Skip to main content

Operations, Administration, and Maintenance (OAM) in Segment Routing over IPv6 (SRv6)
draft-ietf-6man-spring-srv6-oam-13

Revision differences

Document history

Date Rev. By Action
2022-06-20
13 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2022-05-23
13 (System) RFC Editor state changed to AUTH48
2022-05-17
13 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2022-03-31
13 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2022-03-31
13 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2022-03-31
13 (System) IANA Action state changed to In Progress from Waiting on Authors
2022-03-31
13 (System) IANA Action state changed to Waiting on Authors from In Progress
2022-03-23
13 (System) RFC Editor state changed to EDIT
2022-03-23
13 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2022-03-23
13 (System) Announcement was received by RFC Editor
2022-03-23
13 (System) IANA Action state changed to In Progress
2022-03-23
13 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2022-03-23
13 Cindy Morgan IESG has approved the document
2022-03-23
13 Cindy Morgan Closed "Approve" ballot
2022-03-23
13 Cindy Morgan Ballot approval text was generated
2022-03-22
13 (System) Removed all action holders (IESG state changed)
2022-03-22
13 Erik Kline IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2022-03-22
13 Benjamin Kaduk
[Ballot comment]
Thanks for the updates in the -12 and -13; I especially appreciate
that you took the time to rework the example addresses to …
[Ballot comment]
Thanks for the updates in the -12 and -13; I especially appreciate
that you took the time to rework the example addresses to avoid
using hex digits for anything other than literal address bits,
and switched from "classic IPv6" to "non-SRv6 capable".
I do regret that it took me so long to update my ballot position
accordingly; I had hoped to be able to go through the examples
carefully again, but it is clear that I cannot manage to do so
in my few remaining hours as AD, so my review of the diff will have
to suffice.

I'll preserve my original ballot comments on the -11 below, for posterity.


ORIGINAL COMMENTS ON THE -11 APPEAR BELOW
=========================================

Thanks to Dan Harkins for the secdir review and Stig Venaas for the
opsdir review (with observation on the security considerations) and the
authors for updating in response to them.  I support Roman's discuss
position to make the remaining updates.

The setup introducing a couple of the examples mentions the assumed link
metric on the links in question, but none of the procedures we describe
actually make use the assumed metric information -- it seems we could
just as easily omit mention of it.

Section 1.3

      Nodes N3, N5 and N6 are IPv6 nodes that are not SRv6-capable.
      Such nodes are referred as classic IPv6 nodes.

Can I suggest using a different adjective than "classic" for this, perhaps
"standard"?  The word "classic" can come with some connotations of being
old, outdated, or legacy, and I don't think we have IETF consensus that
SRv6 is the next evolution of IPv6 that relegates "classic IPv6" to such
a legacy status.

      A SID at node k with locator block 2001:db8:B::/48 and function F
      is represented by 2001:db8:B:k:F::.
  [...]
      2001:db8:B:k:Cij:: is explicitly allocated as the END.X SID at
      node k towards neighbor node i via jth Link between node i and
      node k.  e.g., 2001:db8:B:2:C31:: represents END.X at N2 towards

What is the "function F" in this example?  My understanding was that the
function would correspond to just End.X (and thus the value "C" for that
16-bit component), with the "ij" information needing to be in the
"argument".

Section 2.1.1

  The O-flag in SRH is used as a marking-bit in the user packets to
  trigger the telemetry data collection and export at the segment
  endpoints.

If it's to be set in "user packets", who exactly is it that sets the mark?

  controller for monitoring and analytics.  Similarly, without the loss
  of generality, this document assumes requested information elements
  are configured by the management plane through data set templates
  (e.g., as in IPFIX [RFC7012]).

Can we say anything about the scope for which the set of requested
information elements are configured?  I mostly assume that it's expected
to, say, configure node A to export some information on seeing the
O-flag, and configure node B to export different information on seeing
the O-flag.  But can it be configured at a finer granularity than just
"node", e.g., at a per-flow level?

  If the telemetry data from the ultimate segment in the segment-list
  is required, a penultimate segment SHOULD NOT be a Penultimate
  Segment Pop (PSP) SID.  When the penultimate segment is a PSP SID,
  the SRH will be removed and the O-flag will not be processed at the
  ultimate segment.

This looks like a statement of fact to me, with no need to strengthen it
by normative langauge.  If you need telemetry from the ultimate segment,
and PSP is used, you won't get telemetry based on the SRH O-flag, and
that's that.

Section 2.2

  IPv6 OAM operations can be performed for any SRv6 SID whose behavior
  allows Upper Layer Header processing for an applicable OAM payload
  (e.g., ICMP, UDP).

What options are available for SIDs whose behavior does not allow such
ULH processing?

  to the correct outgoing interface.  To exercise the behavior of a
  target SID, the OAM operation SHOULD construct the probe in a manner
  similar to a data packet that exercises the SID behavior, i.e. to
  include that SID as a transit SID in either an SRH or IPv6 DA of an
  outer IPv6 header or as appropriate based on the definition of the
  SID behavior.

I think I understand what is meant by putting the target SID as a
transit SID in a SRH (or encapsulated analogue).  I'm not sure how this
would specifically validate that the node is exercising the behavior in
question (End.X here, so switching to the proper outgoing interface).
That is, if I'm trying to ping a given SID and confirm that it does
End.X properly, how does just adding an SRH confirm the cross-connect
part if I am still pinging that SID?  Do I need to target the ping at
the "next" SID in the SID list in order to actually use the
cross-connect?

Section 3.1.1

  IGP metric set to 100.  User issues a ping from node N1 to a loopback
  of node 5, via segment list <2001:db8:B:2:C31::, 2001:db8:B:4:C52::>.

How does a *user* issue a ping (directly) with an associated segment
list?  This seems to no longer be a "classic ping" mechanism as written
... perhaps there is some automated component in the system that
translates what the user put in the packet into a segment list?  Or
should we reference some ping utility that is patched to accept
segment-list input in the vein of Figure 2?
(A similar comment applies to the traceroute analogue in Section 3.2.1.)

  o  The echo request packet at N5 arrives as an IPv6 packet with or
      without an SRH.  If N5 receives the packet with SRH, it skips SRH
      processing (SL=0).  In either case, Node N5 performs the standard
      ICMPv6 processing on the echo request and responds with the echo
      reply message to N1.  The echo reply message is IP routed.

