, 29 Apr 2016 15:47:34 +0000
Message-ID: <D348FA2D.4C885%jguichar@cisco.com>
References: <m3egarz7kh.wl-narten@us.ibm.com> <7E05C330D7FD6D4FAD0728C46B899585893723B9@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F037@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <783b2703-5371-7e9c-0718-27c5722d7f8f@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D5F52C@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7E05C330D7FD6D4FAD0728C46B89958589372CCE@ORSMSX114.amr.corp.intel.com> <787AE7BB302AE849A7480A190F8B933008D5F5A1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7CD2F@dfweml501-mbb> <098dd557-bb0a-c499-6bf6-3faa707b89c7@joelhalpern.com> <4A95BA014132FF49AE685FAB4B9F17F657E7CDB7@dfweml501-mbb> <a278df92-803d-15a4-ff65-a74fc3f9e75d@joelhalpern.com> <787AE7BB302AE849A7480A190F8B933008D604E1@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <4A95BA014132FF49AE685FAB4B9F17F657E7D943@dfweml501-mbb> <552c87c0-81b6-7f14-09a3-f68abc25a581@joelhalpern.com> <CAA=duU0cjXbTxTCqaRetajxFaJVfq8Y-HySPDrR-0AN38Wq3Zw@mail.gmail.com> <4d65232a-d4a6-a11b-c765-635cb909edbd@joelhalpern.com> <CAA=duU0PujWB0LB=wxFauPqaqbf4kFsqkzAwtNn7r3MzBUdCqA@mail.gmail.com> <D3478632.4C66A%jguichar@cisco.com> <a320cf42a7c64ca2a7b5438043174908@SEAEXCHMBX06.olympus.F5Net.com>
In-Reply-To: <a320cf42a7c64ca2a7b5438043174908@SEAEXCHMBX06.olympus.F5Net.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.98.43.179]
Content-Type: multipart/alternative; boundary="_000_D348FA2D4C885jguicharciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/YTWqudW-YeoUi6y7qotV332Ghnk>
Cc: "Elzur, Uri" <uri.elzur@intel.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-sfc-nsh-04.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Apr 2016 15:48:12 -0000

--_000_D348FA2D4C885jguicharciscocom_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Hi Sunil,

I think the suggested text to add is "Use the fragmentation provided by the=
 network overlay mechanics. One example can be found in RFC 6830, section 5=
.4.=94 - hope this clarifies.

Jim

From: Sunil Vallamkonda <sunilvk@f5.com<mailto:sunilvk@f5.com>>
Date: Thursday, April 28, 2016 at 2:54 PM
To: Jim Guichard <jguichar@cisco.com<mailto:jguichar@cisco.com>>, "Andrew G=
. Malis" <agmalis@gmail.com<mailto:agmalis@gmail.com>>, Joel Halpern Direct=
 <jmh.direct@joelhalpern.com<mailto:jmh.direct@joelhalpern.com>>
Cc: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "mohame=
d.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>" <mohamed.bouca=
dair@orange.com<mailto:mohamed.boucadair@orange.com>>, "sfc@ietf.org<mailto=
:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>, Linda Dunbar <linda.du=
nbar@huawei.com<mailto:linda.dunbar@huawei.com>>
Subject: RE: [sfc] Suggested wording addtion to the Section 6 (Fragmentatio=
n Consideration) of the draft-ietf-sfc-nsh-04.txt

Jim,

I agree, the confusion being NSH treated as a network overlay.
Would it be possible for the document to have wording on this ?
This could also clarify interpretations how NSH to be used with ARP, DHCP a=
nd encapsulations.


Thank you,
Sunil

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Jim Guichard (jguichar=
)
Sent: Thursday, April 28, 2016 6:23 AM
To: Andrew G. Malis <agmalis@gmail.com<mailto:agmalis@gmail.com>>; Joel Hal=
pern Direct <jmh.direct@joelhalpern.com<mailto:jmh.direct@joelhalpern.com>>
Cc: Elzur, Uri <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>; mohamed.b=
oucadair@orange.com<mailto:mohamed.boucadair@orange.com>; sfc@ietf.org<mail=
to:sfc@ietf.org>; Linda Dunbar <linda.dunbar@huawei.com<mailto:linda.dunbar=
@huawei.com>>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentatio=
n Consideration) of the draft-ietf-sfc-nsh-04.txt

Hi Andy,

I think the key point is that NSH !=3D network overlay but rather utilizes =
a network overlay for packet transport between SFC network elements. The re=
ference is just an example of how a network overlay might deal with fragmen=
tation and is not a suggestion that NSH adopt that mechanism but rather mak=
es the point that it can utilize the existing network overlay mechanics.

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Andrew G. Malis" <agmalis@gmail.com<mailto:agmalis@gmail.com>>
Date: Thursday, April 28, 2016 at 8:17 AM
To: Joel Halpern Direct <jmh.direct@joelhalpern.com<mailto:jmh.direct@joelh=
alpern.com>>
Cc: "Elzur, Uri" <uri.elzur@intel.com<mailto:uri.elzur@intel.com>>, "mohame=
d.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>" <mohamed.bouca=
dair@orange.com<mailto:mohamed.boucadair@orange.com>>, "sfc@ietf.org<mailto=
:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>, Linda Dunbar <linda.du=
nbar@huawei.com<mailto:linda.dunbar@huawei.com>>
Subject: Re: [sfc] Suggested wording addtion to the Section 6 (Fragmentatio=
n Consideration) of the draft-ietf-sfc-nsh-04.txt

Joel,

The diagrams in section 6 of RFC 6830 are control plane, not data plane. Th=
e data plane diagrams are in section 5.

But the overriding question is - without any fields in the NSH header to se=
quence fragments, how can the fragments be correctly reassembled?

Cheers,
Andy

On Wed, Apr 27, 2016 at 7:46 PM, Joel Halpern Direct <jmh.direct@joelhalper=
n.com<mailto:jmh.direct@joelhalpern.com>> wrote:
The LISP header does not have a fragment flag or fragment offset.  The diag=
rams in section 6 include the outer encapsulating header (the equivalent of=
 the transport header in SFC.)  Yes, the text is a little hard to follow in=
 this regard.  The LISP working group is going to be rewriting RFC 6830 as =
part of moving to standards track.

So there is no difference in this regard between NSH and LISP.

Yours,
Joel

On 4/27/16 7:02 PM, Andrew G. Malis wrote:
Joel et al,

All this talk about fragmentation prompted me to re-read section 6 of
the draft, which recommends (as option 3) using the procedures in
section 5.4 of RFC 6830 (presumably with the =93NSH header=94 replacing the
=93LISP header=94 in the description of the procedures in that section).

So that led me to read that section (and the LISP header definition in
section 5.1), and I see that LISP does fragmentation and reassembly
identically to IPv4, using the Fragment Offset field so that fragments
can be correctly reassembled in the proper order.

However, the NSH Header doesn=92t have a Fragment Offset field or any
other way to order the fragments.

So how can the procedures in Section 5.4 of 6830 be used?

Thanks,
Andy

On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern <jmh@joelhalpern.com<mailt=
o:jmh@joelhalpern.com>
<mailto:jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>> wrote:

    Both methods are valid, and both depend upon details of the
    underlying packet and the transport.  As such, I don't see why this
    document benefits from describing them, much less why it should mark
    one method as a "should".  Implementation details are likely to be
    more significant than any bit consumption difference between the two
    alternatives.

    Yours,
    Joel


    On 4/27/16 3:40 PM, Linda Dunbar wrote:

        I suggest adding the following paragraphs after the Bullet 3 of
        the Section 6 Fragmentation Consideration to make the process
        more clear and less controversial:


        --------------------------------

        RFC6830 describes the fragmentation method of breaking the
        original packet into two equal sub-frames and encapsulating
        [LISP Header + Transport header] to each sub-frame.

        If LISP fragmentation [RFC6830 Section 5.4] is used, the [SFC
        Header + Transport Header] will be added to each half frame (or
        the original data frame). As the Transport Header is terminated
        by the next SFF node's tunnel transport layer, the combined two
        sub-frames will have two SFC Headers.

        Therefore, the fragmentation for NSH encapsulated data frame
        should be done completely by the node tunnel transport layer,
        which should break the [SFC + original packet] into two equal
        sub-frames and each sub-frame being encapsulated with its
        respective tunnel header.  The next SFF node's tunnel transport
        layer should combine the two sub-frames before sending to the
        next node.

        ------------------------------------------------------


        By the way, there are to typo in the Section 6:
        3rd line: "In order the" =3D=3D> "In order to"
        Last line of Bullet 2: extra "the" in the "utilized to ensure
        the the required packet".


        Hope it helps.

        Linda



        -----Original Message-----
        From: mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.=
com>
        <mailto:mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orang=
e.com>>
        [mailto:mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orang=
e.com>
        <mailto:mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orang=
e.com>>]
        Sent: Wednesday, April 27, 2016 12:40 AM
        To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; sfc@ietf.org<mailto:=
sfc@ietf.org>
        <mailto:sfc@ietf.org<mailto:sfc@ietf.org>>
        Subject: RE: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

        Hi Joel, all,

        Please see inline.

        Cheers,
        Med

            -----Message d'origine-----
            De : Joel M. Halpern [mailto:jmh@joelhalpern.com<mailto:jmh@joe=
lhalpern.com>
            <mailto:jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>] Envoy=
=E9 : mardi 26
            avril 2016 19:18 =C0 : Linda Dunbar; BOUCADAIR Mohamed
            IMT/OLN; Elzur,
            Uri; sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.org<mai=
lto:sfc@ietf.org>> Objet : Re: [sfc] WG
            last call for
            draft-ietf-sfc-nsh-04.txt

            With regard to Transport tunnel fragementation, that seems
            an issue
            for the transport protocol.  I don't actually object to a
            sentence,
            but it does not seem that it will accomplish anything.


        [Med] I would like to see some text added to the draft.


            With regard to packets fragmented by the source, I
            completely disagree
            with your assertion.  If an SFF were to reassemble the
            packets, that
            would be a violation of its job.


        [Med] I agree with you.

          There is no reason for an SFF to

            reassemble a packet fragmented by the source.  The
            classifier may have
            to do some interesting things in order to properly classify
            succeeding
            fragments, but that is an implementation issue (most commonly
            addressed with virtual reassembly, which doe snot delay the
            fragments.)  We don't specity that.


        [Med] Still, the external behavior of the classifier needs to be
        clear in the document. I don't find any text in the draft saying
        for instance that an NSH header must be present in all
        fragments. (There some processing that might be needed at the
        SFF to "do its job" with regards to fragments (receive out of
        order fragments + forwarding policy on the full packet).)


            If an SF needs to reassemble fragments to do its job, that
            is up to
            the SF.  Some will need to actually reassemble.  Some will
            need to
            perform virtual reassembly, and some will happily process the
            fragments.  I can not see what the NSH document could
            possibly mandate.


        [Med] Fully agree.


            Yours,
            Joel

            On 4/26/16 11:47 AM, Linda Dunbar wrote:

                Joel,

                I think the document should add the description on the
                following two
                fragmentation scenarios:

                - Transport tunnel generated fragmentation: When a packet
                fragmentation is caused by transport tunnel (i.e. various
                encapsulations), the termination point of the transport
                tunnel is
                responsible for re-assembling the fragmented pieces of
                the packet.
                Since there won't be any SFF nodes in between the
                Transport Tunnel,
                the tunnel generated fragmentation does not require any
                actions by
                SFF nodes or SF nodes.


                - Source node generated fragmentation (after adding on
                the NSH
                header): When fragmentation has to be performed for a
                packet being
                encapsulated with the NSH header, either the
                intermediate SFF nodes
                or the SF nodes have to be able to reassemble the
                fragmented pieces.




                Cheers,


                Linda

                -----Original Message----- From: Joel M. Halpern
                [mailto:jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>
                <mailto:jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>] S=
ent: Tuesday, April 26,
                2016 10:33 AM
                To: Linda Dunbar; mohamed.boucadair@orange.com<mailto:moham=
ed.boucadair@orange.com>
                <mailto:mohamed.boucadair@orange.com<mailto:mohamed.boucada=
ir@orange.com>>; Elzur, Uri;
                sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.org<mail=
to:sfc@ietf.org>> Subject: Re: [sfc] WG
                last call for
                draft-ietf-sfc-nsh-04.txt

                Re-reading your note, it is possible that you are
                referring only to
                the case of transport generated fragmentation of the
                outer packet.
                I had assumed you were not talking about that, since the
                resulting
                fragments will not all have NSH headers.  As with any tunne=
l
                technology, if the tunnel chooses to fragment at its
                layer, then the
                tunnel is responsible for reassembly.  That would be
                invisible to
                the SFF.

                Yours, Joel

                On 4/26/16 11:10 AM, Linda Dunbar wrote:

                    Agree with Med.

                    Even if each fragment piece of a packet with NSH
                    header carries the
                    NSH header, the intermediate SFF nodes still need to
                    put together
                    all the fragments together before passing the whole
                    data frame to
                    the SF.

                    Linda

                    -----Original Message----- From: sfc
                    [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.or=
g>
                    <mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.or=
g>>]
                    On Behalf Of mohamed.boucadair@orange.com<mailto:mohame=
d.boucadair@orange.com>
                    <mailto:mohamed.boucadair@orange.com<mailto:mohamed.bou=
cadair@orange.com>> Sent: Monday,
                    April 25,
                    2016 9:42 AM To: Elzur, Uri; Joel M. Halpern;
                    sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.org<=
mailto:sfc@ietf.org>> Subject:
                    Re: [sfc] WG last call for draft-ietf-sfc-nsh-04.txt

                    Re-,

                    How do you instruct the transport layer to ALWAYS
                    prepend an NSH
                    header even for fragments? Or you don't care about that=
?

