
From nobody Tue Jan  2 08:15:02 2018
Return-Path: <klarose@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B499112D77D for <sfc@ietfa.amsl.com>; Tue,  2 Jan 2018 08:15:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.931
X-Spam-Level: 
X-Spam-Status: No, score=-1.931 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EBv3wzxEkyRG for <sfc@ietfa.amsl.com>; Tue,  2 Jan 2018 08:14:59 -0800 (PST)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 72EF712D7E2 for <sfc@ietf.org>; Tue,  2 Jan 2018 08:14:55 -0800 (PST)
Received: from WTL-EXCHSV2-2.sandvine.com (192.168.194.59) by WTL-EXCHSV2-2.sandvine.com (192.168.194.59) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521) id 15.1.1034.26; Tue, 2 Jan 2018 11:14:54 -0500
Received: from WTL-EXCHSV2-2.sandvine.com ([fe80::70e5:d09e:7bb9:986a]) by WTL-EXCHSV2-2.sandvine.com ([fe80::70e5:d09e:7bb9:986a%20]) with mapi id 15.01.1034.026; Tue, 2 Jan 2018 11:14:54 -0500
From: Kyle Larose <klarose@sandvine.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG Last Call : draft-ietf-sfc-hierarchical
Thread-Index: AQHTaVc/83XBjAYxTEOAVKhNut0jKKNg9k+Q
Date: Tue, 2 Jan 2018 16:14:54 +0000
Message-ID: <072ce1d452564bc389001da5e89ab9bf@sandvine.com>
References: <e31a82d9-3eef-f56c-c0b0-83f112e7f2a3@joelhalpern.com>
In-Reply-To: <e31a82d9-3eef-f56c-c0b0-83f112e7f2a3@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.51]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/YQnrEsetS9Mv4I-9rU5OdRfQBVU>
Subject: Re: [sfc] WG Last Call : draft-ietf-sfc-hierarchical
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jan 2018 16:15:01 -0000

I have read the document. I think it proposes useful techniques for managin=
g complex SFC networks, so I definitely want to see it published. I have em=
ailed a few nits to the authors, but I do not think they are worth preventi=
ng it being published.

I support the document going for publication.

> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Joel M. Halpern
> Sent: Wednesday, November 29, 2017 4:16 PM
> To: sfc@ietf.org
> Subject: [sfc] WG Last Call : draft-ietf-sfc-hierarchical
>=20
> This draft
> https://tools.ietf.org/html/draft-ietf-sfc-hierarchical-05
>=20
> has been adopted by the working group and discussed over several meetings=
.
>=20
> The WG Chairs have determined that it makes sense to issue a WG last call=
 on
> this document.
> Given that there are two last calls an two calls for working group adopti=
on
> (see following emails) we are allowing 3 weeks for these calls.
>=20
> Please respond with either support or objection to the WG delivering this
> document to our area director for publication as a Proposed Standard RFC.
>=20
> We need to see feedback.  Silence does not imply consent.
> We would prefer feedback with content.
>=20
> Thank you,
> Joel (& Jim)
>=20
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Tue Jan  2 20:17:33 2018
Return-Path: <gregimirsky@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D65801200FC for <sfc@ietfa.amsl.com>; Tue,  2 Jan 2018 20:17:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level: 
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EexVGW9-yiGf for <sfc@ietfa.amsl.com>; Tue,  2 Jan 2018 20:17:30 -0800 (PST)
Received: from mail-lf0-x230.google.com (mail-lf0-x230.google.com [IPv6:2a00:1450:4010:c07::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8F4F7124217 for <sfc@ietf.org>; Tue,  2 Jan 2018 20:17:30 -0800 (PST)
Received: by mail-lf0-x230.google.com with SMTP id m20so443759lfi.6 for <sfc@ietf.org>; Tue, 02 Jan 2018 20:17:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=sqQwUwLDM2suCSXcr3+OO5qIJToMAKBnHWMrb6kcPGo=; b=ixdclfEnczxcE311MeKZ7cqaJMbi3jYMW8LkRSe5Bkb4IXIMXoVShFDFc6HHh8m8fR D3L7U69zKRLbCEv83Zv6zhD5bXWHruMKK7U96SM1jpT/g4/bTSIYmGdkoX5eBOl1ze+c zfbssFwIiYPEfSrHChoYcO+USsPkwOU6vWmCtuvwxSd+6A6ia9hPWZ9GTC+lBasRDAUF en6zmqpBTCbW2Jk1opU4+nqJeYFL3/2CE2l6fhuusLWhGIvFtQJEvKY/tgukuC+0lpa5 89lvwx3c7WnDeLL6cVF7NYUyfj+C0ik8A06v5T7fiREu+z1BE7DjnZYw6l8VbqIirSnQ k0LQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=sqQwUwLDM2suCSXcr3+OO5qIJToMAKBnHWMrb6kcPGo=; b=b6ar3cC2NRbNvAjgd3NiGucB2KUtSBfTbks7rcLjm8J2xkKThDJh10k7g5qOauS0vo 1cQkVx+mEBTsvNe4cMGi5UhDntpZpFwv/7/nlnnLE4JThYwST9M4P3pWQIthJOZ/0MId N4SlX2x2tl+tD8SqCsrGFA+tFfMSbJbRViw+DbX93G4pywvbjyO+aqzCz0cA0l2G/NSL vOz+75ADjasU+z32PU83CWVW+GiOymBTsC7+2UvTNNdjBamtrSC6mhc1lt8NX3F01wei XwVwZZccrBQ8+fA8jc/lp4Bl++DiS3YwNjYdRGeVnrpJC+N9gEQoz13Vz3e2qg/9NQKE 0SvA==
X-Gm-Message-State: AKGB3mK3zMcly5k0xyyk4kEAFoX4N8aLpDC0ms37IrKou5DJ/KW8f16R J532GxhBQNegjs6rUChocsf0Dpz20VLrxSHg/ho=
X-Google-Smtp-Source: ACJfBovXrJ/dNytJTrERbyOtn7PGFu/A3Eja+yhbfm7A/hNJrVOMcbhJmwwJ5R9aST2rN+SzMG/+vJHY9bBQ8PGuGLo=
X-Received: by 10.46.18.216 with SMTP id 85mr117003ljs.100.1514953048652; Tue, 02 Jan 2018 20:17:28 -0800 (PST)
MIME-Version: 1.0
Received: by 10.46.32.136 with HTTP; Tue, 2 Jan 2018 20:17:27 -0800 (PST)
Received: by 10.46.32.136 with HTTP; Tue, 2 Jan 2018 20:17:27 -0800 (PST)
In-Reply-To: <e31a82d9-3eef-f56c-c0b0-83f112e7f2a3@joelhalpern.com>
References: <e31a82d9-3eef-f56c-c0b0-83f112e7f2a3@joelhalpern.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Tue, 2 Jan 2018 20:17:27 -0800
Message-ID: <CA+RyBmXJqgawJpBxAx2-Bo6_2ADqLFAZ3DSCRwdBoYEAgV8iyg@mail.gmail.com>
To: Joel Halpern <jmh@joelhalpern.com>
Cc: Service Function Chaining IETF list <sfc@ietf.org>
Content-Type: multipart/alternative; boundary="94eb2c0642d250ff0f0561d77eab"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/0srO5InkWXHndmEE-s3eNaoggpw>
Subject: Re: [sfc] WG Last Call : draft-ietf-sfc-hierarchical
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Jan 2018 04:17:33 -0000

--94eb2c0642d250ff0f0561d77eab
Content-Type: text/plain; charset="UTF-8"

Yes, support the publication.

Regards, Greg

On Nov 29, 2017 1:15 PM, "Joel M. Halpern" <jmh@joelhalpern.com> wrote:

> This draft
> https://tools.ietf.org/html/draft-ietf-sfc-hierarchical-05
>
> has been adopted by the working group and discussed over several meetings.
>
> The WG Chairs have determined that it makes sense to issue a WG last call
> on this document.
> Given that there are two last calls an two calls for working group
> adoption (see following emails) we are allowing 3 weeks for these calls.
>
> Please respond with either support or objection to the WG delivering this
> document to our area director for publication as a Proposed Standard RFC.
>
> We need to see feedback.  Silence does not imply consent.
> We would prefer feedback with content.
>
> Thank you,
> Joel (& Jim)
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>

--94eb2c0642d250ff0f0561d77eab
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto">Yes, support the publication.<div dir=3D"auto"><br></div>=
<div dir=3D"auto">Regards, Greg=C2=A0</div></div><div class=3D"gmail_extra"=
><br><div class=3D"gmail_quote">On Nov 29, 2017 1:15 PM, &quot;Joel M. Halp=
ern&quot; &lt;<a href=3D"mailto:jmh@joelhalpern.com">jmh@joelhalpern.com</a=
>&gt; wrote:<br type=3D"attribution"><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">This dr=
aft<br>
<a href=3D"https://tools.ietf.org/html/draft-ietf-sfc-hierarchical-05" rel=
=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/dr<wbr>aft-ie=
tf-sfc-hierarchical-05</a><br>
<br>
has been adopted by the working group and discussed over several meetings.<=
br>
<br>
The WG Chairs have determined that it makes sense to issue a WG last call o=
n this document.<br>
Given that there are two last calls an two calls for working group adoption=
 (see following emails) we are allowing 3 weeks for these calls.<br>
<br>
Please respond with either support or objection to the WG delivering this d=
ocument to our area director for publication as a Proposed Standard RFC.<br=
>
<br>
We need to see feedback.=C2=A0 Silence does not imply consent.<br>
We would prefer feedback with content.<br>
<br>
Thank you,<br>
Joel (&amp; Jim)<br>
<br>
______________________________<wbr>_________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/sfc</a><br>
</blockquote></div></div>

--94eb2c0642d250ff0f0561d77eab--


From nobody Wed Jan  3 03:22:38 2018
Return-Path: <Dirk.Trossen@InterDigital.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 22763127010 for <sfc@ietfa.amsl.com>; Wed,  3 Jan 2018 03:22:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=interdigital.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Mjt86Fg9QNXK for <sfc@ietfa.amsl.com>; Wed,  3 Jan 2018 03:22:33 -0800 (PST)
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-sn1nam02on0110.outbound.protection.outlook.com [104.47.36.110]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F02A612711B for <sfc@ietf.org>; Wed,  3 Jan 2018 03:22:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=interdigital.onmicrosoft.com; s=selector1-interdigital-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=NJFttqaITMKkUjiycKa6NxLhBFV3z7MC/bQuFHYZgOY=; b=BtRZ5w0YF04KavNXNFc0zrL2F0ARkf02ypNdW7AxWTVHWMiMCklFfPTOLOgP3Esf5g6yP98XJrpmBNyiJQoFohuI8zBw6PM81kSAcj5aoMGQeF+lqVYuOve4QA1lkUK2P+MC8E6/SdZtRH6HD8TLFfO9pVwp9g1b4DGCEdcaj40=
Received: from BN6PR1001MB2324.namprd10.prod.outlook.com (10.174.88.32) by BN6PR1001MB2322.namprd10.prod.outlook.com (10.174.88.30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.366.8; Wed, 3 Jan 2018 11:22:31 +0000
Received: from BN6PR1001MB2324.namprd10.prod.outlook.com ([10.174.88.32]) by BN6PR1001MB2324.namprd10.prod.outlook.com ([10.174.88.32]) with mapi id 15.20.0366.009; Wed, 3 Jan 2018 11:22:31 +0000
From: "Trossen, Dirk" <Dirk.Trossen@InterDigital.com>
To: Ramin Khalili <ramin.khalili@huawei.com>, James N Guichard <james.n.guichard@huawei.com>, 'Service Function Chaining IETF list' <sfc@ietf.org>
CC: Alia Atlas <akatlas@gmail.com>
Thread-Topic: SFC WG re-chartering - initial text for WG review/comment
Thread-Index: AdNyuLcja4roriHRQZ67o9nPI1G8tQHiLsEBADQE7RAAADdirwJcoLVQ
Date: Wed, 3 Jan 2018 11:22:30 +0000
Message-ID: <BN6PR1001MB23249BE80D36DCACEB8960B5F31E0@BN6PR1001MB2324.namprd10.prod.outlook.com>
References: <BF1BE6D99B52F84AB9B48B7CF6F17DA3134BDFE6@sjceml521-mbx.china.huawei.com> <BN6PR1001MB2324D21445864DE32D1B018DF30D0@BN6PR1001MB2324.namprd10.prod.outlook.com>, <566C56D84391B845A5669C78BB642FC0013CCD39@lhreml501-mbb> <BN6PR1001MB2324DCFAC3D5F67DC224E776F3020@BN6PR1001MB2324.namprd10.prod.outlook.com>
In-Reply-To: <BN6PR1001MB2324DCFAC3D5F67DC224E776F3020@BN6PR1001MB2324.namprd10.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Dirk.Trossen@InterDigital.com; 
x-originating-ip: [82.144.227.101]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BN6PR1001MB2322; 7:7SMblg1mRQwnY55Vdys34e9MimB5P2l5lTeuCSfw5Nyg/aX3VG7JXNktPemhmGSOFes5L7VXm4IWAnBHlY1wn/WbViO4lUTTmrOKGvMJcuqBT7tBQHJB2MNDZz5rmKuDMaRh3iBrgBtvEhdjBQ0zmvou8mDqUasDOtPUjptUoxkpjS7ZSyxlqKV8ejbk//5CNg0Ez6uirQaQ5AgPznEoQQbcy0uISjnoPPf8vySeFPDo2AmQF1+JL776g2uFLsmL
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-correlation-id: 5e82b1fb-e551-4ef4-6c9d-08d5529c4783
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(4534020)(4602075)(4603075)(4627115)(201702281549075)(5600026)(4604075)(3008032)(2017052603307)(7153060); SRVR:BN6PR1001MB2322; 
x-ms-traffictypediagnostic: BN6PR1001MB2322:
x-microsoft-antispam-prvs: <BN6PR1001MB2322ABEA69F18D8290B88025F31E0@BN6PR1001MB2322.namprd10.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(192374486261705)(50582790962513);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040470)(2401047)(8121501046)(5005006)(10201501046)(93006095)(93001095)(3231023)(944501075)(3002001)(6041268)(2016111802025)(20161123564045)(20161123558120)(20161123562045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(6043046)(201708071742011); SRVR:BN6PR1001MB2322; BCL:0; PCL:0; RULEID:(100000803101)(100110400095); SRVR:BN6PR1001MB2322; 
x-forefront-prvs: 0541031FF6
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(376002)(366004)(396003)(346002)(39380400002)(39840400004)(199004)(189003)(13464003)(86362001)(3280700002)(3660700001)(33656002)(68736007)(4326008)(8676002)(14454004)(2906002)(81156014)(99286004)(93886005)(53936002)(5660300001)(110136005)(9686003)(106356001)(2950100002)(478600001)(966005)(6306002)(72206003)(2900100001)(105586002)(7736002)(77096006)(76176011)(229853002)(305945005)(59450400001)(8936002)(25786009)(6506007)(53546011)(81166006)(97736004)(66066001)(7696005)(55016002)(39060400002)(316002)(6436002)(102836004)(3846002)(6246003)(6116002)(74316002)(15398625002)(85282002); DIR:OUT; SFP:1102; SCL:1; SRVR:BN6PR1001MB2322; H:BN6PR1001MB2324.namprd10.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; 
received-spf: None (protection.outlook.com: InterDigital.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 09Onr4yOU30vUqn6edlLYkUUrs92FeaIeXzkobZdpkFLbjOBhNuvHewet86LMPDQdwzvb3mXl9xmiGwxjzWDTw==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: interdigital.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5e82b1fb-e551-4ef4-6c9d-08d5529c4783
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Jan 2018 11:22:31.0026 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: e351b779-f6d5-4e50-8568-80e922d180ae
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR1001MB2322
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/AUfD7qEG-5PtcrHU81U9RqMxvgc>
Subject: Re: [sfc] SFC WG re-chartering - initial text for WG review/comment
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Jan 2018 11:22:36 -0000

Forgot to mention that the document at https://ict-flame.eu/wp-content/uplo=
ads/sites/3/2017/10/D3.3-FLAME-Platform-Architecture-and-Infrastructure-Spe=
cification-v1.0.pdf shows (among other things) how SFC is utilized in the m=
entioned EC-funded effort to realize flexible orchestration in many-POP/edg=
e deployment scenarios.

Dirk

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Trossen, Dirk
Sent: 22 December 2017 10:51
To: Ramin Khalili <ramin.khalili@huawei.com>; James N Guichard <james.n.gui=
chard@huawei.com>; 'Service Function Chaining IETF list' <sfc@ietf.org>
Cc: Alia Atlas <akatlas@gmail.com>
Subject: Re: [sfc] SFC WG re-chartering - initial text for WG review/commen=
t

Ramin, all,

Flexible chaining is also essential if the goal is to guarantee some QoS me=
tric, e.g. end-to-end, latency, for the traffic, particularly in edge envir=
onments. A reference to ongoing efforts in this space can be found in the o=
ngoing H2020 efforts FLAME (see https://www.ict-flame.eu/). These efforts a=
re driven by city-scale many-POP deployments of compute infrastructure, all=
 SDN-connected and OpenStack managed. Localized media use cases drive the n=
eed for name-based (HTTP as the main transport protocol here) service insta=
nces being chained with the relationship between specific virtual instances=
 being controlled at the underlying routing/switching level. First trials a=
t city scale are planned for mid 2018.

Best,

Dirk


From: Ramin Khalili <ramin.khalili@huawei.com>
Sent: 22 December 2017 10:44 AM
To: Trossen, Dirk; James N Guichard; 'Service Function Chaining IETF list'
Cc: Alia Atlas
Subject: RE: SFC WG re-chartering - initial text for WG review/comment
=A0=20

Dirk, James,
=A0
These are excellent points. I support them.=20
=A0
The chaining should be optimized to reduce the initial request latency. Fle=
xible chaining is also necessary if the goal is to guarantee some  QoS metr=
ic, e.g. end-to-end, latency, for the traffic.=A0 These two properties are =
essential for latency sensitive traffics, such as URLLC (Ultra Reliable Low=
 Latency) defined by 3GPP standardization. Currently, there is no specific =
discussion regarding these  requirements within the WG and hence I found th=
em important for the new charter.
=A0
Regards,
Ramin.=20
=A0
=A0


From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Trossen, Dirk
Sent: Thursday, December 21, 2017 10:58 AM
To: James N Guichard <james.n.guichard@huawei.com>; 'Service Function Chain=
ing IETF list' <sfc@ietf.org>
Cc: Alia Atlas <akatlas@gmail.com>
Subject: Re: [sfc] SFC WG re-chartering - initial text for WG review/commen=
t
  =A0


James, all,
=20
=A0
=20
Thanks for this excellent start for the planned re-chartering. I'd would li=
ke to pick on this, particularly on the fourth topic (transport considerati=
ons), and propose  two specific topics for a new charter:
=20
=A0
=20
Optimized chaining: this extends on the proposed fourth topic (which I supp=
ort) by incorporating feedback, such as congestion indications, from transp=
ort networks  as well as the (possibly virtualized) service instances along=
 the SFP. Hence, this topic is about optimized control for the construction=
 and re-chaining of SFPs where the 'data points' for the decision making ca=
n come from above or below the SFC delivery mechanism.

Flexible chaining: this proposed topic extends the previous item in that it=
 builds on the desire to flexibly re-chain SFCs, particularly in situations=
 where virtualized service instances exist and dynamic decisions are being =
taken for such re-chaining between  such virtualized instances. Such flexib=
ility could be=A0achieved by raising the abstraction level of the SFP from =
layer2/3 to that of a name-based service where the SF endpoint is being pro=
vided as a name rather than a MAC or IP address. With that, the name-based =
 SFP remains the same even if changes in the currently used virtualized ser=
vice instances occur, bringing SFC closer to data centre networking and man=
y of the associated scenarios.
=20
=A0
=20
What drives the need for such optimization and flexibility? Virtualization =
of service instances, particularly through containers,=A0 certainly does an=
d particular  when such virtualized service instances reside in a number of=
 (possibly regionally) distributed micro-data centres.
=20
=A0
=20
In terms of delivery, item 1 would lead to an (informational?) RFC specifyi=
ng the possible data points leading to the construction of optimized SFCs, =
while item  2 would lead to an RFC for a design for flexible chaining for a=
 name-level SFP.
=20
=A0
=20
Looking forward to receiving comments on this.
=20
=A0
=20
Best,
=20
=A0
=20
Dirk
 =A0
=A0


 =20
From: sfc <sfc-bounces@ietf.org>  on behalf of James N Guichard <james.n.gu=
ichard@huawei.com>
Sent: 11 December 2017 8:13 PM
To: 'Service Function Chaining IETF list'
Cc: Alia Atlas
Subject: [sfc] SFC WG re-chartering - initial text for WG review/comment=20

=A0
 =20

Greetings WG:
=A0
Joel and I have taken an initial stab at new charter text for the SFC WG. P=
lease review and provide comments/suggestions by COB Friday 29th December  =
(2 weeks).

=A0
 =A0
Network operators frequently utilize service functions such as packet filte=
ring at firewalls, load-balancing and transactional proxies (for example sp=
am filters)  in the delivery of services to end users. Delivery of these ty=
pes of services is undergoing significant change with the introduction of v=
irtualization, network overlays, and orchestration.
=A0
The SFC Working Group has developed an Architecture [RFC 7665] and a protoc=
ol (the Network Service Header [draft-ietf-sfc-nsh-28], in the RFC Editor q=
ueue as of  this drafting.)
=A0
The focus of the SFC working group moving forward will be on aspects of the=
 architecture and/or protocol that need to be addressed to enable effective=
 deployment  and usage of this work.=A0 The SFC working group will now begi=
n addressing those items.=A0 In order to maintain focus, the working group =
will primarily produce and advance documents on four topics:
=A0
1) Metadata - we need to define the common type-length-value encoded metada=
ta types with standards track RFCs, and produce informational RFCs to descr=
ibe common  fixed-length (MD-1) metadata usages.
=A0
2) Security - The completed work does not provide mechanisms for authentica=
ting or protecting (either for integrity or from inspection) metadata.=A0 T=
here are a number  of open questions as to what can be effectively provided=
 and how to provide such tools.=A0 These need attention.
=A0
3) OAM and O&M - In order for operators to use these tools in production ne=
tworks, they need Operations, Administration, and Maintenance tools, as wel=
l as management  mechanisms.=A0 This includes YANG models, OAM frameworks, =
and specific OAM mechanisms to address operational needs.
=A0
4) Transport Considerations - this will capture the expectations SFC places=
 on transport behavior, including dealing with issues such as congestion in=
dications  and responses.
=A0
Specifically, the SFC WG is chartered to deliver the following:
=A0
1. A standards track base set of MD-2 type codes within the metadata class =
reserved for IETF usage.
=A0
2. Related Metadata drafts that require more explanation than is reasonable=
 to include in the base MD-2 draft, including MD-1 descriptions and items d=
one once the  base draft is complete.
=A0
3. YANG models for the SFC Components.
=A0
4. One or more security related standards track and / or informational RFCs=
.=A0 At least one standards track security mechanism RFC is needed.
=A0
5. OAM Framework document to provide a common basis for OAM work.=A0 This d=
raft will include guidance on how active, passive, and in-situ OAM are to b=
e supported  if at all.
=A0
6. Specific OAM mechanism documents to provide the tools needed for operati=
onal environments.
=A0
7. Transport Considerations RFC to cover the expectations SFC and NSH place=
 on transport, and the operational constraints transports used by NSH need =
to meet.

=A0
 =A0
Thanks!
=A0
Jim & Joel
=A0
=A0
=A0
=A0
        =20
_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Wed Jan  3 04:40:22 2018
Return-Path: <cjbc@it.uc3m.es>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E2CC126579 for <sfc@ietfa.amsl.com>; Wed,  3 Jan 2018 04:40:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=it-uc3m-es.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MrtQvnR5ebHq for <sfc@ietfa.amsl.com>; Wed,  3 Jan 2018 04:40:17 -0800 (PST)
Received: from mail-wm0-x232.google.com (mail-wm0-x232.google.com [IPv6:2a00:1450:400c:c09::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B27DA12711D for <sfc@ietf.org>; Wed,  3 Jan 2018 04:40:16 -0800 (PST)
Received: by mail-wm0-x232.google.com with SMTP id r78so2442010wme.5 for <sfc@ietf.org>; Wed, 03 Jan 2018 04:40:16 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=it-uc3m-es.20150623.gappssmtp.com; s=20150623; h=message-id:subject:from:reply-to:to:cc:date:in-reply-to:references :organization:mime-version:content-transfer-encoding; bh=e+BHz14X/tDTH8C8beUu1V7Yyw0CtorOO+402/US9Ek=; b=kqkLN2i6HDRZ6eR9SRIEcUP4jOhBdhXFQxWF6dtucDmjS6ZdtdtsMvBq8p2oTZOJ+Z KYxGtGFZsdAhS36KbArY10ntHf0nsHocifmOgKVCFKZeVADo2tP2dhwFST65AZZMp3q6 2B8jmQm3LvVUIAlHBTq3Ypc8nDWtfXvl0OrehFORy0k7VhopVfN6CEbrIf7/DCQq5Ce+ V346Bg6wQYfrUKImoDge4i1WVWJ6aIV+zLKPvuEaZMBx6gwWgnCy9wYqzPpV5gvgedL4 6zVPjBSi1xnbMmLol3SyRlXK0EorLvAiddXMeImLowKhF8cTWmm1+6cZZyC5f2BDE+ac V+uA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:message-id:subject:from:reply-to:to:cc:date :in-reply-to:references:organization:mime-version :content-transfer-encoding; bh=e+BHz14X/tDTH8C8beUu1V7Yyw0CtorOO+402/US9Ek=; b=ZtjB6eIW3tS7jCio4Sv3pWQtNIZisfPOA9PLf+X3jEz8EOkWs4CUDct07K6S93gmWr 0L3FpkBHIdOgbd8slIgI0ZTgmao+5O0HgQEOOuSQLRS4t6XkhiXepozX+hTY/WX9YzPu azO6ADsCfosETMiNunO/RD3ZMrL6mg5sxgbQ/7MXU7SUaKY3zns3x0osdKuC7DJeK+QQ QrAiosMPgzlEI7ZxkAT+AiMeurnIc1ys7i9o3lBSLk1lAu6THkK+WutM3uWrtljnFiHn zwcb87nv9wFkL76BS52zGwR2a/b4OduuEXRxXDbuwDYzJg2T0lHTLYkxOhEH+/D/wp7J 3Diw==
X-Gm-Message-State: AKGB3mJJEKgaUHAfjwvESN7GVVKy1JAHmAVVy14q/K20VQwVe+9JajuZ TQyUNBbufpt0RyZmgpHe1xmQ8Q==
X-Google-Smtp-Source: ACJfBotE6+1ZWYAWAbmnvc1GVD2x1FAjYut8sUBqH1ynD8eOO/rCfrmiV0NVwxdnuljizYwBSZeo6Q==
X-Received: by 10.28.109.139 with SMTP id b11mr1233245wmi.85.1514983215061; Wed, 03 Jan 2018 04:40:15 -0800 (PST)
Received: from cjbc_dell.lan (2.154.161.159.dyn.user.ono.com. [2.154.161.159]) by smtp.gmail.com with ESMTPSA id y42sm1913455wrc.96.2018.01.03.04.40.13 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 03 Jan 2018 04:40:14 -0800 (PST)
Message-ID: <1514983213.5492.58.camel@it.uc3m.es>
From: Carlos =?ISO-8859-1?Q?Jes=FAs?= Bernardos Cano <cjbc@it.uc3m.es>
Reply-To: cjbc@it.uc3m.es
To: James N Guichard <james.n.guichard@huawei.com>, 'Service Function Chaining IETF list' <sfc@ietf.org>
Cc: Alia Atlas <akatlas@gmail.com>
Date: Wed, 03 Jan 2018 13:40:13 +0100
In-Reply-To: <BF1BE6D99B52F84AB9B48B7CF6F17DA3134BDFE6@sjceml521-mbx.china.huawei.com>
References: <BF1BE6D99B52F84AB9B48B7CF6F17DA3134BDFE6@sjceml521-mbx.china.huawei.com>
Organization: Universidad Carlos III de Madrid
Content-Type: text/plain; charset="UTF-8"
X-Mailer: Evolution 3.26.2-1 
Mime-Version: 1.0
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/t90tK73yUbHOkcW_kKSKp5g31dY>
Subject: Re: [sfc] SFC WG re-chartering - initial text for WG review/comment
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Jan 2018 12:40:20 -0000

Hi,
 
Thanks a lot for initiating the rechartering discussion. I fully
support the list of topics you have initially proposed. I'd like to
bring an additional one for consideration:
 
- SFC management/configuration. I think this fits into the topic 3 from
the proposed recharter (OAM and O&M), but it would be nice to keep the
door open to include configuration extensions for specific use-case
environments such as fog ones. We have been working on it, we presented
a draft a 2-3 IETFs ago and we plan to do an update for London IETF.
 