I think the tsv-art reviewer's remark that "the echo reply message is IP
routed" could hide quite a lot, is pretty accurate.  It seems worth
stating clearly that it does not have an SRH so that the reader can work
through the consequences for deployments where there is no native IP
connectivity for the return path.

Section 3.2

  operation at the classic IPv6 nodes in an SRv6 network.  That
  includes the classic IPv6 node with ingress, egress or transit roles.

I'm a little confused at what it would mean for a "classic IPv6" node to
act as the *ingress* role.  What is ingress, if not entrance to the SR
domain and applying an SRH?

Section 3.2.1, 3.2.2

Where do the 2001:db8:1:2:21::, 2001:db8:2:3:31::, 2001:db8:3:4::41::,
2001:db8:4:5::52:: come from?  They don't seem to match the stated
structure for "nth link between node i and j at the i side"
(2001:db8:i:j:in::); was there supposed to be a separate case for "at
the j side" in the terminology section?

Section 3.3

  o  The controller N100 processes and correlates the copy of the
      packets sent from nodes N1, N4 and N7 to find segment-by-segment
      delays and provide other hybrid OAM information related to packet
      P1.

If the controller is going to coalesce timestamped data from the various
SRv6 nodes, we need to have some discussion of the requirement for
synchronized time across the SR domain (or controller knowledge of time
offsets, which is essentially equivalent).

Section 5

  service attack.  Additionally, SRH Flags are protected by the HMAC
  TLV, as described in Section 2.1.2.1 of [RFC8754].

I think we should remind the reader that the HMAC protection is very
coarse-grained, and that once an HMAC exists that allows setting the
O-flag for a given segment list, it can be used to produce an arbitrary
amount of such traffic.

  This document does not impose any additional security challenges to
  be considered beyond security threats described in [RFC4884],
  [RFC4443], [RFC0792], and [RFC8754].

We might add RFC 8986 to this list, since we are using its endpoint
behaviors in our examples.

NITS

Secton 1

  any nodes within an SRv6 domain.  Specifically, the document
  illustrates how a centralized monitoring system can monitor arbitrary
  SRv6 paths by creating the loopback probes that originates and
  terminates at the centralized monitoring system.

singular/plural mismatch "probes" vs "originates and terminates".

Section 1.3

      The IPv6 address of the nth Link between node i and j at the i
      side is represented as 2001:db8:i:j:in::, e.g., the IPv6 address
      of link6 (the 2nd link) between N3 and N4 at N3 in Figure 1 is
      2001:db8:3:4:32::.  Similarly, the IPv6 address of link5 (the 1st
      link between N3 and N4) at node 3 is 2001:db8:3:4:31::.

The expansion of "in" as the contatnation of node index i and link index
n was confusing to me on first reading.  Also, it's not entirely clear
what ordering is used for the "first link" between a given pair of
nodes, since the links themselves are given absolute indices as opposed
to indices scoped to a given pair of nodes.  (Why does 'i' need to be in
the address twice, anyway?)

      2001:db8:B:k:Cij:: is explicitly allocated as the END.X SID at
      node k towards neighbor node i via jth Link between node i and
      node k.  e.g., 2001:db8:B:2:C31:: represents END.X at N2 towards

I suggest using 'n' for the link again (instead of repurposing 'j' which
used to be a node).

(Also, RFC 8986 spells it "End.X" with two minuscule and two majuscule
letters.  Similarly for just "End", as "END" appears later on in the
document.)

Section 2.1.1

  When N receives a packet whose IPv6 DA is S and S is a local SID, the
  line S01 of the pseudo-code associated with the SID S, as defined in
  section 4.3.1.1 of [RFC8754], is appended as follows for the O-flag
  processing.

Seeing "S" right after "DA" primes me to think about "source", not
"SID"; would a different label be workable?
Also, I'd s/appended/appended to/

      Ref1: An implementation SHOULD copy and record the timestamp as
      soon as possible during packet processing. Timestamp or any other
      metadata is not
      carried in the packet forwarded to the next hop.

The pseudocode does not make the inclusion of timestamp optional for
what's sent to the OAM process, so s/or/and/

Section 3.1.1

  IGP metric set to 100.  User issues a ping from node N1 to a loopback
  of node 5, via segment list <2001:db8:B:2:C31::, 2001:db8:B:4:C52::>.

s/5/N5/

  Figure 2 contains sample output for a ping request initiated at node
  N1 to the loopback address of node N5 via a segment list

s/the loopback/a loopback/ (to match the previous paragraph).

  o  Node N2, which is an SRv6-capable node, performs the standard SRH
      processing.  Specifically, it executes the END.X behavior
      (2001:db8:B:2:C31::) and forwards the packet on link3 to N3.

I suggest "executes the End.X behavior indicated by the SID
2001:db8:B:2:C31::".  (Similarly for the other End.X behavior in this
example.)

      If 2001:db8:B:4:C52:: is a PSP SID, The penultimate node (Node N4)
      does not, should not and cannot differentiate between the data
s/T/t/

Section 3.1.2

      processing.  Specifically, it executes the END.X behavior
      (2001:db8:B:2:C31::) on the echo request packet.  If

[same comment as above]

Section 3.2.1

  If an SRv6-capable ingress node wants to traceroute to IPv6 address
  via an arbitrary segment list , it needs to initiate
  traceroute probe with an SR header containing the SID list  1, it performs
      the standard SRH processing.  Specifically, it executes the END.X
      behavior (2001:db8:B:2:C31::) on the traceroute probe.  If
      2001:db8:B:2:C31:: is a PSP SID, node N4 executes the SID like any

N2 != N4; I assume this is a copy/paste issue and the "N4" should be
"N2".

  o  If the target SID (2001:db8:B:4::) is locally instantiated, the
      node processes the upper layer header.  As part of the upper layer
      header processing node N4 responses with the ICMPv6 message (Type:

s/responses/responds/

Section 3.3

      packet to be monitored via the hybrid OAM.  Node N1 sets O-flag
      during encapsulation required by policy P.  As part of setting the