                    Thank you.

                    Cheers, Med

                        -----Message d'origine----- De : Elzur, Uri
                        [mailto:uri.elzur@intel.com<mailto:uri.elzur@intel.=
com>
                        <mailto:uri.elzur@intel.com<mailto:uri.elzur@intel.=
com>>] Envoy=E9 : lundi 25
                        avril 2016 16:26 =C0
                        : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;
                        sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.=
org<mailto:sfc@ietf.org>> Objet
                        : RE: [sfc] WG last call for
                        draft-ietf-sfc-nsh-04.txt

                        Hi Med

                        Not to repeat my position, but I'll do it anyhow
                        :-) As NSH is
                        *NOT* a transport, dealing with fragmentation is
                        left to the
                        Transport used.

                        The model I use for NSH, is basically similar to
                        VXLAN . It is an
                        overly.

                        Thx

                        Uri ("Oo-Ree") C: 949-378-7568<tel:949-378-7568> <t=
el:949-378-7568<tel:949-378-7568>>


                        -----Original Message----- From: sfc
                        [mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@iet=
f.org>
                        <mailto:sfc-bounces@ietf.org<mailto:sfc-bounces@iet=
f.org>>]
                        On Behalf Of mohamed.boucadair@orange.com<mailto:mo=
hamed.boucadair@orange.com>
                        <mailto:mohamed.boucadair@orange.com<mailto:mohamed=
.boucadair@orange.com>> Sent:
                        Monday, April 25,
                        2016 7:18 AM To: Joel M. Halpern
                        <jmh@joelhalpern.com<mailto:jmh@joelhalpern.com> <m=
ailto:jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>>;
                        sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.=
org<mailto:sfc@ietf.org>>
                        Subject: Re: [sfc] WG last call for
                        draft-ietf-sfc-nsh-04.txt

                        Hi Joel,

                        Please see inline.

                        Cheers, Med

                            -----Message d'origine----- De : Joel M. Halper=
n
                            [mailto:jmh@joelhalpern.com<mailto:jmh@joelhalp=
ern.com>
                            <mailto:jmh@joelhalpern.com<mailto:jmh@joelhalp=
ern.com>>] Envoy=E9 : lundi
                            25 avril 2016 15:48 =C0
                            : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org<mailt=
o:sfc@ietf.org>
                            <mailto:sfc@ietf.org<mailto:sfc@ietf.org>> Obje=
t : Re: [sfc] WG
                            last call for draft-ietf-sfc-nsh-04.txt

                            If I am understanding you correctly Med, you
                            are asking that the
                            NSH draft specify how service chaining
                            should cope with packets
                            that have been fragmented?


                        [Med] To be accurate, I'm asking to assess
                        whether there are
                        implications. If there are, then the draft
                        should be updated
                        accordingly.

                            NSH, and the SFF functionality, does not care.


                        [Med] I'm not that sure. Some typical
                        implications are listed
                        below:

                        * SFF: If the NSH header is present only in the
                        a fragment but SFF
                        didn't maintained a state, subsequent fragments
                        won't be
                        appropriately processed. * SFC-aware function:
                        if prepending a
                        context information depends on the full packet,
                        not only a
                        fragment.

                        It just does its job.

                        [Med] which may be disturbed in some situations
                        as listed in the
                        examples above.

                            Ingress and intermediate classifiers may
                            cope with fragments in
                            any number of ways.

                        Specifying such is clearly out of scope for this
                        draft.

                        [Med] The purpose is not to specify the internal
                        implementation
                        details but the external behavior of the
                        classifier function when
                        it comes to handle fragments. That behavior may
                        have an incidence
                        on SFF, in particular. The purpose is not to
                        recommend the maximum
                        resources to be dedicated to out of order
                        fragments nor the
                        timeout to cache those; these considerations are
                        of course out of
                        scope. Nevertheless, an implementation should
                        offer a configurable
                        parameter so that an operator tweak those
                        according to its
                        context.

                            I suppose one could write an informational
                            draft on possible ways
                            of coping.  The IETF has not usually
                            published such.
                            Service functions have to cope with
                            fragmented packets just as
                            they had to before the advent of NSH, so
                            describing that is
                            clearly not needed here.


                        [Med] The advent of NSH has the following
                        implications: * it
                        exacerbates fragmentation. Handing over this
                        issue to the
                        transport layer may lead to interoperability
                        issues. * the
                        chaining may not be efficient if fragments are
                        inappropriately
                        handled.

                        Introducing NSH should not degrade the overall
                        service compared to
                        legacy service deployment schemes.


                            Yours, Joel

                            On 4/25/16 3:00 AM,
                            mohamed.boucadair@orange.com<mailto:mohamed.bou=
cadair@orange.com>
                            <mailto:mohamed.boucadair@orange.com<mailto:moh=
amed.boucadair@orange.com>> wrote:

                                Re-,

                                I hear you, but my comment is that we
                                need, as a WG, to decide
                                what to

                            put in the draft. FWIW, I'm discussing two
                            fragmentation
                            issues:


                                (1) Fragmentation that is caused by
                                prepending an SFC header.
                                (2) Handling fragments at the ingress of
                                an SFC-enabled domain.

                                Increasing the MTU is for sure a
                                recommendation is to be
                                explicitly

                            called out in the text (see my first message).


                                There are other issues that need to be
                                discussed, e.g., how to
                                deal with

                            fragments in SFFs/Classifiers?


                                It is also "prudent" to check that no
                                issues will be experienced
                                in SFF

                            to handle fragments. If an SFC header is
                            prepended for all
                            fragments, I'm not sure there

                                is any particular issue at the SFF
                                level, except if
                                stripping/adding

                            context TLVs depends on the full packet (not
                            just fragment). It
                            is warranted to consider a little bit this
                            point before declaring
                            there is no issue.


                                For point (1), declaring fragmentation
                                out of scope would be
                                meant that

                            an implementation must be prepared to
                            receive fragments with or
                            without NSH header as this is a decision
                            that is left to the
                            transport encapsulation. This is a
                            requirement per se!


                                I won't reiterate all the comments I
                                have about the current
                                wording of

                            this section.


                                Cheers, Med

                                    -----Message d'origine----- De :
                                    Elzur, Uri
                                    [mailto:uri.elzur@intel.com<mailto:uri.=
elzur@intel.com>
                                    <mailto:uri.elzur@intel.com<mailto:uri.=
elzur@intel.com>>] Envoy=E9
                                    : lundi 25 avril 2016
                                    08:30 =C0 : BOUCADAIR Mohamed IMT/OLN;
                                    Thomas Narten;
                                    sfc@ietf.org<mailto:sfc@ietf.org> <mail=
to:sfc@ietf.org<mailto:sfc@ietf.org>>
                                    Objet : RE: [sfc] WG last call for
                                    draft-ietf-sfc-nsh-04.txt

                                    Hi Med

                                    My point is that Fragmentation is
                                    yet another transport related
                                    issue

                            that

                                    is beyond the scope of NSH and
                                    beyond the charter of the WG, so
                                    it

                            doesn't

                                    really belong in the draft. We are
                                    providing an advice as
                                    extending the size of the packet may
                                    lead to fragmentation, but
                                    as you check RFC 7348 VxLAN, which
                                    my create the same issue,
                                    you'll find it doesn't even

                            relate

                                    to it.

                                    Thx

                                    Uri ("Oo-Ree") C: 949-378-7568<tel:949-=
378-7568>
                                    <tel:949-378-7568<tel:949-378-7568>>


                                    -----Original Message----- From: sfc
                                    [mailto:sfc-bounces@ietf.org<mailto:sfc=
-bounces@ietf.org>
                                    <mailto:sfc-bounces@ietf.org<mailto:sfc=
-bounces@ietf.org>>] On
                                    Behalf Of
                                    mohamed.boucadair@orange.com<mailto:moh=
amed.boucadair@orange.com>
                                    <mailto:mohamed.boucadair@orange.com<ma=
ilto:mohamed.boucadair@orange.com>> Sent:
                                    Sunday, April 24, 2016
                                    10:32 PM To: Elzur, Uri
                                    <uri.elzur@intel.com<mailto:uri.elzur@i=
ntel.com>
                                    <mailto:uri.elzur@intel.com<mailto:uri.=
elzur@intel.com>>>;
                                    Thomas Narten

                            <narten@us.ibm.com<mailto:narten@us.ibm.com> <m=
ailto:narten@us.ibm.com<mailto:narten@us.ibm.com>>>;

                                    sfc@ietf.org<mailto:sfc@ietf.org> <mail=
to:sfc@ietf.org<mailto:sfc@ietf.org>>
                                    Subject: Re: [sfc] WG last call for
                                    draft-ietf-sfc-nsh-04.txt

                                    Hi Uri,

                                    That's another option that needs to
                                    be discussed/investigated.
                                    I'm

                            afraid

                                    this is not the rationale adopted in
                                    -04 since it includes some
                                    text

                            that

                                    is far to be sufficient to ensure
                                    interoperable
                                    implementations.

                                    BTW, saying that nsh does not need
                                    to deal with fragmentation
                                    because

                            it

                                    is transport-independent is not IMHO
                                    a good strategy to adopt
                                    here

                            because

                                    it opens the door for interoperable
                                    issues, it may lead to
                                    sub-optimal implementations if the
                                    sfc information is present
                                    only in one

                            fragments,

                                    etc.

                                    My comments are related to the
                                    current text in the -04.
                                    This text needs

                            to

                                    be fixed somehow.

                                    Cheers, Med

                                        -----Message d'origine----- De :
                                        Elzur, Uri
                                        [mailto:uri.elzur@intel.com<mailto:=
uri.elzur@intel.com>
                                        <mailto:uri.elzur@intel.com<mailto:=
uri.elzur@intel.com>>]
                                        Envoy=E9 : dimanche 24 avril
                                        2016 17:36 =C0 : BOUCADAIR Mohamed
                                        IMT/OLN; Thomas Narten;
                                        sfc@ietf.org<mailto:sfc@ietf.org>
                                        <mailto:sfc@ietf.org<mailto:sfc@iet=
f.org>> Objet :
                                        RE: [sfc] WG last call for
                                        draft-ietf-sfc-nsh-04.txt

                                        Hi Med

                                        I see no need to specify the
                                        exact behavior as NSH is
                                        transport independent i.e. like
                                        NSH interaction with any other
                                        Transport eh issue of
                                        Fragmentation is to be dealt in
                                        a way
                                        that matches the mechanisms
                                        supported by the Transport used
                                        and do not belong in the NSH draft

                                        Thx

                                        Uri ("Oo-Ree") C: 949-378-7568<tel:=
949-378-7568>
                                        <tel:949-378-7568<tel:949-378-7568>=
>


                                        -----Original Message----- From: sf=
c
                                        [mailto:sfc-bounces@ietf.org<mailto=
:sfc-bounces@ietf.org>
                                        <mailto:sfc-bounces@ietf.org<mailto=
:sfc-bounces@ietf.org>>]
                                        On Behalf Of
                                        mohamed.boucadair@orange.com<mailto=
:mohamed.boucadair@orange.com>
                                        <mailto:mohamed.boucadair@orange.co=
m<mailto:mohamed.boucadair@orange.com>>
                                        Sent: Thursday, April 14,
                                        2016 12:43 AM To: Thomas Narten
                                        <narten@us.ibm.com<mailto:narten@us=
.ibm.com>
                                        <mailto:narten@us.ibm.com<mailto:na=
rten@us.ibm.com>>>;
                                        sfc@ietf.org<mailto:sfc@ietf.org>
                                        <mailto:sfc@ietf.org<mailto:sfc@iet=
f.org>> Subject:
                                        Re: [sfc] WG last call for
                                        draft-ietf-sfc-nsh-04.txt

                                        R-,

                                        In addition to other pending
                                        issues raised for this draft, I
                                        would like to raise this
                                        additional one about Section 6.

                                        =3D=3D 6.  Fragmentation Considerat=
ions

                                        NSH and the associated transport
                                        header are "added" to the
                                        encapsulated packet/frame.  This
                                        additional information
                                        increases

                            the

                                        size of the packet.  In order
                                        the ensure proper forwarding of
                                        NSH data, several options for
                                        handling fragmentation and
                                        re-assembly exist:

                                        1.  Jumbo Frames, when
                                        supported, enable the transport
                                        of NSH
                                        and associated transport packets
                                        without requiring
                                        fragmentation.

                                        2.  Path MTU Discovery
                                        [RFC1191]"describes a technique for
                                        dynamically discovering the
                                        maximum transmission unit (MTU) of

                            an

                                        arbitrary internet path" and can
                                        be utilized to ensure the

                        the

                                        required packet size is used.

                                        3.  [RFC6830] describes two
                                        schemes for fragmentation and
                                        re-

                            assembly

                                        in section 5.4. =3D=3D

                                        * The text is weak for a
                                        Standard track document that is
                                        intended to solve the problem in
                                        https://tools.ietf.org/html/rfc7498=
#section-

                        2.12.

                                        There should be a clear behavior
                                        to be followed by an

                        implementation.

                                        Further, I would avoid the use
                                        of words such as "can".

                                        * The text covers only
                                        fragmentation when it is induced
                                        by SFC
                                        operations, it does not discuss
                                        the treatment of a fragment
                                        when received in an SFC domain.
                                        IMHO, the draft should also
                                        specify the behavior of the
                                        Classifier with regards to
                                        fragments for the sake of proper
                                        SFC operation. Applying
                                        classification policies may
                                        require the

                                    full packet, not only a fragment.

                                        In particular, dedicated
                                        resources should dedicated for
                                        handling out of order fragments.
                                        Of course, it is out of scope
                                        of this document to describe how
                                        SFs handle fragments.