Thanks,
 
Carlos

On Mon, 2017-12-11 at 20:13 +0000, James N Guichard wrote:
> Greetings WG:
>  
> Joel and I have taken an initial stab at new charter text for the SFC
> WG. Please review and provide comments/suggestions by COB Friday 29th
> December (2 weeks).
>  
>  
> Network operators frequently utilize service functions such as packet
> filtering at firewalls, load-balancing and transactional proxies (for
> example spam filters) in the delivery of services to end users.
> Delivery of these types of services is undergoing significant change
> with the introduction of virtualization, network overlays, and
> orchestration.
>  
> The SFC Working Group has developed an Architecture [RFC 7665] and a
> protocol (the Network Service Header [draft-ietf-sfc-nsh-28], in the
> RFC Editor queue as of this drafting.)
>  
> The focus of the SFC working group moving forward will be on aspects
> of the architecture and/or protocol that need to be addressed to
> enable effective deployment and usage of this work.  The SFC working
> group will now begin addressing those items.  In order to maintain
> focus, the working group will primarily produce and advance documents
> on four topics:
>  
> 1) Metadata - we need to define the common type-length-value encoded
> metadata types with standards track RFCs, and produce informational
> RFCs to describe common fixed-length (MD-1) metadata usages.
>  
> 2) Security - The completed work does not provide mechanisms for
> authenticating or protecting (either for integrity or from
> inspection) metadata.  There are a number of open questions as to
> what can be effectively provided and how to provide such tools. 
> These need attention.
>  
> 3) OAM and O&M - In order for operators to use these tools in
> production networks, they need Operations, Administration, and
> Maintenance tools, as well as management mechanisms.  This includes
> YANG models, OAM frameworks, and specific OAM mechanisms to address
> operational needs.
>  
> 4) Transport Considerations - this will capture the expectations SFC
> places on transport behavior, including dealing with issues such as
> congestion indications and responses.
>  
> Specifically, the SFC WG is chartered to deliver the following:
>  
> 1. A standards track base set of MD-2 type codes within the metadata
> class reserved for IETF usage.
>  
> 2. Related Metadata drafts that require more explanation than is
> reasonable to include in the base MD-2 draft, including MD-1
> descriptions and items done once the base draft is complete.
>  
> 3. YANG models for the SFC Components.
>  
> 4. One or more security related standards track and / or
> informational RFCs.  At least one standards track security mechanism
> RFC is needed.
>  
> 5. OAM Framework document to provide a common basis for OAM work. 
> This draft will include guidance on how active, passive, and in-situ
> OAM are to be supported if at all.
>  
> 6. Specific OAM mechanism documents to provide the tools needed for
> operational environments.
>  
> 7. Transport Considerations RFC to cover the expectations SFC and NSH
> place on transport, and the operational constraints transports used
> by NSH need to meet.
>  
>  
> Thanks!
>  
> Jim & Joel
>  
>  
>  
>  
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc


From nobody Fri Jan  5 12:26:42 2018
Return-Path: <akatlas@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C075A1201F2 for <sfc@ietfa.amsl.com>; Fri,  5 Jan 2018 12:26:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level: 
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EwjPhY6p5T37 for <sfc@ietfa.amsl.com>; Fri,  5 Jan 2018 12:26:38 -0800 (PST)
Received: from mail-oi0-x22b.google.com (mail-oi0-x22b.google.com [IPv6:2607:f8b0:4003:c06::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 198D512D7EC for <sfc@ietf.org>; Fri,  5 Jan 2018 12:26:38 -0800 (PST)
Received: by mail-oi0-x22b.google.com with SMTP id j14so3857831oih.3 for <sfc@ietf.org>; Fri, 05 Jan 2018 12:26:38 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=BYGowQQuP+/EeC58yzfwmzxJgSpSfDydjPlzMLavK14=; b=TwkzN+qiC9rMK9HVDI+b0Avhkl222W/kAOm5YPfghjyBk3HkDBzw1POY2ROLB1DYl3 0wl+su7VpbKAq96yq8yMAuYKguOQRZairN5qIEQIfdl1B99JmGTYOfe4tXEOnJktVo7o 1V5jaH/41vg7KYi3SSvNqCaedjg1zuFZpfLdeF1HM1wni7GXEv30v1KTsGlZiMrPwn6r k4Dbnq/Vpt8p2cC89pb88Zbz3ZjpO04/Rm4V7iLtZ4+ceRcYx2yHTixClIubi/wvXy9O oP9VpGhaayCJYSmtGATVQmVOwhXyiMO3d7dUsGaqa4vcYauSvzACYamQujuvjWXqoGbE AThg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=BYGowQQuP+/EeC58yzfwmzxJgSpSfDydjPlzMLavK14=; b=cGii3S8ujrUluI6q1nVTV+S5/GuCZByu4pEdUJET+mBLQ9VObMlIkw2SPe3RtgMDMu AVrv/u5mV0sARadR4RWV4wIn5JL47VBCQLxzsM/CFQFhWWQ0ZVhKJ5UaWl6ggtJXHY6s c6WpCoxTfYQU/5oqU1IQiDNIpjLiMZhaAQFKkYs1NoiXCNsfTQjlP7XyfBXQRuBCEdmI mqRBI9yeF2JPhzo+4ZhJkuKC9WAWI3gpb2m6ZcpNK21YgAEoK9yHHG1ip/W8QnFyjZNI WWhJnTunDjXXVTqftEvzGslVEtTWBUPdIB+R8VoCBQr0FeM8JHcI4uJfLIIkuFXjYntx UBag==
X-Gm-Message-State: AKGB3mIKeAHJHuEFXd8Y59/cbdffozK49JtVTDvanRqPy915yza5gVST uuOPgn90NoXy8X/5/+jNNJihXLWV6hJxSkB2o20=
X-Google-Smtp-Source: ACJfBovvHyGBwZvkdp3ncey7SAH0knSSe69FnrTx3SRZdnbtt2i2izAjYU3F25fAApcoImC1kkuedoofZcKS4T1ujj8=
X-Received: by 10.202.212.76 with SMTP id l73mr2088877oig.43.1515183997332; Fri, 05 Jan 2018 12:26:37 -0800 (PST)
MIME-Version: 1.0
Received: by 10.157.4.2 with HTTP; Fri, 5 Jan 2018 12:26:36 -0800 (PST)
In-Reply-To: <1514983213.5492.58.camel@it.uc3m.es>
References: <BF1BE6D99B52F84AB9B48B7CF6F17DA3134BDFE6@sjceml521-mbx.china.huawei.com> <1514983213.5492.58.camel@it.uc3m.es>
From: Alia Atlas <akatlas@gmail.com>
Date: Fri, 5 Jan 2018 15:26:36 -0500
Message-ID: <CAG4d1rfRxOAnMf8WtEkbuYpiCy4R7yMqfQ-N7cchRmwSsv7dOQ@mail.gmail.com>
To: cjbc@it.uc3m.es
Cc: James N Guichard <james.n.guichard@huawei.com>,  Service Function Chaining IETF list <sfc@ietf.org>
Content-Type: multipart/alternative; boundary="001a113d1e80ee32a805620d4364"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/DS-4wz0OgmoA3jum0NuRRvIeFcs>
Subject: Re: [sfc] SFC WG re-chartering - initial text for WG review/comment
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Jan 2018 20:26:41 -0000

--001a113d1e80ee32a805620d4364
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Feedback on this seems to have died down.  I'll work with Jim & Joel on
finalizing a charter to
bring back to the WG and then the IESG.

I hear the enthusiasm for flexible chaining - but there's still a lot of
basic work to be done.

Regards,
Alia


On Wed, Jan 3, 2018 at 7:40 AM, Carlos Jes=C3=BAs Bernardos Cano <cjbc@it.u=
c3m.es
> wrote:

> Hi,
>
> Thanks a lot for initiating the rechartering discussion. I fully
> support the list of topics you have initially proposed. I'd like to
> bring an additional one for consideration:
>
> - SFC management/configuration. I think this fits into the topic 3 from
> the proposed recharter (OAM and O&M), but it would be nice to keep the
> door open to include configuration extensions for specific use-case
> environments such as fog ones. We have been working on it, we presented
> a draft a 2-3 IETFs ago and we plan to do an update for London IETF.
>
> Thanks,
>
> Carlos
>
> On Mon, 2017-12-11 at 20:13 +0000, James N Guichard wrote:
> > Greetings WG:
> >
> > Joel and I have taken an initial stab at new charter text for the SFC
> > WG. Please review and provide comments/suggestions by COB Friday 29th
> > December (2 weeks).
> >
> >
> > Network operators frequently utilize service functions such as packet
> > filtering at firewalls, load-balancing and transactional proxies (for
> > example spam filters) in the delivery of services to end users.
> > Delivery of these types of services is undergoing significant change
> > with the introduction of virtualization, network overlays, and
> > orchestration.
> >
> > The SFC Working Group has developed an Architecture [RFC 7665] and a
> > protocol (the Network Service Header [draft-ietf-sfc-nsh-28], in the
> > RFC Editor queue as of this drafting.)
> >
> > The focus of the SFC working group moving forward will be on aspects
> > of the architecture and/or protocol that need to be addressed to
> > enable effective deployment and usage of this work.  The SFC working
> > group will now begin addressing those items.  In order to maintain
> > focus, the working group will primarily produce and advance documents
> > on four topics:
> >
> > 1) Metadata - we need to define the common type-length-value encoded
> > metadata types with standards track RFCs, and produce informational
> > RFCs to describe common fixed-length (MD-1) metadata usages.
> >
> > 2) Security - The completed work does not provide mechanisms for
> > authenticating or protecting (either for integrity or from
> > inspection) metadata.  There are a number of open questions as to
> > what can be effectively provided and how to provide such tools.
> > These need attention.
> >
> > 3) OAM and O&M - In order for operators to use these tools in
> > production networks, they need Operations, Administration, and
> > Maintenance tools, as well as management mechanisms.  This includes
> > YANG models, OAM frameworks, and specific OAM mechanisms to address
> > operational needs.
> >
> > 4) Transport Considerations - this will capture the expectations SFC
> > places on transport behavior, including dealing with issues such as
> > congestion indications and responses.
> >
> > Specifically, the SFC WG is chartered to deliver the following:
> >
> > 1. A standards track base set of MD-2 type codes within the metadata
> > class reserved for IETF usage.
> >
> > 2. Related Metadata drafts that require more explanation than is
> > reasonable to include in the base MD-2 draft, including MD-1
> > descriptions and items done once the base draft is complete.
> >
> > 3. YANG models for the SFC Components.
> >
> > 4. One or more security related standards track and / or
> > informational RFCs.  At least one standards track security mechanism
> > RFC is needed.
> >
> > 5. OAM Framework document to provide a common basis for OAM work.
> > This draft will include guidance on how active, passive, and in-situ
> > OAM are to be supported if at all.
> >
> > 6. Specific OAM mechanism documents to provide the tools needed for
> > operational environments.
> >
> > 7. Transport Considerations RFC to cover the expectations SFC and NSH
> > place on transport, and the operational constraints transports used
> > by NSH need to meet.
> >
> >
> > Thanks!
> >
> > Jim & Joel
> >
> >
> >
> >
> > _______________________________________________
> > sfc mailing list
> > sfc@ietf.org
> > https://www.ietf.org/mailman/listinfo/sfc
>

--001a113d1e80ee32a805620d4364
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Feedback on this seems to have died down.=C2=A0 I&#39;ll w=
ork with Jim &amp; Joel on finalizing a charter to<div>bring back to the WG=
 and then the IESG.</div><div><br></div><div>I hear the enthusiasm for flex=
ible chaining - but there&#39;s still a lot of basic work to be done.</div>=
<div><br></div><div>Regards,</div><div>Alia</div><div><div><br></div></div>=
</div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Wed, Jan=
 3, 2018 at 7:40 AM, Carlos Jes=C3=BAs Bernardos Cano <span dir=3D"ltr">&lt=
;<a href=3D"mailto:cjbc@it.uc3m.es" target=3D"_blank">cjbc@it.uc3m.es</a>&g=
t;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0=
 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi,<br>
<br>
Thanks a lot for initiating the rechartering discussion. I fully<br>
support the list of topics you have initially proposed. I&#39;d like to<br>
bring an additional one for consideration:<br>
<br>
- SFC management/configuration. I think this fits into the topic 3 from<br>
the proposed recharter (OAM and O&amp;M), but it would be nice to keep the<=
br>
door open to include configuration extensions for specific use-case<br>
environments such as fog ones. We have been working on it, we presented<br>
a draft a 2-3 IETFs ago and we plan to do an update for London IETF.<br>
<br>
Thanks,<br>
<br>
Carlos<br>
<div class=3D"HOEnZb"><div class=3D"h5"><br>
On Mon, 2017-12-11 at 20:13 +0000, James N Guichard wrote:<br>
&gt; Greetings WG:<br>
&gt;<br>
&gt; Joel and I have taken an initial stab at new charter text for the SFC<=
br>
&gt; WG. Please review and provide comments/suggestions by COB Friday 29th<=
br>
&gt; December (2 weeks).<br>
&gt;<br>
&gt;<br>
&gt; Network operators frequently utilize service functions such as packet<=
br>
&gt; filtering at firewalls, load-balancing and transactional proxies (for<=
br>
&gt; example spam filters) in the delivery of services to end users.<br>
&gt; Delivery of these types of services is undergoing significant change<b=
r>
&gt; with the introduction of virtualization, network overlays, and<br>
&gt; orchestration.<br>
&gt;<br>
&gt; The SFC Working Group has developed an Architecture [RFC 7665] and a<b=
r>
&gt; protocol (the Network Service Header [draft-ietf-sfc-nsh-28], in the<b=
r>
&gt; RFC Editor queue as of this drafting.)<br>
&gt;<br>
&gt; The focus of the SFC working group moving forward will be on aspects<b=
r>
&gt; of the architecture and/or protocol that need to be addressed to<br>
&gt; enable effective deployment and usage of this work.=C2=A0 The SFC work=
ing<br>
&gt; group will now begin addressing those items.=C2=A0 In order to maintai=
n<br>
&gt; focus, the working group will primarily produce and advance documents<=
br>
&gt; on four topics:<br>
&gt;<br>
&gt; 1) Metadata - we need to define the common type-length-value encoded<b=
r>
&gt; metadata types with standards track RFCs, and produce informational<br=
>
&gt; RFCs to describe common fixed-length (MD-1) metadata usages.<br>
&gt;<br>
&gt; 2) Security - The completed work does not provide mechanisms for<br>
&gt; authenticating or protecting (either for integrity or from<br>
&gt; inspection) metadata.=C2=A0 There are a number of open questions as to=
<br>
&gt; what can be effectively provided and how to provide such tools.<br>
&gt; These need attention.<br>
&gt;<br>
&gt; 3) OAM and O&amp;M - In order for operators to use these tools in<br>
&gt; production networks, they need Operations, Administration, and<br>
&gt; Maintenance tools, as well as management mechanisms.=C2=A0 This includ=
es<br>
&gt; YANG models, OAM frameworks, and specific OAM mechanisms to address<br=
>
&gt; operational needs.<br>
&gt;<br>
&gt; 4) Transport Considerations - this will capture the expectations SFC<b=
r>
&gt; places on transport behavior, including dealing with issues such as<br=
>
&gt; congestion indications and responses.<br>
&gt;<br>
&gt; Specifically, the SFC WG is chartered to deliver the following:<br>
&gt;<br>
&gt; 1. A standards track base set of MD-2 type codes within the metadata<b=
r>
&gt; class reserved for IETF usage.<br>
&gt;<br>
&gt; 2. Related Metadata drafts that require more explanation than is<br>
&gt; reasonable to include in the base MD-2 draft, including MD-1<br>
&gt; descriptions and items done once the base draft is complete.<br>
&gt;<br>
&gt; 3. YANG models for the SFC Components.<br>
&gt;<br>
&gt; 4. One or more security related standards track and / or<br>
&gt; informational RFCs.=C2=A0 At least one standards track security mechan=
ism<br>
&gt; RFC is needed.<br>
&gt;<br>
&gt; 5. OAM Framework document to provide a common basis for OAM work.<br>
&gt; This draft will include guidance on how active, passive, and in-situ<b=
r>
&gt; OAM are to be supported if at all.<br>
&gt;<br>
&gt; 6. Specific OAM mechanism documents to provide the tools needed for<br=
>
&gt; operational environments.<br>
&gt;<br>
&gt; 7. Transport Considerations RFC to cover the expectations SFC and NSH<=
br>
&gt; place on transport, and the operational constraints transports used<br=
>
&gt; by NSH need to meet.<br>
&gt;<br>
&gt;<br>
&gt; Thanks!<br>
&gt;<br>
&gt; Jim &amp; Joel<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
</div></div><div class=3D"HOEnZb"><div class=3D"h5">&gt; __________________=
____________<wbr>_________________<br>
&gt; sfc mailing list<br>
&gt; <a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferre=
r" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/sfc</a><br>
</div></div></blockquote></div><br></div>

--001a113d1e80ee32a805620d4364--


From nobody Fri Jan  5 13:14:53 2018
Return-Path: <gregimirsky@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 790D9124D6C for <sfc@ietfa.amsl.com>; Fri,  5 Jan 2018 13:14:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level: 
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MuestZvPO4fr for <sfc@ietfa.amsl.com>; Fri,  5 Jan 2018 13:14:50 -0800 (PST)
Received: from mail-lf0-x230.google.com (mail-lf0-x230.google.com [IPv6:2a00:1450:4010:c07::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D51151241F5 for <sfc@ietf.org>; Fri,  5 Jan 2018 13:14:49 -0800 (PST)
Received: by mail-lf0-x230.google.com with SMTP id w196so6434602lff.5 for <sfc@ietf.org>; Fri, 05 Jan 2018 13:14:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=m3JIzYINsmZgCBXbjz68JePZicmR2/WpHyZpo+0LhX4=; b=m7eCuKfy5ry55x+LAg8sV8qjH+dHMM1ls27iUjdjf8VWP40bTmnbYpr3p17TbGEuiI lpfe6xN0f/pALNhQfb88iE7GvGFJPBtcm3Lgm2x9KHfj/jyEWeCUgTGVUkNqSW16j45e EuS1kQb1qpeS2jGKSAmY7D+Os/BjUUDMXLG2bPvNdmezlctkCQbfplzXJFDDcR/5LuK+ IzGF4/tdTKajkTfLe/nG3p4QdwgWUsYvbNgHLMd4hwAqKb/4ELhcHfUaMwJSMJmhIbLL 2DOEt67OYYpotIhc38idMtS9scnNfZX/bfUXzpSVcURPS/aaxAJb4wZRvD4gFGp7FJcQ T5Fg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=m3JIzYINsmZgCBXbjz68JePZicmR2/WpHyZpo+0LhX4=; b=FOdo2UPM6itegEuw7GSyDLBmV33qP5nWITW+RJgL4ks8KdgL/FUIf52Qhetd/RrzyY H+iFi3iFGyr+/2qtnG7O59sA4y0XhJq5oAONZt6yiNkMKTM5NAf+Dcv8DWKZzOShTp8m ZMYuVin+Mk9shb54v+5ySGqZ2yJiiduHuulaknIprXiQhJMK7t1UR8g1Plz82yO7vqZi 6YhD0A/3LWTmzilChGtwPDkfQUGxy0hNMVSWXjR5yco4t51VbMkjrN7iwq2v6y8DKmVB LqiC577LUrtkfahO+fUdgYX+ivaSDUW81oKwi8Cs1Bagm9XSFSE+6HtLMWRNg1vokvAv 6xnQ==
X-Gm-Message-State: AKwxyte+25jdCF05kYVbOiJFJBpu7jn1g6MsmJnz0jgAkj8UYCTZlTZw r63ALEgOjzG0yBDEqeGbNFel1x+ZQFldSESOpPc=
X-Google-Smtp-Source: ACJfBov7PLpLFKz8qYCqwJMg12NvnWqZy85Zo26W0q6fyk0JDzSvImdSz02PwHOckS/h04VMleBsOxTp8Pe3a7lq9D0=
X-Received: by 10.25.217.152 with SMTP id s24mr2230356lfi.73.1515186887836; Fri, 05 Jan 2018 13:14:47 -0800 (PST)
MIME-Version: 1.0
Received: by 10.46.32.136 with HTTP; Fri, 5 Jan 2018 13:14:47 -0800 (PST)
In-Reply-To: <BF1BE6D99B52F84AB9B48B7CF6F17DA3134BDFE6@sjceml521-mbx.china.huawei.com>
References: <BF1BE6D99B52F84AB9B48B7CF6F17DA3134BDFE6@sjceml521-mbx.china.huawei.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Fri, 5 Jan 2018 13:14:47 -0800
Message-ID: <CA+RyBmXP0Xp1Y4UCJVewwLZj8ac7E1oOqip4wv--xizkVEzsKg@mail.gmail.com>
To: James N Guichard <james.n.guichard@huawei.com>
Cc: Service Function Chaining IETF list <sfc@ietf.org>, Alia Atlas <akatlas@gmail.com>
Content-Type: multipart/alternative; boundary="94eb2c0642ec37c7ae05620df0d5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/Wmf1KvPU6_Mx4ZIVrz8tu7IdCCA>
Subject: Re: [sfc] SFC WG re-chartering - initial text for WG review/comment
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Jan 2018 21:14:52 -0000

--94eb2c0642ec37c7ae05620df0d5
Content-Type: text/plain; charset="UTF-8"

Hi Jim and Joel,
the recent IPR disclosure by Orange <https://datatracker.ietf.org/ipr/3121/>
with the reference to SFC OAM Framework concerns me because of the RAND
condition. I think I understand where there's intersection between the IPR
and the draft but my opinion is far from authoritative on the matter.
Perhaps it is something the WG should discuss and consider in regard to #5
of the proposed charter.
Also, will note, that the date of the disclosure is rather too far, in my
opinion, from the date of filing.

Regards,
Greg

On Mon, Dec 11, 2017 at 12:13 PM, James N Guichard <
james.n.guichard@huawei.com> wrote:

> Greetings WG:
>
>
>
> Joel and I have taken an initial stab at new charter text for the SFC WG.
> Please review and provide comments/suggestions by COB Friday 29th
> December (2 weeks).
>
>
>
>
>
> Network operators frequently utilize service functions such as packet
> filtering at firewalls, load-balancing and transactional proxies (for
> example spam filters) in the delivery of services to end users. Delivery of
> these types of services is undergoing significant change with the
> introduction of virtualization, network overlays, and orchestration.
>
>
>
> The SFC Working Group has developed an Architecture [RFC 7665] and a
> protocol (the Network Service Header [draft-ietf-sfc-nsh-28], in the RFC
> Editor queue as of this drafting.)
>
>
>
> The focus of the SFC working group moving forward will be on aspects of
> the architecture and/or protocol that need to be addressed to enable
> effective deployment and usage of this work.  The SFC working group will
> now begin addressing those items.  In order to maintain focus, the working
> group will primarily produce and advance documents on four topics:
>
>
>
> 1) Metadata - we need to define the common type-length-value encoded
> metadata types with standards track RFCs, and produce informational RFCs to
> describe common fixed-length (MD-1) metadata usages.
>
>
>
> 2) Security - The completed work does not provide mechanisms for
> authenticating or protecting (either for integrity or from inspection)
> metadata.  There are a number of open questions as to what can be
> effectively provided and how to provide such tools.  These need attention.
>
>
>
> 3) OAM and O&M - In order for operators to use these tools in production
> networks, they need Operations, Administration, and Maintenance tools, as
> well as management mechanisms.  This includes YANG models, OAM frameworks,
> and specific OAM mechanisms to address operational needs.
>
>
>
> 4) Transport Considerations - this will capture the expectations SFC
> places on transport behavior, including dealing with issues such as
> congestion indications and responses.
>
>
>
> Specifically, the SFC WG is chartered to deliver the following:
>
>
>
> 1. A standards track base set of MD-2 type codes within the metadata class
> reserved for IETF usage.
>
>
>
> 2. Related Metadata drafts that require more explanation than is
> reasonable to include in the base MD-2 draft, including MD-1 descriptions
> and items done once the base draft is complete.
>
>
>
> 3. YANG models for the SFC Components.
>
>
>
> 4. One or more security related standards track and / or informational
> RFCs.  At least one standards track security mechanism RFC is needed.
>
>
>
> 5. OAM Framework document to provide a common basis for OAM work.  This
> draft will include guidance on how active, passive, and in-situ OAM are to
> be supported if at all.
>
>
>
> 6. Specific OAM mechanism documents to provide the tools needed for
> operational environments.
>
>
>
> 7. Transport Considerations RFC to cover the expectations SFC and NSH
> place on transport, and the operational constraints transports used by NSH
> need to meet.
>
>
>
>
>
> Thanks!
>
>
>
> Jim & Joel
>
>
>
>
>
>
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>
>

--94eb2c0642ec37c7ae05620df0d5
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Jim and Joel,<div>the recent <a href=3D"https://datatra=
cker.ietf.org/ipr/3121/">IPR disclosure by Orange</a> with the reference to=
 SFC OAM Framework concerns me because of the RAND condition. I think I und=
erstand where there&#39;s intersection between the IPR and the draft but my=
 opinion is far from authoritative on the matter. Perhaps it is something t=
he WG should discuss and consider in regard to #5 of the proposed charter.<=
/div><div>Also, will note, that the date of the disclosure is rather too fa=
r, in my opinion, from the date of filing.</div><div><br></div><div>Regards=
,</div><div>Greg</div></div><div class=3D"gmail_extra"><br><div class=3D"gm=
ail_quote">On Mon, Dec 11, 2017 at 12:13 PM, James N Guichard <span dir=3D"=
ltr">&lt;<a href=3D"mailto:james.n.guichard@huawei.com" target=3D"_blank">j=
ames.n.guichard@huawei.com</a>&gt;</span> wrote:<br><blockquote class=3D"gm=
ail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-le=
ft:1ex">





<div lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"m_4416022444106885795WordSection1">
<p class=3D"MsoNormal">Greetings WG:<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Joel and I have taken an initial stab at new charter=
 text for the SFC WG. Please review and provide comments/suggestions by COB=
 Friday 29<sup>th</sup> December (2 weeks).<u></u><u></u></p>
<div style=3D"border:none;border-bottom:dotted windowtext 3.0pt;padding:0in=
 0in 1.0pt 0in">
<p class=3D"MsoNormal" style=3D"border:none;padding:0in"><u></u>=C2=A0<u></=
u></p>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Network operators frequently utilize service functio=
ns such as packet filtering at firewalls, load-balancing and transactional =
proxies (for example spam filters) in the delivery of services to end users=
. Delivery of these types of services
 is undergoing significant change with the introduction of virtualization, =
network overlays, and orchestration.<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">The SFC Working Group has developed an Architecture =
[RFC 7665] and a protocol (the Network Service Header [draft-ietf-sfc-nsh-2=
8], in the RFC Editor queue as of this drafting.)<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">The focus of the SFC working group moving forward wi=
ll be on aspects of the architecture and/or protocol that need to be addres=
sed to enable effective deployment and usage of this work.=C2=A0 The SFC wo=
rking group will now begin addressing those
 items.=C2=A0 In order to maintain focus, the working group will primarily =
produce and advance documents on four topics:<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">1) Metadata - we need to define the common type-leng=
th-value encoded metadata types with standards track RFCs, and produce info=
rmational RFCs to describe common fixed-length (MD-1) metadata usages.<u></=
u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">2) Security - The completed work does not provide me=
chanisms for authenticating or protecting (either for integrity or from ins=
pection) metadata.=C2=A0 There are a number of open questions as to what ca=
n be effectively provided and how to provide
 such tools.=C2=A0 These need attention.<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">3) OAM and O&amp;M - In order for operators to use t=
hese tools in production networks, they need Operations, Administration, an=
d Maintenance tools, as well as management mechanisms.=C2=A0 This includes =
YANG models, OAM frameworks, and specific OAM
 mechanisms to address operational needs.<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">4) Transport Considerations - this will capture the =
expectations SFC places on transport behavior, including dealing with issue=
s such as congestion indications and responses.<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Specifically, the SFC WG is chartered to deliver the=
 following:<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">1. A standards track base set of MD-2 type codes wit=
hin the metadata class reserved for IETF usage.<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">2. Related Metadata drafts that require more explana=
tion than is reasonable to include in the base MD-2 draft, including MD-1 d=
escriptions and items done once the base draft is complete.<u></u><u></u></=
p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">3. YANG models for the SFC Components.<u></u><u></u>=
</p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">4. One or more security related standards track and =
/ or informational RFCs.=C2=A0 At least one standards track security mechan=
ism RFC is needed.<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">5. OAM Framework document to provide a common basis =
for OAM work.=C2=A0 This draft will include guidance on how active, passive=
, and in-situ OAM are to be supported if at all.<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">6. Specific OAM mechanism documents to provide the t=
ools needed for operational environments.<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">7. Transport Considerations RFC to cover the expecta=
tions SFC and NSH place on transport, and the operational constraints trans=
ports used by NSH need to meet.<u></u><u></u></p>
<div style=3D"border:none;border-bottom:dotted windowtext 3.0pt;padding:0in=
 0in 1.0pt 0in">
<p class=3D"MsoNormal" style=3D"border:none;padding:0in"><u></u>=C2=A0<u></=
u></p>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Thanks!<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Jim &amp; Joel<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>

<br>______________________________<wbr>_________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/sfc</a><br>
<br></blockquote></div><br></div>

--94eb2c0642ec37c7ae05620df0d5--


From nobody Fri Jan  5 21:50:48 2018
Return-Path: <Akbar.Rahman@InterDigital.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 23FB91275F4 for <sfc@ietfa.amsl.com>; Fri,  5 Jan 2018 21:50:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=interdigital.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5rHhLWFyeAud for <sfc@ietfa.amsl.com>; Fri,  5 Jan 2018 21:50:37 -0800 (PST)
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (mail-cys01nam02on072e.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe45::72e]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E2B2B1241F5 for <sfc@ietf.org>; Fri,  5 Jan 2018 21:50:36 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=interdigital.onmicrosoft.com; s=selector1-interdigital-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=VURBWFUQmhkGbUBTI8m2IZ4vobCCOkbA5LP8eRoAv+A=; b=jgUXQmRhpMpAeERFUw6piaDXP0QsZhYY+umqU1RZQrbkhRS+mrgtAQ1kTfJ4P9wU5TL9cY7CeiT02efCj3WRxpeyl+yb7rl3hFY0xm5oNT5wSAcbWYwM8ZDnP9Fqa7G/MUEWR0ik4wjLwkpM8xTKyulxuSsEcAhnmiVhOkpYkF8=
Received: from BN6PR1001MB2115.namprd10.prod.outlook.com (10.174.86.160) by BN6PR1001MB2116.namprd10.prod.outlook.com (10.174.88.142) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.366.8; Sat, 6 Jan 2018 05:50:33 +0000
Received: from BN6PR1001MB2115.namprd10.prod.outlook.com ([10.174.86.160]) by BN6PR1001MB2115.namprd10.prod.outlook.com ([10.174.86.160]) with mapi id 15.20.0345.018; Sat, 6 Jan 2018 05:50:33 +0000
From: "Rahman, Akbar" <Akbar.Rahman@InterDigital.com>
To: Alia Atlas <akatlas@gmail.com>
CC: Service Function Chaining IETF list <sfc@ietf.org>, James N Guichard <james.n.guichard@huawei.com>, "cjbc@it.uc3m.es" <cjbc@it.uc3m.es>
Thread-Topic: [sfc] SFC WG re-chartering - initial text for WG review/comment
Thread-Index: AdNyuLcja4roriHRQZ67o9nPI1G8tQR10ieAAHTfAAAAE2/jcA==
Date: Sat, 6 Jan 2018 05:50:32 +0000
Message-ID: <BN6PR1001MB2115A9C3C2640B2F29F7DBB4E71D0@BN6PR1001MB2115.namprd10.prod.outlook.com>
References: <BF1BE6D99B52F84AB9B48B7CF6F17DA3134BDFE6@sjceml521-mbx.china.huawei.com> <1514983213.5492.58.camel@it.uc3m.es> <CAG4d1rfRxOAnMf8WtEkbuYpiCy4R7yMqfQ-N7cchRmwSsv7dOQ@mail.gmail.com>
In-Reply-To: <CAG4d1rfRxOAnMf8WtEkbuYpiCy4R7yMqfQ-N7cchRmwSsv7dOQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Akbar.Rahman@InterDigital.com; 
x-originating-ip: [74.14.211.121]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BN6PR1001MB2116; 7:fqUtOfiFsCLERWXIu2onL5oPhRr+ypmucRzkhUcZlmCxlZZ78IPPoj8ZtCOnb+w0AO4fru3y4C4JTICpaK+deec8mxGKxW+KghNZ+Fa5S5IsRd4mvhtaECvuEPhKoNnXzd9zq02y/1oL5mwN8dN+jXqemUktewz5RGfSqxWli5I1WSQzKWtbu7PxZi9rtqUBfqzr4K6MCrgMOrpRTDdnRMeYIum4EE0iOKYSWZWe2kr7GlEoZrbKKJ2C6geE2V8m
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-correlation-id: f6b0d924-69b3-4dd9-4f94-08d554c966cf
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(4534020)(4602075)(4603075)(4627115)(201702281549075)(5600026)(4604075)(3008032)(2017052603307)(7153060)(7193020); SRVR:BN6PR1001MB2116; 
x-ms-traffictypediagnostic: BN6PR1001MB2116:
x-microsoft-antispam-prvs: <BN6PR1001MB2116F614700FAD60D8149BF7E71D0@BN6PR1001MB2116.namprd10.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(192374486261705)(50582790962513)(21748063052155); 
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040470)(2401047)(5005006)(8121501046)(10201501046)(3231023)(944501075)(3002001)(93006095)(93001095)(6041268)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(2016111802025)(20161123560045)(20161123564045)(20161123562045)(20161123558120)(6043046)(6072148)(201708071742011); SRVR:BN6PR1001MB2116; BCL:0; PCL:0; RULEID:(100000803101)(100110400095); SRVR:BN6PR1001MB2116; 
x-forefront-prvs: 0544D934E1
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39850400004)(396003)(366004)(39380400002)(376002)(346002)(24454002)(377424004)(199004)(189003)(19609705001)(3280700002)(97736004)(5660300001)(14454004)(3660700001)(86362001)(7696005)(8676002)(72206003)(4326008)(81156014)(76176011)(33656002)(25786009)(6862004)(478600001)(99286004)(53936002)(2950100002)(102836004)(2900100001)(6246003)(53546011)(6506007)(966005)(59450400001)(107886003)(4001150100001)(68736007)(66066001)(6116002)(790700001)(9326002)(229853002)(77096006)(3846002)(81166006)(74316002)(606006)(1411001)(54896002)(9686003)(236005)(2906002)(316002)(6436002)(6306002)(55016002)(105586002)(106356001)(7736002)(8936002)(54906003)(85282002); DIR:OUT; SFP:1102; SCL:1; SRVR:BN6PR1001MB2116; H:BN6PR1001MB2115.namprd10.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; 
received-spf: None (protection.outlook.com: InterDigital.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: ntd2rOI6ekH6bupp4eXj96NzA3yH7Hr2BGpiUZMyyqUtluS9hBldmibrizI+Vt6zzA8ia/838Plt5jHdgRFsXw==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_BN6PR1001MB2115A9C3C2640B2F29F7DBB4E71D0BN6PR1001MB2115_"
MIME-Version: 1.0
X-OriginatorOrg: interdigital.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f6b0d924-69b3-4dd9-4f94-08d554c966cf
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Jan 2018 05:50:32.9377 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: e351b779-f6d5-4e50-8568-80e922d180ae
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR1001MB2116
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/dXQwvegLgpcvrjD4ftt-93ntA5M>
Subject: Re: [sfc] SFC WG re-chartering - initial text for WG review/comment
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 06 Jan 2018 05:50:41 -0000