"during the encapsulation"

      processing.  Specifically, it executes the END.X behavior
      (2001:db8:B:2:C31::) as described in [RFC8986] and forwards the

[same comment as in §3.1.1; also later in this section]

  o  When node N7 receives the packet P1 (2001:db8:A:1::,
      2001:db8:B:7:DT999::) (2001:db8:B:7:DT999::, 2001:db8:B:4:C52::,
      2001:db8:B:2:C31::; SL=0; O-flag=1; NH=IPv4)(IPv4
      header)(payload), it processes the O-flag.  As part of processing
      the O-flag, it sends a timestamped copy of the packet to a local
      OAM process.  The local OAM process sends a full or partial copy
      of the packet P1 to the controller N100.  The OAM process includes
      the recorded timestamp, additional OAM information like incoming
      and outgoing interface, etc. along with any applicable metadata.
      Node N4 performs the standard SRv6 SID and SRH processing on the

N4 != N7
2022-03-22
13 Benjamin Kaduk [Ballot Position Update] Position for Benjamin Kaduk has been changed to No Objection from Discuss
2022-01-31
13 John Scudder
[Ballot comment]
Thanks for the updates.

Former discuss, for posterity:

I can't get past the feeling this document is really two different documents mashed together. …
[Ballot comment]
Thanks for the updates.

Former discuss, for posterity:

I can't get past the feeling this document is really two different documents mashed together. One is a Standards Track, 6man document, that defines the O-flag. All the meat of that document is in §2.1 and §2.2, it would make a nice, compact, readable 3 or 4 page RFC (maybe a little more once all the boilerplate was in). The other is an Informational, SPRING document, that talks about use cases at some length. It seems both cruel and counterproductive to force SRv6 implementors who are implementing the O-flag to read through the entire balance of the document just to be sure they haven't missed something important. Remember these documents will live a long time, and it seems irresponsible to clutter the essential document set with inessential use cases.

My suggestion is to split the document as outlined above.


Comments:

Thanks to Stig Venaas for the Routing Directorate review.

I support Roman's discuss position.

1. The Security Directorate review (https://mailarchive.ietf.org/arch/msg/last-call/alEuF06kwZosmLsX5FkiBVwtG4k/) raises a concern about privacy that hasn't been responded to, either in email or in the draft. The review says:

  ```
      This draft defines a flag in the Segment Routing Header that when
  set will result a copy of the packet being made and forwarded for
  "telemetry data collection and export." That has tremendous security
  and privacy implications that are not mentioned at all in the Security
  Considerations. The Security Considerations just say that there's
  nothing here beyond those described in . I don't
  think that's the case.
 
      Maybe I'm completely missing something but this sounds to me like
  it enables what we used to call "service spy mode" on a router-- take
  a flow and fork a copy off to someone else. I think there needs to be
  a lot more discussion of the implications of this.
  ```

  While the revision of the Security Considerations section may be sufficient to address the "tremendous security... implications" the reviewer raises, it does nothing to address the privacy question. The reviewer has raised a serious question and deserves a serious reply to it.

2. The examples introduced in §1.3 and used throughout use the problematic convention of distinguishing unspecified portions of the IPv6 addresses with capital letters (only), as in 2001:db8::A:k::/128 (which also has an extra :: in it, by the way). It seems self-evidently a bad idea to use valid hexadecimal characters for this purpose. Please, where you don't intend to provide a literal hex digit, use a value not in the set a-f,A-F. The cited example could be rewritten as 2001:db8:X:k::/128, for example.

  Alternately, since these are examples, shown in an example topology, it's not clear to me why you couldn't simply write them out fully in real hex.

3. You use RFC 2119 terminology incorrectly many places in the document. Recall that RFC 2119 defines SHOULD as:

  ```
  3. SHOULD  This word, or the adjective "RECOMMENDED", mean that there
      may exist valid reasons in particular circumstances to ignore a
      particular item, but the full implications must be understood and
      carefully weighed before choosing a different course.
  ```

  I generally use the rule of thumb that a SHOULD is almost a MUST. Here are the places you've used SHOULD:

  ```
        Ref1: An implementation SHOULD copy and record the timestamp as
        soon as possible during packet processing. Timestamp or any other
        metadata is not
        carried in the packet forwarded to the next hop.
  ```

  Can you suggest a "particular circumstance" in which it would be OK for an implementor to NOT copy and record the timestamp "as soon as possible"? It seems as though "as soon as possible" is already a near-infinite amount of rope to allow the implementor to do anything they want, do you really need to soften it further with SHOULD? I would say this should be MUST, or give it up and make it "should" in lower-case.

  ```
      If the telemetry data from the ultimate segment in the segment-list
      is required, a penultimate segment SHOULD NOT be a Penultimate
      Segment Pop (PSP) SID.  When the penultimate segment is a PSP SID,
      the SRH will be removed and the O-flag will not be processed at the
      ultimate segment.
  ```

  Since you are stating a law of physics here (well, figuratively) the SHOULD NOT seems especially inapt. If I've understand the document correctly, if the penultimate SID is a PSP SID then this scenario just won't work. So that's not SHOULD NOT, it's either MUST NOT or more appropriately, "must not" or "can't".

  ```
      The processing node SHOULD rate-limit the number of packets punted to
      the OAM process to a configurable rate.  This is to avoid hitting any
      performance impact on the OAM and the telemetry collection processes.
      Failure in implementing the rate limit can lead to a denial-of-
      service attack, as detailed in Section 5.
  ```

  This is a semi-legitimate SHOULD -- except, what is the "particular circumstance" in which it would be OK for an implementor to NOT rate-limit? Either state it (or at least provide some hints) or make this a MUST. (I note the Routing Directorate reviewer also asked about this and received no answer.)

  ```
      The OAM process is expected to be located on the routing node
      processing the packet.  Although the specification of the OAM process
      or the external controller operations are beyond the scope of this
      document, the OAM process SHOULD NOT be topologically distant from
      the routing node, as this is likely to create significant security
      and congestion issues.
  ```

  I have no problem with this one :-o.

  ```
                                          To exercise the behavior of a
      target SID, the OAM operation SHOULD construct the probe in a manner
      similar to a data packet that exercises the SID behavior, i.e. to
      include that SID as a transit SID in either an SRH or IPv6 DA of an
      outer IPv6 header or as appropriate based on the definition of the
      SID behavior.
  ```

  Again, is there a "particular circumstance" in which the OAM operation can "exercise the behavior of a target SID" without doing this? If not, it's a MUST or (probably better) a "should".