                                        * If an SFC header is prepended
                                        for all fragments, I'm not
                                        sure there is any particular
                                        issue at the SFF level...except
                                        if stripping/adding context TLVs
                                        depends on the full packet
                                        (not just fragment). It is
                                        warranted to consider a little bit
                                        this point before declaring there

                            is

                                    no issue.


                                        * The text states "several
                                        options". This may be interpreted
                                        as if implementing one of them
                                        is sufficient...which is not
                                        true. The first two points
                                        contribute to minimize the
                                        fragmentation risk, but
                                        fragmentation may still be
                                        experienced
                                        (e.g., other shims are prepended
                                        by other nodes for some other
                                        purposes, nested nsh, etc.)

                                        * The first two points have
                                        nothing to do with reassembly.

                                        * The support of jumbo frames by
                                        a router/device does not mean
                                        that it can make use of it.
                                        Appropriate MTU configuration
                                        should be undertaken in a
                                        consistent manner within an SFC
                                        domain. The text should be
                                        updated to make it is about
                                        (consistent) MTU

                        configuration.


                                        * BTW, shouldn't the text be
                                        reworded to recommended to
                                        increase the MTU of **all
                                        nodes** of an SFC-enabled domain by
                                        at least the length of SFC
                                        header + transport header?

                                        * Bullet 2, how PMTU discovery
                                        is actually used in this
                                        context? Do you assume that all
                                        SFC-aware nodes will issue
                                        such messages towards other
                                        SFC-aware node, arbitrary
                                        destination, else?

                                        * Bullet 2, I would drop
                                        "describes a technique for
                                        dynamically discovering the
                                        maximum transmission unit
                                        (MTU) of an arbitrary internet
                                        path".

                                        * Bullet 2, s/ the the/the.

                                        * The reference to the LISP
                                        specification raises two concerns
                                        and one comment:

                                        (1) I don't think it is a good
                                        approach that fragments induced
                                        by the network are passed to
                                        their ultimate destinations as
                                        such

                        (stateless).

                                        IMO, reassembly should be done
                                        within the SFC domain
                                        (responsible for fragmentation)
                                        not passed away. (2) Does the
                                        stateful mode require all SFC
                                        data plane elements maintain a
                                        full list of MTU for the any
                                        SFF/SF instance of the SFC

                                    domain?


                                        The current text suggests that
                                        [RFC6830] should be listed as
                                        normative reference (not an
                                        informative one). I would
                                        personally favor removing the
                                        reference to LISP (as it is an
                                        Experimental RFC).

                                        * The security section of the
                                        draft may be augmented with
                                        informational
                                        fragmentation-related pointers to:
                                        e.g., RFC1858 (Security
                                        Considerations for IP Fragment
                                        Filtering), RFC3128 (Protection
                                        Against a Variant of the Tiny
                                        Fragment Attack), and RFC 4963
                                        (IPv4 Reassembly Errors at High
                                        Data Rates).

                                        Cheers, Med

                                            -----Message d'origine-----
                                            De : sfc
                                            [mailto:sfc-bounces@ietf.org<ma=
ilto:sfc-bounces@ietf.org>
                                            <mailto:sfc-bounces@ietf.org<ma=
ilto:sfc-bounces@ietf.org>>]
                                            De la part de
                                            mohamed.boucadair@orange.com<ma=
ilto:mohamed.boucadair@orange.com>
                                            <mailto:mohamed.boucadair@orang=
e.com<mailto:mohamed.boucadair@orange.com>>
                                            Envoy=E9 : lundi 11 avril
                                            2016 13:14 =C0 : Thomas
                                            Narten; sfc@ietf.org<mailto:sfc=
@ietf.org>
                                            <mailto:sfc@ietf.org<mailto:sfc=
@ietf.org>> Objet
                                            : Re:
                                            [sfc] WG last call for
                                            draft-ietf-sfc-nsh-04.txt

                                            Dear Thomas, all,

                                            As I mentioned during the
                                            meeting, there are several
                                            issues
                                            that are not covered in the
                                            last version of the draft. I
                                            already provided examples of
                                            the issues offline as requested
                                            by Martin.

                                            Cheers, Med

                                                -----Message
                                                d'origine----- De : sfc
                                                [mailto:sfc-bounces@ietf.or=
g<mailto:sfc-bounces@ietf.org>
                                                <mailto:sfc-bounces@ietf.or=
g<mailto:sfc-bounces@ietf.org>>]
                                                De la part de Thomas Narten
                                                Envoy=E9 : jeudi 31 mars
                                                2016 04:48 =C0 :
                                                sfc@ietf.org<mailto:sfc@iet=
f.org>
                                                <mailto:sfc@ietf.org<mailto=
:sfc@ietf.org>>
                                                Objet : [sfc] WG last
                                                call for
                                                draft-ietf-sfc-nsh-04.txt

                                                Dear WG:

                                                This note begins a WG
                                                last call on
                                                draft-ietf-sfc-nsh-04.txt
                                                (https://datatracker.ietf.o=
rg/doc/draft-ietf-sfc-nsh/).



            The editors of the NSH document have indicated that they have

                                                addressed all known
                                                comments and that there
                                                are no open
                                                issues with the current
                                                version of the document.

                                                Substantive comments to
                                                the list please,
                                                editorial comments
                                                can go directly to the
                                                document editors.

                                                We'll also get a brief
                                                update from the editors
                                                at next
                                                week's meeting. If there
                                                are any remaining issues
                                                with the
                                                document, raising them
                                                before the meeting would be
                                                especially helpful.

                                                For the chairs, Thomas

                                                ___________________________=
____________________
                                                sfc mailing
                                                list sfc@ietf.org<mailto:sf=
c@ietf.org>
                                                <mailto:sfc@ietf.org<mailto=
:sfc@ietf.org>>
                                                https://www.ietf.org/mailma=
n/listinfo/sfc


                                            _______________________________=
________________
                                            sfc mailing
                                            list sfc@ietf.org<mailto:sfc@ie=
tf.org>
                                            <mailto:sfc@ietf.org<mailto:sfc=
@ietf.org>>
                                            https://www.ietf.org/mailman/li=
stinfo/sfc


                                        ___________________________________=
____________
                                        sfc mailing
                                        list sfc@ietf.org<mailto:sfc@ietf.o=
rg>
                                        <mailto:sfc@ietf.org<mailto:sfc@iet=
f.org>>
                                        https://www.ietf.org/mailman/listin=
fo/sfc