--_000_BN6PR1001MB2115A9C3C2640B2F29F7DBB4E71D0BN6PR1001MB2115_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_BN6PR1001MB2115A9C3C2640B2F29F7DBB4E71D0BN6PR1001MB2115_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl
PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6
IkNhbWJyaWEgTWF0aCI7DQoJcGFub3NlLTE6MiA0IDUgMyA1IDQgNiAzIDIgNDt9DQpAZm9udC1m
YWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJcGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAy
IDQ7fQ0KLyogU3R5bGUgRGVmaW5pdGlvbnMgKi8NCnAuTXNvTm9ybWFsLCBsaS5Nc29Ob3JtYWws
IGRpdi5Nc29Ob3JtYWwNCgl7bWFyZ2luOjBpbjsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJ
Zm9udC1zaXplOjEyLjBwdDsNCglmb250LWZhbWlseToiVGltZXMgTmV3IFJvbWFuIixzZXJpZjt9
DQphOmxpbmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCglj
b2xvcjpibHVlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KYTp2aXNpdGVkLCBzcGFu
Lk1zb0h5cGVybGlua0ZvbGxvd2VkDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjpw
dXJwbGU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpwLm1zb25vcm1hbDAsIGxpLm1z
b25vcm1hbDAsIGRpdi5tc29ub3JtYWwwDQoJe21zby1zdHlsZS1uYW1lOm1zb25vcm1hbDsNCglt
c28tbWFyZ2luLXRvcC1hbHQ6YXV0bzsNCgltYXJnaW4tcmlnaHQ6MGluOw0KCW1zby1tYXJnaW4t
Ym90dG9tLWFsdDphdXRvOw0KCW1hcmdpbi1sZWZ0OjBpbjsNCglmb250LXNpemU6MTIuMHB0Ow0K
CWZvbnQtZmFtaWx5OiJUaW1lcyBOZXcgUm9tYW4iLHNlcmlmO30NCnNwYW4uRW1haWxTdHlsZTE4
DQoJe21zby1zdHlsZS10eXBlOnBlcnNvbmFsLXJlcGx5Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJp
IixzYW5zLXNlcmlmOw0KCWNvbG9yOndpbmRvd3RleHQ7fQ0KLk1zb0NocERlZmF1bHQNCgl7bXNv
LXN0eWxlLXR5cGU6ZXhwb3J0LW9ubHk7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLHNhbnMtc2Vy
aWY7fQ0KQHBhZ2UgV29yZFNlY3Rpb24xDQoJe3NpemU6OC41aW4gMTEuMGluOw0KCW1hcmdpbjox
LjBpbiAxLjBpbiAxLjBpbiAxLjBpbjt9DQpkaXYuV29yZFNlY3Rpb24xDQoJe3BhZ2U6V29yZFNl
Y3Rpb24xO30NCi0tPjwvc3R5bGU+PCEtLVtpZiBndGUgbXNvIDldPjx4bWw+DQo8bzpzaGFwZWRl
ZmF1bHRzIHY6ZXh0PSJlZGl0IiBzcGlkbWF4PSIxMDI2IiAvPg0KPC94bWw+PCFbZW5kaWZdLS0+
PCEtLVtpZiBndGUgbXNvIDldPjx4bWw+DQo8bzpzaGFwZWxheW91dCB2OmV4dD0iZWRpdCI+DQo8
bzppZG1hcCB2OmV4dD0iZWRpdCIgZGF0YT0iMSIgLz4NCjwvbzpzaGFwZWxheW91dD48L3htbD48
IVtlbmRpZl0tLT4NCjwvaGVhZD4NCjxib2R5IGxhbmc9IkVOLVVTIiBsaW5rPSJibHVlIiB2bGlu
az0icHVycGxlIj4NCjxkaXYgY2xhc3M9IldvcmRTZWN0aW9uMSI+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp
YnJpJnF1b3Q7LHNhbnMtc2VyaWYiPkhpIEFsaWEsPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p
bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bh
bj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw
dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYiPjxvOnA+Jm5ic3A7
PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250
LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+
SnVzdCB3YW50ZWQgdG8gYWRkIG9uZSBtb3JlIHBvaW50IHJlZ2FyZGluZyB0aGUgZmxleGlibGUg
Y2hhaW5pbmcgcG9pbnQgZm9yIHRoZSByZS1jaGFydGVyIGRpc2N1c3Npb25zLiZuYnNwOyBXZSBo
YXZlIGFscmVhZHkgc3RhcnRlZCBkaXNjdXNzaW5nIHRoaXMgdG9waWMgaW4gdGhlIFNpbmdhcG9y
ZSBGMkYNCiBtZWV0aW5nLCBzcGVjaWZpY2FsbHkgdmlhIHRoZSBmb2xsb3dpbmcgZHJhZnQ6PG86
cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZv
bnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlm
Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh
biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7
LHNhbnMtc2VyaWYiPjxhIGhyZWY9Imh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9kcmFmdC1w
dXJrYXlhc3RoYS1zZmMtc2VydmljZS1pbmRpcmVjdGlvbi0wMSI+aHR0cHM6Ly90b29scy5pZXRm
Lm9yZy9odG1sL2RyYWZ0LXB1cmtheWFzdGhhLXNmYy1zZXJ2aWNlLWluZGlyZWN0aW9uLTAxPC9h
PjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl
PSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1z
ZXJpZiI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx
dW90OyxzYW5zLXNlcmlmIj5XZSBhcmUgcGxhbm5pbmcgdG8gaGF2ZSBhbiB1cGRhdGUgcmVhZHkg
Zm9yIHRoZSBuZXh0IElFVEYgbWVldGluZyB0byBhbnN3ZXIgc29tZSBvZiB0aGUgZ29vZCBxdWVz
dGlvbnMgYnJvdWdodCB1cCBkdXJpbmcgdGhlIGRpc2N1c3Npb24uJm5ic3A7IFdlIGJlbGlldmUg
dGhhdCB0aGlzIGZ1bmN0aW9uYWxpdHkNCiB3aWxsIHByb3ZpZGUgYW4gaW1wb3J0YW50IGZlYXR1
cmUgZm9yIHRoZSBldm9sdXRpb24gb2YgU0ZDLCBhbmQgaG9wZSB0aGF0IHlvdSB3aWxsIHN0cm9u
Z2x5IGNvbnNpZGVyIGluY29ycG9yYXRpbmcgaXQgaW50byB0aGUgdXBkYXRlZCBTRkMgY2hhcnRl
ci48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls
ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMt
c2VyaWYiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm
cXVvdDssc2Fucy1zZXJpZiI+QmVzdCBSZWdhcmRzLDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt
aWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+PG86cD4mbmJzcDs8L286cD48L3Nw
YW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w
cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmIj48bzpwPiZuYnNw
OzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u
dC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWYi
PkFrYmFyPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g
c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oyxz
YW5zLXNlcmlmIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxp
YnJpJnF1b3Q7LHNhbnMtc2VyaWYiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPjxhIG5hbWU9Il9NYWlsRW5kQ29tcG9zZSI+PHNwYW4gc3R5bGU9ImZv
bnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlm
Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L2E+PC9wPg0KPHNwYW4gc3R5bGU9Im1zby1ib29r
bWFyazpfTWFpbEVuZENvbXBvc2UiPjwvc3Bhbj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxiPjxz
cGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv
dDssc2Fucy1zZXJpZiI+RnJvbTo8L3NwYW4+PC9iPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu
MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZiI+IHNmYyBbbWFp
bHRvOnNmYy1ib3VuY2VzQGlldGYub3JnXQ0KPGI+T24gQmVoYWxmIE9mIDwvYj5BbGlhIEF0bGFz
PGJyPg0KPGI+U2VudDo8L2I+IEZyaWRheSwgSmFudWFyeSA1LCAyMDE4IDM6MjcgUE08YnI+DQo8
Yj5Ubzo8L2I+IGNqYmNAaXQudWMzbS5lczxicj4NCjxiPkNjOjwvYj4gU2VydmljZSBGdW5jdGlv
biBDaGFpbmluZyBJRVRGIGxpc3QgJmx0O3NmY0BpZXRmLm9yZyZndDs7IEphbWVzIE4gR3VpY2hh
cmQgJmx0O2phbWVzLm4uZ3VpY2hhcmRAaHVhd2VpLmNvbSZndDs8YnI+DQo8Yj5TdWJqZWN0Ojwv
Yj4gUmU6IFtzZmNdIFNGQyBXRyByZS1jaGFydGVyaW5nIC0gaW5pdGlhbCB0ZXh0IGZvciBXRyBy
ZXZpZXcvY29tbWVudDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
PjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPkZlZWRi
YWNrIG9uIHRoaXMgc2VlbXMgdG8gaGF2ZSBkaWVkIGRvd24uJm5ic3A7IEknbGwgd29yayB3aXRo
IEppbSAmYW1wOyBKb2VsIG9uIGZpbmFsaXppbmcgYSBjaGFydGVyIHRvPG86cD48L286cD48L3A+
DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+YnJpbmcgYmFjayB0byB0aGUgV0cgYW5kIHRo
ZW4gdGhlIElFU0cuPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv
Tm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJN
c29Ob3JtYWwiPkkgaGVhciB0aGUgZW50aHVzaWFzbSBmb3IgZmxleGlibGUgY2hhaW5pbmcgLSBi
dXQgdGhlcmUncyBzdGlsbCBhIGxvdCBvZiBiYXNpYyB3b3JrIHRvIGJlIGRvbmUuPG86cD48L286
cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwv
bzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPlJlZ2FyZHMsPG86
cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5BbGlhPG86
cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+T24gV2VkLCBKYW4gMywgMjAxOCBhdCA3OjQwIEFNLCBDYXJsb3MgSmVzw7pz
IEJlcm5hcmRvcyBDYW5vICZsdDs8YSBocmVmPSJtYWlsdG86Y2piY0BpdC51YzNtLmVzIiB0YXJn
ZXQ9Il9ibGFuayI+Y2piY0BpdC51YzNtLmVzPC9hPiZndDsgd3JvdGU6PG86cD48L286cD48L3A+
DQo8YmxvY2txdW90ZSBzdHlsZT0iYm9yZGVyOm5vbmU7Ym9yZGVyLWxlZnQ6c29saWQgI0NDQ0ND
QyAxLjBwdDtwYWRkaW5nOjBpbiAwaW4gMGluIDYuMHB0O21hcmdpbi1sZWZ0OjQuOHB0O21hcmdp
bi1yaWdodDowaW4iPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+SGksPGJyPg0KPGJyPg0KVGhhbmtz
IGEgbG90IGZvciBpbml0aWF0aW5nIHRoZSByZWNoYXJ0ZXJpbmcgZGlzY3Vzc2lvbi4gSSBmdWxs
eTxicj4NCnN1cHBvcnQgdGhlIGxpc3Qgb2YgdG9waWNzIHlvdSBoYXZlIGluaXRpYWxseSBwcm9w
b3NlZC4gSSdkIGxpa2UgdG88YnI+DQpicmluZyBhbiBhZGRpdGlvbmFsIG9uZSBmb3IgY29uc2lk
ZXJhdGlvbjo8YnI+DQo8YnI+DQotIFNGQyBtYW5hZ2VtZW50L2NvbmZpZ3VyYXRpb24uIEkgdGhp
bmsgdGhpcyBmaXRzIGludG8gdGhlIHRvcGljIDMgZnJvbTxicj4NCnRoZSBwcm9wb3NlZCByZWNo
YXJ0ZXIgKE9BTSBhbmQgTyZhbXA7TSksIGJ1dCBpdCB3b3VsZCBiZSBuaWNlIHRvIGtlZXAgdGhl
PGJyPg0KZG9vciBvcGVuIHRvIGluY2x1ZGUgY29uZmlndXJhdGlvbiBleHRlbnNpb25zIGZvciBz
cGVjaWZpYyB1c2UtY2FzZTxicj4NCmVudmlyb25tZW50cyBzdWNoIGFzIGZvZyBvbmVzLiBXZSBo
YXZlIGJlZW4gd29ya2luZyBvbiBpdCwgd2UgcHJlc2VudGVkPGJyPg0KYSBkcmFmdCBhIDItMyBJ
RVRGcyBhZ28gYW5kIHdlIHBsYW4gdG8gZG8gYW4gdXBkYXRlIGZvciBMb25kb24gSUVURi48YnI+
DQo8YnI+DQpUaGFua3MsPGJyPg0KPGJyPg0KQ2FybG9zPG86cD48L286cD48L3A+DQo8ZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxicj4NCk9uIE1vbiwgMjAxNy0xMi0xMSBhdCAy
MDoxMyAmIzQzOzAwMDAsIEphbWVzIE4gR3VpY2hhcmQgd3JvdGU6PGJyPg0KJmd0OyBHcmVldGlu
Z3MgV0c6PGJyPg0KJmd0Ozxicj4NCiZndDsgSm9lbCBhbmQgSSBoYXZlIHRha2VuIGFuIGluaXRp
YWwgc3RhYiBhdCBuZXcgY2hhcnRlciB0ZXh0IGZvciB0aGUgU0ZDPGJyPg0KJmd0OyBXRy4gUGxl
YXNlIHJldmlldyBhbmQgcHJvdmlkZSBjb21tZW50cy9zdWdnZXN0aW9ucyBieSBDT0IgRnJpZGF5
IDI5dGg8YnI+DQomZ3Q7IERlY2VtYmVyICgyIHdlZWtzKS48YnI+DQomZ3Q7PGJyPg0KJmd0Ozxi
cj4NCiZndDsgTmV0d29yayBvcGVyYXRvcnMgZnJlcXVlbnRseSB1dGlsaXplIHNlcnZpY2UgZnVu
Y3Rpb25zIHN1Y2ggYXMgcGFja2V0PGJyPg0KJmd0OyBmaWx0ZXJpbmcgYXQgZmlyZXdhbGxzLCBs
b2FkLWJhbGFuY2luZyBhbmQgdHJhbnNhY3Rpb25hbCBwcm94aWVzIChmb3I8YnI+DQomZ3Q7IGV4
YW1wbGUgc3BhbSBmaWx0ZXJzKSBpbiB0aGUgZGVsaXZlcnkgb2Ygc2VydmljZXMgdG8gZW5kIHVz
ZXJzLjxicj4NCiZndDsgRGVsaXZlcnkgb2YgdGhlc2UgdHlwZXMgb2Ygc2VydmljZXMgaXMgdW5k
ZXJnb2luZyBzaWduaWZpY2FudCBjaGFuZ2U8YnI+DQomZ3Q7IHdpdGggdGhlIGludHJvZHVjdGlv
biBvZiB2aXJ0dWFsaXphdGlvbiwgbmV0d29yayBvdmVybGF5cywgYW5kPGJyPg0KJmd0OyBvcmNo
ZXN0cmF0aW9uLjxicj4NCiZndDs8YnI+DQomZ3Q7IFRoZSBTRkMgV29ya2luZyBHcm91cCBoYXMg
ZGV2ZWxvcGVkIGFuIEFyY2hpdGVjdHVyZSBbUkZDIDc2NjVdIGFuZCBhPGJyPg0KJmd0OyBwcm90
b2NvbCAodGhlIE5ldHdvcmsgU2VydmljZSBIZWFkZXIgW2RyYWZ0LWlldGYtc2ZjLW5zaC0yOF0s
IGluIHRoZTxicj4NCiZndDsgUkZDIEVkaXRvciBxdWV1ZSBhcyBvZiB0aGlzIGRyYWZ0aW5nLik8
YnI+DQomZ3Q7PGJyPg0KJmd0OyBUaGUgZm9jdXMgb2YgdGhlIFNGQyB3b3JraW5nIGdyb3VwIG1v
dmluZyBmb3J3YXJkIHdpbGwgYmUgb24gYXNwZWN0czxicj4NCiZndDsgb2YgdGhlIGFyY2hpdGVj
dHVyZSBhbmQvb3IgcHJvdG9jb2wgdGhhdCBuZWVkIHRvIGJlIGFkZHJlc3NlZCB0bzxicj4NCiZn
dDsgZW5hYmxlIGVmZmVjdGl2ZSBkZXBsb3ltZW50IGFuZCB1c2FnZSBvZiB0aGlzIHdvcmsuJm5i
c3A7IFRoZSBTRkMgd29ya2luZzxicj4NCiZndDsgZ3JvdXAgd2lsbCBub3cgYmVnaW4gYWRkcmVz
c2luZyB0aG9zZSBpdGVtcy4mbmJzcDsgSW4gb3JkZXIgdG8gbWFpbnRhaW48YnI+DQomZ3Q7IGZv
Y3VzLCB0aGUgd29ya2luZyBncm91cCB3aWxsIHByaW1hcmlseSBwcm9kdWNlIGFuZCBhZHZhbmNl
IGRvY3VtZW50czxicj4NCiZndDsgb24gZm91ciB0b3BpY3M6PGJyPg0KJmd0Ozxicj4NCiZndDsg
MSkgTWV0YWRhdGEgLSB3ZSBuZWVkIHRvIGRlZmluZSB0aGUgY29tbW9uIHR5cGUtbGVuZ3RoLXZh
bHVlIGVuY29kZWQ8YnI+DQomZ3Q7IG1ldGFkYXRhIHR5cGVzIHdpdGggc3RhbmRhcmRzIHRyYWNr
IFJGQ3MsIGFuZCBwcm9kdWNlIGluZm9ybWF0aW9uYWw8YnI+DQomZ3Q7IFJGQ3MgdG8gZGVzY3Jp
YmUgY29tbW9uIGZpeGVkLWxlbmd0aCAoTUQtMSkgbWV0YWRhdGEgdXNhZ2VzLjxicj4NCiZndDs8
YnI+DQomZ3Q7IDIpIFNlY3VyaXR5IC0gVGhlIGNvbXBsZXRlZCB3b3JrIGRvZXMgbm90IHByb3Zp
ZGUgbWVjaGFuaXNtcyBmb3I8YnI+DQomZ3Q7IGF1dGhlbnRpY2F0aW5nIG9yIHByb3RlY3Rpbmcg
KGVpdGhlciBmb3IgaW50ZWdyaXR5IG9yIGZyb208YnI+DQomZ3Q7IGluc3BlY3Rpb24pIG1ldGFk
YXRhLiZuYnNwOyBUaGVyZSBhcmUgYSBudW1iZXIgb2Ygb3BlbiBxdWVzdGlvbnMgYXMgdG88YnI+
DQomZ3Q7IHdoYXQgY2FuIGJlIGVmZmVjdGl2ZWx5IHByb3ZpZGVkIGFuZCBob3cgdG8gcHJvdmlk
ZSBzdWNoIHRvb2xzLjxicj4NCiZndDsgVGhlc2UgbmVlZCBhdHRlbnRpb24uPGJyPg0KJmd0Ozxi
cj4NCiZndDsgMykgT0FNIGFuZCBPJmFtcDtNIC0gSW4gb3JkZXIgZm9yIG9wZXJhdG9ycyB0byB1
c2UgdGhlc2UgdG9vbHMgaW48YnI+DQomZ3Q7IHByb2R1Y3Rpb24gbmV0d29ya3MsIHRoZXkgbmVl
ZCBPcGVyYXRpb25zLCBBZG1pbmlzdHJhdGlvbiwgYW5kPGJyPg0KJmd0OyBNYWludGVuYW5jZSB0
b29scywgYXMgd2VsbCBhcyBtYW5hZ2VtZW50IG1lY2hhbmlzbXMuJm5ic3A7IFRoaXMgaW5jbHVk
ZXM8YnI+DQomZ3Q7IFlBTkcgbW9kZWxzLCBPQU0gZnJhbWV3b3JrcywgYW5kIHNwZWNpZmljIE9B
TSBtZWNoYW5pc21zIHRvIGFkZHJlc3M8YnI+DQomZ3Q7IG9wZXJhdGlvbmFsIG5lZWRzLjxicj4N
CiZndDs8YnI+DQomZ3Q7IDQpIFRyYW5zcG9ydCBDb25zaWRlcmF0aW9ucyAtIHRoaXMgd2lsbCBj
YXB0dXJlIHRoZSBleHBlY3RhdGlvbnMgU0ZDPGJyPg0KJmd0OyBwbGFjZXMgb24gdHJhbnNwb3J0
IGJlaGF2aW9yLCBpbmNsdWRpbmcgZGVhbGluZyB3aXRoIGlzc3VlcyBzdWNoIGFzPGJyPg0KJmd0
OyBjb25nZXN0aW9uIGluZGljYXRpb25zIGFuZCByZXNwb25zZXMuPGJyPg0KJmd0Ozxicj4NCiZn
dDsgU3BlY2lmaWNhbGx5LCB0aGUgU0ZDIFdHIGlzIGNoYXJ0ZXJlZCB0byBkZWxpdmVyIHRoZSBm
b2xsb3dpbmc6PGJyPg0KJmd0Ozxicj4NCiZndDsgMS4gQSBzdGFuZGFyZHMgdHJhY2sgYmFzZSBz
ZXQgb2YgTUQtMiB0eXBlIGNvZGVzIHdpdGhpbiB0aGUgbWV0YWRhdGE8YnI+DQomZ3Q7IGNsYXNz
IHJlc2VydmVkIGZvciBJRVRGIHVzYWdlLjxicj4NCiZndDs8YnI+DQomZ3Q7IDIuIFJlbGF0ZWQg
TWV0YWRhdGEgZHJhZnRzIHRoYXQgcmVxdWlyZSBtb3JlIGV4cGxhbmF0aW9uIHRoYW4gaXM8YnI+
DQomZ3Q7IHJlYXNvbmFibGUgdG8gaW5jbHVkZSBpbiB0aGUgYmFzZSBNRC0yIGRyYWZ0LCBpbmNs
dWRpbmcgTUQtMTxicj4NCiZndDsgZGVzY3JpcHRpb25zIGFuZCBpdGVtcyBkb25lIG9uY2UgdGhl
IGJhc2UgZHJhZnQgaXMgY29tcGxldGUuPGJyPg0KJmd0Ozxicj4NCiZndDsgMy4gWUFORyBtb2Rl
bHMgZm9yIHRoZSBTRkMgQ29tcG9uZW50cy48YnI+DQomZ3Q7PGJyPg0KJmd0OyA0LiBPbmUgb3Ig
bW9yZSBzZWN1cml0eSByZWxhdGVkIHN0YW5kYXJkcyB0cmFjayBhbmQgLyBvcjxicj4NCiZndDsg
aW5mb3JtYXRpb25hbCBSRkNzLiZuYnNwOyBBdCBsZWFzdCBvbmUgc3RhbmRhcmRzIHRyYWNrIHNl
Y3VyaXR5IG1lY2hhbmlzbTxicj4NCiZndDsgUkZDIGlzIG5lZWRlZC48YnI+DQomZ3Q7PGJyPg0K
Jmd0OyA1LiBPQU0gRnJhbWV3b3JrIGRvY3VtZW50IHRvIHByb3ZpZGUgYSBjb21tb24gYmFzaXMg
Zm9yIE9BTSB3b3JrLjxicj4NCiZndDsgVGhpcyBkcmFmdCB3aWxsIGluY2x1ZGUgZ3VpZGFuY2Ug
b24gaG93IGFjdGl2ZSwgcGFzc2l2ZSwgYW5kIGluLXNpdHU8YnI+DQomZ3Q7IE9BTSBhcmUgdG8g
YmUgc3VwcG9ydGVkIGlmIGF0IGFsbC48YnI+DQomZ3Q7PGJyPg0KJmd0OyA2LiBTcGVjaWZpYyBP
QU0gbWVjaGFuaXNtIGRvY3VtZW50cyB0byBwcm92aWRlIHRoZSB0b29scyBuZWVkZWQgZm9yPGJy
Pg0KJmd0OyBvcGVyYXRpb25hbCBlbnZpcm9ubWVudHMuPGJyPg0KJmd0Ozxicj4NCiZndDsgNy4g
VHJhbnNwb3J0IENvbnNpZGVyYXRpb25zIFJGQyB0byBjb3ZlciB0aGUgZXhwZWN0YXRpb25zIFNG
QyBhbmQgTlNIPGJyPg0KJmd0OyBwbGFjZSBvbiB0cmFuc3BvcnQsIGFuZCB0aGUgb3BlcmF0aW9u
YWwgY29uc3RyYWludHMgdHJhbnNwb3J0cyB1c2VkPGJyPg0KJmd0OyBieSBOU0ggbmVlZCB0byBt
ZWV0Ljxicj4NCiZndDs8YnI+DQomZ3Q7PGJyPg0KJmd0OyBUaGFua3MhPGJyPg0KJmd0Ozxicj4N
CiZndDsgSmltICZhbXA7IEpvZWw8YnI+DQomZ3Q7PGJyPg0KJmd0Ozxicj4NCiZndDs8YnI+DQom
Z3Q7PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj4mZ3Q7IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fPGJyPg0KJmd0OyBzZmMgbWFpbGluZyBsaXN0PGJyPg0KJmd0OyA8YSBocmVmPSJt
YWlsdG86c2ZjQGlldGYub3JnIj5zZmNAaWV0Zi5vcmc8L2E+PGJyPg0KJmd0OyA8YSBocmVmPSJo
dHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL3NmYyIgdGFyZ2V0PSJfYmxhbmsi
Pmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjPC9hPjxvOnA+PC9vOnA+
PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1z
b05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9ib2R5Pg0K
PC9odG1sPg0K

--_000_BN6PR1001MB2115A9C3C2640B2F29F7DBB4E71D0BN6PR1001MB2115_--


From nobody Sun Jan  7 09:44:12 2018
Return-Path: <ron_parker@affirmednetworks.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 35238126CF6 for <sfc@ietfa.amsl.com>; Sun,  7 Jan 2018 09:44:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MXdvjt94h5op for <sfc@ietfa.amsl.com>; Sun,  7 Jan 2018 09:44:07 -0800 (PST)
Received: from hub021-ca-3.exch021.serverdata.net (hub021-ca-3.exch021.serverdata.net [64.78.22.170]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0759A12025C for <sfc@ietf.org>; Sun,  7 Jan 2018 09:44:06 -0800 (PST)
Received: from MBX021-W3-CA-2.exch021.domain.local ([10.254.4.78]) by HUB021-CA-3.exch021.domain.local ([10.254.4.36]) with mapi id 14.03.0319.002;  Sun, 7 Jan 2018 09:44:06 -0800
From: Ron Parker <ron_parker@affirmednetworks.com>
To: "Rahman, Akbar" <Akbar.Rahman@InterDigital.com>, Alia Atlas <akatlas@gmail.com>
CC: "cjbc@it.uc3m.es" <cjbc@it.uc3m.es>, James N Guichard <james.n.guichard@huawei.com>, Service Function Chaining IETF list <sfc@ietf.org>
Thread-Topic: [sfc] SFC WG re-chartering - initial text for WG review/comment
Thread-Index: AQHThJAHyATrOBVChk+wn9pof2Dq8aNmQ/MAgACdkACAAdHdYA==
Date: Sun, 7 Jan 2018 17:44:05 +0000
Message-ID: <CDF2F015F4429F458815ED2A6C2B6B0B83AD2F2C@MBX021-W3-CA-2.exch021.domain.local>
References: <BF1BE6D99B52F84AB9B48B7CF6F17DA3134BDFE6@sjceml521-mbx.china.huawei.com> <1514983213.5492.58.camel@it.uc3m.es> <CAG4d1rfRxOAnMf8WtEkbuYpiCy4R7yMqfQ-N7cchRmwSsv7dOQ@mail.gmail.com> <BN6PR1001MB2115A9C3C2640B2F29F7DBB4E71D0@BN6PR1001MB2115.namprd10.prod.outlook.com>
In-Reply-To: <BN6PR1001MB2115A9C3C2640B2F29F7DBB4E71D0@BN6PR1001MB2115.namprd10.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [71.184.117.56]
Content-Type: multipart/alternative; boundary="_000_CDF2F015F4429F458815ED2A6C2B6B0B83AD2F2CMBX021W3CA2exch_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/-ljnTl8KadnGp0rzwIMlH5TXbKA>
Subject: Re: [sfc] SFC WG re-chartering - initial text for WG review/comment
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 07 Jan 2018 17:44:10 -0000

--_000_CDF2F015F4429F458815ED2A6C2B6B0B83AD2F2CMBX021W3CA2exch_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_CDF2F015F4429F458815ED2A6C2B6B0B83AD2F2CMBX021W3CA2exch_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_CDF2F015F4429F458815ED2A6C2B6B0B83AD2F2CMBX021W3CA2exch_--


From nobody Mon Jan  8 21:55:41 2018
Return-Path: <tal.mizrahi.phd@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA856126C23 for <sfc@ietfa.amsl.com>; Mon,  8 Jan 2018 21:55:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z58CNCSFDxd1 for <sfc@ietfa.amsl.com>; Mon,  8 Jan 2018 21:55:37 -0800 (PST)
Received: from mail-ot0-x22c.google.com (mail-ot0-x22c.google.com [IPv6:2607:f8b0:4003:c0f::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8173C124BFA for <sfc@ietf.org>; Mon,  8 Jan 2018 21:55:37 -0800 (PST)
Received: by mail-ot0-x22c.google.com with SMTP id d10so10431915oti.7 for <sfc@ietf.org>; Mon, 08 Jan 2018 21:55:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to;  bh=tTkA+tI71sk/Guzc9hnWHNkRz4VFUmocMSc0riPgw/0=; b=g26xKLG9lcJHncXvPjRhlAw8zGEntHNCyDKSw4uyp+gIav/PV/rWJUhKYpzZ6TrNMk 4J/SUt6r2OL7hmXi9oxYoxJ1u4MRBC3QB7srKkVlzXRD5dby/QOKVjlOJVRSNRc760e4 gfxctwQz+Hj1z0ydy/NGcS2clNgLkjav33DfTs+NjMua5O9C9k8hxdDP5dSQGU4Vz6Hg q5PhvkQPAQEbN2OqXKIfGNCxR2iRhvVz5thebCgikhw3EIy0hNpBU9s6de+Xo9TKhHhk Zf48Sx5wYCUhBtvtGkayGVm+EQa2gKgP1nL0bfEENGZSr+8t/ljtQ7+RCdAqVoz3Gjol YGKg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=tTkA+tI71sk/Guzc9hnWHNkRz4VFUmocMSc0riPgw/0=; b=Nyk4wAWl0zR3LtBJONE1nzWCd3Er/m07phlOcJrSbuhW1g7Kf9gCajmj6YgFFp3fi0 l0GBC2n7quVjB2y4ejw3dZKUOnemFGF6jSRIdy1gx/KXmcVsH4xkkjxFAG6r1mxQDuiq QSGxqBajhwXmOvqwwz2C0YVl7QKylMY/mHhWjam7/Jb/EDPKSfttOK/CjF1ilzBaOf5j G/zc0kOtlA8uuG3pqvM7uRTYWdPsdDt7zFVG5krgxjzJu6FBYnuK0KXaFztmFNAYz7X7 KX3Zc2ET0l2p89rf8HPNlrmxhbMdk849QFH3RPNpWNkzg+mwRVEs2QGSmxOQxg1TyPF0 GiRg==
X-Gm-Message-State: AKwxytfxEqGC1zyqsVPSfKQklRA/ufR65txQR8ZbXyZBCyvUvwCjV4/r 82yumOr7ok9yByhfdd940C0tEd6q+EAzbIfnSYA=
X-Google-Smtp-Source: ACJfBoti5NdM++CWLFRXHy4C9LhQVTAh2B8oOPGo1+lg0n1GSbJKGWwOTjjhmSUjrbjP6PZNqJhqNp3kOCDa3aIWaws=
X-Received: by 10.157.26.89 with SMTP id u25mr279504otu.194.1515477336654; Mon, 08 Jan 2018 21:55:36 -0800 (PST)
MIME-Version: 1.0
Received: by 10.168.70.1 with HTTP; Mon, 8 Jan 2018 21:55:36 -0800 (PST)
In-Reply-To: <CAD5dHojC8O1Sf6mqSt1mJiff-CvpFxF-QN7B9iLw=vu1toBS3w@mail.gmail.com>
References: <CABUE3X=zzwy4Bz--1Wk=-kz9CEATE53k3X0qGre2C7QNxVFFaA@mail.gmail.com> <038201d37ef3$5631e6e0$0295b4a0$@olddog.co.uk> <CABUE3Xmiz_9wVQT045gTteYyhWAeefjHj2Mv_1fXByy6jNrn5A@mail.gmail.com> <0F2DFD1A-4F63-443C-9321-096D67E4B52B@gmail.com> <CABUE3Xme2e7SKvKBDiv3qSTVOOJFoPU3duXNkGMbR59-ZYXrqw@mail.gmail.com> <CAD5dHojC8O1Sf6mqSt1mJiff-CvpFxF-QN7B9iLw=vu1toBS3w@mail.gmail.com>
From: Tal Mizrahi <tal.mizrahi.phd@gmail.com>
Date: Tue, 9 Jan 2018 07:55:36 +0200
Message-ID: <CABUE3X=MTMn--d31yAE21pAO-iWs+8b6wq6_73=BS5rhMzHBeA@mail.gmail.com>
To: sfc@ietf.org
Content-Type: multipart/alternative; boundary="001a1135342c51082a0562519045"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/kfkLaEOiEaGrIGEIr54eu_1DwUA>
Subject: [sfc] Fwd:  IPR Poll Regarding draft-farrel-sfc-convent
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Jan 2018 05:55:40 -0000

--001a1135342c51082a0562519045
Content-Type: text/plain; charset="UTF-8"

Hi,

Lucy Yong's response to the IPR poll can be found below.