4. In Section 2.1.1:

  ```
      The OAM process MUST NOT process the copy of the packet or respond to
      any upper-layer header (like ICMP, UDP, etc.) payload to prevent
      multiple evaluations of the datagram.
  ```

  "Process" is a very general term, taken literally this means the OAM process must not do anything at all with the copy it's given. Please be more specific about what you mean. I'd offer text if I had a good guess as to your intent, but I don't.

5. General comment, "classic IPv6". I find the recurrent use of the term "classic IPv6" along with "classic ping", "classic traceroute", etc, somehow jarring. We aren't marketing soft drinks! In most places you've used "classic" you could either provide no adjective at all (as with ping and traceroute) or replace with "SRv6-incapable". In some cases, the dichotomy isn't even needed, as in

  ```
      The existing mechanism to perform the reachability checks, along the  shortest path, continues to work without any modification.  The  initiator may be an SRv6 node or a classic IPv6 node.  Similarly, the  egress or transit may be an SRv6-capable node or a classic IPv6 node.
  ```

  The last sentence could easily be rewritten something like  “Any IPv6 node can initiate, transit, and egress a ping packet.” Similarly,

  ```
      Similarly, the egress node (IPv6 classic or SRv6-capable) does not
  ```

  could simply omit the parenthetical.

6. Nit:

  ```
      o  Node N1 initiates a traceroute probe packet with a monotonically      increasing value of hop count and SRH as follows (2001:db8:A:1::,
  ```

  "Monotonic" doesn't mean "increasing by 1 each time", which is what you mean here. There are an infinite number of valid monotonic progressions that wouldn't work for traceroute.

7. Please define "USP" before use. You should probably just put "USP" and "PSP" in §1.2.

8. Nit:

  ```
      In the reference topology in Figure 1, N100 uses an IGP protocol like  OSPF or ISIS to get the topology view within the IGP domain.  N100
  ```

  That should be "IS-IS" (with hyphen).

9. In your Security Considerations you say

  ```
      This document does not define any new protocol extensions and relies  on existing procedures defined for ICMPv6.
  ```

  Surely the O-flag, which you define, is a protocol extension.
2022-01-31
13 John Scudder [Ballot Position Update] Position for John Scudder has been changed to No Objection from Discuss
2022-01-23
13 Zafar Ali New version available: draft-ietf-6man-spring-srv6-oam-13.txt
2022-01-23
13 (System) New version accepted (logged-in submitter: Zafar Ali)
2022-01-23
13 Zafar Ali Uploaded new revision
2022-01-10
12 Roman Danyliw [Ballot comment]
Thank you to Dan Harkins for the SECDIR review.

Thank you for the edits in -12 to address my DISCUSS and COMMENT feedback.
2022-01-10
12 Roman Danyliw [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss
2021-11-28
12 (System) Changed action holders to Erik Kline (IESG state changed)
2021-11-28
12 (System) Sub state has been changed to AD Followup from Revised ID Needed
2021-11-28
12 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2021-11-28
12 Zafar Ali New version available: draft-ietf-6man-spring-srv6-oam-12.txt
2021-11-28
12 (System) New version accepted (logged-in submitter: Zafar Ali)
2021-11-28
12 Zafar Ali Uploaded new revision
2021-06-28
11 Tero Kivinen Request for Telechat review by SECDIR Completed: Ready. Reviewer: Dan Harkins. Submission of review completed at an earlier date.
2021-06-24
11 Tero Kivinen Request for Telechat review by SECDIR Completed: Ready. Reviewer: Dan Harkins.
2021-06-03
11 (System) Changed action holders to Clarence Filsfils, Zafar Ali, Mach Chen, Erik Kline, Satoru Matsushima, Dani Voyer (IESG state changed)
2021-06-03
11 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2021-06-03
11 Robert Wilton
[Ballot comment]
Hi,

Thanks for this document.  I would also like to thank Dan for the Opsdir review.

Similarly to how some fellow ADs have …
[Ballot comment]
Hi,

Thanks for this document.  I would also like to thank Dan for the Opsdir review.

Similarly to how some fellow ADs have commented, I found parts of this document tricky to read, particularly around the use of IPv6 addresses and trying to understand what is fixed and what is variable.  I suspect that the terminology is clear to engineers who are very familiar with SRv6, but is perhaps more opaque to less familiar readers.  I've added a few suggestions on how this could possible be clarified (at the authors discretion):

(1) I wonder whether the diagrams would be easier to understand if perhaps the variables used angle brackets or '$' to indicate that they are a variable.  E.g. rather than: "2001:db8:i:j:in::", would it be clearer as "2001:db8:::::" or  perhaps "2001:db8:$i:$j:$i$n::"?

(2) In other cases the locator block is defined as 2001:db8:B::/48, but it isn't defined what B is.  I presume that this identifies the block, but this should be clarified, and perhaps giving a concrete example Block number might be helpful.

(3) Similarly, "A" in the loopback address donot appear to be defined.  Nor is it clear what "C" is, in the context of "Cij" or "C23".

Separately, I also have some sympathy with John's discuss ballot where a separate Stds Track doc from the OAM flag vs an Informational draft for the Ping and traceroute examples might have been clearer.  But conversely, I can also see clear benefit in having all of SRv6 related OAM work in one document.  The document may benefit having a bit more of a clear distinction between the normative parts of the document that define new functionality and the illustrative parts of the document that just provide examples.

In particular, I would suggest:
- Changing the ordering/wording of both the abstract and introduction to describe the OAM flag first, and then the ping/traceroute examples second, which also follows the order that the concepts are discussed in the document.
- Perhaps be explicit at the beginning of section 3 that the text is not normative and only provide examples of what the existing mechanisms look like when applied to SRv6.
- Perhaps move section 1.3 to section 3, if I am right that the example is only applicable to section 3?