                                    _______________________________________=
________
                                    sfc mailing


--_000_D348FA2D4C885jguicharciscocom_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <51D060B29752E94887DA825BDD7843AF@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif;">
<div>Hi Sunil,</div>
<div><br>
</div>
<div>I think the suggested text to add is&nbsp;<span style=3D"font-family: =
-webkit-standard; font-size: medium;">&quot;Use the fragmentation provided =
by the network overlay mechanics. One example can be found in RFC 6830, sec=
tion 5.4.=94 - hope this clarifies.</span></div>
<div><span style=3D"font-family: -webkit-standard; font-size: medium;"><br>
</span></div>
<div><span style=3D"font-family: -webkit-standard; font-size: medium;">Jim<=
/span></div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>Sunil Vallamkonda &lt;<a href=
=3D"mailto:sunilvk@f5.com">sunilvk@f5.com</a>&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Thursday, April 28, 2016 at 2=
:54 PM<br>
<span style=3D"font-weight:bold">To: </span>Jim Guichard &lt;<a href=3D"mai=
lto:jguichar@cisco.com">jguichar@cisco.com</a>&gt;, &quot;Andrew G. Malis&q=
uot; &lt;<a href=3D"mailto:agmalis@gmail.com">agmalis@gmail.com</a>&gt;, Jo=
el Halpern Direct &lt;<a href=3D"mailto:jmh.direct@joelhalpern.com">jmh.dir=
ect@joelhalpern.com</a>&gt;<br>
<span style=3D"font-weight:bold">Cc: </span>&quot;Elzur, Uri&quot; &lt;<a h=
ref=3D"mailto:uri.elzur@intel.com">uri.elzur@intel.com</a>&gt;, &quot;<a hr=
ef=3D"mailto:mohamed.boucadair@orange.com">mohamed.boucadair@orange.com</a>=
&quot; &lt;<a href=3D"mailto:mohamed.boucadair@orange.com">mohamed.boucadai=
r@orange.com</a>&gt;,
 &quot;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot; &lt;<a href=
=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;, Linda Dunbar &lt;<a href=3D"=
mailto:linda.dunbar@huawei.com">linda.dunbar@huawei.com</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>RE: [sfc] Suggested wordin=
g addtion to the Section 6 (Fragmentation Consideration) of the draft-ietf-=
sfc-nsh-04.txt<br>
</div>
<div><br>
</div>
<div xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micro=
soft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" x=
mlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:/=
/www.w3.org/TR/REC-html40">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Jim,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">I agree, the confusion being NSH trea=
ted as a network overlay.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Would it be possible for the document=
 to have wording on this ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">This could also clarify interpretatio=
ns how NSH to be used with ARP, DHCP and encapsulations.<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Thank you,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Sunil<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,sans-serif">From:</span></b><span style=3D"font-size:11.0pt;=
font-family:&quot;Calibri&quot;,sans-serif"> sfc [<a href=3D"mailto:sfc-bou=
nces@ietf.org">mailto:sfc-bounces@ietf.org</a>]
<b>On Behalf Of </b>Jim Guichard (jguichar)<br>
<b>Sent:</b> Thursday, April 28, 2016 6:23 AM<br>
<b>To:</b> Andrew G. Malis &lt;<a href=3D"mailto:agmalis@gmail.com">agmalis=
@gmail.com</a>&gt;; Joel Halpern Direct &lt;<a href=3D"mailto:jmh.direct@jo=
elhalpern.com">jmh.direct@joelhalpern.com</a>&gt;<br>
<b>Cc:</b> Elzur, Uri &lt;<a href=3D"mailto:uri.elzur@intel.com">uri.elzur@=
intel.com</a>&gt;;
<a href=3D"mailto:mohamed.boucadair@orange.com">mohamed.boucadair@orange.co=
m</a>; <a href=3D"mailto:sfc@ietf.org">
sfc@ietf.org</a>; Linda Dunbar &lt;<a href=3D"mailto:linda.dunbar@huawei.co=
m">linda.dunbar@huawei.com</a>&gt;<br>
<b>Subject:</b> Re: [sfc] Suggested wording addtion to the Section 6 (Fragm=
entation Consideration) of the draft-ietf-sfc-nsh-04.txt<o:p></o:p></span><=
/p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">Hi Andy,<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">I think the key point is that NSH !=3D =
network overlay but rather utilizes a<b>&nbsp;</b>network overlay for packe=
t transport between SFC network elements. The reference
 is just an example of how a network overlay might deal with fragmentation =
and is not a suggestion that NSH adopt that mechanism but rather makes the =
point that it can utilize the existing network overlay mechanics.&nbsp;<o:p=
></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">Jim<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,sans-serif;color:black">From:
</span></b><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,=
sans-serif;color:black">sfc &lt;<a href=3D"mailto:sfc-bounces@ietf.org">sfc=
-bounces@ietf.org</a>&gt; on behalf of &quot;Andrew G. Malis&quot; &lt;<a h=
ref=3D"mailto:agmalis@gmail.com">agmalis@gmail.com</a>&gt;<br>
<b>Date: </b>Thursday, April 28, 2016 at 8:17 AM<br>
<b>To: </b>Joel Halpern Direct &lt;<a href=3D"mailto:jmh.direct@joelhalpern=
.com">jmh.direct@joelhalpern.com</a>&gt;<br>
<b>Cc: </b>&quot;Elzur, Uri&quot; &lt;<a href=3D"mailto:uri.elzur@intel.com=
">uri.elzur@intel.com</a>&gt;, &quot;<a href=3D"mailto:mohamed.boucadair@or=
ange.com">mohamed.boucadair@orange.com</a>&quot; &lt;<a href=3D"mailto:moha=
med.boucadair@orange.com">mohamed.boucadair@orange.com</a>&gt;, &quot;<a hr=
ef=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&quot;
 &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a>&gt;, Linda Dunbar &lt=
;<a href=3D"mailto:linda.dunbar@huawei.com">linda.dunbar@huawei.com</a>&gt;=
<br>
<b>Subject: </b>Re: [sfc] Suggested wording addtion to the Section 6 (Fragm=
entation Consideration) of the draft-ietf-sfc-nsh-04.txt<o:p></o:p></span><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">Joel,
<o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">The diagrams in section 6 of RFC 6830 a=
re control plane, not data plane. The data plane diagrams are in section 5.=
<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">But the overriding question is - withou=
t any fields in the NSH header to sequence fragments, how can the fragments=
 be correctly reassembled?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">Cheers,<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">Andy<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">On Wed, Apr 27, 2016 at 7:46 PM, Joel H=
alpern Direct &lt;<a href=3D"mailto:jmh.direct@joelhalpern.com" target=3D"_=
blank">jmh.direct@joelhalpern.com</a>&gt; wrote:<o:p></o:p></span></p>
<blockquote style=3D"border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">The LISP header does not have a fragmen=
t flag or fragment offset.&nbsp; The diagrams in section 6 include the oute=
r encapsulating header (the equivalent of the transport
 header in SFC.)&nbsp; Yes, the text is a little hard to follow in this reg=
ard.&nbsp; The LISP working group is going to be rewriting RFC 6830 as part=
 of moving to standards track.<br>
<br>
So there is no difference in this regard between NSH and LISP.<br>
<br>
Yours,<br>
Joel<br>
<br>
On 4/27/16 7:02 PM, Andrew G. Malis wrote:<o:p></o:p></span></p>
<blockquote style=3D"border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black">Joel et al,<br>
<br>
All this talk about fragmentation prompted me to re-read section 6 of<br>
the draft, which recommends (as option 3) using the procedures in<br>
section 5.4 of RFC 6830 (presumably with the =93NSH header=94 replacing the=
<br>
=93LISP header=94 in the description of the procedures in that section).<br=
>
<br>
So that led me to read that section (and the LISP header definition in<br>
section 5.1), and I see that LISP does fragmentation and reassembly<br>
identically to IPv4, using the Fragment Offset field so that fragments<br>
can be correctly reassembled in the proper order.<br>
<br>
However, the NSH Header doesn=92t have a Fragment Offset field or any<br>
other way to order the fragments.<br>
<br>
So how can the procedures in Section 5.4 of 6830 be used?<br>
<br>
Thanks,<br>
Andy<br>
<br>
On Wed, Apr 27, 2016 at 4:19 PM, Joel M. Halpern &lt;<a href=3D"mailto:jmh@=
joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a><br>
&lt;mailto:<a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joe=
lhalpern.com</a>&gt;&gt; wrote:<br>
<br>
&nbsp; &nbsp; Both methods are valid, and both depend upon details of the<b=
r>
&nbsp; &nbsp; underlying packet and the transport.&nbsp; As such, I don't s=
ee why this<br>
&nbsp; &nbsp; document benefits from describing them, much less why it shou=
ld mark<br>
&nbsp; &nbsp; one method as a &quot;should&quot;.&nbsp; Implementation deta=
ils are likely to be<br>
&nbsp; &nbsp; more significant than any bit consumption difference between =
the two<br>
&nbsp; &nbsp; alternatives.<br>
<br>
&nbsp; &nbsp; Yours,<br>
&nbsp; &nbsp; Joel<br>
<br>
<br>
&nbsp; &nbsp; On 4/27/16 3:40 PM, Linda Dunbar wrote:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; I suggest adding the following paragraphs after=
 the Bullet 3 of<br>
&nbsp; &nbsp; &nbsp; &nbsp; the Section 6 Fragmentation Consideration to ma=
ke the process<br>
&nbsp; &nbsp; &nbsp; &nbsp; more clear and less controversial:<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; --------------------------------<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; RFC6830 describes the fragmentation method of b=
reaking the<br>
&nbsp; &nbsp; &nbsp; &nbsp; original packet into two equal sub-frames and e=
ncapsulating<br>
&nbsp; &nbsp; &nbsp; &nbsp; [LISP Header &#43; Transport header] to each su=
b-frame.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; If LISP fragmentation [RFC6830 Section 5.4] is =
used, the [SFC<br>
&nbsp; &nbsp; &nbsp; &nbsp; Header &#43; Transport Header] will be added to=
 each half frame (or<br>
&nbsp; &nbsp; &nbsp; &nbsp; the original data frame). As the Transport Head=
er is terminated<br>
&nbsp; &nbsp; &nbsp; &nbsp; by the next SFF node's tunnel transport layer, =
the combined two<br>
&nbsp; &nbsp; &nbsp; &nbsp; sub-frames will have two SFC Headers.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Therefore, the fragmentation for NSH encapsulat=
ed data frame<br>
&nbsp; &nbsp; &nbsp; &nbsp; should be done completely by the node tunnel tr=
ansport layer,<br>
&nbsp; &nbsp; &nbsp; &nbsp; which should break the [SFC &#43; original pack=
et] into two equal<br>
&nbsp; &nbsp; &nbsp; &nbsp; sub-frames and each sub-frame being encapsulate=
d with its<br>
&nbsp; &nbsp; &nbsp; &nbsp; respective tunnel header.&nbsp; The next SFF no=
de's tunnel transport<br>
&nbsp; &nbsp; &nbsp; &nbsp; layer should combine the two sub-frames before =
sending to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; next node.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; -----------------------------------------------=
-------<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; By the way, there are to typo in the Section 6:=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; 3rd line: &quot;In order the&quot; =3D=3D&gt; &=
quot;In order to&quot;<br>
&nbsp; &nbsp; &nbsp; &nbsp; Last line of Bullet 2: extra &quot;the&quot; in=
 the &quot;utilized to ensure<br>
&nbsp; &nbsp; &nbsp; &nbsp; the the required packet&quot;.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Hope it helps.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Linda<br>
<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; -----Original Message-----<br>
&nbsp; &nbsp; &nbsp; &nbsp; From: <a href=3D"mailto:mohamed.boucadair@orang=
e.com" target=3D"_blank">mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:mohamed.boucadair@=
orange.com" target=3D"_blank">mohamed.boucadair@orange.com</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a href=3D"mailto:mohamed.boucadair@ora=
nge.com" target=3D"_blank">mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:mohamed.boucadair@=
orange.com" target=3D"_blank">mohamed.boucadair@orange.com</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; Sent: Wednesday, April 27, 2016 12:40 AM<br>
&nbsp; &nbsp; &nbsp; &nbsp; To: Joel M. Halpern; Linda Dunbar; Elzur, Uri; =
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" targ=
et=3D"_blank">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; Subject: RE: [sfc] WG last call for draft-ietf-=
sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Hi Joel, all,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Please see inline.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; Cheers,<br>
&nbsp; &nbsp; &nbsp; &nbsp; Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Message d'origine-----<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; De : Joel M. Halpern [mailto:<a h=
ref=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a=
><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:jmh@=
joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a>&gt;] Envoy=E9 : =
mardi 26<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; avril 2016 19:18 =C0 : Linda Dunb=
ar; BOUCADAIR Mohamed<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; IMT/OLN; Elzur,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Uri; <a href=3D"mailto:sfc@ietf.o=
rg" target=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@iet=
f.org" target=3D"_blank">sfc@ietf.org</a>&gt; Objet : Re: [sfc] WG<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; With regard to Transport tunnel f=
ragementation, that seems<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; an issue<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; for the transport protocol.&nbsp;=
 I don't actually object to a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sentence,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; but it does not seem that it will=
 accomplish anything.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; [Med] I would like to see some text added to th=
e draft.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; With regard to packets fragmented=
 by the source, I<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; completely disagree<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; with your assertion.&nbsp; If an =
SFF were to reassemble the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; packets, that<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; would be a violation of its job.<=
br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; [Med] I agree with you.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; There is no reason for an SFF to<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; reassemble a packet fragmented by=
 the source.&nbsp; The<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; classifier may have<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; to do some interesting things in =
order to properly classify<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; succeeding<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragments, but that is an impleme=
ntation issue (most commonly<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; addressed with virtual reassembly=
, which doe snot delay the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragments.)&nbsp; We don't specit=
y that.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; [Med] Still, the external behavior of the class=
ifier needs to be<br>
&nbsp; &nbsp; &nbsp; &nbsp; clear in the document. I don't find any text in=
 the draft saying<br>
&nbsp; &nbsp; &nbsp; &nbsp; for instance that an NSH header must be present=
 in all<br>
&nbsp; &nbsp; &nbsp; &nbsp; fragments. (There some processing that might be=
 needed at the<br>
&nbsp; &nbsp; &nbsp; &nbsp; SFF to &quot;do its job&quot; with regards to f=
ragments (receive out of<br>
&nbsp; &nbsp; &nbsp; &nbsp; order fragments &#43; forwarding policy on the =
full packet).)<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; If an SF needs to reassemble frag=
ments to do its job, that<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is up to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the SF.&nbsp; Some will need to a=
ctually reassemble.&nbsp; Some will<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; need to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; perform virtual reassembly, and s=
ome will happily process the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragments.&nbsp; I can not see wh=
at the NSH document could<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; possibly mandate.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; [Med] Fully agree.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Yours,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Joel<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; On 4/26/16 11:47 AM, Linda Dunbar=
 wrote:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Joel,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I think the documen=
t should add the description on the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; following two<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentation scena=
rios:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; - Transport tunnel =
generated fragmentation: When a packet<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentation is ca=
used by transport tunnel (i.e. various<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; encapsulations), th=
e termination point of the transport<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; tunnel is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; responsible for re-=
assembling the fragmented pieces of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the packet.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Since there won't b=
e any SFF nodes in between the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Transport Tunnel,<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the tunnel generate=
d fragmentation does not require any<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; actions by<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFF nodes or SF nod=
es.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; - Source node gener=
ated fragmentation (after adding on<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the NSH<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; header): When fragm=
entation has to be performed for a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; packet being<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; encapsulated with t=
he NSH header, either the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; intermediate SFF no=
des<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; or the SF nodes hav=
e to be able to reassemble the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmented pieces.<=
br>
<br>
<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Cheers,<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Linda<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Original Messa=
ge----- From: Joel M. Halpern<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a href=3D"=
mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=
=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a>&g=
t;] Sent: Tuesday, April 26,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2016 10:33 AM<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; To: Linda Dunbar; <=
a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=
=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">mohamed.boucadai=
r@orange.com</a>&gt;; Elzur, Uri;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D"mailto:s=
fc@ietf.org" target=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a href=3D"mailt=
o:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt; Subject: Re: [sfc] W=
G<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf-sfc-nsh-=
04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Re-reading your not=
e, it is possible that you are<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; referring only to<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the case of transpo=
rt generated fragmentation of the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; outer packet.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I had assumed you w=
ere not talking about that, since the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; resulting<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragments will not =
all have NSH headers.&nbsp; As with any tunnel<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; technology, if the =
tunnel chooses to fragment at its<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; layer, then the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; tunnel is responsib=
le for reassembly.&nbsp; That would be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; invisible to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the SFF.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Yours, Joel<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; On 4/26/16 11:10 AM=
, Linda Dunbar wrote:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Agree=
 with Med.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Even =
if each fragment piece of a packet with NSH<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; heade=
r carries the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; NSH h=
eader, the intermediate SFF nodes still need to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; put t=
ogether<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; all t=
he fragments together before passing the whole<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; data =
frame to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the S=
F.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Linda=
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----=
Original Message----- From: sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mail=
to:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ie=
tf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;m=
ailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces=
@ietf.org</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; On Be=
half Of <a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;m=
ailto:<a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">moh=
amed.boucadair@orange.com</a>&gt; Sent: Monday,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; April=
 25,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2016 =
9:42 AM To: Elzur, Uri; Joel M. Halpern;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a hr=
ef=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a> &lt;mailto:<a=
 href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt; Subjec=
t:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Re: [=
sfc] WG last call for draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Re-,<=
br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; How d=
o you instruct the transport layer to ALWAYS<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; prepe=
nd an NSH<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; heade=
r even for fragments? Or you don't care about that?<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Thank=
 you.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Cheer=
s, Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; -----Message d'origine----- De : Elzur, Uri<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [mailto:<a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank">u=
ri.elzur@intel.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &lt;mailto:<a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank=
">uri.elzur@intel.com</a>&gt;] Envoy=E9 : lundi 25<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; avril 2016 16:26 =C0<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; : BOUCADAIR Mohamed IMT/OLN; Joel M. Halpern;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>=
 &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org<=
/a>&gt; Objet<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; : RE: [sfc] WG last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Hi Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Not to repeat my position, but I'll do it anyhow<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; :-) As NSH is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; *NOT* a transport, dealing with fragmentation is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; left to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Transport used.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; The model I use for NSH, is basically similar to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; VXLAN . It is an<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; overly.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Thx<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Uri (&quot;Oo-Ree&quot;) C: <a href=3D"tel:949-378-7568" target=3D=
"_blank">
949-378-7568</a> &lt;tel:<a href=3D"tel:949-378-7568" target=3D"_blank">949=
-378-7568</a>&gt;<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; -----Original Message----- From: sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">=
sfc-bounces@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &lt;mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blan=
k">sfc-bounces@ietf.org</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; On Behalf Of <a href=3D"mailto:mohamed.boucadair@orange.com" targe=
t=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &lt;mailto:<a href=3D"mailto:mohamed.boucadair@orange.com" target=
=3D"_blank">mohamed.boucadair@orange.com</a>&gt; Sent:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Monday, April 25,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; 2016 7:18 AM To: Joel M. Halpern<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &lt;<a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@j=
oelhalpern.com</a> &lt;mailto:<a href=3D"mailto:jmh@joelhalpern.com" target=
=3D"_blank">jmh@joelhalpern.com</a>&gt;&gt;;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>=
 &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org<=
/a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Subject: Re: [sfc] WG last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Hi Joel,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Please see inline.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Cheers, Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; -----Message d'origine----- De : Joel M. Halpern<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; [mailto:<a href=3D"mailto:jmh@joelhalpern.com" targe=
t=3D"_blank">jmh@joelhalpern.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:jmh@joelhalpern.com" ta=
rget=3D"_blank">jmh@joelhalpern.com</a>&gt;] Envoy=E9 : lundi<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; 25 avril 2016 15:48 =C0<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; : BOUCADAIR Mohamed IMT/OLN; <a href=3D"mailto:sfc@i=
etf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D=
"_blank">sfc@ietf.org</a>&gt; Objet : Re: [sfc] WG<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; last call for draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; If I am understanding you correctly Med, you<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; are asking that the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; NSH draft specify how service chaining<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; should cope with packets<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; that have been fragmented?<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [Med] To be accurate, I'm asking to assess<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; whether there are<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; implications. If there are, then the draft<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; should be updated<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; accordingly.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; NSH, and the SFF functionality, does not care.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [Med] I'm not that sure. Some typical<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; implications are listed<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; below:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; * SFF: If the NSH header is present only in the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; a fragment but SFF<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; didn't maintained a state, subsequent fragments<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; won't be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; appropriately processed. * SFC-aware function:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; if prepending a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; context information depends on the full packet,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; not only a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; fragment.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; It just does its job.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [Med] which may be disturbed in some situations<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; as listed in the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; examples above.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; Ingress and intermediate classifiers may<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; cope with fragments in<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; any number of ways.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Specifying such is clearly out of scope for this<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; draft.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [Med] The purpose is not to specify the internal<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; implementation<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; details but the external behavior of the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; classifier function when<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; it comes to handle fragments. That behavior may<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; have an incidence<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; on SFF, in particular. The purpose is not to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; recommend the maximum<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; resources to be dedicated to out of order<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; fragments nor the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; timeout to cache those; these considerations are<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; of course out of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; scope. Nevertheless, an implementation should<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; offer a configurable<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; parameter so that an operator tweak those<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; according to its<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; context.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; I suppose one could write an informational<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; draft on possible ways<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; of coping.&nbsp; The IETF has not usually<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; published such.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; Service functions have to cope with<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; fragmented packets just as<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; they had to before the advent of NSH, so<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; describing that is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; clearly not needed here.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; [Med] The advent of NSH has the following<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; implications: * it<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; exacerbates fragmentation. Handing over this<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; issue to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; transport layer may lead to interoperability<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; issues. * the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; chaining may not be efficient if fragments are<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; inappropriately<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; handled.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; Introducing NSH should not degrade the overall<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; service compared to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; legacy service deployment schemes.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; Yours, Joel<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; On 4/25/16 3:00 AM,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; <a href=3D"mailto:mohamed.boucadair@orange.com" targ=
et=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:mohamed.boucadair@orang=