This concludes the two-week IPR poll.

Cheers,
Tal.



---------- Forwarded message ----------
From: Lucy Yong <lucyyong@gmail.com>
Date: Mon, Jan 8, 2018 at 12:58 AM
Subject: Re: [sfc] IPR Poll Regarding draft-farrel-sfc-convent
To: Tal Mizrahi <tal.mizrahi.phd@gmail.com>


Yes, I mean that I did not have any IPR related to this draft. sorry to
typo.

Lucy

On Wed, Jan 3, 2018 at 12:03 AM, Tal Mizrahi <tal.mizrahi.phd@gmail.com>
wrote:

> Hi Lucy,
>
> Many thanks for the reply.
>
> Apologies, but just to clarify - you wrote that "I am no loner co-author
> on this draft *and did have any IPR* related to this subject".
>
> Did you mean to say that you did *not* have any related IPR?
>
> Many thanks,
> Tal.
>
> On Wed, Jan 3, 2018 at 1:05 AM, <lucyyong@gmail.com> wrote:
>
>> I am no loner co-author on this draft and did have any IPR related to
>> this subject, and no longer work in IETF.
>> Lucy
>>
>> Sent from my iPhone
>>
>> On Jan 1, 2018, at 7:09 AM, Tal Mizrahi <tal.mizrahi.phd@gmail.com>
>> wrote:
>>
>> Hi Lucy,
>>
>> Since you are listed as a contributor to this draft, could you please
>> reply-to-all to the original mail, indicating whether you are aware of any
>> IPRs related to this draft?
>>
>> Thanks,
>> Tal.
>>
>>
>> ---------- Forwarded message ----------
>> From: Adrian Farrel <adrian@olddog.co.uk>
>> Date: Wed, Dec 27, 2017 at 11:15 AM
>> Subject: RE: [sfc] IPR Poll Regarding draft-farrel-sfc-convent
>> To: Tal Mizrahi <tal.mizrahi.phd@gmail.com>,
>> draft-farrel-sfc-convent@ietf.org, sfc@ietf.org, sfc-chairs@ietf.org
>>
>>
>> Hi,
>>
>>
>>
>> I am not aware of any IPR that applies to this draft.
>>
>>
>>
>> Thanks,
>>
>> Adrian
>>
>>
>>
>> *From:* sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of *Tal Mizrahi
>> *Sent:* 25 December 2017 07:33
>> *To:* draft-farrel-sfc-convent@ietf.org; sfc@ietf.org;
>> sfc-chairs@ietf.org
>> *Subject:* [sfc] IPR Poll Regarding draft-farrel-sfc-convent
>>
>>
>>
>> Hi,
>>
>>
>>
>> This email begins a two-week poll for any IPRs that may apply to
>> draft-farrel-sfc-convent.
>>
>>
>>
>> Are you aware of any IPR that applies to draft-farrel-sfc-convent?
>>
>>
>>
>> Specifically, if you are listed as a document author or contributor,
>> please respond to this email (reply-to-all) stating whether or not you are
>> aware of any relevant IPR.
>>
>>
>>
>> If you are aware of a relevant IPR, please state whether this IPR been
>> disclosed in compliance with IETF IPR rules (see RFCs 3979, 4879, 3669 and
>> 5378 for more details).
>>
>>
>>
>> This poll closes on the 8th of January 2018.
>>
>>
>>
>> Best regards,
>>
>> Tal.
>>
>>
>

--001a1135342c51082a0562519045
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi,<div><br></div><div>Lucy Yong&#39;s response to the IPR=
 poll can be found below.</div><div><br></div><div>This concludes the two-w=
eek IPR poll.</div><div><br></div><div>Cheers,</div><div>Tal.</div><div><br=
></div><div><br></div><div><br><div class=3D"gmail_quote">---------- Forwar=
ded message ----------<br>From: <b class=3D"gmail_sendername">Lucy Yong</b>=
 <span dir=3D"ltr">&lt;<a href=3D"mailto:lucyyong@gmail.com">lucyyong@gmail=
.com</a>&gt;</span><br>Date: Mon, Jan 8, 2018 at 12:58 AM<br>Subject: Re: [=
sfc] IPR Poll Regarding draft-farrel-sfc-convent<br>To: Tal Mizrahi &lt;<a =
href=3D"mailto:tal.mizrahi.phd@gmail.com">tal.mizrahi.phd@gmail.com</a>&gt;=
<br><br><br><div dir=3D"ltr"><div>Yes, I mean that I did not have any IPR r=
elated to this draft. sorry to typo.</div><span class=3D"HOEnZb"><font colo=
r=3D"#888888"><div><br></div><div>Lucy</div></font></span></div><div class=
=3D"HOEnZb"><div class=3D"h5"><div class=3D"gmail_extra"><br><div class=3D"=
gmail_quote">On Wed, Jan 3, 2018 at 12:03 AM, Tal Mizrahi <span dir=3D"ltr"=
>&lt;<a href=3D"mailto:tal.mizrahi.phd@gmail.com" target=3D"_blank">tal.miz=
rahi.phd@gmail.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quot=
e" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">=
<div dir=3D"ltr">Hi Lucy,<div><br></div><div>Many thanks for the reply.=C2=
=A0</div><div><br></div><div>Apologies, but just to clarify - you wrote tha=
t &quot;I am no loner co-author on this draft <b>and did have any IPR</b> r=
elated to this subject&quot;.<br></div><div><br></div><div>Did you mean to =
say that you did *not* have any related IPR?</div><div><br></div><div>Many =
thanks,</div><div>Tal.</div></div><div class=3D"m_-1361695896171130583HOEnZ=
b"><div class=3D"m_-1361695896171130583h5"><div class=3D"gmail_extra"><br><=
div class=3D"gmail_quote">On Wed, Jan 3, 2018 at 1:05 AM,  <span dir=3D"ltr=
">&lt;<a href=3D"mailto:lucyyong@gmail.com" target=3D"_blank">lucyyong@gmai=
l.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"m=
argin:0px 0px 0px 0.8ex;padding-left:1ex;border-left-color:rgb(204,204,204)=
;border-left-width:1px;border-left-style:solid"><div dir=3D"auto">I am no l=
oner co-author on this draft and did have any IPR related to this subject, =
and no longer work in IETF.<div>Lucy<br><br><div id=3D"m_-13616958961711305=
83m_1983178214467161243m_-1374469537590977289AppleMailSignature">Sent from =
my iPhone</div><div><div class=3D"m_-1361695896171130583m_19831782144671612=
43h5"><div><br>On Jan 1, 2018, at 7:09 AM, Tal Mizrahi &lt;<a href=3D"mailt=
o:tal.mizrahi.phd@gmail.com" target=3D"_blank">tal.mizrahi.phd@gmail.com</a=
>&gt; wrote:<br><br></div><blockquote type=3D"cite"><div><div dir=3D"ltr">H=
i Lucy,<div><br></div><div>Since you are listed as a contributor to this dr=
aft, could you please reply-to-all to the original mail, indicating whether=
 you are aware of any IPRs related to this draft?</div><div><br></div><div>=
Thanks,</div><div>Tal.</div><div><br></div><div><br><div class=3D"gmail_quo=
te">---------- Forwarded message ----------<br>From: <b class=3D"gmail_send=
ername">Adrian Farrel</b> <span dir=3D"ltr">&lt;<a href=3D"mailto:adrian@ol=
ddog.co.uk" target=3D"_blank">adrian@olddog.co.uk</a>&gt;</span><br>Date: W=
ed, Dec 27, 2017 at 11:15 AM<br>Subject: RE: [sfc] IPR Poll Regarding draft=
-farrel-sfc-convent<br>To: Tal Mizrahi &lt;<a href=3D"mailto:tal.mizrahi.ph=
d@gmail.com" target=3D"_blank">tal.mizrahi.phd@gmail.com</a>&gt;, <a href=
=3D"mailto:draft-farrel-sfc-convent@ietf.org" target=3D"_blank">draft-farre=
l-sfc-convent@ietf.<wbr>org</a>, <a href=3D"mailto:sfc@ietf.org" target=3D"=
_blank">sfc@ietf.org</a>, <a href=3D"mailto:sfc-chairs@ietf.org" target=3D"=
_blank">sfc-chairs@ietf.org</a><br><br><br><div lang=3D"EN-GB" vlink=3D"pur=
ple" link=3D"blue"><div class=3D"m_-1361695896171130583m_198317821446716124=
3m_-1374469537590977289m_5731493557496418959WordSection1"><p class=3D"MsoNo=
rmal"><span style=3D"color:rgb(31,73,125);font-family:&quot;Calibri&quot;,&=
quot;sans-serif&quot;;font-size:11pt">Hi,<u></u><u></u></span></p><p class=
=3D"MsoNormal"><span style=3D"color:rgb(31,73,125);font-family:&quot;Calibr=
i&quot;,&quot;sans-serif&quot;;font-size:11pt"><u></u>=C2=A0<u></u></span><=
/p><p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125);font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;font-size:11pt">I am not aware of=
 any IPR that applies to this draft.<u></u><u></u></span></p><p class=3D"Ms=
oNormal"><span style=3D"color:rgb(31,73,125);font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;;font-size:11pt"><u></u>=C2=A0<u></u></span></p><p =
class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125);font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;;font-size:11pt">Thanks,<u></u><u></u></=
span></p><p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125);font-fa=
mily:&quot;Calibri&quot;,&quot;sans-serif&quot;;font-size:11pt">Adrian<u></=
u><u></u></span></p><p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,1=
25);font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;font-size:11pt">=
<u></u>=C2=A0<u></u></span></p><div style=3D"border-width:medium medium med=
ium 1.5pt;border-style:none none none solid;border-color:currentColor curre=
ntColor currentColor blue;padding:0cm 0cm 0cm 4pt"><div><div style=3D"borde=
r-width:1pt medium medium;border-style:solid none none;border-color:rgb(181=
,196,223) currentColor currentColor;padding:3pt 0cm 0cm"><p class=3D"MsoNor=
mal"><b><span lang=3D"EN-US" style=3D"font-family:&quot;Tahoma&quot;,&quot;=
sans-serif&quot;;font-size:10pt">From:</span></b><span lang=3D"EN-US" style=
=3D"font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;font-size:10pt"> =
sfc [mailto:<a href=3D"mailto:sfc-bounces@ietf.org" target=3D"_blank">sfc-b=
ounces@ietf.org</a>] <b>On Behalf Of </b>Tal Mizrahi<br><b>Sent:</b> 25 Dec=
ember 2017 07:33<br><b>To:</b> <a href=3D"mailto:draft-farrel-sfc-convent@i=
etf.org" target=3D"_blank">draft-farrel-sfc-convent@ietf.<wbr>org</a>; <a h=
ref=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a>; <a href=3D"=
mailto:sfc-chairs@ietf.org" target=3D"_blank">sfc-chairs@ietf.org</a><br><b=
>Subject:</b> [sfc] IPR Poll Regarding draft-farrel-sfc-convent<u></u><u></=
u></span></p></div></div><div><div class=3D"m_-1361695896171130583m_1983178=
214467161243m_-1374469537590977289h5"><p class=3D"MsoNormal"><u></u>=C2=A0<=
u></u></p><div><div><p class=3D"MsoNormal">Hi,<u></u><u></u></p></div><div>=
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p></div><div><p class=3D"MsoNo=
rmal">This email begins a two-week poll for any IPRs that may apply to draf=
t-farrel-sfc-convent.<u></u><u></u></p></div><div><p class=3D"MsoNormal"><u=
></u>=C2=A0<u></u></p></div><div><p class=3D"MsoNormal">Are you aware of an=
y IPR that applies to draft-farrel-sfc-convent?=C2=A0<u></u><u></u></p></di=
v><div><p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p></div><div><p class=
=3D"MsoNormal">Specifically, if you are listed as a document author or cont=
ributor, please respond to this email (reply-to-all) stating whether or not=
 you are aware of any relevant IPR.<u></u><u></u></p></div><div><p class=3D=
"MsoNormal"><u></u>=C2=A0<u></u></p></div><div><p class=3D"MsoNormal">If yo=
u are aware of a relevant IPR, please state whether this IPR been disclosed=
 in compliance with IETF IPR rules (see RFCs 3979, 4879, 3669 and 5378 for =
more details).<u></u><u></u></p></div><div><p class=3D"MsoNormal"><u></u>=
=C2=A0<u></u></p></div><div><p class=3D"MsoNormal">This poll closes on the =
8th of January 2018.<u></u><u></u></p></div><div><p class=3D"MsoNormal"><u>=
</u>=C2=A0<u></u></p></div><div><p class=3D"MsoNormal">Best regards,<u></u>=
<u></u></p></div><div><p class=3D"MsoNormal">Tal.<u></u><u></u></p></div></=
div></div></div></div></div></div></div><br></div></div>
</div></blockquote></div></div></div></div></blockquote></div><br></div>
</div></div></blockquote></div><br></div>
</div></div></div><br></div></div>

--001a1135342c51082a0562519045--


From nobody Tue Jan  9 22:45:02 2018
Return-Path: <tal.mizrahi.phd@gmail.com>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 9FAFA1200B9; Tue,  9 Jan 2018 22:45:00 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Tal Mizrahi <tal.mizrahi.phd@gmail.com>
To: <akatlas@gmail.com>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.68.3
Auto-Submitted: auto-generated
Precedence: bulk
Cc: iesg-secretary@ietf.org, Tal Mizrahi <tal.mizrahi.phd@gmail.com>, tal.mizrahi.phd@gmail.com, sfc-chairs@ietf.org, sfc@ietf.org
Message-ID: <151556670064.21509.15323511186504819193.idtracker@ietfa.amsl.com>
Date: Tue, 09 Jan 2018 22:45:00 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/6KJebY_IwyoBaeOfjq838WGVIrc>
Subject: [sfc] Publication has been requested for draft-farrel-sfc-convent-05
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Jan 2018 06:45:01 -0000

Tal Mizrahi has requested publication of draft-farrel-sfc-convent-05 as Proposed Standard on behalf of the SFC working group.

Please verify the document's state at https://datatracker.ietf.org/doc/draft-farrel-sfc-convent/


From nobody Fri Jan 12 14:54:17 2018
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6BD0012D852; Fri, 12 Jan 2018 14:54:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level: 
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sd4f0g99LrAz; Fri, 12 Jan 2018 14:53:59 -0800 (PST)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3232D12D7EF; Fri, 12 Jan 2018 14:53:46 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 30) id DD9F9B82155; Fri, 12 Jan 2018 14:53:22 -0800 (PST)
To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
X-PHP-Originating-Script: 1005:ams_util_lib.php
From: rfc-editor@rfc-editor.org
Cc: rfc-editor@rfc-editor.org, drafts-update-ref@iana.org, sfc@ietf.org
Content-type: text/plain; charset=UTF-8
Message-Id: <20180112225322.DD9F9B82155@rfc-editor.org>
Date: Fri, 12 Jan 2018 14:53:22 -0800 (PST)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/vXSuRycMDfo2_a5ShEKYOb_D9uI>
Subject: [sfc] =?utf-8?q?RFC_8300_on_Network_Service_Header_=28NSH=29?=
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Jan 2018 22:54:11 -0000

A new Request for Comments is now available in online RFC libraries.

        
        RFC 8300

        Title:      Network Service Header (NSH) 
        Author:     P. Quinn, Ed.,
                    U. Elzur, Ed.,
                    C. Pignataro, Ed.
        Status:     Standards Track
        Stream:     IETF
        Date:       January 2018
        Mailbox:    paulq@cisco.com, 
                    uri.elzur@intel.com, 
                    cpignata@cisco.com
        Pages:      40
        Characters: 93675
        Updates/Obsoletes/SeeAlso:   None

        I-D Tag:    draft-ietf-sfc-nsh-28.txt

        URL:        https://www.rfc-editor.org/info/rfc8300

        DOI:        10.17487/RFC8300

This document describes a Network Service Header (NSH) imposed on
packets or frames to realize Service Function Paths (SFPs).  The NSH
also provides a mechanism for metadata exchange along the
instantiated service paths.  The NSH is the Service Function Chaining
(SFC) encapsulation required to support the SFC architecture (defined
in RFC 7665).

This document is a product of the Service Function Chaining Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC



From nobody Fri Jan 12 16:23:10 2018
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 25725120725 for <sfc@ietfa.amsl.com>; Fri, 12 Jan 2018 16:23:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z1xFxWpKs9Cx for <sfc@ietfa.amsl.com>; Fri, 12 Jan 2018 16:23:06 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 33FF61204DA for <sfc@ietf.org>; Fri, 12 Jan 2018 16:23:06 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 16A06308CD2 for <sfc@ietf.org>; Fri, 12 Jan 2018 16:23:06 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1515802986; bh=znik8YJVcasP9wSjeeZCm4o0iTBnnZE5XRc0j4q2dIA=; h=Subject:To:References:From:Date:In-Reply-To:From; b=YFF9o1gHiIFImQQGj48k44NYJgE74F1k9juNAy8Ps0Y9U7brIMJVXbkCC1SIsAjgl 9l+9CSq0JJ72s0Ofk4pJtQ+G57cvjMuLjL4usUIr70MiytEUw/eMYPSK6Q0fPymDLq 3ltWI+Vic99xFWm8EGGMUP8iM3dWDeZ33COKC/Bg=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (unknown [50.225.209.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 86E20308CD1 for <sfc@ietf.org>; Fri, 12 Jan 2018 16:23:05 -0800 (PST)
To: sfc@ietf.org
References: <20180112225322.DD9F9B82155@rfc-editor.org>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <cf8b7337-9d6b-dcbb-442d-9e098fd9bec0@joelhalpern.com>
Date: Fri, 12 Jan 2018 19:23:04 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <20180112225322.DD9F9B82155@rfc-editor.org>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/8B1dViwGsUR82EBAbaeny31-n1g>
Subject: Re: [sfc] RFC 8300 on Network Service Header (NSH)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 13 Jan 2018 00:23:08 -0000

Congratulations and thanks to the working group and authors.

Yours,
Joel

On 1/12/18 5:53 PM, rfc-editor@rfc-editor.org wrote:
> A new Request for Comments is now available in online RFC libraries.
> 
>          
>          RFC 8300
> 
>          Title:      Network Service Header (NSH)
>          Author:     P. Quinn, Ed.,
>                      U. Elzur, Ed.,
>                      C. Pignataro, Ed.
>          Status:     Standards Track
>          Stream:     IETF
>          Date:       January 2018
>          Mailbox:    paulq@cisco.com,
>                      uri.elzur@intel.com,
>                      cpignata@cisco.com
>          Pages:      40
>          Characters: 93675
>          Updates/Obsoletes/SeeAlso:   None
> 
>          I-D Tag:    draft-ietf-sfc-nsh-28.txt
> 
>          URL:        https://www.rfc-editor.org/info/rfc8300
> 
>          DOI:        10.17487/RFC8300
> 
> This document describes a Network Service Header (NSH) imposed on
> packets or frames to realize Service Function Paths (SFPs).  The NSH
> also provides a mechanism for metadata exchange along the
> instantiated service paths.  The NSH is the Service Function Chaining
> (SFC) encapsulation required to support the SFC architecture (defined
> in RFC 7665).
> 
> This document is a product of the Service Function Chaining Working Group of the IETF.
> 
> This is now a Proposed Standard.
> 
> STANDARDS TRACK: This document specifies an Internet Standards Track
> protocol for the Internet community, and requests discussion and suggestions
> for improvements.  Please refer to the current edition of the Official
> Internet Protocol Standards (https://www.rfc-editor.org/standards) for the
> standardization state and status of this protocol.  Distribution of this
> memo is unlimited.
> 
> This announcement is sent to the IETF-Announce and rfc-dist lists.
> To subscribe or unsubscribe, see
>    https://www.ietf.org/mailman/listinfo/ietf-announce
>    https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist
> 
> For searching the RFC series, see https://www.rfc-editor.org/search
> For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk
> 
> Requests for special distribution should be addressed to either the
> author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless
> specifically noted otherwise on the RFC itself, all RFCs are for
> unlimited distribution.
> 
> 
> The RFC Editor Team
> Association Management Solutions, LLC
> 
> 
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
> 


From nobody Mon Jan 15 07:44:02 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 9FD4512E037; Mon, 15 Jan 2018 07:44:00 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: sfc@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.68.3
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151603104062.28346.12660755878049144737@ietfa.amsl.com>
Date: Mon, 15 Jan 2018 07:44:00 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/bb8hj8XRY3LPOUHdG6qxkzsttug>
Subject: [sfc] I-D Action: draft-ietf-sfc-nsh-broadband-allocation-00.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Jan 2018 15:44:01 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Service Function Chaining WG of the IETF.

        Title           : NSH Context Header Allocation for Broadband
        Authors         : Jeffrey Napper
                          Surendra Kumar
                          Praveen Muley
                          Wim Hendericks
                          Mohamed Boucadair
	Filename        : draft-ietf-sfc-nsh-broadband-allocation-00.txt
	Pages           : 10
	Date            : 2018-01-15

Abstract:
   This document provides a recommended allocation of Network Service
   Header (NSH) context headers within the broadband service provider
   network context.  Both fixed and mobile deployments are considered.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh-broadband-allocation/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sfc-nsh-broadband-allocation-00
https://datatracker.ietf.org/doc/html/draft-ietf-sfc-nsh-broadband-allocation-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Jan 16 08:33:26 2018
Return-Path: <akatlas@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 354041315CD for <sfc@ietfa.amsl.com>; Tue, 16 Jan 2018 08:33:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 98yIJKcu0kOn for <sfc@ietfa.amsl.com>; Tue, 16 Jan 2018 08:33:21 -0800 (PST)
Received: from mail-ot0-x230.google.com (mail-ot0-x230.google.com [IPv6:2607:f8b0:4003:c0f::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 837F9131570 for <sfc@ietf.org>; Tue, 16 Jan 2018 08:31:00 -0800 (PST)
Received: by mail-ot0-x230.google.com with SMTP id p16so14130531otf.1 for <sfc@ietf.org>; Tue, 16 Jan 2018 08:31:00 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=RWmayDMWvhyY4HCub9wInz9x0boN5xzUv15ft2emXv8=; b=HDDBo/D0wqnQv97M6+2RDozsBBgDpT2HFQwQoAISjtTAhAninZzQRvEoiGFF3G0tGV iULz/QNGBPICbjMOTDaeG4/MLN7otpa+j+m/vEMd1ZCaFUugK3+s41gqIOLMRqCZts4X 8fmCTbce/YxXWsF8f8EBRnLKJzjvOqpEmGA79UDthWk4OjqO2hQNuIdfEITDpjnwGgBh z4DTxv1pEvHNiU1LKQBRyaNRu1YaA/5UljL3CqWY8/QC9KH3SyGTFRz/bzXwdeNgJBbs J3yueo+Iitn/8eCR7WOHfBvZqUb2lS6PB3YKQmX/qhP/2rlZ74hQN3MKFxMQoekLYhR1 9N7w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=RWmayDMWvhyY4HCub9wInz9x0boN5xzUv15ft2emXv8=; b=jqF4nJO5HnkIiLQy6/6+Oh5wWd9zvgGbAD6jnaBiaIoUSlNa1LCTYsRNbj+QFjnD2M Dnnp/FYx4pvSvAclh+qH4fUfYSBZaq2odLrjrYxG/fSjcVOlXEU46QPb9J3Hizpr82ht pA/cr78oabws12RRIdMHVV+VsKyEA5wzSH1gYuTKQ5Ho2qWdYouU0Y1F/LC2RfUAyYF4 eWVoM/6S8nckL1tr5eVrnP5Z5mjy7RnvPz5ftpsz7kJPHeD1uputBWboppSPNw+C+wQ7 NafYZr35dByDMoNIjdkyp3o3RJ/JnyC7FKyJketnWDgOjynLC46IXaRcuoCQ6ZB4oc37 0e1Q==
X-Gm-Message-State: AKwxytdEczm7PMaf1FOvXDgypR8GAqB2yXNB6ZQPlmW43+DBHGn2TNHN QXIbo2X7z1SaR8pzmFVRHostZEWQpt2tbIoZjhIFoQ==
X-Google-Smtp-Source: ACJfBovuub0pqjqzkx05XMCIHKnc8EmOwKqSJT3rYhPpO+QP8l+iEWrJEXmlkzbWSTjBROL/zc3OHVbhC4mm8BuFN44=
X-Received: by 10.157.69.130 with SMTP id x2mr9157609ote.286.1516120259549; Tue, 16 Jan 2018 08:30:59 -0800 (PST)
MIME-Version: 1.0
Received: by 10.157.67.47 with HTTP; Tue, 16 Jan 2018 08:30:58 -0800 (PST)
In-Reply-To: <cf8b7337-9d6b-dcbb-442d-9e098fd9bec0@joelhalpern.com>
References: <20180112225322.DD9F9B82155@rfc-editor.org> <cf8b7337-9d6b-dcbb-442d-9e098fd9bec0@joelhalpern.com>
From: Alia Atlas <akatlas@gmail.com>
Date: Tue, 16 Jan 2018 11:30:58 -0500
Message-ID: <CAG4d1remCO9gFdD9UxhXeyTs4WZbbU9+f+VLLQGKQAU885fXoQ@mail.gmail.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Cc: Service Function Chaining IETF list <sfc@ietf.org>
Content-Type: multipart/alternative; boundary="089e082cc25481dfd10562e74132"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/cXVEPeRa6WntQR5RKAyQK6_ZVZw>
Subject: Re: [sfc] RFC 8300 on Network Service Header (NSH)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Jan 2018 16:33:24 -0000

--089e082cc25481dfd10562e74132
Content-Type: text/plain; charset="UTF-8"

Congratulations to the WG, editors, and all who worked on getting this work
done.
It is a major milestone and took a lot of work.