A couple of comments related to PSP handling:

In section 2.1.1:
  If the telemetry data from the ultimate segment in the segment-list
  is required, a penultimate segment SHOULD NOT be a Penultimate
  Segment Pop (PSP) SID.  When the penultimate segment is a PSP SID,
  the SRH will be removed and the O-flag will not be processed at the
  ultimate segment.

Would "cannot" be better than "SHOULD NOT"?  I.e., isn't this more of this just won't work rather than this won't interoperate?

Similarly, in section 3.1.1:
      The penultimate node (Node N4)
      does not, should not and cannot differentiate between the data
      packets and OAM probes.

I would suggest changing "does not, should not and cannot" to just "cannot".

Finally, it wasn't clear to me how the controller N100 is connected to topology.  Normally, I would assume that this would be over a separate management network, but then in section 3.4 it talks about loopback probes.  Hence, it wasn't clear to me whether the expectation was to be bridging data plane traffic to the management network (which seems unwise), or more likely you would have a separate dataplane connection to the controller for the loopback probes.  Adding some text to section 3.4 to clarify this may be helpful for readers.

Thanks,
Rob
2021-06-03
11 Robert Wilton [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton
2021-06-02
11 Murray Kucherawy [Ballot Position Update] Position for Murray Kucherawy has been changed to No Objection from No Record
2021-06-02
11 Murray Kucherawy
[Ballot comment]
The shepherd writeup omits an answer to the question "Why is this the proper type of RFC?"

Although "TC" and "IS-IS" are defined …
[Ballot comment]
The shepherd writeup omits an answer to the question "Why is this the proper type of RFC?"

Although "TC" and "IS-IS" are defined in the glossary in Section 1.2, they appear in no other sections.  (It's "ISIS" elsewhere.")

In Section 1.3, I don't think you can start a sentence with "e.g."

In Section 2.1: It says, "The processing node SHOULD rate-limit the number of packets ...", but no guidance is given on what a good rate might be.
2021-06-02
11 Murray Kucherawy Ballot comment text updated for Murray Kucherawy
2021-06-02
11 Benjamin Kaduk
[Ballot discuss]
In Section 3.1.2, we say that:

  o  If the target SID (2001:db8:B:4::) is not locally instantiated,
      the packet is …
[Ballot discuss]
In Section 3.1.2, we say that:

  o  If the target SID (2001:db8:B:4::) is not locally instantiated,
      the packet is discarded

However, RFC 8754 §4.3.2 seems to say that the next header is processed
in this case.  Only if the target SID is both not locally instantiated
and does not represent a local interface will the packet be discarded,
if I understand correctly.  (Similarly for the analogous statement in
§3.2.2.)


There's also quite a few other internal incosistencies in this document,
such as copy/paste chunks that refer to "N4" as executing a given SID in
a scenario where it is actually a different node doing so, many
instances where a given IP address or SID does not match up with the
addressing structure listed in Section 1.3, places where we seem to say
that an SR ingress node can be a classic IPv6 node that lacks SRv6
capabilities, etc.  Individually, many of
these would be nit-level (and indeed are called out specifically in the
NITS section of my ballot comment), but collectively they seem to
indicate a document that is not yet in publishable state.
2021-06-02
11 Benjamin Kaduk
[Ballot comment]
Thanks to Dan Harkins for the secdir review and Stig Venaas for the
opsdir review (with observation on the security considerations) and the …
[Ballot comment]
Thanks to Dan Harkins for the secdir review and Stig Venaas for the
opsdir review (with observation on the security considerations) and the
authors for updating in response to them.  I support Roman's discuss
position to make the remaining updates.

The setup introducing a couple of the examples mentions the assumed link
metric on the links in question, but none of the procedures we describe
actually make use the assumed metric information -- it seems we could
just as easily omit mention of it.

Section 1.3

      Nodes N3, N5 and N6 are IPv6 nodes that are not SRv6-capable.
      Such nodes are referred as classic IPv6 nodes.

Can I suggest using a different adjective than "classic" for this, perhaps
"standard"?  The word "classic" can come with some connotations of being
old, outdated, or legacy, and I don't think we have IETF consensus that
SRv6 is the next evolution of IPv6 that relegates "classic IPv6" to such
a legacy status.

      A SID at node k with locator block 2001:db8:B::/48 and function F
      is represented by 2001:db8:B:k:F::.
  [...]
      2001:db8:B:k:Cij:: is explicitly allocated as the END.X SID at
      node k towards neighbor node i via jth Link between node i and
      node k.  e.g., 2001:db8:B:2:C31:: represents END.X at N2 towards

What is the "function F" in this example?  My understanding was that the
function would correspond to just End.X (and thus the value "C" for that
16-bit component), with the "ij" information needing to be in the
"argument".

Section 2.1.1

  The O-flag in SRH is used as a marking-bit in the user packets to
  trigger the telemetry data collection and export at the segment
  endpoints.

If it's to be set in "user packets", who exactly is it that sets the mark?

  controller for monitoring and analytics.  Similarly, without the loss
  of generality, this document assumes requested information elements
  are configured by the management plane through data set templates
  (e.g., as in IPFIX [RFC7012]).

Can we say anything about the scope for which the set of requested
information elements are configured?  I mostly assume that it's expected
to, say, configure node A to export some information on seeing the
O-flag, and configure node B to export different information on seeing
the O-flag.  But can it be configured at a finer granularity than just
"node", e.g., at a per-flow level?

  If the telemetry data from the ultimate segment in the segment-list
  is required, a penultimate segment SHOULD NOT be a Penultimate
  Segment Pop (PSP) SID.  When the penultimate segment is a PSP SID,
  the SRH will be removed and the O-flag will not be processed at the
  ultimate segment.

This looks like a statement of fact to me, with no need to strengthen it
by normative langauge.  If you need telemetry from the ultimate segment,
and PSP is used, you won't get telemetry based on the SRH O-flag, and
that's that.

Section 2.2

  IPv6 OAM operations can be performed for any SRv6 SID whose behavior
  allows Upper Layer Header processing for an applicable OAM payload
  (e.g., ICMP, UDP).