e.com" target=3D"_blank">mohamed.boucadair@orange.com</a>&gt; wrote:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Re-,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I hear you, but my comment is that we<=
br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; need, as a WG, to decide<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; what to<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; put in the draft. FWIW, I'm discussing two<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; fragmentation<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; issues:<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (1) Fragmentation that is caused by<br=
>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; prepending an SFC header.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (2) Handling fragments at the ingress =
of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; an SFC-enabled domain.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Increasing the MTU is for sure a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; recommendation is to be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; explicitly<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; called out in the text (see my first message).<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; There are other issues that need to be=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; discussed, e.g., how to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; deal with<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; fragments in SFFs/Classifiers?<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; It is also &quot;prudent&quot; to chec=
k that no<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; issues will be experienced<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; in SFF<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; to handle fragments. If an SFC header is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; prepended for all<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; fragments, I'm not sure there<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is any particular issue at the SFF<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; level, except if<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; stripping/adding<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; context TLVs depends on the full packet (not<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; just fragment). It<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; is warranted to consider a little bit this<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; point before declaring<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; there is no issue.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; For point (1), declaring fragmentation=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; out of scope would be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; meant that<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; an implementation must be prepared to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; receive fragments with or<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; without NSH header as this is a decision<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; that is left to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; transport encapsulation. This is a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; requirement per se!<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I won't reiterate all the comments I<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; have about the current<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; wording of<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; this section.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Cheers, Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Message d'origine--=
--- De :<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Elzur, Uri<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a href=3D"mailt=
o:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"ma=
ilto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel.com</a>&gt;] En=
voy=E9<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : lundi 25 avril 2016<br=
>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 08:30 =C0 : BOUCADAIR Mo=
hamed IMT/OLN;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Thomas Narten;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D"mailto:sfc@ie=
tf.org" target=3D"_blank">
sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blan=
k">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Objet : RE: [sfc] WG las=
t call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf-sfc-nsh-04.tx=
t<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Hi Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; My point is that Fragmen=
tation is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; yet another transport re=
lated<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; issue<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; that<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is beyond the scope of N=
SH and<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; beyond the charter of th=
e WG, so<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; it<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; doesn't<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; really belong in the dra=
ft. We are<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; providing an advice as<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; extending the size of th=
e packet may<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; lead to fragmentation, b=
ut<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; as you check RFC 7348 Vx=
LAN, which<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; my create the same issue=
,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; you'll find it doesn't e=
ven<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; relate<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; to it.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Thx<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Uri (&quot;Oo-Ree&quot;)=
 C: <a href=3D"tel:949-378-7568" target=3D"_blank">
949-378-7568</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;tel:<a href=3D"tel:9=
49-378-7568" target=3D"_blank">949-378-7568</a>&gt;<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Original Message---=
-- From: sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a href=3D"mailt=
o:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"ma=
ilto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ietf.org</a>&gt;] =
On<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Behalf Of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D"mailto:mohame=
d.boucadair@orange.com" target=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"ma=
ilto:mohamed.boucadair@orange.com" target=3D"_blank">mohamed.boucadair@oran=
ge.com</a>&gt; Sent:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Sunday, April 24, 2016<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 10:32 PM To: Elzur, Uri<=
br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;<a href=3D"mailto:ur=
i.elzur@intel.com" target=3D"_blank">uri.elzur@intel.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto:<a href=3D"ma=
ilto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel.com</a>&gt;&gt;=
;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Thomas Narten<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &lt;<a href=3D"mailto:narten@us.ibm.com" target=3D"_=
blank">narten@us.ibm.com</a> &lt;mailto:<a href=3D"mailto:narten@us.ibm.com=
" target=3D"_blank">narten@us.ibm.com</a>&gt;&gt;;<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D"mailto:sfc@ie=
tf.org" target=3D"_blank">
sfc@ietf.org</a> &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blan=
k">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Subject: Re: [sfc] WG la=
st call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf-sfc-nsh-04.tx=
t<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Hi Uri,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; That's another option th=
at needs to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; be discussed/investigate=
d.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I'm<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; afraid<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; this is not the rational=
e adopted in<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -04 since it includes so=
me<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; text<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; that<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is far to be sufficient =
to ensure<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; interoperable<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; implementations.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; BTW, saying that nsh doe=
s not need<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; to deal with fragmentati=
on<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; because<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; it<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is transport-independent=
 is not IMHO<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; a good strategy to adopt=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; here<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; because<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; it opens the door for in=
teroperable<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; issues, it may lead to<b=
r>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sub-optimal implementati=
ons if the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sfc information is prese=
nt<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; only in one<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; fragments,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; etc.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; My comments are related =
to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; current text in the -04.=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; This text needs<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; to<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; be fixed somehow.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Cheers, Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Messa=
ge d'origine----- De :<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Elzur, Uri=
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a=
 href=3D"mailto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel.com<=
/a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel.c=
om</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Envoy=E9 :=
 dimanche 24 avril<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2016 17:36=
 =C0 : BOUCADAIR Mohamed<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; IMT/OLN; T=
homas Narten;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D=
"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt; Obj=
et :<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; RE: [sfc] =
WG last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf=
-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Hi Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I see no n=
eed to specify the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; exact beha=
vior as NSH is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; transport =
independent i.e. like<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; NSH intera=
ction with any other<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Transport =
eh issue of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Fragmentat=
ion is to be dealt in<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; a way<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; that match=
es the mechanisms<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; supported =
by the Transport used<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; and do not=
 belong in the NSH draft<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Thx<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Uri (&quot=
;Oo-Ree&quot;) C: <a href=3D"tel:949-378-7568" target=3D"_blank">
949-378-7568</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;tel:<a=
 href=3D"tel:949-378-7568" target=3D"_blank">949-378-7568</a>&gt;<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -----Origi=
nal Message----- From: sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [mailto:<a=
 href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ietf.or=
g</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-bounces@ietf=
.org</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; On Behalf =
Of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D=
"mailto:mohamed.boucadair@orange.com" target=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">mohamed.=
boucadair@orange.com</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Sent: Thur=
sday, April 14,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2016 12:43=
 AM To: Thomas Narten<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;<a hre=
f=3D"mailto:narten@us.ibm.com" target=3D"_blank">narten@us.ibm.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:narten@us.ibm.com" target=3D"_blank">narten@us.ibm.com</=
a>&gt;&gt;;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D=
"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt; Sub=
ject:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Re: [sfc] =
WG last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf=
-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; R-,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; In additio=
n to other pending<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; issues rai=
sed for this draft, I<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; would like=
 to raise this<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; additional=
 one about Section 6.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =3D=3D 6.&=
nbsp; Fragmentation Considerations<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; NSH and th=
e associated transport<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; header are=
 &quot;added&quot; to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; encapsulat=
ed packet/frame.&nbsp; This<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; additional=
 information<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; increases<=
br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; the<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; size of th=
e packet.&nbsp; In order<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the ensure=
 proper forwarding of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; NSH data, =
several options for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; handling f=
ragmentation and<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; re-assembl=
y exist:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 1.&nbsp; J=
umbo Frames, when<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; supported,=
 enable the transport<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; of NSH<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; and associ=
ated transport packets<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; without re=
quiring<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentat=
ion.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2.&nbsp; P=
ath MTU Discovery<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [RFC1191]&=
quot;describes a technique for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; dynamicall=
y discovering the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; maximum tr=
ansmission unit (MTU) of<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; an<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; arbitrary =
internet path&quot; and can<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; be utilize=
d to ensure the<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; the<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; required p=
acket size is used.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 3.&nbsp; [=
RFC6830] describes two<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; schemes fo=
r fragmentation and<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; re-<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; assembly<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; in section=
 5.4. =3D=3D<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The text=
 is weak for a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Standard t=
rack document that is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; intended t=
o solve the problem in<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D=
"https://tools.ietf.org/html/rfc7498#section-" target=3D"_blank">
https://tools.ietf.org/html/rfc7498#section-</a><br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; 2.12.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; There shou=
ld be a clear behavior<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; to be foll=
owed by an<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; implementation.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Further, I=
 would avoid the use<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; of words s=
uch as &quot;can&quot;.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The text=
 covers only<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentat=
ion when it is induced<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; by SFC<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; operations=
, it does not discuss<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the treatm=
ent of a fragment<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; when recei=
ved in an SFC domain.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; IMHO, the =
draft should also<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; specify th=
e behavior of the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Classifier=
 with regards to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragments =
for the sake of proper<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFC operat=
ion. Applying<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; classifica=
tion policies may<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; require th=
e<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; full packet, not only a =
fragment.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; In particu=
lar, dedicated<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; resources =
should dedicated for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; handling o=
ut of order fragments.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Of course,=
 it is out of scope<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; of this do=
cument to describe how<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFs handle=
 fragments.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * If an SF=
C header is prepended<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; for all fr=
agments, I'm not<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sure there=
 is any particular<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; issue at t=
he SFF level...except<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; if strippi=
ng/adding context TLVs<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; depends on=
 the full packet<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (not just =
fragment). It is<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; warranted =
to consider a little bit<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; this point=
 before declaring there<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; is<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; no issue.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The text=
 states &quot;several<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; options&qu=
ot;. This may be interpreted<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; as if impl=
ementing one of them<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is suffici=
ent...which is not<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; true. The =
first two points<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; contribute=
 to minimize the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentat=
ion risk, but<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentat=
ion may still be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; experience=
d<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (e.g., oth=
er shims are prepended<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; by other n=
odes for some other<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; purposes, =
nested nsh, etc.)<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The firs=
t two points have<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; nothing to=
 do with reassembly.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The supp=
ort of jumbo frames by<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; a router/d=
evice does not mean<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; that it ca=
n make use of it.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Appropriat=
e MTU configuration<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; should be =
undertaken in a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; consistent=
 manner within an SFC<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; domain. Th=
e text should be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; updated to=
 make it is about<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (consisten=
t) MTU<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; configuration.<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * BTW, sho=
uldn't the text be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; reworded t=
o recommended to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; increase t=
he MTU of **all<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; nodes** of=
 an SFC-enabled domain by<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; at least t=
he length of SFC<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; header &#4=
3; transport header?<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * Bullet 2=
, how PMTU discovery<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; is actuall=
y used in this<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; context? D=
o you assume that all<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFC-aware =
nodes will issue<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; such messa=
ges towards other<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFC-aware =
node, arbitrary<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; destinatio=
n, else?<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * Bullet 2=
, I would drop<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &quot;desc=
ribes a technique for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; dynamicall=
y discovering the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; maximum tr=
ansmission unit<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (MTU) of a=
n arbitrary internet<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; path&quot;=
.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * Bullet 2=
, s/ the the/the.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The refe=
rence to the LISP<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; specificat=
ion raises two concerns<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; and one co=
mment:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (1) I don'=
t think it is a good<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; approach t=
hat fragments induced<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; by the net=
work are passed to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; their ulti=
mate destinations as<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; such<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; (stateless).<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; IMO, reass=
embly should be done<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; within the=
 SFC domain<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (responsib=
le for fragmentation)<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; not passed=
 away. (2) Does the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; stateful m=
ode require all SFC<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; data plane=
 elements maintain a<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; full list =
of MTU for the any<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SFF/SF ins=
tance of the SFC<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; domain?<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; The curren=
t text suggests that<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [RFC6830] =
should be listed as<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; normative =
reference (not an<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; informativ=
e one). I would<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; personally=
 favor removing the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; reference =
to LISP (as it is an<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Experiment=
al RFC).<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; * The secu=
rity section of the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; draft may =
be augmented with<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; informatio=
nal<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; fragmentat=
ion-related pointers to:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; e.g., RFC1=
858 (Security<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Considerat=
ions for IP Fragment<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Filtering)=
, RFC3128 (Protection<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Against a =
Variant of the Tiny<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Fragment A=
ttack), and RFC 4963<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (IPv4 Reas=
sembly Errors at High<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Data Rates=
).<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Cheers, Me=
d<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; -----Message d'origine-----<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; De : sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-b=
ounces@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &lt;mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sf=
c-bounces@ietf.org</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; De la part de<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; <a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_blank">
mohamed.boucadair@orange.com</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &lt;mailto:<a href=3D"mailto:mohamed.boucadair@orange.com" target=3D"_b=
lank">mohamed.boucadair@orange.com</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; Envoy=E9 : lundi 11 avril<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; 2016 13:14 =C0 : Thomas<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; Narten; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.o=
rg</a>&gt; Objet<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; : Re:<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; [sfc] WG last call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; Dear Thomas, all,<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; As I mentioned during the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; meeting, there are several<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; issues<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; that are not covered in the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; last version of the draft. I<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; already provided examples of<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; the issues offline as requested<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; by Martin.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; Cheers, Med<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; -----Message<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; d'origine----- De : sfc<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D=
"_blank">sfc-bounces@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=
=3D"_blank">sfc-bounces@ietf.org</a>&gt;]<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; De la part de Thomas Narten<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; Envoy=E9 : jeudi 31 mars<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; 2016 04:48 =C0 :<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_bla=
nk">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; Objet : [sfc] WG last<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; call for<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; draft-ietf-sfc-nsh-04.txt<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; Dear WG:<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; This note begins a WG<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; last call on<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; draft-ietf-sfc-nsh-04.txt<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; (<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-s=
fc-nsh/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-sfc-=
nsh/</a>).<br>
<br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; The editors of the NSH document h=
ave indicated that they have<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; addressed all known<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; comments and that there<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; are no open<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; issues with the current<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; version of the document.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; Substantive comments to<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; the list please,<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; editorial comments<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; can go directly to the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; document editors.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; We'll also get a brief<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; update from the editors<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; at next<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; week's meeting. If there<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; are any remaining issues<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; with the<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; document, raising them<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; before the meeting would be<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; especially helpful.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; For the chairs, Thomas<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; _______________________________________________<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; sfc mailing<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; list <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_bla=
nk">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" tar=
get=3D"_blank">
https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; _______________________________________________<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; sfc mailing<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; list <a href=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &lt;mailto:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.o=
rg</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank"=
>
https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; __________=
_____________________________________<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sfc mailin=
g<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; list <a hr=
ef=3D"mailto:sfc@ietf.org" target=3D"_blank">
sfc@ietf.org</a><br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &lt;mailto=
:<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>&gt;<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href=3D=
"https://www.ietf.org/mailman/listinfo/sfc" target=3D"_blank">
https://www.ietf.org/mailman/listinfo/sfc</a><br>
<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; ________________________=
_______________________<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sfc mailing<o:p></o:p></=
span></p>
</blockquote>
</blockquote>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</span>
</body>
</html>