Thank you!
Alia

On Fri, Jan 12, 2018 at 7:23 PM, Joel M. Halpern <jmh@joelhalpern.com>
wrote:

> Congratulations and thanks to the working group and authors.
>
> Yours,
> Joel
>
>
> On 1/12/18 5:53 PM, rfc-editor@rfc-editor.org wrote:
>
>> A new Request for Comments is now available in online RFC libraries.
>>
>>                   RFC 8300
>>
>>          Title:      Network Service Header (NSH)
>>          Author:     P. Quinn, Ed.,
>>                      U. Elzur, Ed.,
>>                      C. Pignataro, Ed.
>>          Status:     Standards Track
>>          Stream:     IETF
>>          Date:       January 2018
>>          Mailbox:    paulq@cisco.com,
>>                      uri.elzur@intel.com,
>>                      cpignata@cisco.com
>>          Pages:      40
>>          Characters: 93675
>>          Updates/Obsoletes/SeeAlso:   None
>>
>>          I-D Tag:    draft-ietf-sfc-nsh-28.txt
>>
>>          URL:        https://www.rfc-editor.org/info/rfc8300
>>
>>          DOI:        10.17487/RFC8300
>>
>> This document describes a Network Service Header (NSH) imposed on
>> packets or frames to realize Service Function Paths (SFPs).  The NSH
>> also provides a mechanism for metadata exchange along the
>> instantiated service paths.  The NSH is the Service Function Chaining
>> (SFC) encapsulation required to support the SFC architecture (defined
>> in RFC 7665).
>>
>> This document is a product of the Service Function Chaining Working Group
>> of the IETF.
>>
>> This is now a Proposed Standard.
>>
>> STANDARDS TRACK: This document specifies an Internet Standards Track
>> protocol for the Internet community, and requests discussion and
>> suggestions
>> for improvements.  Please refer to the current edition of the Official
>> Internet Protocol Standards (https://www.rfc-editor.org/standards) for
>> the
>> standardization state and status of this protocol.  Distribution of this
>> memo is unlimited.
>>
>> This announcement is sent to the IETF-Announce and rfc-dist lists.
>> To subscribe or unsubscribe, see
>>    https://www.ietf.org/mailman/listinfo/ietf-announce
>>    https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist
>>
>> For searching the RFC series, see https://www.rfc-editor.org/search
>> For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk
>>
>> Requests for special distribution should be addressed to either the
>> author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless
>> specifically noted otherwise on the RFC itself, all RFCs are for
>> unlimited distribution.
>>
>>
>> The RFC Editor Team
>> Association Management Solutions, LLC
>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>>
>>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>

--089e082cc25481dfd10562e74132
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Congratulations to the WG, editors, and all who worked on =
getting this work done.<div>It is a major milestone and took a lot of work.=
</div><div><br></div><div>Thank you!</div><div>Alia</div></div><div class=
=3D"gmail_extra"><br><div class=3D"gmail_quote">On Fri, Jan 12, 2018 at 7:2=
3 PM, Joel M. Halpern <span dir=3D"ltr">&lt;<a href=3D"mailto:jmh@joelhalpe=
rn.com" target=3D"_blank">jmh@joelhalpern.com</a>&gt;</span> wrote:<br><blo=
ckquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #c=
cc solid;padding-left:1ex">Congratulations and thanks to the working group =
and authors.<br>
<br>
Yours,<br>
Joel<div><div class=3D"h5"><br>
<br>
On 1/12/18 5:53 PM, <a href=3D"mailto:rfc-editor@rfc-editor.org" target=3D"=
_blank">rfc-editor@rfc-editor.org</a> wrote:<br>
</div></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bo=
rder-left:1px #ccc solid;padding-left:1ex"><div><div class=3D"h5">
A new Request for Comments is now available in online RFC libraries.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 RFC 8300<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Title:=C2=A0 =C2=A0 =C2=A0 Network Servic=
e Header (NSH)<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Author:=C2=A0 =C2=A0 =C2=A0P. Quinn, Ed.,=
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0U. Elzur, Ed.,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0C. Pignataro, Ed.<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Status:=C2=A0 =C2=A0 =C2=A0Standards Trac=
k<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Stream:=C2=A0 =C2=A0 =C2=A0IETF<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Date:=C2=A0 =C2=A0 =C2=A0 =C2=A0January 2=
018<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Mailbox:=C2=A0 =C2=A0 <a href=3D"mailto:p=
aulq@cisco.com" target=3D"_blank">paulq@cisco.com</a>,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0<a href=3D"mailto:uri.elzur@intel.com" target=3D"_blank">uri.elzur@intel=
.com</a>,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0<a href=3D"mailto:cpignata@cisco.com" target=3D"_blank">cpignata@cisco.c=
om</a><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Pages:=C2=A0 =C2=A0 =C2=A0 40<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Characters: 93675<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Updates/Obsoletes/SeeAlso:=C2=A0 =C2=A0No=
ne<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0I-D Tag:=C2=A0 =C2=A0 draft-ietf-sfc-nsh-=
28.txt<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0URL:=C2=A0 =C2=A0 =C2=A0 =C2=A0 <a href=
=3D"https://www.rfc-editor.org/info/rfc8300" rel=3D"noreferrer" target=3D"_=
blank">https://www.rfc-editor.org/inf<wbr>o/rfc8300</a><br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0DOI:=C2=A0 =C2=A0 =C2=A0 =C2=A0 10.17487/=
RFC8300<br>
<br>
This document describes a Network Service Header (NSH) imposed on<br>
packets or frames to realize Service Function Paths (SFPs).=C2=A0 The NSH<b=
r>
also provides a mechanism for metadata exchange along the<br>
instantiated service paths.=C2=A0 The NSH is the Service Function Chaining<=
br>
(SFC) encapsulation required to support the SFC architecture (defined<br>
in RFC 7665).<br>
<br>
This document is a product of the Service Function Chaining Working Group o=
f the IETF.<br>
<br>
This is now a Proposed Standard.<br>
<br>
STANDARDS TRACK: This document specifies an Internet Standards Track<br>
protocol for the Internet community, and requests discussion and suggestion=
s<br>
for improvements.=C2=A0 Please refer to the current edition of the Official=
<br>
Internet Protocol Standards (<a href=3D"https://www.rfc-editor.org/standard=
s" rel=3D"noreferrer" target=3D"_blank">https://www.rfc-editor.org/st<wbr>a=
ndards</a>) for the<br>
standardization state and status of this protocol.=C2=A0 Distribution of th=
is<br>
memo is unlimited.<br>
<br>
This announcement is sent to the IETF-Announce and rfc-dist lists.<br>
To subscribe or unsubscribe, see<br>
=C2=A0 =C2=A0<a href=3D"https://www.ietf.org/mailman/listinfo/ietf-announce=
" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/mailman/<wbr>li=
stinfo/ietf-announce</a><br>
=C2=A0 =C2=A0<a href=3D"https://mailman.rfc-editor.org/mailman/listinfo/rfc=
-dist" rel=3D"noreferrer" target=3D"_blank">https://mailman.rfc-editor.or<w=
br>g/mailman/listinfo/rfc-dist</a><br>
<br>
For searching the RFC series, see <a href=3D"https://www.rfc-editor.org/sea=
rch" rel=3D"noreferrer" target=3D"_blank">https://www.rfc-editor.org/sea<wb=
r>rch</a><br>
For downloading RFCs, see <a href=3D"https://www.rfc-editor.org/retrieve/bu=
lk" rel=3D"noreferrer" target=3D"_blank">https://www.rfc-editor.org/ret<wbr=
>rieve/bulk</a><br>
<br>
Requests for special distribution should be addressed to either the<br>
author of the RFC in question, or to <a href=3D"mailto:rfc-editor@rfc-edito=
r.org" target=3D"_blank">rfc-editor@rfc-editor.org</a>.=C2=A0 Unless<br>
specifically noted otherwise on the RFC itself, all RFCs are for<br>
unlimited distribution.<br>
<br>
<br>
The RFC Editor Team<br>
Association Management Solutions, LLC<br>
<br>
<br></div></div>
______________________________<wbr>_________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/sfc</a><br>
<br>
</blockquote>
<br>
______________________________<wbr>_________________<br>
sfc mailing list<br>
<a href=3D"mailto:sfc@ietf.org" target=3D"_blank">sfc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sfc" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/sfc</a><br>
</blockquote></div><br></div>

--089e082cc25481dfd10562e74132--


From nobody Wed Jan 17 11:40:06 2018
Return-Path: <akatlas@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B759212E877; Wed, 17 Jan 2018 11:40:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iu5rOa1bWQsJ; Wed, 17 Jan 2018 11:40:04 -0800 (PST)
Received: from mail-ot0-x22b.google.com (mail-ot0-x22b.google.com [IPv6:2607:f8b0:4003:c0f::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 75CCE12946D; Wed, 17 Jan 2018 11:40:04 -0800 (PST)
Received: by mail-ot0-x22b.google.com with SMTP id t35so11222239otd.13; Wed, 17 Jan 2018 11:40:04 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=qefqwM+cK1SxHhm3+0UqE0aJ4pBqjjHA4bHtaDMsYsQ=; b=Li0dpveeN4ixYxgMCGxvWXM7MXRbWU1826zPO0d6Fy2iqqpcyTGfqAIlE+WzcOTVAM 7YXHjyszIg+M30jUOFS33OYihr5nlpqtTyqEj/AQ1akvZSX/+xGaVM8kywoTrBlUNYAK 6/WlhrSTbHAYPsSievivTuTyEkKi2pdiu6yJS30h3qnzYfu6iuXboS9gc/XUpgcPBQGo iQ9bkHrHlWnMKgNrhgAVYz0NVcJYuW0J2atx+lN6f5ZxmW4Rel6ztArK/WJfAOg09uZL oOqwAEXgDvjTHeUzqs3j7TD8RxdXlBbBjy665qwVujrhN5k354nl9G2FsF4WGCLBzZD0 Zs1g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=qefqwM+cK1SxHhm3+0UqE0aJ4pBqjjHA4bHtaDMsYsQ=; b=hqIxifx0CDLLaq7tZPkZZjWHQAyX9l3fyQp3PzCH7eWF2Lj3VfSCRXwkoN3DNVGudZ iaXNuk4BUhq0hpdZEHPcK333Kt+epMW0qv5fz6mGbLr7NAtXGqlOsoVeHpSoUsLuZMm/ vZHyv2SAt9Bhq9aN8pn7Iye9Oesgx2M0wlv3WRbZBWM0ZAYBafQK4HBBGRNpNoHnZvD9 5bY6jQrp/T0VFGdeyNkfH3OyMAMaOtzuIzsFiFWyclCBlYJhrJ9PErXKtW3N9dRSMMvp NAzjObDa48OG3CbVueNuuyteiyHxNuBqjjd8+Ibus4KoBxUvG2jUOMX29vPwWGcTL4En EN+w==
X-Gm-Message-State: AKwxytfB6vxc6gIasgoWeJ34MKpDNMkihHSZgF5o6kT+Aa5PtkogcEEO FS+zvIjgSJgWO//BrYvxqDEv0WDlahp0yUbmAvOYIA==
X-Google-Smtp-Source: ACJfBouuPRZMEoNDl8A1/4iAefJeCbcWIhzD+J7sWPL7+u+3X3WMiVIahP1QikOhVTFDzmkeMR7kx/kv+CDHmCd+2o4=
X-Received: by 10.157.45.71 with SMTP id v65mr1993332ota.161.1516218003115; Wed, 17 Jan 2018 11:40:03 -0800 (PST)
MIME-Version: 1.0
Received: by 10.157.67.47 with HTTP; Wed, 17 Jan 2018 11:40:02 -0800 (PST)
From: Alia Atlas <akatlas@gmail.com>
Date: Wed, 17 Jan 2018 14:40:02 -0500
Message-ID: <CAG4d1rcBrRYJLgKKXXsZKOjw4UxyTDW_iA2X19EXBnVP-YUvaQ@mail.gmail.com>
To: Service Function Chaining IETF list <sfc@ietf.org>, draft-farrel-sfc-convent@ietf.org
Content-Type: multipart/alternative; boundary="001a113d04667a55360562fe0319"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/iaqnkbDhafif68KPBs4I_v88lRk>
Subject: [sfc] AD review of draft-farrel-sfc-convent-05
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Jan 2018 19:40:06 -0000

--001a113d04667a55360562fe0319
Content-Type: text/plain; charset="UTF-8"

As is customary, I have done my AD review of draft-farrel-sfc-convent-05.
First, I would like to thank the authors - Adrian and John - as well as
those who reviewed this document.

At this time, I do not have specific comments from my review.  I have
requested IETF Last Call and scheduled this for the IESG telechat on
Febuary 8.

Regards,
Alia

--001a113d04667a55360562fe0319
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">As is customary, I have done my AD review of draft-farrel-=
sfc-convent-05.=C2=A0 First, I would like to thank the authors - Adrian and=
 John - as well as those who reviewed this document.<div><br></div><div>At =
this time, I do not have specific comments from my review.=C2=A0 I have req=
uested IETF Last Call and scheduled this for the IESG telechat on Febuary 8=
.</div><div><br></div><div>Regards,</div><div>Alia</div></div>

--001a113d04667a55360562fe0319--


From nobody Wed Jan 17 13:35:14 2018
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 186DE126C19; Wed, 17 Jan 2018 13:34:59 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: "IETF-Announce" <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.69.0
Auto-Submitted: auto-generated
Precedence: bulk
CC: draft-farrel-sfc-convent@ietf.org, sfc-chairs@ietf.org, sfc@ietf.org, akatlas@gmail.com, Tal Mizrahi <tal.mizrahi.phd@gmail.com>, tal.mizrahi.phd@gmail.com
Reply-To: ietf@ietf.org
Sender: <iesg-secretary@ietf.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Message-ID: <151622489907.21649.16185191879478422147.idtracker@ietfa.amsl.com>
Date: Wed, 17 Jan 2018 13:34:59 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/VRNdQ4vNAWh5HtrVDphnscKJ_68>
Subject: [sfc] Last Call: <draft-farrel-sfc-convent-05.txt> (Operating the Network Service Header (NSH) with Next Protocol "None") to Proposed Standard
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Jan 2018 21:35:13 -0000

The IESG has received a request from the Service Function Chaining WG (sfc)
to consider the following document: - 'Operating the Network Service Header
(NSH) with Next Protocol "None"'
  <draft-farrel-sfc-convent-05.txt> as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2018-01-31. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   This document describes the use of the Network Service Header (NSH)
   in a Service Function Chaining (SFC) enabled network with no payload
   data and carrying only metadata.  This is achieved by defining a new
   NSH "Next Protocol" type value of "None".

   This document illustrates some of the functions that may be achieved
   or enhanced by this mechanism, but it does not provide an exhaustive
   list of use cases, nor is it intended to be definitive about the
   functions it describes.  It is expected that other documents will
   describe specific use cases in more detail and will define the
   protocol mechanics for each use case.





The file can be obtained via
https://datatracker.ietf.org/doc/draft-farrel-sfc-convent/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-farrel-sfc-convent/ballot/


No IPR declarations have been submitted directly on this I-D.





From nobody Thu Jan 18 06:38:57 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A107127137; Thu, 18 Jan 2018 06:38:47 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: sfc@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.69.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151628632731.2391.4142886289816504590@ietfa.amsl.com>
Date: Thu, 18 Jan 2018 06:38:47 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/-dJsdejx3YPzkW1aC06zeQbx5dE>
Subject: [sfc] I-D Action: draft-ietf-sfc-hierarchical-06.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Jan 2018 14:38:47 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Service Function Chaining WG of the IETF.

        Title           : Hierarchical Service Function Chaining (hSFC)
        Authors         : David Dolson
                          Shunsuke Homma
                          Diego R. Lopez
                          Mohamed Boucadair
	Filename        : draft-ietf-sfc-hierarchical-06.txt
	Pages           : 26
	Date            : 2018-01-18

Abstract:
   Hierarchical Service Function Chaining (hSFC) is a network
   architecture allowing an organization to decompose a large-scale
   network into multiple domains of administration.

   The goals of hSFC are to make a large-scale network easier to reason
   about, simpler to control and to support independent functional
   groups within large network operators.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sfc-hierarchical/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sfc-hierarchical-06
https://datatracker.ietf.org/doc/html/draft-ietf-sfc-hierarchical-06

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-hierarchical-06


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu Jan 18 06:40:42 2018
Return-Path: <ddolson@sandvine.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 23F9112711D for <sfc@ietfa.amsl.com>; Thu, 18 Jan 2018 06:40:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.931
X-Spam-Level: 
X-Spam-Status: No, score=-1.931 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xqa417tUHVu1 for <sfc@ietfa.amsl.com>; Thu, 18 Jan 2018 06:40:39 -0800 (PST)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B2F26127023 for <sfc@ietf.org>; Thu, 18 Jan 2018 06:40:38 -0800 (PST)
Received: from WTL-EXCHSV1-1.sandvine.com (192.168.196.60) by WTL-EXCHSV2-1.sandvine.com (192.168.194.58) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1034.26; Thu, 18 Jan 2018 09:40:37 -0500
Received: from WTL-EXCHSV2-1.sandvine.com (192.168.194.58) by WTL-EXCHSV1-1.sandvine.com (192.168.196.60) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1034.26; Thu, 18 Jan 2018 09:40:37 -0500
Received: from WTL-EXCHSV2-1.sandvine.com ([fe80::759d:603d:352d:2692]) by WTL-EXCHSV2-1.sandvine.com ([fe80::759d:603d:352d:2692%19]) with mapi id 15.01.1034.026; Thu, 18 Jan 2018 09:40:37 -0500
From: Dave Dolson <ddolson@sandvine.com>
To: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] I-D Action: draft-ietf-sfc-hierarchical-06.txt
Thread-Index: AQHTkGoWwiGIvHqvJ0yGRCVwCazct6N5s3jA
Date: Thu, 18 Jan 2018 14:40:36 +0000
Message-ID: <cc677b0b91424533af09b06dc26104e1@sandvine.com>
References: <151628632731.2391.4142886289816504590@ietfa.amsl.com>
In-Reply-To: <151628632731.2391.4142886289816504590@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.200.114]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/sYXjsUfBHW0JUKhVlsE_Mj-Sd54>
Subject: Re: [sfc] I-D Action: draft-ietf-sfc-hierarchical-06.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Jan 2018 14:40:40 -0000

This version addresses comments received during WG last-call.
We believe we have addressed all comments.

-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of internet-drafts@ietf.o=
rg
Sent: Thursday, January 18, 2018 9:39 AM
To: i-d-announce@ietf.org
Cc: sfc@ietf.org
Subject: [sfc] I-D Action: draft-ietf-sfc-hierarchical-06.txt


A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
This draft is a work item of the Service Function Chaining WG of the IETF.

        Title           : Hierarchical Service Function Chaining (hSFC)
        Authors         : David Dolson
                          Shunsuke Homma
                          Diego R. Lopez
                          Mohamed Boucadair
	Filename        : draft-ietf-sfc-hierarchical-06.txt
	Pages           : 26
	Date            : 2018-01-18

Abstract:
   Hierarchical Service Function Chaining (hSFC) is a network
   architecture allowing an organization to decompose a large-scale
   network into multiple domains of administration.

   The goals of hSFC are to make a large-scale network easier to reason
   about, simpler to control and to support independent functional
   groups within large network operators.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sfc-hierarchical/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sfc-hierarchical-06
https://datatracker.ietf.org/doc/html/draft-ietf-sfc-hierarchical-06

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sfc-hierarchical-06


Please note that it may take a couple of minutes from the time of submissio=
n until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc


From nobody Thu Jan 18 09:53:36 2018
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C719312D779 for <sfc@ietfa.amsl.com>; Thu, 18 Jan 2018 09:53:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.721
X-Spam-Level: 
X-Spam-Status: No, score=-2.721 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QoB4-6Gs4Du1 for <sfc@ietfa.amsl.com>; Thu, 18 Jan 2018 09:53:34 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2AB1C12D0C3 for <sfc@ietf.org>; Thu, 18 Jan 2018 09:53:34 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 0B5B68E02EB for <sfc@ietf.org>; Thu, 18 Jan 2018 09:53:34 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1516298014; bh=vq/eNzbmHxS98/Ku6iGgcDt7uzTPu8EImy1DvFRVS6Q=; h=Subject:To:References:From:Date:In-Reply-To:From; b=q010aAY+hFLn88rmti7enWBDKAfr69J7Jlx+dRTqArl6QwuDHjsYNcWOEfSeX6KRO lldjpoPIHFfn/pp5j0SB9SG7NEe8L5vZSB7utqRWZX25byi8NfgDmWjub/VbVjfS/P Sh/49Di3SDBpbx9tLA0L4JyJZ4Y46MNWTysShlhQ=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (unknown [50.225.209.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id A3CC71C01D4 for <sfc@ietf.org>; Thu, 18 Jan 2018 09:53:33 -0800 (PST)
To: "sfc@ietf.org" <sfc@ietf.org>
References: <151628632731.2391.4142886289816504590@ietfa.amsl.com> <cc677b0b91424533af09b06dc26104e1@sandvine.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <9287c108-561b-1ba1-0b74-1bc9ce1e0cb3@joelhalpern.com>
Date: Thu, 18 Jan 2018 12:53:32 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <cc677b0b91424533af09b06dc26104e1@sandvine.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/s3H2UaRTtWB4wyeYpnZe16yH3cQ>
Subject: Re: [sfc] I-D Action: draft-ietf-sfc-hierarchical-06.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Jan 2018 17:53:36 -0000

Thank you Dave.

While there was not as much support as we would have liked, there chairs 
have concluded that there is sufficient support to request RFC 
publication of this document.

We would like to ask for a volunteer to shepherd it.  This would be a 
non-author who is willing to help us with the process.  We will provide 
assistance, etc.  (Tal just did the Convent document, so we are looking 
for a WG member this time.)

Yours,
Joel (& Jim)


On 1/18/18 9:40 AM, Dave Dolson wrote:
> This version addresses comments received during WG last-call.
> We believe we have addressed all comments.
> 
> -----Original Message-----
> From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of internet-drafts@ietf.org
> Sent: Thursday, January 18, 2018 9:39 AM
> To: i-d-announce@ietf.org
> Cc: sfc@ietf.org
> Subject: [sfc] I-D Action: draft-ietf-sfc-hierarchical-06.txt
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the Service Function Chaining WG of the IETF.
> 
>          Title           : Hierarchical Service Function Chaining (hSFC)
>          Authors         : David Dolson
>                            Shunsuke Homma
>                            Diego R. Lopez
>                            Mohamed Boucadair
> 	Filename        : draft-ietf-sfc-hierarchical-06.txt
> 	Pages           : 26
> 	Date            : 2018-01-18
> 
> Abstract:
>     Hierarchical Service Function Chaining (hSFC) is a network
>     architecture allowing an organization to decompose a large-scale
>     network into multiple domains of administration.
> 
>     The goals of hSFC are to make a large-scale network easier to reason
>     about, simpler to control and to support independent functional
>     groups within large network operators.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sfc-hierarchical/
> 
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-sfc-hierarchical-06
> https://datatracker.ietf.org/doc/html/draft-ietf-sfc-hierarchical-06
> 
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-hierarchical-06
> 
> 
> Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
> 
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
> 


From nobody Thu Jan 18 16:25:57 2018
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4496E12D82E for <sfc@ietfa.amsl.com>; Thu, 18 Jan 2018 16:25:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.509
X-Spam-Level: 
X-Spam-Status: No, score=-14.509 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gyMQLra25Eji for <sfc@ietfa.amsl.com>; Thu, 18 Jan 2018 16:25:46 -0800 (PST)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AFD5712D775 for <sfc@ietf.org>; Thu, 18 Jan 2018 16:25:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5610; q=dns/txt; s=iport; t=1516321537; x=1517531137; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=i6yl4KS5asF1qPvI37Fk2ScFpm13byXD6zt5S00ZQwo=; b=arz6au5c0ugIU+vG1qKJW0IUsavvVNLx980RHzZ1mYcgWWepridsabY1 hCF2wgHoJmRjq5T7dCiSLVtudYhxOeKjbQ9XoxzsGSVnjm7GRHPK/SQhQ pP/CgR5TV34LTfXFvuDIyrO9bM+9eDmPlhsQq6+I9VC/vGpGJPdJmS+o+ M=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DfAADBOWFa/4MNJK1eGQEBAQEBAQEBA?= =?us-ascii?q?QEBAQcBAQEBAYNCZnQnB4NWiiSOYYFbkgaFUoIWChgBCoUYAhqERD8YAQEBAQE?= =?us-ascii?q?BAQEBayiFJAIEAQEhSwsQAgEIBDsDAgICJQsUEQIEDgWJT2QQq1+CJ4ouAQEBA?= =?us-ascii?q?QEBAQEBAQEBAQEBAQEBAQEBGAWEPIIVgVeCEQyCeYMvAQECAYUFMYI0BaNvAog?= =?us-ascii?q?NjUeCGYYei16NSolDAhEZAYE7AR85gVBvFT0qAYF/hFd4i2OBFwEBAQ?=
X-IronPort-AV: E=Sophos;i="5.46,379,1511827200";  d="scan'208,217";a="346267029"
Received: from alln-core-1.cisco.com ([173.36.13.131]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Jan 2018 00:25:36 +0000
Received: from XCH-RTP-020.cisco.com (xch-rtp-020.cisco.com [64.101.220.160]) by alln-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id w0J0PZR0010894 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 19 Jan 2018 00:25:36 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-020.cisco.com (64.101.220.160) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Thu, 18 Jan 2018 19:25:35 -0500
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1320.000; Thu, 18 Jan 2018 19:25:35 -0500
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
CC: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG Last Call : draft-ietf-sfc-hierarchical
Thread-Index: AQHTkLwFfNXVIguLYEe2cQ9hY4dZcQ==
Date: Fri, 19 Jan 2018 00:25:35 +0000
Message-ID: <0DD125EF-390D-45C6-8740-EA4E7EC2E07B@cisco.com>
References: <e31a82d9-3eef-f56c-c0b0-83f112e7f2a3@joelhalpern.com>
In-Reply-To: <e31a82d9-3eef-f56c-c0b0-83f112e7f2a3@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.70.235.240]
Content-Type: multipart/alternative; boundary="_000_0DD125EF390D45C68740EA4E7EC2E07Bciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/70tT-JpKM6hQYGB6oFV6axYhN8I>
Subject: Re: [sfc] WG Last Call : draft-ietf-sfc-hierarchical
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Jan 2018 00:25:56 -0000

--_000_0DD125EF390D45C68740EA4E7EC2E07Bciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_0DD125EF390D45C68740EA4E7EC2E07Bciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <8414A3565E78EA4A872B38CAC38A043C@emea.cisco.com>
Content-Transfer-Encoding: base64
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--_000_0DD125EF390D45C68740EA4E7EC2E07Bciscocom_--


From nobody Thu Jan 18 16:26:52 2018
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0269912D82E for <sfc@ietfa.amsl.com>; Thu, 18 Jan 2018 16:26:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.509
X-Spam-Level: 
X-Spam-Status: No, score=-14.509 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cHO1sLmbcrvy for <sfc@ietfa.amsl.com>; Thu, 18 Jan 2018 16:26:48 -0800 (PST)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C109612D775 for <sfc@ietf.org>; Thu, 18 Jan 2018 16:26:47 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=13456; q=dns/txt; s=iport; t=1516321607; x=1517531207; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=aRn4iMJyuolhIUVMSiQMiQQPXKBUvfXX9SpbCBWtZuo=; b=mZYHgizR9BbGrPWcbjZIT/7LWb+wLxsiAKyXkT/5Inv3+epESyObOPHI FqGgDqtO5BVzztv7FzFZOrD5eQLVhD5Ei63YoTM7CBXd6/PV/lFAN6Whs 40Csc5RPj3Ptb2DGwoFRXG401eqQ7x1KNau3S03hswNkJUnvpFhnKR6Eo U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DNAAD8OmFa/40NJK1eGQEBAQEBAQEBA?= =?us-ascii?q?QEBAQcBAQEBAYNCZnQnB4NWiiSOYYICkV+FUoIWChgBCoUYAhqERD8YAQEBAQE?= =?us-ascii?q?BAQEBayiFIwEBAQQBASFLCwwEAgEIEQEDAQEoAwICAiULFAMGCAIEDgWJT2QQq?= =?us-ascii?q?0WCJ4ouAQEBAQEBAQEBAQEBAQEBAQEBAQEBHYQ8ghWBV4IRgwWDLwEBAgEBF4I?= =?us-ascii?q?UglkxgjQFmXuJdAKIDY1HghlnhTeLXo1KiUMCERkBgTsBHzmBUG8VGSQqAYF/C?= =?us-ascii?q?YJLHIFneItjgRcBAQE?=
X-IronPort-AV: E=Sophos;i="5.46,379,1511827200";  d="scan'208,217";a="346267271"
Received: from alln-core-8.cisco.com ([173.36.13.141]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Jan 2018 00:26:25 +0000
Received: from XCH-RTP-020.cisco.com (xch-rtp-020.cisco.com [64.101.220.160]) by alln-core-8.cisco.com (8.14.5/8.14.5) with ESMTP id w0J0QOI0014299 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 19 Jan 2018 00:26:25 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-020.cisco.com (64.101.220.160) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Thu, 18 Jan 2018 19:26:24 -0500
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1320.000; Thu, 18 Jan 2018 19:26:24 -0500
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
CC: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] I-D Action: draft-ietf-sfc-hierarchical-06.txt
Thread-Index: AQHTkGoaWWBVy0imSESgh0R7N3xpe6N6B5cAgAA16ACAAG3AgA==
Date: Fri, 19 Jan 2018 00:26:24 +0000
Message-ID: <61AF5B2F-05B1-4C26-ABD0-5848AC3DF4A1@cisco.com>
References: <151628632731.2391.4142886289816504590@ietfa.amsl.com> <cc677b0b91424533af09b06dc26104e1@sandvine.com> <9287c108-561b-1ba1-0b74-1bc9ce1e0cb3@joelhalpern.com>
In-Reply-To: <9287c108-561b-1ba1-0b74-1bc9ce1e0cb3@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.70.235.240]
Content-Type: multipart/alternative; boundary="_000_61AF5B2F05B14C26ABD05848AC3DF4A1ciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/cVZSE_6LpidAICgbvFuyxjyrLuc>
Subject: Re: [sfc] I-D Action: draft-ietf-sfc-hierarchical-06.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Jan 2018 00:26:50 -0000

--_000_61AF5B2F05B14C26ABD05848AC3DF4A1ciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