What options are available for SIDs whose behavior does not allow such
ULH processing?

  to the correct outgoing interface.  To exercise the behavior of a
  target SID, the OAM operation SHOULD construct the probe in a manner
  similar to a data packet that exercises the SID behavior, i.e. to
  include that SID as a transit SID in either an SRH or IPv6 DA of an
  outer IPv6 header or as appropriate based on the definition of the
  SID behavior.

I think I understand what is meant by putting the target SID as a
transit SID in a SRH (or encapsulated analogue).  I'm not sure how this
would specifically validate that the node is exercising the behavior in
question (End.X here, so switching to the proper outgoing interface).
That is, if I'm trying to ping a given SID and confirm that it does
End.X properly, how does just adding an SRH confirm the cross-connect
part if I am still pinging that SID?  Do I need to target the ping at
the "next" SID in the SID list in order to actually use the
cross-connect?

Section 3.1.1

  IGP metric set to 100.  User issues a ping from node N1 to a loopback
  of node 5, via segment list <2001:db8:B:2:C31::, 2001:db8:B:4:C52::>.

How does a *user* issue a ping (directly) with an associated segment
list?  This seems to no longer be a "classic ping" mechanism as written
... perhaps there is some automated component in the system that
translates what the user put in the packet into a segment list?  Or
should we reference some ping utility that is patched to accept
segment-list input in the vein of Figure 2?
(A similar comment applies to the traceroute analogue in Section 3.2.1.)

  o  The echo request packet at N5 arrives as an IPv6 packet with or
      without an SRH.  If N5 receives the packet with SRH, it skips SRH
      processing (SL=0).  In either case, Node N5 performs the standard
      ICMPv6 processing on the echo request and responds with the echo
      reply message to N1.  The echo reply message is IP routed.

I think the tsv-art reviewer's remark that "the echo reply message is IP
routed" could hide quite a lot, is pretty accurate.  It seems worth
stating clearly that it does not have an SRH so that the reader can work
through the consequences for deployments where there is no native IP
connectivity for the return path.

Section 3.2

  operation at the classic IPv6 nodes in an SRv6 network.  That
  includes the classic IPv6 node with ingress, egress or transit roles.

I'm a little confused at what it would mean for a "classic IPv6" node to
act as the *ingress* role.  What is ingress, if not entrance to the SR
domain and applying an SRH?

Section 3.2.1, 3.2.2

Where do the 2001:db8:1:2:21::, 2001:db8:2:3:31::, 2001:db8:3:4::41::,
2001:db8:4:5::52:: come from?  They don't seem to match the stated
structure for "nth link between node i and j at the i side"
(2001:db8:i:j:in::); was there supposed to be a separate case for "at
the j side" in the terminology section?

Section 3.3

  o  The controller N100 processes and correlates the copy of the
      packets sent from nodes N1, N4 and N7 to find segment-by-segment
      delays and provide other hybrid OAM information related to packet
      P1.

If the controller is going to coalesce timestamped data from the various
SRv6 nodes, we need to have some discussion of the requirement for
synchronized time across the SR domain (or controller knowledge of time
offsets, which is essentially equivalent).

Section 5

  service attack.  Additionally, SRH Flags are protected by the HMAC
  TLV, as described in Section 2.1.2.1 of [RFC8754].

I think we should remind the reader that the HMAC protection is very
coarse-grained, and that once an HMAC exists that allows setting the
O-flag for a given segment list, it can be used to produce an arbitrary
amount of such traffic.

  This document does not impose any additional security challenges to
  be considered beyond security threats described in [RFC4884],
  [RFC4443], [RFC0792], and [RFC8754].

We might add RFC 8986 to this list, since we are using its endpoint
behaviors in our examples.

NITS

Secton 1

  any nodes within an SRv6 domain.  Specifically, the document
  illustrates how a centralized monitoring system can monitor arbitrary
  SRv6 paths by creating the loopback probes that originates and
  terminates at the centralized monitoring system.

singular/plural mismatch "probes" vs "originates and terminates".

Section 1.3

      The IPv6 address of the nth Link between node i and j at the i
      side is represented as 2001:db8:i:j:in::, e.g., the IPv6 address
      of link6 (the 2nd link) between N3 and N4 at N3 in Figure 1 is
      2001:db8:3:4:32::.  Similarly, the IPv6 address of link5 (the 1st
      link between N3 and N4) at node 3 is 2001:db8:3:4:31::.

The expansion of "in" as the contatnation of node index i and link index
n was confusing to me on first reading.  Also, it's not entirely clear
what ordering is used for the "first link" between a given pair of
nodes, since the links themselves are given absolute indices as opposed
to indices scoped to a given pair of nodes.  (Why does 'i' need to be in
the address twice, anyway?)

      2001:db8:B:k:Cij:: is explicitly allocated as the END.X SID at
      node k towards neighbor node i via jth Link between node i and
      node k.  e.g., 2001:db8:B:2:C31:: represents END.X at N2 towards

I suggest using 'n' for the link again (instead of repurposing 'j' which
used to be a node).

(Also, RFC 8986 spells it "End.X" with two minuscule and two majuscule
letters.  Similarly for just "End", as "END" appears later on in the
document.)

Section 2.1.1

  When N receives a packet whose IPv6 DA is S and S is a local SID, the
  line S01 of the pseudo-code associated with the SID S, as defined in
  section 4.3.1.1 of [RFC8754], is appended as follows for the O-flag
  processing.

Seeing "S" right after "DA" primes me to think about "source", not
"SID"; would a different label be workable?
Also, I'd s/appended/appended to/

      Ref1: An implementation SHOULD copy and record the timestamp as
      soon as possible during packet processing. Timestamp or any other
      metadata is not
      carried in the packet forwarded to the next hop.

The pseudocode does not make the inclusion of timestamp optional for
what's sent to the OAM process, so s/or/and/

Section 3.1.1

  IGP metric set to 100.  User issues a ping from node N1 to a loopback
  of node 5, via segment list <2001:db8:B:2:C31::, 2001:db8:B:4:C52::>.

s/5/N5/

  Figure 2 contains sample output for a ping request initiated at node
  N1 to the loopback address of node N5 via a segment list

s/the loopback/a loopback/ (to match the previous paragraph).

  o  Node N2, which is an SRv6-capable node, performs the standard SRH
      processing.  Specifically, it executes the END.X behavior
      (2001:db8:B:2:C31::) and forwards the packet on link3 to N3.