--_000_D348FA2D4C885jguicharciscocom_--


From nobody Fri Apr 29 09:23:17 2016
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C69A12D1D8 for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 09:23:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pNAluwD2q9Wq for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 09:23:06 -0700 (PDT)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5B7BA12D1D2 for <sfc@ietf.org>; Fri, 29 Apr 2016 09:23:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=7156; q=dns/txt; s=iport; t=1461946986; x=1463156586; h=from:to:subject:date:message-id:mime-version; bh=dNaqSCZgfwCYE0+zgX7tP/HOLHvjcFkhQulI+CbQGkk=; b=JXwO8zJ9wkbcPwoHyOal/0pmPWC6ii9e6ZC1MtauXvYTLgCcW5js4J6c yJa6HwVHKEJPvyEmtojmvSGyFEJe5e5kWaVrH/LnnUxLJ3dQpDWDLAqc9 qa5ty2Z7/XJc1FZREPhcBvtXGNluf3ZalH3NNDVXnxiBri38EdjAQIkup 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BLAgAkiiNX/4UNJK1dgmxMgUIOBrR3h?= =?us-ascii?q?HMBDYF2hhCBLTgUAQEBAQEBAWUnhEEBAQUdbgEIEQMBAig5FAkKBAESiCrEYQE?= =?us-ascii?q?BAQEBBQEBAQEBARqGIYRMhA8RATyFNgWODoUUhHEBjhaBZ4RNiF2PLwEeAQFCg?= =?us-ascii?q?2tsh0w2fwEBAQ?=
X-IronPort-AV: E=Sophos;i="5.24,552,1454976000";  d="scan'208,217";a="266953571"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 29 Apr 2016 16:23:05 +0000
Received: from XCH-ALN-010.cisco.com (xch-aln-010.cisco.com [173.36.7.20]) by alln-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id u3TGN5jN007902 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL) for <sfc@ietf.org>; Fri, 29 Apr 2016 16:23:05 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-010.cisco.com (173.36.7.20) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 29 Apr 2016 11:23:04 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Fri, 29 Apr 2016 11:23:03 -0500
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] Call for WG adoption of draft-penno-sfc-trace-03
Thread-Index: AQHRojNnrFMuf4oP40+/x3o+g9IIvg==
Date: Fri, 29 Apr 2016 16:23:03 +0000
Message-ID: <D34901FD.4C89B%jguichar@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.98.43.179]
Content-Type: multipart/alternative; boundary="_000_D34901FD4C89Bjguicharciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/K9lEs49M9Qjcyf5PkikCAKR6oF4>
Subject: Re: [sfc] Call for WG adoption of draft-penno-sfc-trace-03
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Apr 2016 16:23:10 -0000

--_000_D34901FD4C89Bjguicharciscocom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Dear WG:

Thank you for your feedback on draft-penno-sfc-trace-03 as a WG document. W=
e have received good support for adoption of the draft and therefore author=
s, please post a new version as draft-ietf-sfc-trace-00.

Thank You!

Jim

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
Jim Guichard <jguichar@cisco.com<mailto:jguichar@cisco.com>>
Date: Thursday, February 11, 2016 at 3:18 PM
To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: [sfc] Call for WG adoption of draft-penno-sfc-trace-03

Dear WG:

This email serves as a call for WG adoption of draft-penno-sfc-trace-03 as =
a WG document. The call for adoption will run for 2 weeks ending 2/25/2016.

Please note that this is a call for adoption, and not a last call for conte=
nt of the document. Adopting a WG document simply means that the WG will fo=
cus its efforts on that particular draft going forward, and use that docume=
nt for resolving open issues and documenting the WG's decisions.

Please indicate whether you support adoption for not, and if not why. Issue=
s you have with the current document itself can also be raised, but they sh=
ould be raised in the context of what should be changed in the document goi=
ng forward, rather than a pre-condition for adoption.

Finally, now is also a good time to poll for knowledge of any IPR that appl=
ies to this draft, in line with the IPR disclosure obligations for WG parti=
cipants (see RFCs 3979, 4879, 3669 and 5378 for more details). If you are l=
isted as a document author please respond to this email (to the chairs) whe=
ther or not you are aware of any relevant IPR.

Thanks!

SFC Chairs

--_000_D34901FD4C89Bjguicharciscocom_
Content-Type: text/html; charset="iso-8859-1"
Content-ID: <856885671EEE634EAAB92BAFD6CE63F3@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif;">
<div>Dear WG:</div>
<div><br>
</div>
<div>Thank you for your feedback on draft-penno-sfc-trace-03 as a WG docume=
nt. We have received good support for adoption of the draft and therefore a=
uthors, please post a new version as draft-ietf-sfc-trace-00.</div>
<div><br>
</div>
<div>Thank You!</div>
<div><br>
</div>
<div>Jim</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>sfc &lt;<a href=3D"mailto:sfc=
-bounces@ietf.org">sfc-bounces@ietf.org</a>&gt; on behalf of Jim Guichard &=
lt;<a href=3D"mailto:jguichar@cisco.com">jguichar@cisco.com</a>&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Thursday, February 11, 2016 a=
t 3:18 PM<br>
<span style=3D"font-weight:bold">To: </span>&quot;<a href=3D"mailto:sfc@iet=
f.org">sfc@ietf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.=
org</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>[sfc] Call for WG adoption=
 of draft-penno-sfc-trace-03<br>
</div>
<div><br>
</div>
<div>
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-famil=
y: Calibri, sans-serif;">
<div>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">Dear WG:</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;"><br>
</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">This email serves a=
s a call for WG adoption of draft-penno-sfc-trace-03 as a WG document. The =
call for adoption will run for 2 weeks
 ending 2/25/2016.</span><span style=3D"font-size: 13.5pt;"><o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 13.5pt;">&nbsp;</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">Please note that th=
is is a call for adoption, and not a last call for content of the document.=
 Adopting a WG document simply means that
 the WG will focus its efforts on that particular draft going forward, and =
use that document for resolving open issues and documenting the WG&#8217;s =
decisions.</span><span style=3D"font-size: 13.5pt;"><o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 13.5pt;">&nbsp;</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">Please indicate whe=
ther you support adoption for not, and if not why. Issues you have with the=
 current document itself can also be raised,
 but they should be raised in the context of what should be changed in the =
document going forward, rather than a pre-condition for adoption.&nbsp;</sp=
an><span style=3D"font-size: 13.5pt;"><o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 13.5pt;">&nbsp;</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">Finally, now is als=
o a good time to poll for knowledge of any IPR that applies to this draft, =
in line with the IPR disclosure obligations
 for WG participants (see RFCs 3979, 4879, 3669 and 5378 for more details).=
 If you are listed as a document author please respond to this email (to th=
e chairs) whether or not you are aware of any relevant IPR.</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;"><br>
</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">Thanks!</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;"><br>
</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">SFC Chairs</span></=
p>
</div>
</div>
</div>
</span>
</body>
</html>

--_000_D34901FD4C89Bjguicharciscocom_--


From nobody Fri Apr 29 09:31:19 2016
Return-Path: <jguichar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 960D012D199 for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 09:31:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I-sc0Xwg1icC for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 09:31:16 -0700 (PDT)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8004212D1B3 for <sfc@ietf.org>; Fri, 29 Apr 2016 09:31:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=7071; q=dns/txt; s=iport; t=1461947476; x=1463157076; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=NgTm5Ad2ZjcNojGUoJqZ6+22KHwz4+f0mTLDF0/7M74=; b=mIW+sVQ9OWT8dkxmSywH1gBK1ucV0yRXj27alahCU3R/VI1UKq1xhl8A mnFgoyhkN7Y3hfYj2bGitEvweWzBP3P9yWc9msg3LTF23MK6q4PDCFjmj wR227M9/xaXqLScgTXrqAXoGC4FGmLFaxaurP7i/6ENv2gv/lq4tms7SU k=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BLAgChiyNX/5FdJa1dgmxMgVAGtHmEc?= =?us-ascii?q?wENgXaGEAKBKzgUAQEBAQEBAWUcC4RBAQEBBB1sAgEZAwECKAcyFAkIAgQTiCr?= =?us-ascii?q?EZAEBAQEBAQEBAQEBAQEBAQEBAQEXhiGIWxEBPIU2BY4OhRSEcQGBLYxpgWeET?= =?us-ascii?q?Yhdjy8BHgEBQoIFG4FLbIdMNn8BAQE?=
X-IronPort-AV: E=Sophos; i="5.24,552,1454976000"; d="scan'208,217"; a="99363046"
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 29 Apr 2016 16:31:15 +0000
Received: from XCH-RCD-010.cisco.com (xch-rcd-010.cisco.com [173.37.102.20]) by rcdn-core-9.cisco.com (8.14.5/8.14.5) with ESMTP id u3TGVFcR006077 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL) for <sfc@ietf.org>; Fri, 29 Apr 2016 16:31:15 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-010.cisco.com (173.37.102.20) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 29 Apr 2016 11:31:14 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1104.009; Fri, 29 Apr 2016 11:31:14 -0500
From: "Jim Guichard (jguichar)" <jguichar@cisco.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: Call for WG adoption of draft-penno-sfc-appid-03
Thread-Index: AQHRZQHOvGZf31kz6UifjJTvmDJQAZ+hr9aA
Date: Fri, 29 Apr 2016 16:31:14 +0000
Message-ID: <D3490404.4C8A3%jguichar@cisco.com>
References: <D2E24A13.43289%jguichar@cisco.com>
In-Reply-To: <D2E24A13.43289%jguichar@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.98.43.179]
Content-Type: multipart/alternative; boundary="_000_D34904044C8A3jguicharciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/c6W5EaVvz1Vzf6UtxgvHoyYXKuY>
Subject: [sfc] Call for WG adoption of draft-penno-sfc-appid-03
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Apr 2016 16:31:18 -0000

--_000_D34904044C8A3jguicharciscocom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Dear WG:

We did not receive many responses for this call for adoption and therefore =
would like to re-invite people to post their thoughts on adopting this docu=
ment into the SFC WG. The call for adoption will run for a further 2 weeks =
ending 6/13/2016.

Thanks!

SFC Chairs

From: Jim Guichard <jguichar@cisco.com<mailto:jguichar@cisco.com>>
Date: Thursday, February 11, 2016 at 3:24 PM
To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Call for WG adoption of draft-penno-sfc-appid-03

Dear WG:

This email serves as a call for WG adoption of draft-penno-sfc-appid-03 as =
a WG document. The call for adoption will run for 2 weeks ending 2/25/2016.

Please note that this is a call for adoption, and not a last call for conte=
nt of the document. Adopting a WG document simply means that the WG will fo=
cus its efforts on that particular draft going forward, and use that docume=
nt for resolving open issues and documenting the WG's decisions.

Please indicate whether you support adoption for not, and if not why. Issue=
s you have with the current document itself can also be raised, but they sh=
ould be raised in the context of what should be changed in the document goi=
ng forward, rather than a pre-condition for adoption.

Finally, now is also a good time to poll for knowledge of any IPR that appl=
ies to this draft, in line with the IPR disclosure obligations for WG parti=
cipants (see RFCs 3979, 4879, 3669 and 5378 for more details). If you are l=
isted as a document author please respond to this email (to the chairs) whe=
ther or not you are aware of any relevant IPR.

Thanks!