Sm9lbCwNCg0KQXBvbG9naWVzIGZvciB0aGUgZGVsYXllZCBzdXBwb3J0Kysgb24gdGhpcy4NCg0K
4oCUDQpDYXJsb3MgUGlnbmF0YXJvLCBjYXJsb3NAY2lzY28uY29tPG1haWx0bzpjYXJsb3NAY2lz
Y28uY29tPg0KDQrigJxTb21ldGltZXMgSSB1c2UgYmlnIHdvcmRzIHRoYXQgSSBkbyBub3QgZnVs
bHkgdW5kZXJzdGFuZCwgdG8gbWFrZSBteXNlbGYgc291bmQgbW9yZSBwaG90b3N5bnRoZXNpcy4i
DQoNCk9uIEphbiAxOSwgMjAxOCwgYXQgMjo1MyBBTSwgSm9lbCBNLiBIYWxwZXJuIDxqbWhAam9l
bGhhbHBlcm4uY29tPG1haWx0bzpqbWhAam9lbGhhbHBlcm4uY29tPj4gd3JvdGU6DQoNClRoYW5r
IHlvdSBEYXZlLg0KDQpXaGlsZSB0aGVyZSB3YXMgbm90IGFzIG11Y2ggc3VwcG9ydCBhcyB3ZSB3
b3VsZCBoYXZlIGxpa2VkLCB0aGVyZSBjaGFpcnMgaGF2ZSBjb25jbHVkZWQgdGhhdCB0aGVyZSBp
cyBzdWZmaWNpZW50IHN1cHBvcnQgdG8gcmVxdWVzdCBSRkMgcHVibGljYXRpb24gb2YgdGhpcyBk
b2N1bWVudC4NCg0KV2Ugd291bGQgbGlrZSB0byBhc2sgZm9yIGEgdm9sdW50ZWVyIHRvIHNoZXBo
ZXJkIGl0LiAgVGhpcyB3b3VsZCBiZSBhIG5vbi1hdXRob3Igd2hvIGlzIHdpbGxpbmcgdG8gaGVs
cCB1cyB3aXRoIHRoZSBwcm9jZXNzLiAgV2Ugd2lsbCBwcm92aWRlIGFzc2lzdGFuY2UsIGV0Yy4g
IChUYWwganVzdCBkaWQgdGhlIENvbnZlbnQgZG9jdW1lbnQsIHNvIHdlIGFyZSBsb29raW5nIGZv
ciBhIFdHIG1lbWJlciB0aGlzIHRpbWUuKQ0KDQpZb3VycywNCkpvZWwgKCYgSmltKQ0KDQoNCk9u
IDEvMTgvMTggOTo0MCBBTSwgRGF2ZSBEb2xzb24gd3JvdGU6DQpUaGlzIHZlcnNpb24gYWRkcmVz
c2VzIGNvbW1lbnRzIHJlY2VpdmVkIGR1cmluZyBXRyBsYXN0LWNhbGwuDQpXZSBiZWxpZXZlIHdl
IGhhdmUgYWRkcmVzc2VkIGFsbCBjb21tZW50cy4NCi0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0t
DQpGcm9tOiBzZmMgW21haWx0bzpzZmMtYm91bmNlc0BpZXRmLm9yZ10gT24gQmVoYWxmIE9mIGlu
dGVybmV0LWRyYWZ0c0BpZXRmLm9yZzxtYWlsdG86aW50ZXJuZXQtZHJhZnRzQGlldGYub3JnPg0K
U2VudDogVGh1cnNkYXksIEphbnVhcnkgMTgsIDIwMTggOTozOSBBTQ0KVG86IGktZC1hbm5vdW5j
ZUBpZXRmLm9yZzxtYWlsdG86aS1kLWFubm91bmNlQGlldGYub3JnPg0KQ2M6IHNmY0BpZXRmLm9y
ZzxtYWlsdG86c2ZjQGlldGYub3JnPg0KU3ViamVjdDogW3NmY10gSS1EIEFjdGlvbjogZHJhZnQt
aWV0Zi1zZmMtaGllcmFyY2hpY2FsLTA2LnR4dA0KQSBOZXcgSW50ZXJuZXQtRHJhZnQgaXMgYXZh
aWxhYmxlIGZyb20gdGhlIG9uLWxpbmUgSW50ZXJuZXQtRHJhZnRzIGRpcmVjdG9yaWVzLg0KVGhp
cyBkcmFmdCBpcyBhIHdvcmsgaXRlbSBvZiB0aGUgU2VydmljZSBGdW5jdGlvbiBDaGFpbmluZyBX
RyBvZiB0aGUgSUVURi4NCiAgICAgICAgVGl0bGUgICAgICAgICAgIDogSGllcmFyY2hpY2FsIFNl
cnZpY2UgRnVuY3Rpb24gQ2hhaW5pbmcgKGhTRkMpDQogICAgICAgIEF1dGhvcnMgICAgICAgICA6
IERhdmlkIERvbHNvbg0KICAgICAgICAgICAgICAgICAgICAgICAgICBTaHVuc3VrZSBIb21tYQ0K
ICAgICAgICAgICAgICAgICAgICAgICAgICBEaWVnbyBSLiBMb3Bleg0KICAgICAgICAgICAgICAg
ICAgICAgICAgICBNb2hhbWVkIEJvdWNhZGFpcg0KRmlsZW5hbWUgICAgICAgIDogZHJhZnQtaWV0
Zi1zZmMtaGllcmFyY2hpY2FsLTA2LnR4dA0KUGFnZXMgICAgICAgICAgIDogMjYNCkRhdGUgICAg
ICAgICAgICA6IDIwMTgtMDEtMTgNCkFic3RyYWN0Og0KICAgSGllcmFyY2hpY2FsIFNlcnZpY2Ug
RnVuY3Rpb24gQ2hhaW5pbmcgKGhTRkMpIGlzIGEgbmV0d29yaw0KICAgYXJjaGl0ZWN0dXJlIGFs
bG93aW5nIGFuIG9yZ2FuaXphdGlvbiB0byBkZWNvbXBvc2UgYSBsYXJnZS1zY2FsZQ0KICAgbmV0
d29yayBpbnRvIG11bHRpcGxlIGRvbWFpbnMgb2YgYWRtaW5pc3RyYXRpb24uDQogICBUaGUgZ29h
bHMgb2YgaFNGQyBhcmUgdG8gbWFrZSBhIGxhcmdlLXNjYWxlIG5ldHdvcmsgZWFzaWVyIHRvIHJl
YXNvbg0KICAgYWJvdXQsIHNpbXBsZXIgdG8gY29udHJvbCBhbmQgdG8gc3VwcG9ydCBpbmRlcGVu
ZGVudCBmdW5jdGlvbmFsDQogICBncm91cHMgd2l0aGluIGxhcmdlIG5ldHdvcmsgb3BlcmF0b3Jz
Lg0KVGhlIElFVEYgZGF0YXRyYWNrZXIgc3RhdHVzIHBhZ2UgZm9yIHRoaXMgZHJhZnQgaXM6DQpo
dHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9kcmFmdC1pZXRmLXNmYy1oaWVyYXJjaGlj
YWwvDQpUaGVyZSBhcmUgYWxzbyBodG1saXplZCB2ZXJzaW9ucyBhdmFpbGFibGUgYXQ6DQpodHRw
czovL3Rvb2xzLmlldGYub3JnL2h0bWwvZHJhZnQtaWV0Zi1zZmMtaGllcmFyY2hpY2FsLTA2DQpo
dHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWlldGYtc2ZjLWhpZXJh
cmNoaWNhbC0wNg0KQSBkaWZmIGZyb20gdGhlIHByZXZpb3VzIHZlcnNpb24gaXMgYXZhaWxhYmxl
IGF0Og0KaHR0cHM6Ly93d3cuaWV0Zi5vcmcvcmZjZGlmZj91cmwyPWRyYWZ0LWlldGYtc2ZjLWhp
ZXJhcmNoaWNhbC0wNg0KUGxlYXNlIG5vdGUgdGhhdCBpdCBtYXkgdGFrZSBhIGNvdXBsZSBvZiBt
aW51dGVzIGZyb20gdGhlIHRpbWUgb2Ygc3VibWlzc2lvbiB1bnRpbCB0aGUgaHRtbGl6ZWQgdmVy
c2lvbiBhbmQgZGlmZiBhcmUgYXZhaWxhYmxlIGF0IHRvb2xzLmlldGYub3JnLg0KSW50ZXJuZXQt
RHJhZnRzIGFyZSBhbHNvIGF2YWlsYWJsZSBieSBhbm9ueW1vdXMgRlRQIGF0Og0KZnRwOi8vZnRw
LmlldGYub3JnL2ludGVybmV0LWRyYWZ0cy8NCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fDQpzZmMgbWFpbGluZyBsaXN0DQpzZmNAaWV0Zi5vcmcNCmh0dHBz
Oi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2ZjDQpfX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fXw0Kc2ZjIG1haWxpbmcgbGlzdA0Kc2ZjQGlldGYu
b3JnDQpodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL3NmYw0KDQpfX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0Kc2ZjIG1haWxpbmcgbGlz
dA0Kc2ZjQGlldGYub3JnPG1haWx0bzpzZmNAaWV0Zi5vcmc+DQpodHRwczovL3d3dy5pZXRmLm9y
Zy9tYWlsbWFuL2xpc3RpbmZvL3NmYw0KDQo=

--_000_61AF5B2F05B14C26ABD05848AC3DF4A1ciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <91BD6AA95FA85C4D9639A8D7BB24FB97@emea.cisco.com>
Content-Transfer-Encoding: base64
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--_000_61AF5B2F05B14C26ABD05848AC3DF4A1ciscocom_--


From nobody Sat Jan 20 22:57:58 2018
Return-Path: <session-request@ietf.org>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 07E5B126B6D; Sat, 20 Jan 2018 22:57:57 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IETF Meeting Session Request Tool <session-request@ietf.org>
To: <session-request@ietf.org>
Cc: tal.mizrahi.phd@gmail.com, sfc-chairs@ietf.org, sfc@ietf.org, akatlas@gmail.com
X-Test-IDTracker: no
X-IETF-IDTracker: 6.69.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151651787696.3113.18117694359904125513.idtracker@ietfa.amsl.com>
Date: Sat, 20 Jan 2018 22:57:56 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/H9rQrjJLpta0-Vn2JcVPa0SqT4E>
Subject: [sfc] sfc - New Meeting Session Request for IETF 101
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 21 Jan 2018 06:57:57 -0000

A new meeting session request has just been submitted by Tal Mizrahi, a Secretary of the sfc working group.


---------------------------------------------------------
Working Group Name: Service Function Chaining
Area Name: Routing Area
Session Requester: Tal Mizrahi

Number of Sessions: 1
Length of Session(s):  2 Hours
Number of Attendees: 150
Conflicts to Avoid: 
 First Priority:  bess idr i2nsf ippm mpls nvo3 rtgwg spring lisp




People who must be present:
  Joel M. Halpern
  Jim Guichard
  Alia Atlas

Resources Requested:

Special Requests:
  
---------------------------------------------------------


From nobody Tue Jan 23 19:48:14 2018
Return-Path: <ben@nostrum.com>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id D7A8C12D775; Tue, 23 Jan 2018 19:48:05 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Ben Campbell <ben@nostrum.com>
To: "The IESG" <iesg@ietf.org>
Cc: sfc-chairs@ietf.org, sfc@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.69.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151676568583.24088.676761041683551923.idtracker@ietfa.amsl.com>
Date: Tue, 23 Jan 2018 19:48:05 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/cVo8W1obyclyuqwtXDa64Cssnaw>
Subject: [sfc] Ben Campbell's No Record on charter-ietf-sfc-01-01: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jan 2018 03:48:06 -0000

Ben Campbell has entered the following ballot position for
charter-ietf-sfc-01-01: No Record

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)



The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/charter-ietf-sfc/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Would it be reasonable to add a focus on privacy considerations, either as part
of item 2), or as a separate top-level item?



From nobody Tue Jan 23 19:48:50 2018
Return-Path: <ben@nostrum.com>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 4117812D775; Tue, 23 Jan 2018 19:48:45 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Ben Campbell <ben@nostrum.com>
To: "The IESG" <iesg@ietf.org>
Cc: sfc-chairs@ietf.org, sfc@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.69.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151676572526.24197.7119110496137986501.idtracker@ietfa.amsl.com>
Date: Tue, 23 Jan 2018 19:48:45 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/uAUV7NW0pC4DqjR7cohJA5Zc2x4>
Subject: [sfc] Ben Campbell's No Objection on charter-ietf-sfc-01-01: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jan 2018 03:48:45 -0000

Ben Campbell has entered the following ballot position for
charter-ietf-sfc-01-01: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)



The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/charter-ietf-sfc/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Would it be reasonable to add a focus on privacy considerations, either as part
of item 2), or as a separate top-level item?



From nobody Tue Jan 23 20:08:56 2018
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C40412D952; Tue, 23 Jan 2018 20:08:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level: 
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cNPgFEMwecXt; Tue, 23 Jan 2018 20:08:47 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C790312D880; Tue, 23 Jan 2018 20:08:47 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id B0F31245B6D; Tue, 23 Jan 2018 20:08:47 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1516766927; bh=NnevG7N6RlyVhDsqHrISMSEAT9nSGNXlOI1j9eNPAkg=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=Z6/8EEhP/qcIF8Y1LkBequ89Z1HeVnQSo12S/heer/WxTCeV6GdxlvOinR3f7WoNI 1On1Fmm98pu3j9OqxX3W1fcXcKfHKr0scRRy0BqwfxXUM3S9UCIwBL42dNd2VlhOE2 6OZlbm9tm0BAsXz/fLf67RU3UjIpBfOJnL2ecxT0=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (unknown [50.225.209.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 0B133245B58; Tue, 23 Jan 2018 20:08:46 -0800 (PST)
To: Ben Campbell <ben@nostrum.com>, The IESG <iesg@ietf.org>
Cc: sfc@ietf.org
References: <151676568583.24088.676761041683551923.idtracker@ietfa.amsl.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <f5e010ab-9cd7-fe71-7368-27289528f429@joelhalpern.com>
Date: Tue, 23 Jan 2018 23:08:46 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <151676568583.24088.676761041683551923.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/pcUdIxOhX75uj6fP-xgVhFcMRL4>
Subject: Re: [sfc] Ben Campbell's No Record on charter-ietf-sfc-01-01: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jan 2018 04:08:49 -0000

Item 2 already includes confidentiality explicitly.
I do not think adding the word privacy would help us understand that 
there is something else to be covered.  If there is soemthing else, i am 
happy to add it (see it added, since this belongs to the IESG at this 
point).  But I think it would take more wording that just saying 
"privacy" in the list of security issues.

Yours,
Joel

On 1/23/18 10:48 PM, Ben Campbell wrote:
> Ben Campbell has entered the following ballot position for
> charter-ietf-sfc-01-01: No Record
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> 
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/charter-ietf-sfc/
> 
> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> Would it be reasonable to add a focus on privacy considerations, either as part
> of item 2), or as a separate top-level item?
> 
> 
> 


From nobody Tue Jan 23 20:41:09 2018
Return-Path: <ben@nostrum.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 71DDE12D959; Tue, 23 Jan 2018 20:41:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.89
X-Spam-Level: 
X-Spam-Status: No, score=-1.89 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01, T_SPF_HELO_PERMERROR=0.01, T_SPF_PERMERROR=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 824_jk0IwTtF; Tue, 23 Jan 2018 20:40:59 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B10E11275C5; Tue, 23 Jan 2018 20:40:59 -0800 (PST)
Received: from [10.0.1.105] (cpe-66-25-7-22.tx.res.rr.com [66.25.7.22]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id w0O4ew8R010916 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Tue, 23 Jan 2018 22:40:59 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-66-25-7-22.tx.res.rr.com [66.25.7.22] claimed to be [10.0.1.105]
From: Ben Campbell <ben@nostrum.com>
Message-Id: <C5334E19-6857-4880-973C-1471E7FCD598@nostrum.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_7D1AF5A3-340E-4E6E-88FF-0F5440C6CA08"; protocol="application/pgp-signature"; micalg=pgp-sha512
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
Date: Tue, 23 Jan 2018 22:40:57 -0600
In-Reply-To: <f5e010ab-9cd7-fe71-7368-27289528f429@joelhalpern.com>
Cc: The IESG <iesg@ietf.org>, sfc@ietf.org
To: "Joel M. Halpern" <jmh@joelhalpern.com>
References: <151676568583.24088.676761041683551923.idtracker@ietfa.amsl.com> <f5e010ab-9cd7-fe71-7368-27289528f429@joelhalpern.com>
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/_KzEm3TOIdQ9GAeZUyM6MMrKpmQ>
Subject: Re: [sfc] Ben Campbell's No Record on charter-ietf-sfc-01-01: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jan 2018 04:41:02 -0000

--Apple-Mail=_7D1AF5A3-340E-4E6E-88FF-0F5440C6CA08
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8


> On Jan 23, 2018, at 10:08 PM, Joel M. Halpern <jmh@joelhalpern.com> =
wrote:
>=20
> Item 2 already includes confidentiality explicitly.
> I do not think adding the word privacy would help us understand that =
there is something else to be covered.  If there is soemthing else, i am =
happy to add it (see it added, since this belongs to the IESG at this =
point).  But I think it would take more wording that just saying =
"privacy" in the list of security issues.

I see confidentiality as a necessary but not sufficient condition for =
privacy. For example, if a network function uses the service chaining =
header as a channel for the equivalent of header enrichment, it may =
create a privacy problem by passing metadata down the chain that the =
user may have preferred to keep private. The fact that the channel may =
have confidentiality protection doesn=E2=80=99t change that.

>=20
> Yours,
> Joel
>=20
> On 1/23/18 10:48 PM, Ben Campbell wrote:
>> Ben Campbell has entered the following ballot position for
>> charter-ietf-sfc-01-01: No Record
>> When responding, please keep the subject line intact and reply to all
>> email addresses included in the To and CC lines. (Feel free to cut =
this
>> introductory paragraph, however.)
>> The document, along with other ballot positions, can be found here:
>> https://datatracker.ietf.org/doc/charter-ietf-sfc/
>> =
----------------------------------------------------------------------
>> COMMENT:
>> =
----------------------------------------------------------------------
>> Would it be reasonable to add a focus on privacy considerations, =
either as part
>> of item 2), or as a separate top-level item?


--Apple-Mail=_7D1AF5A3-340E-4E6E-88FF-0F5440C6CA08
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org
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=TO5O
-----END PGP SIGNATURE-----

--Apple-Mail=_7D1AF5A3-340E-4E6E-88FF-0F5440C6CA08--


From nobody Wed Jan 24 05:19:54 2018
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C1E51241FC; Wed, 24 Jan 2018 05:19:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.721
X-Spam-Level: 
X-Spam-Status: No, score=-2.721 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C5edyZnnCU2n; Wed, 24 Jan 2018 05:19:51 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D08C4120721; Wed, 24 Jan 2018 05:19:51 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id B97FD6A08DD; Wed, 24 Jan 2018 05:19:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1516799991; bh=OKUKr6lCkaUmI/iVH9e1TKZT8FKFJSivb0s6gjNqJw0=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=Dxbgyd9EFXMcNuUmvr3BpEMrXHmlP+DNT1+D/K57szW4pRa+TpELfEGY59egmgJly vSnIAlY7zHYiimlN2SmzFm0IzSzWvtuL6hRYINARbMJdz8748ZM6LPx7sKPOseACgc WkdlAw/VBCsWhBJgBoWfeHkwEJ4dmOMjT0BdxDNM=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (unknown [50.225.209.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 1BBD71C0D7E; Wed, 24 Jan 2018 05:19:51 -0800 (PST)
To: Ben Campbell <ben@nostrum.com>
Cc: The IESG <iesg@ietf.org>, sfc@ietf.org
References: <151676568583.24088.676761041683551923.idtracker@ietfa.amsl.com> <f5e010ab-9cd7-fe71-7368-27289528f429@joelhalpern.com> <C5334E19-6857-4880-973C-1471E7FCD598@nostrum.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <0f4c7112-a37a-b40b-af13-55f7c885e925@joelhalpern.com>
Date: Wed, 24 Jan 2018 08:19:50 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <C5334E19-6857-4880-973C-1471E7FCD598@nostrum.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/lW0hl4G0dUnzDik1-AQegtlUbsQ>
Subject: Re: [sfc] Ben Campbell's No Record on charter-ietf-sfc-01-01: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jan 2018 13:19:53 -0000

Given that the operation of SFC is entirely within one domain, I do not 
see how a service function can create and pass down metadata "that the 
user would have preferred to keep private."  SFC is NOT for the operator 
to pass metdata to end services outside of their control.  As such, the 
metadata is carrying information the operator knows to that same operator.

Within the operator's domain, it is both ineffective and outside of our 
scope to attempt to define what metadata operators choose to put on packets.

So the quesiton again is what you would like to see covered in that 
point that will be useful in improving privacy.

Yours,
Joel

On 1/23/18 11:40 PM, Ben Campbell wrote:
> 
>> On Jan 23, 2018, at 10:08 PM, Joel M. Halpern <jmh@joelhalpern.com> wrote:
>>
>> Item 2 already includes confidentiality explicitly.
>> I do not think adding the word privacy would help us understand that there is something else to be covered.  If there is soemthing else, i am happy to add it (see it added, since this belongs to the IESG at this point).  But I think it would take more wording that just saying "privacy" in the list of security issues.
> 
> I see confidentiality as a necessary but not sufficient condition for privacy. For example, if a network function uses the service chaining header as a channel for the equivalent of header enrichment, it may create a privacy problem by passing metadata down the chain that the user may have preferred to keep private. The fact that the channel may have confidentiality protection doesn’t change that.
> 
>>
>> Yours,
>> Joel
>>
>> On 1/23/18 10:48 PM, Ben Campbell wrote:
>>> Ben Campbell has entered the following ballot position for
>>> charter-ietf-sfc-01-01: No Record
>>> When responding, please keep the subject line intact and reply to all
>>> email addresses included in the To and CC lines. (Feel free to cut this
>>> introductory paragraph, however.)
>>> The document, along with other ballot positions, can be found here:
>>> https://datatracker.ietf.org/doc/charter-ietf-sfc/
>>> ----------------------------------------------------------------------
>>> COMMENT:
>>> ----------------------------------------------------------------------
>>> Would it be reasonable to add a focus on privacy considerations, either as part
>>> of item 2), or as a separate top-level item?
> 


From nobody Wed Jan 24 07:50:00 2018
Return-Path: <ben@nostrum.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 03CB612DA4A; Wed, 24 Jan 2018 07:49:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.89
X-Spam-Level: 
X-Spam-Status: No, score=-1.89 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01, T_SPF_HELO_PERMERROR=0.01, T_SPF_PERMERROR=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BWpYRgibrlJW; Wed, 24 Jan 2018 07:49:50 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B5926126C26; Wed, 24 Jan 2018 07:49:50 -0800 (PST)
Received: from [10.0.1.105] (cpe-66-25-7-22.tx.res.rr.com [66.25.7.22]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id w0OFnnx0087398 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Wed, 24 Jan 2018 09:49:50 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-66-25-7-22.tx.res.rr.com [66.25.7.22] claimed to be [10.0.1.105]
From: Ben Campbell <ben@nostrum.com>
Message-Id: <93BC4049-A1EC-4D9F-9496-823C250D614F@nostrum.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_409FB356-F2CC-40C9-8378-34440395908D"; protocol="application/pgp-signature"; micalg=pgp-sha512
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
Date: Wed, 24 Jan 2018 09:49:48 -0600
In-Reply-To: <0f4c7112-a37a-b40b-af13-55f7c885e925@joelhalpern.com>
Cc: The IESG <iesg@ietf.org>, sfc@ietf.org
To: "Joel M. Halpern" <jmh@joelhalpern.com>
References: <151676568583.24088.676761041683551923.idtracker@ietfa.amsl.com> <f5e010ab-9cd7-fe71-7368-27289528f429@joelhalpern.com> <C5334E19-6857-4880-973C-1471E7FCD598@nostrum.com> <0f4c7112-a37a-b40b-af13-55f7c885e925@joelhalpern.com>
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/oBaKF5b-JAy4va3jSGJ1WvWXC3Q>
Subject: Re: [sfc] Ben Campbell's No Record on charter-ietf-sfc-01-01: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jan 2018 15:49:53 -0000

--Apple-Mail=_409FB356-F2CC-40C9-8378-34440395908D
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

I mainly want to make sure that the privacy considerations that have =
already been considered continue to carry forward into ongoing work.

I think it would be nice to have a bit more nuanced guidance about =
keeping things in the "same domain". With the current popularity of =
hosted cloud environments, domains may overlap. Or a single operator may =
be made of multiple business units where it may or may not make sense to =
share privacy-sensitive information. I also have a somewhat cynical =
expectation that some operators will define the term =E2=80=9Cdomain=E2=80=
=9D more expansively that we might have in mind.

In any case, this was not a blocking comment.

Thanks!

Ben.

> On Jan 24, 2018, at 7:19 AM, Joel M. Halpern <jmh@joelhalpern.com> =
wrote:
>=20
> Given that the operation of SFC is entirely within one domain, I do =
not see how a service function can create and pass down metadata "that =
the user would have preferred to keep private."  SFC is NOT for the =
operator to pass metdata to end services outside of their control.  As =
such, the metadata is carrying information the operator knows to that =
same operator.
>=20
> Within the operator's domain, it is both ineffective and outside of =
our scope to attempt to define what metadata operators choose to put on =
packets.
>=20
> So the quesiton again is what you would like to see covered in that =
point that will be useful in improving privacy.
>=20
> Yours,
> Joel
>=20
> On 1/23/18 11:40 PM, Ben Campbell wrote:
>>> On Jan 23, 2018, at 10:08 PM, Joel M. Halpern <jmh@joelhalpern.com> =
wrote:
>>>=20
>>> Item 2 already includes confidentiality explicitly.
>>> I do not think adding the word privacy would help us understand that =
there is something else to be covered.  If there is soemthing else, i am =
happy to add it (see it added, since this belongs to the IESG at this =
point).  But I think it would take more wording that just saying =
"privacy" in the list of security issues.
>> I see confidentiality as a necessary but not sufficient condition for =
privacy. For example, if a network function uses the service chaining =
header as a channel for the equivalent of header enrichment, it may =
create a privacy problem by passing metadata down the chain that the =
user may have preferred to keep private. The fact that the channel may =
have confidentiality protection doesn=E2=80=99t change that.
>>>=20
>>> Yours,
>>> Joel
>>>=20
>>> On 1/23/18 10:48 PM, Ben Campbell wrote:
>>>> Ben Campbell has entered the following ballot position for
>>>> charter-ietf-sfc-01-01: No Record
>>>> When responding, please keep the subject line intact and reply to =
all
>>>> email addresses included in the To and CC lines. (Feel free to cut =
this
>>>> introductory paragraph, however.)
>>>> The document, along with other ballot positions, can be found here:
>>>> https://datatracker.ietf.org/doc/charter-ietf-sfc/
>>>> =
----------------------------------------------------------------------
>>>> COMMENT:
>>>> =
----------------------------------------------------------------------
>>>> Would it be reasonable to add a focus on privacy considerations, =
either as part
>>>> of item 2), or as a separate top-level item?


--Apple-Mail=_409FB356-F2CC-40C9-8378-34440395908D
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org

iQIzBAEBCgAdFiEExW9rpd7ez4DexOFOgFZKbJXz1A0FAlpoqxwACgkQgFZKbJXz
1A2zhQ//R2m9+B2NpvMv6r2mZ9KahgE9lTdae/8FS6OnJIFJof6ECjj/4eWoHtgv
s6zhEDESev5U8g4hzKmhUR3/F4iQeWI5nfD6wcramG8wyEDDw75nPDGVw3AHiswM
Ri/JTvlL2XaYt8WycB7OAHvhu7d6BbDWrXd7/XDecPjY3AWgfzKcGLynhaGFG2fy
GF/op3gP38KeW/TN2ndFBNMDXVKy53Qrk9/seAqjYVFNlYDsMsaVsgbJXqGvCphQ
ESlSDfMtL+1SmNwLO3pDeNfll829aj2ijd3VBXhyXJ5u1T1gquUvTmFSZqN7HTMh
J9X2lR60XK2SwROQt5BIh9VqvBe/tctFFC0XlChGbP16UKXA8AlpKCyz1a2MLZbU
YRc99R79TPVcJ2ImU6aXMSI2SFE6OSAVv4vd5TH2rIJieuFC7WNs6lL3r14dHGvk
xyHalPPaaLH/Zs0SE3IiEJGSf9Kyl6p00dJsPCdSYVrqoNr0nUhjljt3Nbvh+M9v
AePe1VEsT38gAUH9HNcR2rRUMSGOHEfsudkzx+FkzrInMwcGuudYNNo02Evh/UcW
QdXWA2e94Y2PuzAqDJwhu/nowhIPoV8mhHKX9CSYbPNsJvaFYaQCcU9kbtxvH11l
J+P2pa64O4zCZqbUcxtbywj8qgAG3JrxgT9oPn+/M97cIT/N2k4=
=6Yio
-----END PGP SIGNATURE-----

--Apple-Mail=_409FB356-F2CC-40C9-8378-34440395908D--


From nobody Wed Jan 24 08:45:26 2018
Return-Path: <alissa@cooperw.in>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1CCB1270A7; Wed, 24 Jan 2018 08:45:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.72
X-Spam-Level: 
X-Spam-Status: No, score=-2.72 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cooperw.in header.b=W3CuGkXd; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=oEtZaF/+
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UXbtsp83vmDy; Wed, 24 Jan 2018 08:45:21 -0800 (PST)
Received: from out4-smtp.messagingengine.com (out4-smtp.messagingengine.com [66.111.4.28]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D1DA2126E3A; Wed, 24 Jan 2018 08:45:09 -0800 (PST)
Received: from compute7.internal (compute7.nyi.internal [10.202.2.47]) by mailout.nyi.internal (Postfix) with ESMTP id 27DA122401; Wed, 24 Jan 2018 11:45:09 -0500 (EST)
Received: from frontend2 ([10.202.2.161]) by compute7.internal (MEProxy); Wed, 24 Jan 2018 11:45:09 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cooperw.in; h=cc :content-type:date:from:in-reply-to:message-id:mime-version :references:subject:to:x-me-sender:x-me-sender:x-sasl-enc; s= fm2; bh=G0wTpkgEyEu2a7uYDVRzpZx6t7ZPQlSs7s1BT7bGJM8=; b=W3CuGkXd BgsB8M5Wd8B5vk9Ymjx731UH43MBHgxRJAqtIOmVLXSUUXYyxDfoYBKFZpftmAjF rEocGk7+DLyzBne/fEsVF/h7ABQ+j1o/AMv6NjDlrI3W/tiFhrmHnw24Dgpu43xw Udv4n4EapCxAih0ovYHBeSlgBCSYe+5lrIQaEnu2MtkAFHNeSzqh4lWpUbfEmdbU lnLQQzRXqleqbJEMG33fBCZgYgku2KaHPl24p23vzsastC57iwwbDMdnrM3je0ru 6F6uTG46xPRtzjiJb0nIf7FgpICykk737kexP4WbmFpAix76mlKzcNu2AoLulUbo B+6GvSarwBDpDw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-sender :x-me-sender:x-sasl-enc; s=fm1; bh=G0wTpkgEyEu2a7uYDVRzpZx6t7ZPQ lSs7s1BT7bGJM8=; b=oEtZaF/+rk17KXUkiIQyCGVBdEYOK4vUepNQcn0Kqrd2A rLLeHdpfLm1z/Firps3eSSMkxebxKE2iktXt3QCZ92FgrYTcYRLUIYzBLuGHKC3e Qb7HLsEKrLr4bFb//NR+XNb7K9YmSPTV4e8ErIn9awwsFERKmc0sRcJsd7s7tQgu 9p4PZd8IeHu0zjAlzY2rntmtnxVJ4UoO3egJsZ5FSkuQgZQtll5oWyMV7Moa5bK0 W8dap0Oe/1urUKejTbSYXIW3dB/7FdHV63ibHaCHCZ8yYn/qw/z+ygMElqKTaaiW pbs1YGWeXoMzrZefpTVaSp7UH6FQTTqWuDBg0alqQ==
X-ME-Sender: <xms:FbhoWkRICvK00VNY0AY0yx8mCwmYC8vCfzagOz7vJygOWgoKsZO9GA>
Received: from [10.19.234.245] (unknown [128.107.241.186]) by mail.messagingengine.com (Postfix) with ESMTPA id 082A9240F8; Wed, 24 Jan 2018 11:45:07 -0500 (EST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_66DBBED2-B48F-4D7E-AA2D-30A82F4301E0"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Alissa Cooper <alissa@cooperw.in>
In-Reply-To: <0f4c7112-a37a-b40b-af13-55f7c885e925@joelhalpern.com>
Date: Wed, 24 Jan 2018 11:45:06 -0500
Cc: Ben Campbell <ben@nostrum.com>, IESG <iesg@ietf.org>, sfc@ietf.org
Message-Id: <5E74102F-BB98-4268-825C-C1D6B274C72D@cooperw.in>
References: <151676568583.24088.676761041683551923.idtracker@ietfa.amsl.com> <f5e010ab-9cd7-fe71-7368-27289528f429@joelhalpern.com> <C5334E19-6857-4880-973C-1471E7FCD598@nostrum.com> <0f4c7112-a37a-b40b-af13-55f7c885e925@joelhalpern.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/27u9TC4GQ_iiFx1Kdx0WIwuTpwA>
Subject: Re: [sfc] Ben Campbell's No Record on charter-ietf-sfc-01-01: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jan 2018 16:45:24 -0000

--Apple-Mail=_66DBBED2-B48F-4D7E-AA2D-30A82F4301E0
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8


> On Jan 24, 2018, at 8:19 AM, Joel M. Halpern <jmh@joelhalpern.com> =
wrote:
>=20
> Given that the operation of SFC is entirely within one domain, I do =
not see how a service function can create and pass down metadata "that =
the user would have preferred to keep private."  SFC is NOT for the =
operator to pass metdata to end services outside of their control.  As =
such, the metadata is carrying information the operator knows to that =
same operator.
>=20
> Within the operator's domain, it is both ineffective and outside of =
our scope to attempt to define what metadata operators choose to put on =
packets.

But this is something we take into consideration all the time when =
defining types or data structures to hold specific kinds of data. When I =
look at some of what is proposed in =
https://tools.ietf.org/html/draft-sarikaya-sfc-hostid-serviceheader-06 =
<https://tools.ietf.org/html/draft-sarikaya-sfc-hostid-serviceheader-06>, =
for example, it seems like the kind of granularity Ben is talking about =
would be worth some discussion, because it might not be the case that =
every node in the domain should be authorized to consume every piece of =
header metadata. Even if it=E2=80=99s just in one of the informational =
applicability documents that the charter talks about, this seems like it =
should be called out somewhere.