I suggest "executes the End.X behavior indicated by the SID
2001:db8:B:2:C31::".  (Similarly for the other End.X behavior in this
example.)

      If 2001:db8:B:4:C52:: is a PSP SID, The penultimate node (Node N4)
      does not, should not and cannot differentiate between the data
s/T/t/

Section 3.1.2

      processing.  Specifically, it executes the END.X behavior
      (2001:db8:B:2:C31::) on the echo request packet.  If

[same comment as above]

Section 3.2.1

  If an SRv6-capable ingress node wants to traceroute to IPv6 address
  via an arbitrary segment list , it needs to initiate
  traceroute probe with an SR header containing the SID list  1, it performs
      the standard SRH processing.  Specifically, it executes the END.X
      behavior (2001:db8:B:2:C31::) on the traceroute probe.  If
      2001:db8:B:2:C31:: is a PSP SID, node N4 executes the SID like any

N2 != N4; I assume this is a copy/paste issue and the "N4" should be
"N2".

  o  If the target SID (2001:db8:B:4::) is locally instantiated, the
      node processes the upper layer header.  As part of the upper layer
      header processing node N4 responses with the ICMPv6 message (Type:

s/responses/responds/

Section 3.3

      packet to be monitored via the hybrid OAM.  Node N1 sets O-flag
      during encapsulation required by policy P.  As part of setting the

"during the encapsulation"

      processing.  Specifically, it executes the END.X behavior
      (2001:db8:B:2:C31::) as described in [RFC8986] and forwards the

[same comment as in §3.1.1; also later in this section]

  o  When node N7 receives the packet P1 (2001:db8:A:1::,
      2001:db8:B:7:DT999::) (2001:db8:B:7:DT999::, 2001:db8:B:4:C52::,
      2001:db8:B:2:C31::; SL=0; O-flag=1; NH=IPv4)(IPv4
      header)(payload), it processes the O-flag.  As part of processing
      the O-flag, it sends a timestamped copy of the packet to a local
      OAM process.  The local OAM process sends a full or partial copy
      of the packet P1 to the controller N100.  The OAM process includes
      the recorded timestamp, additional OAM information like incoming
      and outgoing interface, etc. along with any applicable metadata.
      Node N4 performs the standard SRv6 SID and SRH processing on the

N4 != N7
2021-06-02
11 Benjamin Kaduk [Ballot Position Update] New position, Discuss, has been recorded for Benjamin Kaduk
2021-06-02
11 John Scudder
[Ballot discuss]
I can't get past the feeling this document is really two different documents mashed together. One is a Standards Track, 6man document, that …
[Ballot discuss]
I can't get past the feeling this document is really two different documents mashed together. One is a Standards Track, 6man document, that defines the O-flag. All the meat of that document is in §2.1 and §2.2, it would make a nice, compact, readable 3 or 4 page RFC (maybe a little more once all the boilerplate was in). The other is an Informational, SPRING document, that talks about use cases at some length. It seems both cruel and counterproductive to force SRv6 implementors who are implementing the O-flag to read through the entire balance of the document just to be sure they haven't missed something important. Remember these documents will live a long time, and it seems irresponsible to clutter the essential document set with inessential use cases.

My suggestion is to split the document as outlined above.
2021-06-02
11 John Scudder
[Ballot comment]
Thanks to Stig Venaas for the Routing Directorate review.

I support Roman's discuss position.

1. The Security Directorate review (https://mailarchive.ietf.org/arch/msg/last-call/alEuF06kwZosmLsX5FkiBVwtG4k/) raises …
[Ballot comment]
Thanks to Stig Venaas for the Routing Directorate review.

I support Roman's discuss position.

1. The Security Directorate review (https://mailarchive.ietf.org/arch/msg/last-call/alEuF06kwZosmLsX5FkiBVwtG4k/) raises a concern about privacy that hasn't been responded to, either in email or in the draft. The review says:

  ```
      This draft defines a flag in the Segment Routing Header that when
  set will result a copy of the packet being made and forwarded for
  "telemetry data collection and export." That has tremendous security
  and privacy implications that are not mentioned at all in the Security
  Considerations. The Security Considerations just say that there's
  nothing here beyond those described in . I don't
  think that's the case.
 
      Maybe I'm completely missing something but this sounds to me like
  it enables what we used to call "service spy mode" on a router-- take
  a flow and fork a copy off to someone else. I think there needs to be
  a lot more discussion of the implications of this.
  ```

  While the revision of the Security Considerations section may be sufficient to address the "tremendous security... implications" the reviewer raises, it does nothing to address the privacy question. The reviewer has raised a serious question and deserves a serious reply to it.

2. The examples introduced in §1.3 and used throughout use the problematic convention of distinguishing unspecified portions of the IPv6 addresses with capital letters (only), as in 2001:db8::A:k::/128 (which also has an extra :: in it, by the way). It seems self-evidently a bad idea to use valid hexadecimal characters for this purpose. Please, where you don't intend to provide a literal hex digit, use a value not in the set a-f,A-F. The cited example could be rewritten as 2001:db8:X:k::/128, for example.

  Alternately, since these are examples, shown in an example topology, it's not clear to me why you couldn't simply write them out fully in real hex.

3. You use RFC 2119 terminology incorrectly many places in the document. Recall that RFC 2119 defines SHOULD as:

  ```
  3. SHOULD  This word, or the adjective "RECOMMENDED", mean that there
      may exist valid reasons in particular circumstances to ignore a
      particular item, but the full implications must be understood and
      carefully weighed before choosing a different course.
  ```

  I generally use the rule of thumb that a SHOULD is almost a MUST. Here are the places you've used SHOULD:

  ```
        Ref1: An implementation SHOULD copy and record the timestamp as
        soon as possible during packet processing. Timestamp or any other
        metadata is not
        carried in the packet forwarded to the next hop.
  ```

  Can you suggest a "particular circumstance" in which it would be OK for an implementor to NOT copy and record the timestamp "as soon as possible"? It seems as though "as soon as possible" is already a near-infinite amount of rope to allow the implementor to do anything they want, do you really need to soften it further with SHOULD? I would say this should be MUST, or give it up and make it "should" in lower-case.

  ```
      If the telemetry data from the ultimate segment in the segment-list
      is required, a penultimate segment SHOULD NOT be a Penultimate
      Segment Pop (PSP) SID.  When the penultimate segment is a PSP SID,
      the SRH will be removed and the O-flag will not be processed at the
      ultimate segment.
  ```