SFC Chairs

--_000_D34904044C8A3jguicharciscocom_
Content-Type: text/html; charset="iso-8859-1"
Content-ID: <72C4D93262357A4298A4E1C926F828AB@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif;">
<div>Dear WG:</div>
<div><br>
</div>
<div>We did not receive many responses for this call for adoption and there=
fore would like to re-invite people to post their thoughts on adopting this=
 document into the SFC WG. The call for adoption will run for a further 2 w=
eeks ending 6/13/2016.&nbsp;</div>
<div><br>
</div>
<div>Thanks!</div>
<div><br>
</div>
<div>SFC Chairs</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>Jim Guichard &lt;<a href=3D"m=
ailto:jguichar@cisco.com">jguichar@cisco.com</a>&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Thursday, February 11, 2016 a=
t 3:24 PM<br>
<span style=3D"font-weight:bold">To: </span>&quot;<a href=3D"mailto:sfc@iet=
f.org">sfc@ietf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.=
org</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>Call for WG adoption of dr=
aft-penno-sfc-appid-03<br>
</div>
<div><br>
</div>
<div>
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-famil=
y: Calibri, sans-serif;">
<div>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">Dear WG:</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;"><br>
</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">This email serves a=
s a call for WG adoption of draft-penno-sfc-appid-03 as a WG document. The =
call for adoption will run for 2 weeks
 ending 2/25/2016.</span><span style=3D"font-size: 13.5pt;"><o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 13.5pt;">&nbsp;</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">Please note that th=
is is a call for adoption, and not a last call for content of the document.=
 Adopting a WG document simply means that
 the WG will focus its efforts on that particular draft going forward, and =
use that document for resolving open issues and documenting the WG&#8217;s =
decisions.</span><span style=3D"font-size: 13.5pt;"><o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 13.5pt;">&nbsp;</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">Please indicate whe=
ther you support adoption for not, and if not why. Issues you have with the=
 current document itself can also be raised,
 but they should be raised in the context of what should be changed in the =
document going forward, rather than a pre-condition for adoption.&nbsp;</sp=
an><span style=3D"font-size: 13.5pt;"><o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 13.5pt;">&nbsp;</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">Finally, now is als=
o a good time to poll for knowledge of any IPR that applies to this draft, =
in line with the IPR disclosure obligations
 for WG participants (see RFCs 3979, 4879, 3669 and 5378 for more details).=
 If you are listed as a document author please respond to this email (to th=
e chairs) whether or not you are aware of any relevant IPR.</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;"><br>
</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">Thanks!</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;"><br>
</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">SFC Chairs</span></=
p>
</div>
</div>
</div>
</span>
</body>
</html>

--_000_D34904044C8A3jguicharciscocom_--


From nobody Fri Apr 29 10:41:35 2016
Return-Path: <naikumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EFADB12D167 for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 10:41:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.516
X-Spam-Level: 
X-Spam-Status: No, score=-15.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gwnusDN3DW_n for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 10:41:32 -0700 (PDT)
Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 53D5012D11F for <sfc@ietf.org>; Fri, 29 Apr 2016 10:41:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=8735; q=dns/txt; s=iport; t=1461951692; x=1463161292; h=from:to:subject:date:message-id:mime-version; bh=F7Vo5fTw4PAd1NeUeXALBUO5XVnb0Aw9vWrV0yYU3T0=; b=DV4IOP+bM7DUcFi8pkYXI5t6i2wI57er/T5xmVwg/6kjSQK+Y2brjsTp GfoD98H7C4klM3WwDOvYiSYUmfZskTdSaZe/KzMAlxXLlzSdcLILnIF8x VwKaBMB2mgAIuzP7mT7AcEyXmRCR3BUhVzYalTbfAbZ6y39Y6k+jlU3V6 0=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BKAgAHnCNX/4wNJK1dgmxMgVAGtHmEc?= =?us-ascii?q?wENgXaGEIEuOBQBAQEBAQEBZSeEQQEBBR1uAQgRAwECKDkUCQoEARKIKsR8AQE?= =?us-ascii?q?BAQEFAQEBAQEBGopthA8RATyFNgWODoUUhHEBjhaBZ4RNiF2PLwEeAQFCggUbg?= =?us-ascii?q?Utsh0w2fwEBAQ?=
X-IronPort-AV: E=Sophos; i="5.24,552,1454976000"; d="scan'208,217"; a="99220111"
Received: from alln-core-7.cisco.com ([173.36.13.140]) by rcdn-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 29 Apr 2016 17:41:31 +0000
Received: from XCH-RCD-008.cisco.com (xch-rcd-008.cisco.com [173.37.102.18]) by alln-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id u3THfVvJ013528 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL) for <sfc@ietf.org>; Fri, 29 Apr 2016 17:41:31 GMT
Received: from xch-rcd-015.cisco.com (173.37.102.25) by XCH-RCD-008.cisco.com (173.37.102.18) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 29 Apr 2016 12:41:30 -0500
Received: from xch-rcd-015.cisco.com ([173.37.102.25]) by XCH-RCD-015.cisco.com ([173.37.102.25]) with mapi id 15.00.1104.009; Fri, 29 Apr 2016 12:41:30 -0500
From: "Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com>
To: "Jim Guichard (jguichar)" <jguichar@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] Call for WG adoption of draft-penno-sfc-appid-03
Thread-Index: AQHRoj5dGTJSUC0nfUiLJR/vcLXzfw==
Date: Fri, 29 Apr 2016 17:41:30 +0000
Message-ID: <D34914FE.14560B%naikumar@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.5.7.151005
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.234.13]
Content-Type: multipart/alternative; boundary="_000_D34914FE14560Bnaikumarciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/-Y1VAvwlINZTkpSqdXAkemmzgLQ>
Subject: Re: [sfc] Call for WG adoption of draft-penno-sfc-appid-03
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Apr 2016 17:41:34 -0000

--_000_D34914FE14560Bnaikumarciscocom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Support.

Regards,
Nagendra

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> on behalf of =
"Jim Guichard (jguichar)" <jguichar@cisco.com<mailto:jguichar@cisco.com>>
Date: Friday, April 29, 2016 at 12:31 PM
To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: [sfc] Call for WG adoption of draft-penno-sfc-appid-03

Dear WG:

We did not receive many responses for this call for adoption and therefore =
would like to re-invite people to post their thoughts on adopting this docu=
ment into the SFC WG. The call for adoption will run for a further 2 weeks =
ending 6/13/2016.

Thanks!

SFC Chairs

From: Jim Guichard <jguichar@cisco.com<mailto:jguichar@cisco.com>>
Date: Thursday, February 11, 2016 at 3:24 PM
To: "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>
Subject: Call for WG adoption of draft-penno-sfc-appid-03

Dear WG:

This email serves as a call for WG adoption of draft-penno-sfc-appid-03 as =
a WG document. The call for adoption will run for 2 weeks ending 2/25/2016.

Please note that this is a call for adoption, and not a last call for conte=
nt of the document. Adopting a WG document simply means that the WG will fo=
cus its efforts on that particular draft going forward, and use that docume=
nt for resolving open issues and documenting the WG's decisions.

Please indicate whether you support adoption for not, and if not why. Issue=
s you have with the current document itself can also be raised, but they sh=
ould be raised in the context of what should be changed in the document goi=
ng forward, rather than a pre-condition for adoption.

Finally, now is also a good time to poll for knowledge of any IPR that appl=
ies to this draft, in line with the IPR disclosure obligations for WG parti=
cipants (see RFCs 3979, 4879, 3669 and 5378 for more details). If you are l=
isted as a document author please respond to this email (to the chairs) whe=
ther or not you are aware of any relevant IPR.

Thanks!

SFC Chairs

--_000_D34914FE14560Bnaikumarciscocom_
Content-Type: text/html; charset="iso-8859-1"
Content-ID: <23544AD3C6030A46B1908822F2EEDFF1@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Calibri, sans-serif;">
<div>Support.</div>
<div><br>
</div>
<div>Regards,</div>
<div>Nagendra</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>sfc &lt;<a href=3D"mailto:sfc=
-bounces@ietf.org">sfc-bounces@ietf.org</a>&gt; on behalf of &quot;Jim Guic=
hard (jguichar)&quot; &lt;<a href=3D"mailto:jguichar@cisco.com">jguichar@ci=
sco.com</a>&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Friday, April 29, 2016 at 12:=
31 PM<br>
<span style=3D"font-weight:bold">To: </span>&quot;<a href=3D"mailto:sfc@iet=
f.org">sfc@ietf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.=
org</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>[sfc] Call for WG adoption=
 of draft-penno-sfc-appid-03<br>
</div>
<div><br>
</div>
<div>
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-famil=
y: Calibri, sans-serif;">
<div>Dear WG:</div>
<div><br>
</div>
<div>We did not receive many responses for this call for adoption and there=
fore would like to re-invite people to post their thoughts on adopting this=
 document into the SFC WG. The call for adoption will run for a further 2 w=
eeks ending 6/13/2016.&nbsp;</div>
<div><br>
</div>
<div>Thanks!</div>
<div><br>
</div>
<div>SFC Chairs</div>
<div><br>
</div>
<span id=3D"OLK_SRC_BODY_SECTION">
<div style=3D"font-family:Calibri; font-size:11pt; text-align:left; color:b=
lack; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM:=
 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid;=
 BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style=3D"font-weight:bold">From: </span>Jim Guichard &lt;<a href=3D"m=
ailto:jguichar@cisco.com">jguichar@cisco.com</a>&gt;<br>
<span style=3D"font-weight:bold">Date: </span>Thursday, February 11, 2016 a=
t 3:24 PM<br>
<span style=3D"font-weight:bold">To: </span>&quot;<a href=3D"mailto:sfc@iet=
f.org">sfc@ietf.org</a>&quot; &lt;<a href=3D"mailto:sfc@ietf.org">sfc@ietf.=
org</a>&gt;<br>
<span style=3D"font-weight:bold">Subject: </span>Call for WG adoption of dr=
aft-penno-sfc-appid-03<br>
</div>
<div><br>
</div>
<div>
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-famil=
y: Calibri, sans-serif;">
<div>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">Dear WG:</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;"><br>
</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">This email serves a=
s a call for WG adoption of draft-penno-sfc-appid-03 as a WG document. The =
call for adoption will run for 2 weeks
 ending 2/25/2016.</span><span style=3D"font-size: 13.5pt;"><o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 13.5pt;">&nbsp;</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">Please note that th=
is is a call for adoption, and not a last call for content of the document.=
 Adopting a WG document simply means that
 the WG will focus its efforts on that particular draft going forward, and =
use that document for resolving open issues and documenting the WG&#8217;s =
decisions.</span><span style=3D"font-size: 13.5pt;"><o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 13.5pt;">&nbsp;</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">Please indicate whe=
ther you support adoption for not, and if not why. Issues you have with the=
 current document itself can also be raised,
 but they should be raised in the context of what should be changed in the =
document going forward, rather than a pre-condition for adoption.&nbsp;</sp=
an><span style=3D"font-size: 13.5pt;"><o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 13.5pt;">&nbsp;</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">Finally, now is als=
o a good time to poll for knowledge of any IPR that applies to this draft, =
in line with the IPR disclosure obligations
 for WG participants (see RFCs 3979, 4879, 3669 and 5378 for more details).=
 If you are listed as a document author please respond to this email (to th=
e chairs) whether or not you are aware of any relevant IPR.</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;"><br>
</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">Thanks!</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;"><br>
</span></p>
<p class=3D"MsoNormal" style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt;"=
><span style=3D"font-size: 9pt; font-family: Consolas;">SFC Chairs</span></=
p>
</div>
</div>
</div>
</span></div>
</div>
</span>
</body>
</html>

--_000_D34914FE14560Bnaikumarciscocom_--


From nobody Fri Apr 29 14:33:42 2016
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E923812D1DD for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 14:33:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.895
X-Spam-Level: 
X-Spam-Status: No, score=-2.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GwBgB2yQUrYz for <sfc@ietfa.amsl.com>; Fri, 29 Apr 2016 14:33:38 -0700 (PDT)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) by ietfa.amsl.com (Postfix) with ESMTP id 4B1C912D742 for <sfc@ietf.org>; Fri, 29 Apr 2016 14:33:38 -0700 (PDT)
Received: from WTL-EXCHP-2.sandvine.com ([fe80::68ac:f071:19ff:3455]) by wtl-exchp-1.sandvine.com ([::1]) with mapi id 14.03.0195.001; Fri, 29 Apr 2016 17:33:37 -0400
From: Dave Dolson <ddolson@sandvine.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: draft-ietf-sfc-control-plane -- C3 interface
Thread-Index: AdGiKlPylIfr42rfQei+e06aOHat/gALj+Bg
Date: Fri, 29 Apr 2016 21:33:37 +0000
Message-ID: <E8355113905631478EFF04F5AA706E9830F46E8D@wtl-exchp-2.sandvine.com>
References: <787AE7BB302AE849A7480A190F8B933008D6201C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B933008D6201C@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.63]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_E8355113905631478EFF04F5AA706E9830F46E8Dwtlexchp2sandvi_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sfc/OoOpTNffv5XLHc6pKzLQ9TmDluA>
Subject: Re: [sfc] draft-ietf-sfc-control-plane -- C3 interface
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Apr 2016 21:33:41 -0000

--_000_E8355113905631478EFF04F5AA706E9830F46E8Dwtlexchp2sandvi_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Med,
Please see inline [DD2]

From: mohamed.boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
Sent: Friday, April 29, 2016 11:18 AM
To: Dave Dolson; sfc@ietf.org
Subject: RE: draft-ietf-sfc-control-plane -- C3 interface

Re-,

Please see inline.

Cheers,
Med


De : Dave Dolson [mailto:ddolson@sandvine.com]
Envoy=E9 : vendredi 29 avril 2016 16:24
=C0 : BOUCADAIR Mohamed IMT/OLN; sfc@ietf.org<mailto:sfc@ietf.org>
Objet : RE: draft-ietf-sfc-control-plane -- C3 interface

[..]