Alissa

>=20
> So the quesiton again is what you would like to see covered in that =
point that will be useful in improving privacy.
>=20
> Yours,
> Joel
>=20
> On 1/23/18 11:40 PM, Ben Campbell wrote:
>>> On Jan 23, 2018, at 10:08 PM, Joel M. Halpern <jmh@joelhalpern.com> =
wrote:
>>>=20
>>> Item 2 already includes confidentiality explicitly.
>>> I do not think adding the word privacy would help us understand that =
there is something else to be covered.  If there is soemthing else, i am =
happy to add it (see it added, since this belongs to the IESG at this =
point).  But I think it would take more wording that just saying =
"privacy" in the list of security issues.
>> I see confidentiality as a necessary but not sufficient condition for =
privacy. For example, if a network function uses the service chaining =
header as a channel for the equivalent of header enrichment, it may =
create a privacy problem by passing metadata down the chain that the =
user may have preferred to keep private. The fact that the channel may =
have confidentiality protection doesn=E2=80=99t change that.
>>>=20
>>> Yours,
>>> Joel
>>>=20
>>> On 1/23/18 10:48 PM, Ben Campbell wrote:
>>>> Ben Campbell has entered the following ballot position for
>>>> charter-ietf-sfc-01-01: No Record
>>>> When responding, please keep the subject line intact and reply to =
all
>>>> email addresses included in the To and CC lines. (Feel free to cut =
this
>>>> introductory paragraph, however.)
>>>> The document, along with other ballot positions, can be found here:
>>>> https://datatracker.ietf.org/doc/charter-ietf-sfc/
>>>> =
----------------------------------------------------------------------
>>>> COMMENT:
>>>> =
----------------------------------------------------------------------
>>>> Would it be reasonable to add a focus on privacy considerations, =
either as part
>>>> of item 2), or as a separate top-level item?
>=20


--Apple-Mail=_66DBBED2-B48F-4D7E-AA2D-30A82F4301E0
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D""><br class=3D""><div><blockquote type=3D"cite" class=3D""><div =
class=3D"">On Jan 24, 2018, at 8:19 AM, Joel M. Halpern &lt;<a =
href=3D"mailto:jmh@joelhalpern.com" class=3D"">jmh@joelhalpern.com</a>&gt;=
 wrote:</div><br class=3D"Apple-interchange-newline"><div class=3D""><div =
class=3D"">Given that the operation of SFC is entirely within one =
domain, I do not see how a service function can create and pass down =
metadata "that the user would have preferred to keep private." &nbsp;SFC =
is NOT for the operator to pass metdata to end services outside of their =
control. &nbsp;As such, the metadata is carrying information the =
operator knows to that same operator.<br class=3D""><br class=3D"">Within =
the operator's domain, it is both ineffective and outside of our scope =
to attempt to define what metadata operators choose to put on =
packets.<br class=3D""></div></div></blockquote><div><br =
class=3D""></div><div>But this is something we take into consideration =
all the time when defining types or data structures to hold specific =
kinds of data. When I look at some of what is proposed in&nbsp;<a =
href=3D"https://tools.ietf.org/html/draft-sarikaya-sfc-hostid-serviceheade=
r-06" =
class=3D"">https://tools.ietf.org/html/draft-sarikaya-sfc-hostid-servicehe=
ader-06</a>, for example, it seems like the kind of granularity Ben is =
talking about would be worth some discussion, because it might not be =
the case that every node in the domain should be authorized to consume =
every piece of header metadata. Even if it=E2=80=99s just in one of the =
informational applicability documents that the charter talks about, this =
seems like it should be called out somewhere.</div><div><br =
class=3D""></div><div>Alissa</div><br class=3D""><blockquote type=3D"cite"=
 class=3D""><div class=3D""><div class=3D""><br class=3D"">So the =
quesiton again is what you would like to see covered in that point that =
will be useful in improving privacy.<br class=3D""><br =
class=3D"">Yours,<br class=3D"">Joel<br class=3D""><br class=3D"">On =
1/23/18 11:40 PM, Ben Campbell wrote:<br class=3D""><blockquote =
type=3D"cite" class=3D""><blockquote type=3D"cite" class=3D"">On Jan 23, =
2018, at 10:08 PM, Joel M. Halpern &lt;<a =
href=3D"mailto:jmh@joelhalpern.com" class=3D"">jmh@joelhalpern.com</a>&gt;=
 wrote:<br class=3D""><br class=3D"">Item 2 already includes =
confidentiality explicitly.<br class=3D"">I do not think adding the word =
privacy would help us understand that there is something else to be =
covered. &nbsp;If there is soemthing else, i am happy to add it (see it =
added, since this belongs to the IESG at this point). &nbsp;But I think =
it would take more wording that just saying "privacy" in the list of =
security issues.<br class=3D""></blockquote>I see confidentiality as a =
necessary but not sufficient condition for privacy. For example, if a =
network function uses the service chaining header as a channel for the =
equivalent of header enrichment, it may create a privacy problem by =
passing metadata down the chain that the user may have preferred to keep =
private. The fact that the channel may have confidentiality protection =
doesn=E2=80=99t change that.<br class=3D""><blockquote type=3D"cite" =
class=3D""><br class=3D"">Yours,<br class=3D"">Joel<br class=3D""><br =
class=3D"">On 1/23/18 10:48 PM, Ben Campbell wrote:<br =
class=3D""><blockquote type=3D"cite" class=3D"">Ben Campbell has entered =
the following ballot position for<br class=3D"">charter-ietf-sfc-01-01: =
No Record<br class=3D"">When responding, please keep the subject line =
intact and reply to all<br class=3D"">email addresses included in the To =
and CC lines. (Feel free to cut this<br class=3D"">introductory =
paragraph, however.)<br class=3D"">The document, along with other ballot =
positions, can be found here:<br class=3D""><a =
href=3D"https://datatracker.ietf.org/doc/charter-ietf-sfc/" =
class=3D"">https://datatracker.ietf.org/doc/charter-ietf-sfc/</a><br =
class=3D"">---------------------------------------------------------------=
-------<br class=3D"">COMMENT:<br =
class=3D"">---------------------------------------------------------------=
-------<br class=3D"">Would it be reasonable to add a focus on privacy =
considerations, either as part<br class=3D"">of item 2), or as a =
separate top-level item?<br =
class=3D""></blockquote></blockquote></blockquote><br =
class=3D""></div></div></blockquote></div><br class=3D""></body></html>=

--Apple-Mail=_66DBBED2-B48F-4D7E-AA2D-30A82F4301E0--


From nobody Wed Jan 24 08:51:00 2018
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7006D127058; Wed, 24 Jan 2018 08:50:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.721
X-Spam-Level: 
X-Spam-Status: No, score=-2.721 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nZBRQiFw1ewY; Wed, 24 Jan 2018 08:50:57 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 49938126DCA; Wed, 24 Jan 2018 08:50:57 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 31A1A6A164B; Wed, 24 Jan 2018 08:50:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1516812657; bh=Cr5NQ3/gW1idT2mfYtH3WRgRajrhnAoddaxCFDWNgRk=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=P9YWnCShN1vY+zJ30VI7ex0aEEpeVWujz5taqGm3/vHGmh4Sf7R1x64HsSNLIJoPQ M6XPJ9GVXWJzsSe27zFwF3eN2H+QvCnnyaJHEzEJsyFY6J1I6rsDYGiyVXEb9ZMsqP cuMVMy1zcBFLBsTZ5yucLsbb0iXEqhuSQLJv9W04=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (unknown [50.225.209.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 8253C1C0D7E; Wed, 24 Jan 2018 08:50:56 -0800 (PST)
To: Alissa Cooper <alissa@cooperw.in>
Cc: Ben Campbell <ben@nostrum.com>, IESG <iesg@ietf.org>, sfc@ietf.org
References: <151676568583.24088.676761041683551923.idtracker@ietfa.amsl.com> <f5e010ab-9cd7-fe71-7368-27289528f429@joelhalpern.com> <C5334E19-6857-4880-973C-1471E7FCD598@nostrum.com> <0f4c7112-a37a-b40b-af13-55f7c885e925@joelhalpern.com> <5E74102F-BB98-4268-825C-C1D6B274C72D@cooperw.in>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <0be11083-50bd-8a89-b9f1-c875f909e040@joelhalpern.com>
Date: Wed, 24 Jan 2018 11:50:55 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <5E74102F-BB98-4268-825C-C1D6B274C72D@cooperw.in>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/LGfSpP1c5iSJbWNrTAfUGhD4egM>
Subject: Re: [sfc] Ben Campbell's No Record on charter-ietf-sfc-01-01: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jan 2018 16:50:59 -0000

That is why we have confidentiality called out as a work topic. 
Figuring out how to do it effectively, so only the right things can see 
the information (and similarly for integrity so only the right things 
can modify the information) has a lot of complexity, and is agreed to be 
important.

If there are additional specific words you think would help that bullet, 
please say so.

Yours,
Joel

On 1/24/18 11:45 AM, Alissa Cooper wrote:
> 
>> On Jan 24, 2018, at 8:19 AM, Joel M. Halpern <jmh@joelhalpern.com 
>> <mailto:jmh@joelhalpern.com>> wrote:
>>
>> Given that the operation of SFC is entirely within one domain, I do 
>> not see how a service function can create and pass down metadata "that 
>> the user would have preferred to keep private."  SFC is NOT for the 
>> operator to pass metdata to end services outside of their control.  As 
>> such, the metadata is carrying information the operator knows to that 
>> same operator.
>>
>> Within the operator's domain, it is both ineffective and outside of 
>> our scope to attempt to define what metadata operators choose to put 
>> on packets.
> 
> But this is something we take into consideration all the time when 
> defining types or data structures to hold specific kinds of data. When I 
> look at some of what is proposed in 
> https://tools.ietf.org/html/draft-sarikaya-sfc-hostid-serviceheader-06, 
> for example, it seems like the kind of granularity Ben is talking about 
> would be worth some discussion, because it might not be the case that 
> every node in the domain should be authorized to consume every piece of 
> header metadata. Even if it’s just in one of the informational 
> applicability documents that the charter talks about, this seems like it 
> should be called out somewhere.
> 
> Alissa
> 
>>
>> So the quesiton again is what you would like to see covered in that 
>> point that will be useful in improving privacy.
>>
>> Yours,
>> Joel
>>
>> On 1/23/18 11:40 PM, Ben Campbell wrote:
>>>> On Jan 23, 2018, at 10:08 PM, Joel M. Halpern <jmh@joelhalpern.com 
>>>> <mailto:jmh@joelhalpern.com>> wrote:
>>>>
>>>> Item 2 already includes confidentiality explicitly.
>>>> I do not think adding the word privacy would help us understand that 
>>>> there is something else to be covered.  If there is soemthing else, 
>>>> i am happy to add it (see it added, since this belongs to the IESG 
>>>> at this point).  But I think it would take more wording that just 
>>>> saying "privacy" in the list of security issues.
>>> I see confidentiality as a necessary but not sufficient condition for 
>>> privacy. For example, if a network function uses the service chaining 
>>> header as a channel for the equivalent of header enrichment, it may 
>>> create a privacy problem by passing metadata down the chain that the 
>>> user may have preferred to keep private. The fact that the channel 
>>> may have confidentiality protection doesn’t change that.
>>>>
>>>> Yours,
>>>> Joel
>>>>
>>>> On 1/23/18 10:48 PM, Ben Campbell wrote:
>>>>> Ben Campbell has entered the following ballot position for
>>>>> charter-ietf-sfc-01-01: No Record
>>>>> When responding, please keep the subject line intact and reply to all
>>>>> email addresses included in the To and CC lines. (Feel free to cut this
>>>>> introductory paragraph, however.)
>>>>> The document, along with other ballot positions, can be found here:
>>>>> https://datatracker.ietf.org/doc/charter-ietf-sfc/
>>>>> ----------------------------------------------------------------------
>>>>> COMMENT:
>>>>> ----------------------------------------------------------------------
>>>>> Would it be reasonable to add a focus on privacy considerations, 
>>>>> either as part
>>>>> of item 2), or as a separate top-level item?
>>
> 


From nobody Wed Jan 24 14:09:53 2018
Return-Path: <Kathleen.Moriarty.ietf@gmail.com>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id BBA041270FC; Wed, 24 Jan 2018 14:09:45 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Kathleen Moriarty <Kathleen.Moriarty.ietf@gmail.com>
To: "The IESG" <iesg@ietf.org>
Cc: sfc-chairs@ietf.org, sfc@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.70.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151683178572.23566.6161203973157367458.idtracker@ietfa.amsl.com>
Date: Wed, 24 Jan 2018 14:09:45 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/8tkOZ8xX8xsYA1p-6DXGeSbBZ5c>
Subject: [sfc] Kathleen Moriarty's No Objection on charter-ietf-sfc-01-02: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jan 2018 22:09:46 -0000

Kathleen Moriarty has entered the following ballot position for
charter-ietf-sfc-01-02: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)



The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/charter-ietf-sfc/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thanks for the charter work item on security.  The earlier description looks
good, I'm glad to see integrity included as one of the controls to be explored.
 It would be nice to see a more descriptive work item later in the charter than
what's currently listed.  What are the ideas for this specific work item?

Thanks!



From nobody Wed Jan 24 15:25:33 2018
Return-Path: <adam@nostrum.com>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id B7AF012D810; Wed, 24 Jan 2018 15:25:27 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Adam Roach <adam@nostrum.com>
To: "The IESG" <iesg@ietf.org>
Cc: sfc-chairs@ietf.org, sfc@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.70.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151683632771.15916.4762180772719719154.idtracker@ietfa.amsl.com>
Date: Wed, 24 Jan 2018 15:25:27 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/2YbpZ_-sgyscrlSBq6gQ8MaV_ng>
Subject: [sfc] Adam Roach's No Objection on charter-ietf-sfc-01-02: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jan 2018 23:25:28 -0000

Adam Roach has entered the following ballot position for
charter-ietf-sfc-01-02: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)



The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/charter-ietf-sfc/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

I'm really excited about the addition of a standards-track security deliverable
for SFC.

The ballot question is unclear about whether we're being asked to approve for
external review or approval without external review. If it were clearly the
former, I'd be balloting "yes" to show additional support for the security
deliverable addition. If we are being asked the latter question, I feel that
the changes in here are substantial enough to warrant external review, but not
enough that I'd stand in the way of moving forward.

I support Ben's comment.



From nobody Wed Jan 24 15:44:28 2018
Return-Path: <akatlas@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AF37312D849; Wed, 24 Jan 2018 15:44:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qyPoKldgGDHs; Wed, 24 Jan 2018 15:44:24 -0800 (PST)
Received: from mail-ot0-x235.google.com (mail-ot0-x235.google.com [IPv6:2607:f8b0:4003:c0f::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 598FA12D7F4; Wed, 24 Jan 2018 15:44:24 -0800 (PST)
Received: by mail-ot0-x235.google.com with SMTP id 44so5162138otk.8; Wed, 24 Jan 2018 15:44:24 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=VXtnDdxFjHhp1hneNrXdm9+J5zBtUob/WhvpNq0awfE=; b=pc2B7S9T3gTokK7hDjkR7pi+YLPpkJvwdPUEyzqjTwAkLRL2r5Sg6chxERnumXcIeH reokU3MFDHHizkT7W8nurIYw/bOKUajrDb8ktHpTFf2ui2ZYVyCK6EMpGHxiFS+lnluj xZWdRLh3dWtF2y7wP/bn6OCn32N8ZLo5NKridg+RxpQlJixn1zZ73xNeebmpUKx2UIYl ovLzKN/QuqnF1Njnow7/7bNwObkaXGqbHVz5mh7UaaJPyiVjyZvK19Yo++mxpvxi/9ew NCTFQgfcOE1neAY0xwArafyLyUKTjspqXyWEAEzHc/6tdowzjqPpy7H2+qlyZ3DzpP07 PMkQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=VXtnDdxFjHhp1hneNrXdm9+J5zBtUob/WhvpNq0awfE=; b=gW3iveSLQQ+jAmVp/EKBbecr4GKcoQjKbrL0NwFil4Q3PHr+OyWDPLC3/PCTSmMZmc aQgpdYmrkuFHVBfeaIOUjL5GIp+aK07D+Syo3VJiHv25RtY5oHWMAiZgqu5Pa39tiwtk pLQG5VbZ5IPxn3Sh9zjag0J+AJAci6cn2zbWKo1/PVmYKKMQBjzu5jMdko3PXyoCf/ON qUlkYW0eVnRmg1yTK0+PUZJIuaMvaWD9p5DC/NQ1t3ciiwJDgUudmFzUzT5pxD6ECoUs M+J+QAC8uhf71RLWxOkYX8jJnwad17NxTKN88p8/oCbuWuArCGuGfAtIdzcJo0GtrbZf 5IKw==
X-Gm-Message-State: AKwxyte5vSr1Jx4i54mHwDtp3aSp1p8WegVL1CYATu3xbsP377pKnoyV 41sYWf2wdwJDub0VN2Rg3IIHkYzQAd9oPOU83BudNA==
X-Google-Smtp-Source: AH8x227D1MknnYkC2IcQJFXQTRYmX+Ew8wL9OonFxBoZhykoyvn7meWGpFfDBv7AQTXylAo3/IljdBsvzeTceFFNPE4=
X-Received: by 10.157.9.208 with SMTP id 16mr9947936otz.96.1516837463395; Wed, 24 Jan 2018 15:44:23 -0800 (PST)
MIME-Version: 1.0
Received: by 10.157.21.103 with HTTP; Wed, 24 Jan 2018 15:44:22 -0800 (PST)
In-Reply-To: <151683632771.15916.4762180772719719154.idtracker@ietfa.amsl.com>
References: <151683632771.15916.4762180772719719154.idtracker@ietfa.amsl.com>
From: Alia Atlas <akatlas@gmail.com>
Date: Wed, 24 Jan 2018 18:44:22 -0500
Message-ID: <CAG4d1rfX0=VraLRNAorbD_qTTy1OJ=LCNxbn8hXXwd8=7ERxhA@mail.gmail.com>
To: Adam Roach <adam@nostrum.com>
Cc: The IESG <iesg@ietf.org>, sfc-chairs@ietf.org,  Service Function Chaining IETF list <sfc@ietf.org>
Content-Type: multipart/alternative; boundary="001a11417f2430136105638e3e15"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/dVTZG0QdGOtiP4o4mT6AL_wepOk>
Subject: Re: [sfc] Adam Roach's No Objection on charter-ietf-sfc-01-02: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jan 2018 23:44:27 -0000

--001a11417f2430136105638e3e15
Content-Type: text/plain; charset="UTF-8"

Adam,

Your feedback to the ballot question is exactly how to make the
determination
between needing external review and not.

One of the aspect is that we know do the part of the "external review"
which includes the
WG before bringing it to the IETF - so the stages are muddled.  To me, the
question is
whether other SDOs or the broader IETF community may have comments.

I'm happy to have an external review as well.

Regards,
Alia

On Wed, Jan 24, 2018 at 6:25 PM, Adam Roach <adam@nostrum.com> wrote:

> Adam Roach has entered the following ballot position for
> charter-ietf-sfc-01-02: No Objection
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/charter-ietf-sfc/
>
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> I'm really excited about the addition of a standards-track security
> deliverable
> for SFC.
>
> The ballot question is unclear about whether we're being asked to approve
> for
> external review or approval without external review. If it were clearly the
> former, I'd be balloting "yes" to show additional support for the security
> deliverable addition. If we are being asked the latter question, I feel
> that
> the changes in here are substantial enough to warrant external review, but
> not
> enough that I'd stand in the way of moving forward.
>
> I support Ben's comment.
>
>
>

--001a11417f2430136105638e3e15
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Adam,=C2=A0<div><br></div><div>Your feedback to the ballot=
 question is exactly how to make the determination</div><div>between needin=
g external review and not.</div><div><br></div><div>One of the aspect is th=
at we know do the part of the &quot;external review&quot; which includes th=
e</div><div>WG before bringing it to the IETF - so the stages are muddled.=
=C2=A0 To me, the question is=C2=A0</div><div>whether other SDOs or the bro=
ader IETF community may have comments.=C2=A0 =C2=A0</div><div><br></div><di=
v>I&#39;m happy to have an external review as well.</div><div><br></div><di=
v>Regards,</div><div>Alia</div></div><div class=3D"gmail_extra"><br><div cl=
ass=3D"gmail_quote">On Wed, Jan 24, 2018 at 6:25 PM, Adam Roach <span dir=
=3D"ltr">&lt;<a href=3D"mailto:adam@nostrum.com" target=3D"_blank">adam@nos=
trum.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Adam Roa=
ch has entered the following ballot position for<br>
charter-ietf-sfc-01-02: No Objection<br>
<br>
When responding, please keep the subject line intact and reply to all<br>
email addresses included in the To and CC lines. (Feel free to cut this<br>
introductory paragraph, however.)<br>
<br>
<br>
<br>
The document, along with other ballot positions, can be found here:<br>
<a href=3D"https://datatracker.ietf.org/doc/charter-ietf-sfc/" rel=3D"noref=
errer" target=3D"_blank">https://datatracker.ietf.org/<wbr>doc/charter-ietf=
-sfc/</a><br>
<br>
<br>
<br>
------------------------------<wbr>------------------------------<wbr>-----=
-----<br>
COMMENT:<br>
------------------------------<wbr>------------------------------<wbr>-----=
-----<br>
<br>
I&#39;m really excited about the addition of a standards-track security del=
iverable<br>
for SFC.<br>
<br>
The ballot question is unclear about whether we&#39;re being asked to appro=
ve for<br>
external review or approval without external review. If it were clearly the=
<br>
former, I&#39;d be balloting &quot;yes&quot; to show additional support for=
 the security<br>
deliverable addition. If we are being asked the latter question, I feel tha=
t<br>
the changes in here are substantial enough to warrant external review, but =
not<br>
enough that I&#39;d stand in the way of moving forward.<br>
<br>
I support Ben&#39;s comment.<br>
<br>
<br>
</blockquote></div><br></div>

--001a11417f2430136105638e3e15--


From nobody Wed Jan 24 16:01:34 2018
Return-Path: <akatlas@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7241B12D834; Wed, 24 Jan 2018 16:01:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HluWFhr1Xbs9; Wed, 24 Jan 2018 16:01:25 -0800 (PST)
Received: from mail-ot0-x22f.google.com (mail-ot0-x22f.google.com [IPv6:2607:f8b0:4003:c0f::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3C08012AF6E; Wed, 24 Jan 2018 16:01:25 -0800 (PST)
Received: by mail-ot0-x22f.google.com with SMTP id s3so5202994otc.9; Wed, 24 Jan 2018 16:01:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=gGcAQwd9/YPQgWGzc46byTerxAJHOqBCbsxdH36I0ac=; b=L8hJCeCv4kzPE84cx92x0jhL7aWLso7FrVCjY6nS58CToulQEJWyc68CG0RAJNnITz k9mYrIGdlO1+Or0ayn+aX6poP3lVOP3f/nULJ4mESIbTHou7ff07easJugtOqusR30pc S/uN8TK/v5PzPJhjF6EpJLbVdBdZnIbSX64nV//KjvY43FFK5WTIFKicjlVsHEE3g1uC CQlBrK1y1nkhyy0UKKrIX7uriRWcPZAe/DoEo3KyoH4uNBLmzCYi4K4uakC4E2CANwHi a5LQvrlbXw7og4puWwAhs+cZ84+96reJGlxvea7EpfCQESqo/RyrznM03fO7I1jKhs79 yv5A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=gGcAQwd9/YPQgWGzc46byTerxAJHOqBCbsxdH36I0ac=; b=DKrPSJIzzAU/KZ4mrsDEwW7DIfi7diHo0ObvJYLadq7cawqbiiVsi9UiD9FR3xyrCz s1vWPWZnaeujyfkbPXdPLoYjMmBSmY8M1fnHGrUEhLNRv97KfzLqRbgnbEdh8yh5jdSU 1dTqL40Z5DcrF6oiJKP2vF6gaRduipushB+LsQS4dp0V1scnYcr5Jd35nilhugp7Sya9 m6RBXM1vOfYMLj9+vgON/gEnDJERvVALBXZ+blvw/eiSHok2zvgZGXsApLczDHXsSG8u c724Fe+JrxPpjxPZIqZDP+wKUD0fLiMOKvGemeXZ5361squH2H18E/TNrryhfBhy1B8E tEog==
X-Gm-Message-State: AKwxytdPeVC5udqt+DDs9f1xG9Lb7PNP1Y+047bbxwK943Fc74f+Z3Ao DSZQvbpNhEHzR33UHb2mGSisvhXh40U9yCqLrrc=
X-Google-Smtp-Source: AH8x224h4/xT8g8/0vmWCgWiBmznNuUgaouCze7bNuD8F+QGQwMF5uHR7QvIHmS518kLRiqWqVyFvQs1SDZFtF1mS0k=
X-Received: by 10.157.17.98 with SMTP id p31mr3705726otp.362.1516838484410; Wed, 24 Jan 2018 16:01:24 -0800 (PST)
MIME-Version: 1.0
Received: by 10.157.21.103 with HTTP; Wed, 24 Jan 2018 16:01:23 -0800 (PST)
In-Reply-To: <151683178572.23566.6161203973157367458.idtracker@ietfa.amsl.com>
References: <151683178572.23566.6161203973157367458.idtracker@ietfa.amsl.com>
From: Alia Atlas <akatlas@gmail.com>
Date: Wed, 24 Jan 2018 19:01:23 -0500
Message-ID: <CAG4d1rfT+JgB6uSDm=+LcqYE_ZixtGW18LFKGrK8UAi60AmEmA@mail.gmail.com>
To: Kathleen Moriarty <Kathleen.Moriarty.ietf@gmail.com>
Cc: The IESG <iesg@ietf.org>, sfc-chairs@ietf.org,  Service Function Chaining IETF list <sfc@ietf.org>
Content-Type: multipart/alternative; boundary="001a113e15d60b8a0505638e7b74"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/5j9uWbfsJDXUcwI2Ye6hvzrBosw>
Subject: Re: [sfc] Kathleen Moriarty's No Objection on charter-ietf-sfc-01-02: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jan 2018 00:01:27 -0000

--001a113e15d60b8a0505638e7b74
Content-Type: text/plain; charset="UTF-8"

On Wed, Jan 24, 2018 at 5:09 PM, Kathleen Moriarty <
Kathleen.Moriarty.ietf@gmail.com> wrote:

> Kathleen Moriarty has entered the following ballot position for
> charter-ietf-sfc-01-02: No Objection
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/charter-ietf-sfc/
>
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>

Hi Kathleen,


> Thanks for the charter work item on security.  The earlier description
> looks
> good, I'm glad to see integrity included as one of the controls to be
> explored.
>  It would be nice to see a more descriptive work item later in the charter
> than
> what's currently listed.  What are the ideas for this specific work item?
>

There were some drafts proposing mechanisms a few years ago - but I don't
have a specific work item for you.  I would like to see some suggestions
from
the WG on specific work items.

Regards,
Alia

--001a113e15d60b8a0505638e7b74
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><br><div class=3D"gmail_extra"><br><div class=3D"gmail_quo=
te">On Wed, Jan 24, 2018 at 5:09 PM, Kathleen Moriarty <span dir=3D"ltr">&l=
t;<a href=3D"mailto:Kathleen.Moriarty.ietf@gmail.com" target=3D"_blank">Kat=
hleen.Moriarty.ietf@gmail.com</a>&gt;</span> wrote:<br><blockquote class=3D=
"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding=
-left:1ex">Kathleen Moriarty has entered the following ballot position for<=
br>
charter-ietf-sfc-01-02: No Objection<br>
<br>
When responding, please keep the subject line intact and reply to all<br>
email addresses included in the To and CC lines. (Feel free to cut this<br>
introductory paragraph, however.)<br>
<br>
<br>
<br>
The document, along with other ballot positions, can be found here:<br>
<a href=3D"https://datatracker.ietf.org/doc/charter-ietf-sfc/" rel=3D"noref=
errer" target=3D"_blank">https://datatracker.ietf.org/<wbr>doc/charter-ietf=
-sfc/</a><br>
<br>
<br>
<br>
------------------------------<wbr>------------------------------<wbr>-----=
-----<br>
COMMENT:<br>
------------------------------<wbr>------------------------------<wbr>-----=
-----<br></blockquote><div><br></div><div>Hi Kathleen,=C2=A0</div><div>=C2=
=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;borde=
r-left:1px #ccc solid;padding-left:1ex">
Thanks for the charter work item on security.=C2=A0 The earlier description=
 looks<br>
good, I&#39;m glad to see integrity included as one of the controls to be e=
xplored.<br>
=C2=A0It would be nice to see a more descriptive work item later in the cha=
rter than<br>
what&#39;s currently listed.=C2=A0 What are the ideas for this specific wor=
k item?<br></blockquote><div><br></div><div>There were some drafts proposin=
g mechanisms a few years ago - but I don&#39;t</div><div>have a specific wo=
rk item for you.=C2=A0 I would like to see some suggestions from</div><div>=
the WG on specific work items.</div><div><br></div><div>Regards,</div><div>=
Alia=C2=A0</div></div><br></div></div>

--001a113e15d60b8a0505638e7b74--


From nobody Thu Jan 25 05:26:02 2018
Return-Path: <bclaise@cisco.com>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 962E91200FC; Thu, 25 Jan 2018 05:26:01 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Benoit Claise <bclaise@cisco.com>
To: "The IESG" <iesg@ietf.org>
Cc: sfc-chairs@ietf.org, sfc@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.70.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151688676156.31237.3901209898184107560.idtracker@ietfa.amsl.com>
Date: Thu, 25 Jan 2018 05:26:01 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/WsJVAyzh2PX1VWBYNeGcTcOs7Nc>
Subject: [sfc] Benoit Claise's No Objection on charter-ietf-sfc-01-02: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jan 2018 13:26:02 -0000

Benoit Claise has entered the following ballot position for
charter-ietf-sfc-01-02: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)



The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/charter-ietf-sfc/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

I'm not blocking this charter, but it needs some improvements before being
ready.

-
The focus of the SFC working group moving forward will be on aspects of the
architecture and/or protocol that need to be addressed to enable effective
deployment and usage of this work. In order to maintain focus, the working
group will primarily produce and advance documents on four topics:

No need to use the future tense.
Once posted, present tense is fine

-
"1) Metadata - Define the common type-length-value encoded metadata types with
Standards Track RFCs"
Typically, the document types are mentioned at the bottom of the charter, in
the milestones.

ex: Aug 2015  Submit to IESG Standards Track document specifying the generic
service function chaining header encapsulation

Or maybe you want to specifically draw attention to "Standard Track" in the
charter text?

- From the old charter:
5. Manageability: Work on the management and configuration of SFC
   components related to the support of Service Function Chaining will
   certainly be needed, but first needs to be better understood and
   scoped.

Do I understand that this paragraph changed into:
3) OAM and O&M - In order for operators to use these tools in production
networks, they need Operations, Administration, and Maintenance tools, as well
as management mechanisms.  This includes YANG models, OAM frameworks, and
specific OAM mechanisms to address operational needs.

-
3) OAM and O&M - In order for operators to use these tools in production
networks, they need Operations, Administration, and Maintenance tools, as well
as management mechanisms.  This includes YANG models, OAM frameworks, and
specific OAM mechanisms to address operational needs.

The OAM work should be based on LIME? If yes, please mention it.
Btw, extend O&M

-
3. YANG models for the SFC Components.

Proposal:
3. YANG models for the management of SFC Components.

Are you missing OAM in there? I see point 5 and 6 that concern OAM documents,
but no YANG models.



From nobody Thu Jan 25 05:57:55 2018
Return-Path: <aretana.ietf@gmail.com>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 9AAFE120227; Thu, 25 Jan 2018 05:57:49 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Alvaro Retana <aretana.ietf@gmail.com>
To: "The IESG" <iesg@ietf.org>
Cc: sfc-chairs@ietf.org, sfc@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.70.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151688866960.31491.8487439740343721468.idtracker@ietfa.amsl.com>
Date: Thu, 25 Jan 2018 05:57:49 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/LMGYMI2XntGTBf_D19WCxOVwkTo>
Subject: [sfc] Alvaro Retana's No Objection on charter-ietf-sfc-01-02: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jan 2018 13:57:50 -0000

Alvaro Retana has entered the following ballot position for
charter-ietf-sfc-01-02: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)



The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/charter-ietf-sfc/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Please add a short description of MD-2, or a reference.

I would like to see milestones before approval of the updated charter.

I agree with Adam on the need for External Review.



From nobody Thu Jan 25 05:58:42 2018
Return-Path: <alissa@cooperw.in>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DC5B120227; Thu, 25 Jan 2018 05:58:36 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Alissa Cooper <alissa@cooperw.in>
To: "The IESG" <iesg@ietf.org>
Cc: sfc-chairs@ietf.org, sfc@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.70.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151688871651.31491.1790628714405439827.idtracker@ietfa.amsl.com>
Date: Thu, 25 Jan 2018 05:58:36 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/9L4mUaMaUhS0ftyCj3XweDioSTw>
Subject: [sfc] Alissa Cooper's No Objection on charter-ietf-sfc-01-02: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jan 2018 13:58:37 -0000

Alissa Cooper has entered the following ballot position for
charter-ietf-sfc-01-02: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)



The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/charter-ietf-sfc/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Building off of the discussion in Ben's ballot thread, I would suggest
something like this for focus area #2:

2) Security and privacy - Mechanisms and guidance for securing metadata via
authentication, integrity protection, confidentiality, and data minimization
are not yet defined.  What can be effectively provided, for which scenarios,
and how those tools can be provided need to be determined and the tools
standardized.



From nobody Thu Jan 25 07:32:48 2018
Return-Path: <ben@nostrum.com>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id EA499124BAC; Thu, 25 Jan 2018 07:32:45 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Ben Campbell <ben@nostrum.com>
To: "The IESG" <iesg@ietf.org>
Cc: sfc-chairs@ietf.org, sfc@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.70.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151689436595.20340.12572043161720585589.idtracker@ietfa.amsl.com>
Date: Thu, 25 Jan 2018 07:32:45 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/p-n3RiLph429a7ZoRFD1TW3WADw>
Subject: [sfc] Ben Campbell's No Objection on charter-ietf-sfc-01-02: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jan 2018 15:32:46 -0000

Ben Campbell has entered the following ballot position for
charter-ietf-sfc-01-02: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)



The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/charter-ietf-sfc/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Would it be reasonable to add a focus on privacy considerations, either as part
of item 2), or as a separate top-level item?

Update: I also mildly prefer external review.



From nobody Fri Jan 26 12:13:55 2018
Return-Path: <rjsparks@nostrum.com>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id DFBC012DA68; Fri, 26 Jan 2018 12:13:44 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Robert Sparks <rjsparks@nostrum.com>
To: <gen-art@ietf.org>
Cc: draft-farrel-sfc-convent.all@ietf.org, ietf@ietf.org, sfc@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.70.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151699762487.4341.13082099098870205884@ietfa.amsl.com>
Date: Fri, 26 Jan 2018 12:13:44 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/lfGG6coyuUGXXUs1NpdWLQiSGOo>
Subject: [sfc] Genart last call review of draft-farrel-sfc-convent-05
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Jan 2018 20:13:45 -0000

Reviewer: Robert Sparks
Review result: Ready

I am the assigned Gen-ART reviewer for this draft. The General Area
Review Team (Gen-ART) reviews all IETF documents being processed
by the IESG for the IETF Chair.  Please treat these comments just
like any other last call comments.

For more information, please see the FAQ at

<https://trac.ietf.org/trac/gen/wiki/GenArtfaq>.

Document: draft-farrel-sfc-convent-05
Reviewer: Robert Sparks
Review Date: 2018-01-26
IETF LC End Date: 2018-01-31
IESG Telechat date: 2018-02-08

Summary: Ready for Publication as a Proposed Standard




From nobody Fri Jan 26 12:45:26 2018
Return-Path: <akatlas@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 10EA212DA41; Fri, 26 Jan 2018 12:45:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q9TJAZqecKfe; Fri, 26 Jan 2018 12:45:17 -0800 (PST)
Received: from mail-ot0-x231.google.com (mail-ot0-x231.google.com [IPv6:2607:f8b0:4003:c0f::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 78DA912778D; Fri, 26 Jan 2018 12:45:17 -0800 (PST)
Received: by mail-ot0-x231.google.com with SMTP id p36so1509701otd.10; Fri, 26 Jan 2018 12:45:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=4BVxjEeST2+mmF0lTQtD7Wp+herfXNxeZVfHWi8kc1Q=; b=DQVtUtPOuOik5NYxq/WMNOaf0syXY6pB2Goj5DkAixxDwhIYm65RO4ZA67N/yOR+bz oh9+BSvpOvOABMPCKHGFTVvdyvp1zEoAA2V4OzYX0j/c8O/D9MIuG82IL+CtBHoE5s2Z hr3INdIbNpLgYL+xpv0hj+N+z1tbPdQMRLU9AUQ9Vvs4CPPHUQECg9TWAzo1qAECwJpo 50Balb74sqxXHhyoS1A/vwbvh8ix3GTs694LsHQWDICEbsCH0Bg7iK5qg8JdquAHt95q zUY9tw62Z1CUEE3NxxBC89y/VSBlpQWpLjfpTSoo9NrzrTAfO5nosIW+LE2+RuQMm4a9 GjKw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=4BVxjEeST2+mmF0lTQtD7Wp+herfXNxeZVfHWi8kc1Q=; b=drrIi4sLvAQUMcJima0aJiXyULrnnanPv/Z7Fk3w/KuX0UrqE7fpJ1jltm7WJ5QuDz OiwroPyt8loUB8aUCmaaqlWieBuTqiNiPdNdhqko+ATHVXVisOSgsOF2Pv4qB3X2wls2 D5RnHiS0fnwjoM7QbJ8cXYd4lCTLh6O3ZU+h6s4ekIU3fllT4kvxOdt/lQtv4umt9g2b 6xdREuXX+ha4IwduCM9i0IylurWBEDeX+GgRv4EUOPse3Ceu4xX+avf7cXEYXAmnGPeF 02w40suLWPzz81Ml7L8MCN0Z4qqsX+WCcPzUlRXQYNQoEP4SNzOOoTYeDbmBu0RWaZ8i 3aTg==
X-Gm-Message-State: AKwxytctSslwbSpcoI3JBi2nrSMaK6TZNcdQTcGGqe+BrK+z66DYwNH1 Q5iaMz8s5t/ftZZFrtVP5bC63hi+JjQ5NbsaPp4=
X-Google-Smtp-Source: AH8x227zXeOXw+jVkalxsz1e7uyf7K+xOvUqE1YRAyfLFH8ElSapaXN80X1dDAjVUEtwOa1G7JDRM5d5LiDO+R1VPVw=
X-Received: by 10.157.83.2 with SMTP id g2mr4019990oth.286.1516999516591; Fri, 26 Jan 2018 12:45:16 -0800 (PST)
MIME-Version: 1.0
Received: by 10.157.21.103 with HTTP; Fri, 26 Jan 2018 12:45:16 -0800 (PST)
In-Reply-To: <151688676156.31237.3901209898184107560.idtracker@ietfa.amsl.com>
References: <151688676156.31237.3901209898184107560.idtracker@ietfa.amsl.com>
From: Alia Atlas <akatlas@gmail.com>
Date: Fri, 26 Jan 2018 15:45:16 -0500
Message-ID: <CAG4d1reqNBMwNpnYv6P505zghMBE+=TksHCt=b51-59-4YSUNQ@mail.gmail.com>
To: Benoit Claise <bclaise@cisco.com>
Cc: The IESG <iesg@ietf.org>, sfc-chairs@ietf.org,  Service Function Chaining IETF list <sfc@ietf.org>
Content-Type: multipart/alternative; boundary="f4030435c2804f9aa90563b3f9ec"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/k2oC-RKd6abUj6OYFciN0EV4CjA>
Subject: Re: [sfc] Benoit Claise's No Objection on charter-ietf-sfc-01-02: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Jan 2018 20:45:20 -0000

--f4030435c2804f9aa90563b3f9ec
Content-Type: text/plain; charset="UTF-8"

Hi Benoit,

On Thu, Jan 25, 2018 at 8:26 AM, Benoit Claise <bclaise@cisco.com> wrote:

> Benoit Claise has entered the following ballot position for
> charter-ietf-sfc-01-02: No Objection
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/charter-ietf-sfc/
>
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> I'm not blocking this charter, but it needs some improvements before being
> ready.
>
> -
> The focus of the SFC working group moving forward will be on aspects of the
> architecture and/or protocol that need to be addressed to enable effective
> deployment and usage of this work. In order to maintain focus, the working
> group will primarily produce and advance documents on four topics:
>
> No need to use the future tense.
> Once posted, present tense is fine


Fiexed

>
>
-
> "1) Metadata - Define the common type-length-value encoded metadata types
> with
> Standards Track RFCs"
> Typically, the document types are mentioned at the bottom of the charter,
> in
> the milestones.
>
> ex: Aug 2015  Submit to IESG Standards Track document specifying the
> generic
> service function chaining header encapsulation
>
> Or maybe you want to specifically draw attention to "Standard Track" in the
> charter text?
>

Yes - this is a negotiated compromise where the WG has come to agreement,
so it is
intentionally mentioned in the charter.


> - From the old charter:
> 5. Manageability: Work on the management and configuration of SFC
>    components related to the support of Service Function Chaining will
>    certainly be needed, but first needs to be better understood and
>    scoped.
>
> Do I understand that this paragraph changed into:
> 3) OAM and O&M - In order for operators to use these tools in production
> networks, they need Operations, Administration, and Maintenance tools, as
> well
> as management mechanisms.  This includes YANG models, OAM frameworks, and
> specific OAM mechanisms to address operational needs.
>
> -
> 3) OAM and O&M - In order for operators to use these tools in production
> networks, they need Operations, Administration, and Maintenance tools, as
> well
> as management mechanisms.  This includes YANG models, OAM frameworks, and
> specific OAM mechanisms to address operational needs.
>
> The OAM work should be based on LIME? If yes, please mention it.
> Btw, extend O&M
>

I haven't heard any clear intention of basing the OAM work on LIME, so I'd
prefer not
to mention it in the charter.


> -
> 3. YANG models for the SFC Components.
>
> Proposal:
> 3. YANG models for the management of SFC Components.
>

Agreed

Are you missing OAM in there? I see point 5 and 6 that concern OAM
> documents,
> but no YANG models.
>

I think that improving 3 provides the room for YANG models around OAM.

Regards,
Alia

--f4030435c2804f9aa90563b3f9ec
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Benoit,<div class=3D"gmail_extra"><br><div class=3D"gma=
il_quote">On Thu, Jan 25, 2018 at 8:26 AM, Benoit Claise <span dir=3D"ltr">=
&lt;<a href=3D"mailto:bclaise@cisco.com" target=3D"_blank">bclaise@cisco.co=
m</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margi=
n:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Benoit Claise has=
 entered the following ballot position for<br>
charter-ietf-sfc-01-02: No Objection<br>
<br>
When responding, please keep the subject line intact and reply to all<br>
email addresses included in the To and CC lines. (Feel free to cut this<br>
introductory paragraph, however.)<br>
<br>
<br>
<br>
The document, along with other ballot positions, can be found here:<br>
<a href=3D"https://datatracker.ietf.org/doc/charter-ietf-sfc/" rel=3D"noref=
errer" target=3D"_blank">https://datatracker.ietf.org/<wbr>doc/charter-ietf=
-sfc/</a><br>
<br>
<br>
<br>
------------------------------<wbr>------------------------------<wbr>-----=
-----<br>
COMMENT:<br>
------------------------------<wbr>------------------------------<wbr>-----=
-----<br>
<br>
I&#39;m not blocking this charter, but it needs some improvements before be=
ing<br>
ready.<br>
<br>
-<br>
The focus of the SFC working group moving forward will be on aspects of the=
<br>
architecture and/or protocol that need to be addressed to enable effective<=
br>
deployment and usage of this work. In order to maintain focus, the working<=
br>
group will primarily produce and advance documents on four topics:<br>
<br>
No need to use the future tense.<br>
Once posted, present tense is fine</blockquote><div><br></div><div>Fiexed=
=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bo=
rder-left:1px #ccc solid;padding-left:1ex">=C2=A0<br></blockquote><blockquo=
te class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc so=
lid;padding-left:1ex">
-<br>
&quot;1) Metadata - Define the common type-length-value encoded metadata ty=
pes with<br>
Standards Track RFCs&quot;<br>
Typically, the document types are mentioned at the bottom of the charter, i=
n<br>
the milestones.<br>
<br>
ex: Aug 2015=C2=A0 Submit to IESG Standards Track document specifying the g=
eneric<br>
service function chaining header encapsulation<br>
<br>
Or maybe you want to specifically draw attention to &quot;Standard Track&qu=
ot; in the<br>
charter text?<br></blockquote><div><br></div><div>Yes - this is a negotiate=
d compromise where the WG has come to agreement, so it is</div><div>intenti=
onally mentioned in the charter.</div><div>=C2=A0</div><blockquote class=3D=
"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding=
-left:1ex">
- From the old charter:<br>
5. Manageability: Work on the management and configuration of SFC<br>
=C2=A0 =C2=A0components related to the support of Service Function Chaining=
 will<br>
=C2=A0 =C2=A0certainly be needed, but first needs to be better understood a=
nd<br>
=C2=A0 =C2=A0scoped.<br>
<br>
Do I understand that this paragraph changed into:<br>
3) OAM and O&amp;M - In order for operators to use these tools in productio=
n<br>
networks, they need Operations, Administration, and Maintenance tools, as w=
ell<br>
as management mechanisms.=C2=A0 This includes YANG models, OAM frameworks, =
and<br>
specific OAM mechanisms to address operational needs.<br>
<br>
-<br>
3) OAM and O&amp;M - In order for operators to use these tools in productio=
n<br>
networks, they need Operations, Administration, and Maintenance tools, as w=
ell<br>
as management mechanisms.=C2=A0 This includes YANG models, OAM frameworks, =
and<br>
specific OAM mechanisms to address operational needs.<br>
<br>
The OAM work should be based on LIME? If yes, please mention it.<br>
Btw, extend O&amp;M<br></blockquote><div><br></div><div>I haven&#39;t heard=
 any clear intention of basing the OAM work on LIME, so I&#39;d prefer not=
=C2=A0</div><div>to mention it in the charter.</div><div>=C2=A0</div><block=
quote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc=
 solid;padding-left:1ex">
-<br>
3. YANG models for the SFC Components.<br>
<br>
Proposal:<br>
3. YANG models for the management of SFC Components.<br></blockquote><div><=
br></div><div>Agreed=C2=A0</div><div><br></div><blockquote class=3D"gmail_q=
uote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1e=
x">
Are you missing OAM in there? I see point 5 and 6 that concern OAM document=
s,<br>
but no YANG models.<br></blockquote><div><br></div><div>I think that improv=
ing 3 provides the room for YANG models around OAM.=C2=A0</div><div><br></d=
iv><div>Regards,</div><div>Alia</div></div></div></div>

--f4030435c2804f9aa90563b3f9ec--


From nobody Fri Jan 26 13:10:40 2018
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 571591201FA; Fri, 26 Jan 2018 13:10:33 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: "IETF-Announce" <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.70.0
Auto-Submitted: auto-generated
Precedence: bulk
Cc: sfc@ietf.org 
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Message-ID: <151700103333.4373.12415068690417578748.idtracker@ietfa.amsl.com>
Date: Fri, 26 Jan 2018 13:10:33 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/pSJo6mc6_IlXyidtP2o8_ogPQWY>
Subject: [sfc] WG Review: Service Function Chaining (sfc)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Jan 2018 21:10:33 -0000

The Service Function Chaining (sfc) WG in the Routing Area of the IETF is
undergoing rechartering. The IESG has not made any determination yet. The
following draft charter was submitted, and is provided for informational
purposes only. Please send your comments to the IESG mailing list
(iesg@ietf.org) by 2018-02-05.

Service Function Chaining (sfc)
-----------------------------------------------------------------------
Current status: Active WG

Chairs:
  Joel Halpern <jmh@joelhalpern.com>
  Jim Guichard <james.n.guichard@huawei.com>

Secretaries:
  Tal Mizrahi <talmi@marvell.com>

Assigned Area Director:
  Alia Atlas <akatlas@gmail.com>

Routing Area Directors:
  Alia Atlas <akatlas@gmail.com>
  Alvaro Retana <aretana.ietf@gmail.com>
  Deborah Brungard <db3546@att.com>

Mailing list:
  Address: sfc@ietf.org
  To subscribe: https://www.ietf.org/mailman/listinfo/sfc
  Archive: https://mailarchive.ietf.org/arch/browse/sfc/

Group page: https://datatracker.ietf.org/group/sfc/

Charter: https://datatracker.ietf.org/doc/charter-ietf-sfc/

Network operators frequently utilize service functions such as packet
filtering at firewalls, load-balancing and transactional proxies (for example
spam filters) in the delivery of services to end users. Delivery of these
types of services is undergoing significant change with the introduction of
virtualization, network overlays, and orchestration.

The SFC Working Group has developed an Architecture [RFC 7665] and the
Network Service Header [RFC 8300] for service function chaining.

The focus of the SFC working group moving forward is on aspects of the
architecture and/or protocol that need to be addressed to enable effective
deployment and usage of this work. In order to maintain focus, the working
group primarily produces and advances documents on four topics:

1) Metadata - Define the common type-length-value encoded metadata types with
Standards Track RFCs, and produce Informational RFCs to describe common
fixed-length (MD-1) metadata usages.

2) Security and Privacy - Mechanisms and guidance for securing metadata via
authentication, integrity protection, confidentiality, and/or data
minimization are not yet defined.  What can be effectively provided, for
which scenarios, and how those tools can be provided need to be determined
and the tools standardized.

3) OAM and Operations & Management - In order for operators to use these
tools in production networks, they need Operations, Administration, and
Maintenance tools, as well as management mechanisms.  This includes YANG
models, OAM frameworks, and specific OAM mechanisms to address operational
needs.

4) Transport Considerations - This will capture the expectations SFC places
on transport behavior, including dealing with issues such as congestion
indications and responses.  This should define how NSH works on standardized
transports that are expected to see widespread use.

Specifically, the SFC WG is chartered to deliver the following:

1. A Standards Track base set of the metadata MD-2 type codes within the
metadata class reserved for IETF usage, as specified in RFC 8300.

2. Related Metadata drafts that require more explanation than is reasonable
to include in the base MD-2 draft, including MD-1 descriptions and items done
once the base draft is complete.

3. YANG models for the management of SFC Components.

4. One or more security related Standards Track and / or Informational RFCs. 
At least one Standards Track security mechanism RFC is needed.

5. OAM Framework document to provide a common basis for OAM work.  This draft
will include guidance on how active, passive, and hybrid OAM are to be
supported if at all.

6. Specific OAM mechanism documents to provide the tools needed for
operational environments.

7. Transport Considerations RFC to cover the expectations SFC and NSH place
on transport, and the operational constraints transports used by NSH need to
meet.

The SFC WG may work on Informational applicability documents that show how
the technology, meta-data, and associated control-plane mechanisms can be
used in specific use-cases.  The SFC WG may work on Informational documents
that provide operational considerations.

The SFC WG will coordinate with BESS and PCE on the control-plane work
related to SFC.

Milestones:

TBD


From nobody Sat Jan 27 08:24:43 2018
Return-Path: <ietf-secretariat-reply@ietf.org>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id D187112D944; Sat, 27 Jan 2018 08:24:41 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IETF Secretariat <ietf-secretariat-reply@ietf.org>
To: <sfc-chairs@ietf.org>, <sfc@ietf.org>, <draft-quinn-sfc-nsh-tlv@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.70.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151707028185.30912.13943284229789069343.idtracker@ietfa.amsl.com>
Date: Sat, 27 Jan 2018 08:24:41 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/jZpL8_pipXa8uuyUVnq5nK5zh-M>
Subject: [sfc] The SFC WG has placed draft-quinn-sfc-nsh-tlv in state "Adopted by a WG"
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 27 Jan 2018 16:24:42 -0000

The SFC WG has placed draft-quinn-sfc-nsh-tlv in state
Adopted by a WG (entered by Joel Halpern)

The document is available at
https://datatracker.ietf.org/doc/draft-quinn-sfc-nsh-tlv/

Comment:
Adopted some time ago, but the chairs failed to complete the process.  Now it
is done.


From nobody Sat Jan 27 08:24:59 2018
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9BF8C1243F6 for <sfc@ietfa.amsl.com>; Sat, 27 Jan 2018 08:24:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level: 
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nyq1mgUlVVvG for <sfc@ietfa.amsl.com>; Sat, 27 Jan 2018 08:24:55 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D9D7712D87A for <sfc@ietf.org>; Sat, 27 Jan 2018 08:24:52 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 9EEFB2C05BD; Sat, 27 Jan 2018 08:24:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1517070292; bh=n+RvpgCAJQ9hLL+cNtUjriHEbvAn2xakxCc5b4Fwl2w=; h=To:From:Subject:Date:From; b=iT7TAoJ7Q6y0K0wBo9HvCqmGGlOxihiLoNAs8jGQQh2XSqjOCg9e0aZyBsh4NE/EZ bS9dw1Wy0DRcYOei7MJHKirayODD1C6olxQVb+aHPX0kNmOy3f9OnMn3C8ExWwc4Ro bcyfvVYDLD5QGIoWeiCt/APtFF4ReB3en5YYy6PI=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (unknown [50.225.209.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 33B76240F71; Sat, 27 Jan 2018 08:24:52 -0800 (PST)
To: "sfc@ietf.org" <sfc@ietf.org>, Sumandra Majee <S.Majee@F5.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <dae96c6d-df97-d74d-413e-970f6e60797e@joelhalpern.com>
Date: Sat, 27 Jan 2018 11:24:51 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.5.2
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/uN_CkZwSTS5UP2SzzE5ISWmvOu0>
Subject: [sfc] Document Adoption Approval
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 27 Jan 2018 16:24:57 -0000

It was pointed out that Jim and I had never actually said that the NSH 
TLV document was adopted.  the working group agreed to approve it quite 
some time ago.

Yes, it is adopted.
Sumandra, please submit draft-ietf-sfc-nsh-tlv.

Yours,
Joel


From nobody Mon Jan 29 10:05:25 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D75112FA83; Mon, 29 Jan 2018 10:05:24 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: sfc@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.70.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151724912394.19542.6366081756087017137@ietfa.amsl.com>
Date: Mon, 29 Jan 2018 10:05:24 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/W9fhCtF3zBqv70MkP4B8166ryk8>
Subject: [sfc] I-D Action: draft-ietf-sfc-nsh-tlv-00.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jan 2018 18:05:25 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Service Function Chaining WG of the IETF.

        Title           : Network Service Header TLVs
        Authors         : Paul Quinn
                          Uri Elzur
                          Sumandra Majee
	Filename        : draft-ietf-sfc-nsh-tlv-00.txt
	Pages           : 8
	Date            : 2018-01-29

Abstract:
   This draft describes Network Service Header (NSH) MD-Type 2 metadata
   TLVs that can be used within a service function path.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh-tlv/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sfc-nsh-tlv-00
https://datatracker.ietf.org/doc/html/draft-ietf-sfc-nsh-tlv-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Mon Jan 29 16:15:54 2018
Return-Path: <wangzitao@huawei.com>
X-Original-To: sfc@ietf.org
Delivered-To: sfc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 029BD12711A; Mon, 29 Jan 2018 16:15:39 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: Zitao Wang <wangzitao@huawei.com>
To: <ops-dir@ietf.org>
Cc: draft-farrel-sfc-convent.all@ietf.org, ietf@ietf.org, sfc@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.70.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151727133894.27336.11581082683338694561@ietfa.amsl.com>
Date: Mon, 29 Jan 2018 16:15:39 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/2wYVpy1HfxVQhUEsreyP7sMi20w>
Subject: [sfc] Opsdir last call review of draft-farrel-sfc-convent-05
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Jan 2018 00:15:39 -0000

Reviewer: Zitao Wang
Review result: Ready

I have reviewed this document as part of the Operational directorate’s ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written with the intent of improving the operational aspects of
the IETF drafts. Comments that are not addressed in last call may be included
in AD reviews during the IESG review.  Document editors and WG chairs should
treat these comments just like any other last call comments.

Document reviewed:draft-farrel-sfc-convent-05

Summary:

This document describes the use of the Network Service Header (NSH) in a
Service Function Chaining (SFC) enabled network with no payload data and
carrying only metadata.  This is achieved by defining a new NSH "Next Protocol"
type value of "None". This document illustrates some of the functions that may
be achieved or enhanced by this mechanism, but it does not provide an
exhaustive list of use cases, nor is it intended to be definitive about the
functions it describes.  It is expected that other documents will describe
specific use cases in more detail and will define the protocol mechanics for
each use case.

Major issue: None

Minor issue: Suggest adding a termnology section to introduce the abbreviations
which be used in this document, such as SFP, NSH, SF, SFI, etc.



From nobody Tue Jan 30 00:51:07 2018
Return-Path: <adrian@olddog.co.uk>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EBB63131786; Tue, 30 Jan 2018 00:51:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5fDEt7Xemqzf; Tue, 30 Jan 2018 00:50:59 -0800 (PST)
Received: from asmtp5.iomartmail.com (asmtp5.iomartmail.com [62.128.201.176]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A53F6131A20; Tue, 30 Jan 2018 00:49:27 -0800 (PST)
Received: from asmtp5.iomartmail.com (localhost.localdomain [127.0.0.1]) by asmtp5.iomartmail.com (8.13.8/8.13.8) with ESMTP id w0U8mxA4013787; Tue, 30 Jan 2018 08:48:59 GMT
Received: from 950129200 ([193.57.120.225]) (authenticated bits=0) by asmtp5.iomartmail.com (8.13.8/8.13.8) with ESMTP id w0U8mvnf013756 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 30 Jan 2018 08:48:58 GMT
Reply-To: <adrian@olddog.co.uk>
From: "Adrian Farrel" <adrian@olddog.co.uk>
To: "'Zitao Wang'" <wangzitao@huawei.com>, <ops-dir@ietf.org>
Cc: <draft-farrel-sfc-convent.all@ietf.org>, <ietf@ietf.org>, <sfc@ietf.org>
References: <151727133894.27336.11581082683338694561@ietfa.amsl.com>
In-Reply-To: <151727133894.27336.11581082683338694561@ietfa.amsl.com>
Date: Tue, 30 Jan 2018 08:48:57 -0000
Message-ID: <086101d399a7$2b723710$8256a530$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQIcpUOq1X79PMrmRdl6Wp93DiGtiaL6AGZw
Content-Language: en-gb
X-TM-AS-MML: disable
X-TM-AS-Product-Ver: IMSS-7.1.0.1679-8.2.0.1013-23628.006
X-TM-AS-Result: No--7.760-10.0-31-10
X-imss-scan-details: No--7.760-10.0-31-10
X-TMASE-MatchedRID: vEvJ7Rh1lGinykMun0J1wp21GZGE81yGMZm0+sEE9mu1YUw9VHYKvP4Z AUsty2ENjXsFLEEP2YqYmSTfbx/hHjPAnsAORqSfwVaayvK71l/AvdwvBqgdnkavwbe/bczf+QM 79UDZjetNYvDaO9t+nOwJvvRqClGr772W/22r9NiVUcz8XpiS9EDwlkRNC6PCzUFc4X2GObJyJp dgSLwCbqsW9TgXXMGUKNbVyoeR7BOQMCeWVJQ9t/zu9Lw9C7fAUAjrAJWsTe8wplGJ7NxS0y+sl rIoxy6PpSxgXQCmVD4O5jobBvSaVF7QViK5UP9wz5rIW0RbS5g026H7nOZLr3KqW7xVeF20Kgb8 BfqrnGpzrFueZ32PHT4gmzHPr8wbY4qH3z2g5CGM29hkek7Xd30tCKdnhB581B0Hk1Q1KyLUZxE AlFPo846HM5rqDwqtnl32i3qSnBNHKexGZ8cKvlaH0ZSl//thpsfhkQRk2yzlawJRsiWsVA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/E4g3H_wn9Xb07o3HbuuCgRn971o>
Subject: Re: [sfc] Opsdir last call review of draft-farrel-sfc-convent-05
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Jan 2018 08:51:02 -0000

Thanks for the review Zitao,

I'm disinclined to add a terminology section to a short draft that just =
defines one code point in a simple increment to RFC 8300.

If we did, we would position it after the Introduction. But I checked, =
and all of the acronyms and abbreviations (except DCN) are expanded in =
the Introduction, so we would just be adding repetition.

Additionally, the Introduction also includes...

   This document uses the terms defined in [RFC7665] and
   [I-D.ietf-sfc-nsh].

Nevertheless, if the ADs think this would be helpful, it is easy enough =
to add. I await their review.

Thanks,
Adrian

> -----Original Message-----
> From: ietf [mailto:ietf-bounces@ietf.org] On Behalf Of Zitao Wang
> Sent: 30 January 2018 00:16
> To: ops-dir@ietf.org
> Cc: draft-farrel-sfc-convent.all@ietf.org; ietf@ietf.org; sfc@ietf.org
> Subject: Opsdir last call review of draft-farrel-sfc-convent-05
>=20
> Reviewer: Zitao Wang
> Review result: Ready
>=20
> I have reviewed this document as part of the Operational =
directorate=E2=80=99s ongoing
> effort to review all IETF documents being processed by the IESG.  =
These
> comments were written with the intent of improving the operational =
aspects of
> the IETF drafts. Comments that are not addressed in last call may be =
included
> in AD reviews during the IESG review.  Document editors and WG chairs =
should
> treat these comments just like any other last call comments.
>=20
> Document reviewed:draft-farrel-sfc-convent-05
>=20
> Summary:
>=20
> This document describes the use of the Network Service Header (NSH) in =
a
> Service Function Chaining (SFC) enabled network with no payload data =
and
> carrying only metadata.  This is achieved by defining a new NSH "Next =
Protocol"
> type value of "None". This document illustrates some of the functions =
that may
> be achieved or enhanced by this mechanism, but it does not provide an
> exhaustive list of use cases, nor is it intended to be definitive =
about the
> functions it describes.  It is expected that other documents will =
describe
> specific use cases in more detail and will define the protocol =
mechanics for
> each use case.
>=20
> Major issue: None
>=20
> Minor issue: Suggest adding a termnology section to introduce the =
abbreviations
> which be used in this document, such as SFP, NSH, SF, SFI, etc.



From nobody Tue Jan 30 23:39:04 2018
Return-Path: <wangzitao@huawei.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5608613162D; Tue, 30 Jan 2018 23:38:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.23
X-Spam-Level: 
X-Spam-Status: No, score=-4.23 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3U8Z8YeIPzsI; Tue, 30 Jan 2018 23:38:43 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 435BA131628; Tue, 30 Jan 2018 23:38:43 -0800 (PST)
Received: from lhreml702-cah.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id 9E084C317FF1B; Wed, 31 Jan 2018 07:38:39 +0000 (GMT)
Received: from DGGEML423-HUB.china.huawei.com (10.1.199.40) by lhreml702-cah.china.huawei.com (10.201.108.43) with Microsoft SMTP Server (TLS) id 14.3.361.1; Wed, 31 Jan 2018 07:38:40 +0000
Received: from DGGEML504-MBS.china.huawei.com ([169.254.11.87]) by dggeml423-hub.china.huawei.com ([10.1.199.40]) with mapi id 14.03.0361.001; Wed, 31 Jan 2018 15:38:33 +0800
From: wangzitao <wangzitao@huawei.com>
To: "adrian@olddog.co.uk" <adrian@olddog.co.uk>, "ops-dir@ietf.org" <ops-dir@ietf.org>
CC: "draft-farrel-sfc-convent.all@ietf.org" <draft-farrel-sfc-convent.all@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: Opsdir last call review of draft-farrel-sfc-convent-05
Thread-Index: AdOaZhSOD0qjI7/kQYOviBokr+zXIA==
Date: Wed, 31 Jan 2018 07:38:33 +0000
Message-ID: <E6BC9BBCBCACC246846FC685F9FF41EA2B8B37DA@DGGEML504-MBS.china.huawei.com>
Accept-Language: en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.136.78.152]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/UmcGAmzCgIjngQudpBrDOfOCQXg>
Subject: Re: [sfc] Opsdir last call review of draft-farrel-sfc-convent-05
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Jan 2018 07:38:45 -0000
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