E.g., as in section 5.1 of https://www.ietf.org/archive/id/draft-penno-sfc-=
packet-02.txt
Maybe add this paragraph:
"This interface informs the SFC-aware SF about the method for handling bidi=
rectional paths,
either by conveying the algorithmic method to use, or by providing forward/=
reverse path
mapping."

[Med] I'm hesitating to add text about the "algorithmic method" as I don't =
have a document to cite. Note that some stateful SFs (e.g., NAT) will natur=
ally add a reverse mapping to handle incoming packets without requiring inp=
uts from the CP. What do you mean by "providing forward/reverse path mappin=
g"? Is it SF-specific mapping?

[DD] I agree there is a lack of material to cite...
[DD] What I mean is informing the SF that "path X is the complementary path=
 of path Y". E.g., "Paths 100 (upstream) and 101 (downstream) are pairs. Re=
spond to a path-100 packet on path 101."
[Med] Thank you for the clarification. What would be the added value of pro=
viding that information (X complementary of Y) if we assume that two classi=
fication rules are installed to handle both directions?
[DD2] Please see the new https://tools.ietf.org/html/draft-penno-sfc-packet=
-03, which discusses the need for symmetric path information.  Section 5.1 =
talks about using the control plane to provide this information. If this ap=
proach is taken, the C3 interface would provide the information.

What about adding this NEW text at the end of Section 4.2?

NEW:
   Typically, C2 interface is used to ensure that the same SF instance
   is involved in both directions of a flow (including, to ensure full
   chain symmetry).
[DD] I disagree that C2 has anything to do with this. Instead, C1 must be u=
sed to provide consistent classification.
[Med] The example I have in mind is an a statefull NAT that is attached to =
a given SFF while the Classifier hasn't the visibility on the full forwardi=
ng path. The classifier in such case has no means to force that the same SF=
 instance will be invoked for both direction. Wouldn't C2 be involved in su=
ch case?
[DD2] OK, I see your point, but this is different than my concern, which is=
 that if the SF needs to know about related forward/reverse paths, then the=
 C3 interface has this responsibility.

[DD] How about adding the generic statement to section 3.3.3, "Some SFs may=
 need to be configured regarding the rules for packet reversal on a path. T=
he controller may use the C3 interface to specify how packets on a path may=
 be placed on the reverse path."
[Med] What is specific in this case compared to configuring two classificat=
ion rules; one for each direction? Is there something the classifier is sup=
posed to do?
[DD2] I hope https://tools.ietf.org/html/draft-penno-sfc-packet-03 explains=
 why SFs need to know this.


...

[Med] FWIW, context information is mentioned in the WG charter "communicate=
s context information between nodes that implement". What about this change=
 to avoid confusion:

OLD:
   This interface is also used to instruct an SFC-aware SF about any
   context information it needs to supply in the context of a given SFC.

NEW:
   This interface is also used to instruct an SFC-aware SF about any
   context information (a.k.a., metadata) it needs to supply
   for a given SFC.
[DD] Again, is this intended to mean adding information to a packet? Or is =
"supply" intentionally vague about the delivery mechanism?
[Med] "Supply" is intentional here as this covers both cases: (1) add a new=
 information to a packer (e.g., a new TLV), (2) update the context of an ex=
isting TLV.
[DD2] I think we agree on the purpose. But if it is configuration about how=
 to modify packets, I think you should say so; otherwise one might think it=
 is about supplying information out-of-band in the control-plane. Would you=
 change "... it needs to supply for a given SFC." to "... it needs to attac=
h to packets for a given SFC." ?


Regarding this paragraph, I think it would be cleaner if this behavior actu=
ally requires the C2 interface into the SF.

[Med] I do think the current wording is correct. Having an SFF co-located w=
ith a set of SFs is deployment-specific according to the SFC architecture R=
FC.
[DD] I agree with that statement. However, I think the case being described=
 is when there *is* a co-located SFF, but the text is pretending there isn'=
t. If the following text remains, C3 will need to include all the functiona=
lity of C2.
[Med] I re-confirm that the initial case we wanted to cover by this text is=
 an SFF servicing a group of SFs that are embedded in a distinct physical n=
ode. This scenario suppose that once an SF is consumed it sends back the pa=
cket to the SFF that may undertake another hook to another SF in that node =
and so on. The packet is not handed from an SF to another one without solic=
iting the external SFF. That's sub-optimal, I agree. The text is currently =
silent whether the distinct locators are configured using the C2 interface =
(assuming that a distinct management interface is used between the control =
element and an SFC-aware SF).
[DD2] If you wish the text to be silent on which interface, then you should=
 move it out of section "3.3.3 C3: Interface between SFC Control Plane & SF=
C-aware SFs".
[DD2] But again, I think you should avoid discussing how an SF can be confi=
gured to send traffic directly to another SF, which I don't think is archit=
ecturally correct. There needs to be a (co-located) SFF to connect them.





--_000_E8355113905631478EFF04F5AA706E9830F46E8Dwtlexchp2sandvi_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
p.PrformatHTML, li.PrformatHTML, div.PrformatHTML
	{mso-style-name:"Pr=E9format=E9 HTML";
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:"Courier New";}
p.Textedebulles, li.Textedebulles, div.Textedebulles
	{mso-style-name:"Texte de bulles";
	mso-style-link:"Texte de bulles Car";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.TextedebullesCar
	{mso-style-name:"Texte de bulles Car";
	mso-style-priority:99;
	mso-style-link:"Texte de bulles";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle27
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle28
	{mso-style-type:personal;
	font-family:"Courier New";
	color:black;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle29
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Med,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#E36C0A">Please see inline [DD2=
]<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> mohamed.=
boucadair@orange.com [mailto:mohamed.boucadair@orange.com]
<br>
<b>Sent:</b> Friday, April 29, 2016 11:18 AM<br>
<b>To:</b> Dave Dolson; sfc@ietf.org<br>
<b>Subject:</b> RE: draft-ietf-sfc-control-plane -- C3 interface<o:p></o:p>=
</span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Re-,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Please see inline.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black">Med<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:10.0pt;font-fam=
ily:&quot;Courier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">De&nbsp;:</span></b><span=
 lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot=
;sans-serif&quot;"> Dave Dolson [<a href=3D"mailto:ddolson@sandvine.com">ma=
ilto:ddolson@sandvine.com</a>]
<br>
<b>Envoy=E9&nbsp;:</b> vendredi 29 avril 2016 16:24<br>
<b>=C0&nbsp;:</b> BOUCADAIR Mohamed IMT/OLN; <a href=3D"mailto:sfc@ietf.org=
">sfc@ietf.org</a><br>
<b>Objet&nbsp;:</b> RE: draft-ietf-sfc-control-plane -- C3 interface<o:p></=
o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"FR"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[..]</span><span style=
=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black"><o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal">E.g., as in section 5.1 of <span lang=3D"FR"><a href=
=3D"https://www.ietf.org/archive/id/draft-penno-sfc-packet-02.txt"><span la=
ng=3D"EN-US">https://www.ietf.org/archive/id/draft-penno-sfc-packet-02.txt<=
/span></a>
</span><o:p></o:p></p>
<p class=3D"MsoNormal">Maybe add this paragraph:<o:p></o:p></p>
<p class=3D"MsoNormal">&#8220;This interface informs the SFC-aware SF about=
 the method for handling bidirectional paths,<o:p></o:p></p>
<p class=3D"MsoNormal">either by conveying the algorithmic method to use, o=
r by providing forward/reverse path
<o:p></o:p></p>
<p class=3D"MsoNormal">mapping.&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">[Med] I&#8217;m hesitating to add text about t=
he &#8220;algorithmic method&#8221; as I don&#8217;t have a document to cit=
e. Note that some stateful SFs (e.g., NAT) will naturally add a reverse
 mapping to handle incoming packets without requiring inputs from the CP. W=
hat do you mean by &#8220;providing forward/reverse path mapping&#8221;? Is=
 it SF-specific mapping?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] I agree there is =
a lack of material to cite&#8230;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] What I mean is in=
forming the SF that &#8220;path X is the complementary path of path Y&#8221=
;. E.g., &#8220;Paths 100 (upstream) and 101 (downstream) are pairs. Respon=
d to a path-100 packet on path 101.&#8221;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:red">[Med] Thank you for the clarification. What woul=
d be the added value of providing that information (X complementary of Y) i=
f we assume that two classification rules are
 installed to handle both directions?&nbsp;&nbsp; <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#E36C0A">[DD2] Please see the n=
ew <a href=3D"https://tools.ietf.org/html/draft-penno-sfc-packet-03">
https://tools.ietf.org/html/draft-penno-sfc-packet-03</a></span><span style=
=3D"color:#1F497D">,
</span><span style=3D"color:#E36C0A">which discusses the need for symmetric=
 path information</span><span style=3D"color:#1F497D">.</span><span style=
=3D"color:#E36C0A"> &nbsp;Section 5.1 talks about using the control plane t=
o provide this information. If this approach
 is taken, the C3 interface would provide the information.<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">What about adding this NEW text at the end of =
Section 4.2?
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;&nbsp; Typically, C2 interface is used t=
o ensure that the same SF instance
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;&nbsp;&nbsp;is involved in both directio=
ns of a flow (including, to ensure full
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&nbsp;&nbsp;&nbsp;chain symmetry).
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] I disagree that C=
2 has anything to do with this. Instead, C1 must be used to provide consist=
ent classification.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:red">[Med] The example I have in mind is an a statefu=
ll NAT that is attached to a given SFF while the Classifier hasn&#8217;t th=
e visibility on the full forwarding path. The classifier
 in such case has no means to force that the same SF instance will be invok=
ed for both direction. Wouldn&#8217;t C2 be involved in such case?&nbsp;&nb=
sp;
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#E36C0A">[DD2] OK, I see your p=
oint, but this is different than my concern, which is that if the SF needs =
to know about related forward/reverse paths, then the C3 interface has this=
 responsibility.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] How about adding =
the generic statement to section 3.3.3, &#8220;Some SFs may need to be conf=
igured regarding the rules for packet reversal on a path. The controller ma=
y use the C3 interface to specify how packets
 on a path may be placed on the reverse path.&#8221;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:red">[Med] What is specific in this case compared to =
configuring two classification rules; one for each direction? Is there some=
thing the classifier is supposed to do?&nbsp;
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#E36C0A">[DD2] I hope <a href=
=3D"https://tools.ietf.org/html/draft-penno-sfc-packet-03">
https://tools.ietf.org/html/draft-penno-sfc-packet-03</a> explains why SFs =
need to know this.<o:p></o:p></span></p>
<pre><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">&=
nbsp;&nbsp;&nbsp;<span style=3D"color:black"><o:p></o:p></span></span></pre=
>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">&#8230;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">[Med] FWIW, context information is mentioned i=
n the WG charter &#8220;communicates context information between nodes that=
 implement&#8221;. What about this change to avoid confusion:<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">OLD:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
&nbsp;&nbsp; This interface is also used to instruct an SFC-aware SF about =
any<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
&nbsp;&nbsp; context information it needs to supply in the context of a giv=
en SFC.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">NEW:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
&nbsp;&nbsp; This interface is also used to instruct an SFC-aware SF about =
any<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
&nbsp;&nbsp; context information (a.k.a., metadata) it needs to supply
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
&nbsp;&nbsp;&nbsp;for a given SFC.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] Again, is this in=
tended to mean adding information to a packet? Or is &#8220;supply&#8221; i=
ntentionally vague about the delivery mechanism?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:red">[Med] &#8220;Supply&#8221; is intentional here a=
s this covers both cases: (1) add a new information to a packer (e.g., a ne=
w TLV), (2) update the context of an existing TLV.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#E36C0A">[DD2] I think we agree=
 on the purpose. But if it is configuration about how to modify packets, I =
think you should say so; otherwise one might think it is about supplying in=
formation out-of-band in the control-plane.
 Would you change &#8220;&#8230; it needs to supply for a given SFC.&#8221;=
 to &#8220;&#8230; it needs to attach to packets for a given SFC.&#8221; ?<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Regarding this paragraph, I think it would be cleane=
r if this behavior actually requires the C2 interface into the SF.<o:p></o:=
p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black">[Med] I do think the current wording is correc=
t. Having an SFF co-located with a set of SFs is deployment-specific accord=
ing to the SFC architecture RFC.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[DD] I agree with that=
 statement. However, I think the case being described is when there *<b>is<=
/b>* a co-located SFF, but the text is pretending there isn&#8217;t. If the=
 following text remains, C3 will need to include
 all the functionality of C2.</span><span style=3D"color:black"><o:p></o:p>=
</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:red">[Med] I re-confirm that the initial case we want=
ed to cover by this text is an SFF servicing a group of SFs that are embedd=
ed in a distinct physical node. This scenario
 suppose that once an SF is consumed it sends back the packet to the SFF th=
at may undertake another hook to another SF in that node and so on. The pac=
ket is not handed from an SF to another one without soliciting the external=
 SFF. That&#8217;s sub-optimal, I agree.
 The text is currently silent whether the distinct locators are configured =
using the C2 interface (assuming that a distinct management interface is us=
ed between the control element and an SFC-aware SF).
</span><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;=
color:#1F497D"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#E36C0A">[DD2] If you wish the =
text to be silent on which interface, then you should move it out of sectio=
n &#8220;3.3.3 C3: Interface between SFC Control Plane &amp; SFC-aware SFs&=
#8221;.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#E36C0A">[DD2] But again, I thi=
nk you should avoid discussing how an SF can be configured to send traffic =
directly to another SF, which I don&#8217;t think is architecturally correc=
t. There needs to be a (co-located) SFF to
 connect them.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#E36C0A"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#E36C0A"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:red">&nbsp;&nbsp;&nbsp;&nbsp;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
</div>
</div>
</body>
</html>

--_000_E8355113905631478EFF04F5AA706E9830F46E8Dwtlexchp2sandvi_--