  Since you are stating a law of physics here (well, figuratively) the SHOULD NOT seems especially inapt. If I've understand the document correctly, if the penultimate SID is a PSP SID then this scenario just won't work. So that's not SHOULD NOT, it's either MUST NOT or more appropriately, "must not" or "can't".

  ```
      The processing node SHOULD rate-limit the number of packets punted to
      the OAM process to a configurable rate.  This is to avoid hitting any
      performance impact on the OAM and the telemetry collection processes.
      Failure in implementing the rate limit can lead to a denial-of-
      service attack, as detailed in Section 5.
  ```

  This is a semi-legitimate SHOULD -- except, what is the "particular circumstance" in which it would be OK for an implementor to NOT rate-limit? Either state it (or at least provide some hints) or make this a MUST. (I note the Routing Directorate reviewer also asked about this and received no answer.)

  ```
      The OAM process is expected to be located on the routing node
      processing the packet.  Although the specification of the OAM process
      or the external controller operations are beyond the scope of this
      document, the OAM process SHOULD NOT be topologically distant from
      the routing node, as this is likely to create significant security
      and congestion issues.
  ```

  I have no problem with this one :-o.

  ```
                                          To exercise the behavior of a
      target SID, the OAM operation SHOULD construct the probe in a manner
      similar to a data packet that exercises the SID behavior, i.e. to
      include that SID as a transit SID in either an SRH or IPv6 DA of an
      outer IPv6 header or as appropriate based on the definition of the
      SID behavior.
  ```

  Again, is there a "particular circumstance" in which the OAM operation can "exercise the behavior of a target SID" without doing this? If not, it's a MUST or (probably better) a "should".

4. In Section 2.1.1:

  ```
      The OAM process MUST NOT process the copy of the packet or respond to
      any upper-layer header (like ICMP, UDP, etc.) payload to prevent
      multiple evaluations of the datagram.
  ```

  "Process" is a very general term, taken literally this means the OAM process must not do anything at all with the copy it's given. Please be more specific about what you mean. I'd offer text if I had a good guess as to your intent, but I don't.

5. General comment, "classic IPv6". I find the recurrent use of the term "classic IPv6" along with "classic ping", "classic traceroute", etc, somehow jarring. We aren't marketing soft drinks! In most places you've used "classic" you could either provide no adjective at all (as with ping and traceroute) or replace with "SRv6-incapable". In some cases, the dichotomy isn't even needed, as in

  ```
      The existing mechanism to perform the reachability checks, along the  shortest path, continues to work without any modification.  The  initiator may be an SRv6 node or a classic IPv6 node.  Similarly, the  egress or transit may be an SRv6-capable node or a classic IPv6 node.
  ```

  The last sentence could easily be rewritten something like  “Any IPv6 node can initiate, transit, and egress a ping packet.” Similarly,

  ```
      Similarly, the egress node (IPv6 classic or SRv6-capable) does not
  ```

  could simply omit the parenthetical.

6. Nit:

  ```
      o  Node N1 initiates a traceroute probe packet with a monotonically      increasing value of hop count and SRH as follows (2001:db8:A:1::,
  ```

  "Monotonic" doesn't mean "increasing by 1 each time", which is what you mean here. There are an infinite number of valid monotonic progressions that wouldn't work for traceroute.

7. Please define "USP" before use. You should probably just put "USP" and "PSP" in §1.2.

8. Nit:

  ```
      In the reference topology in Figure 1, N100 uses an IGP protocol like  OSPF or ISIS to get the topology view within the IGP domain.  N100
  ```

  That should be "IS-IS" (with hyphen).

9. In your Security Considerations you say

  ```
      This document does not define any new protocol extensions and relies  on existing procedures defined for ICMPv6.
  ```

  Surely the O-flag, which you define, is a protocol extension.
2021-06-02
11 John Scudder [Ballot Position Update] New position, Discuss, has been recorded for John Scudder
2021-06-02
11 Roman Danyliw
[Ballot discuss]
The privacy implications of the O-flag needs to be more clearly articulated.  It provides a dual use capability -- there is tangible benefit …
[Ballot discuss]
The privacy implications of the O-flag needs to be more clearly articulated.  It provides a dual use capability -- there is tangible benefit for OAM use cases, but also reduces the friction for surveillance uses cases.

The SECDIR review (https://mailarchive.ietf.org/arch/msg/secdir/FeTu7x7-okw7w7-T6dZRFhJHpAo/) pointed this out in -09.  The changes made to the Security Considerations in -10 were helpful, but primarily focused on reiterating the security assumptions of the SR domain boundary and the degree of protection of the SRH. 

My recommendation would be for an explicit Privacy Considerations section with the following (approximate) text:

NEW
7.  Privacy Considerations

The per-packet marking capabilities of the O-flag provides a granular mechanism to collect telemetry.  When this collection is deployed by an operator with knowledge and consent of the users, it will enable a variety of diagnostics and monitoring to support the OAM and security operations use cases needed for resilient network operations.  However, this collection mechanism will also provide an explicit protocol mechanism to operators for surveillance and pervasive monitoring use cases done contrary to the users’ consent.
2021-06-02
11 Roman Danyliw
[Ballot comment]
Thank you to Dan Harkins for the SECDIR review.

** Section 5.  Even with the trust assumptions of the SR domain, it would …
[Ballot comment]
Thank you to Dan Harkins for the SECDIR review.

** Section 5.  Even with the trust assumptions of the SR domain, it would be worth mentioning that:

The security properties of the channel used to send exported packets marked by the O-flag will depend on the specific OAM processes used.  An on-path attacker able to observe this OAM channel could conduct traffic analysis, or potentially eavesdropping (depending on the OAM configuration), of this telemetry for the entire SR domain from such a vantage point. 

** Section 5.  Per “Additionally, SRH Flags are protected by the HMAC TLV, as described in Section 2.1.2.1 of [RFC8754]”, I didn’t follow to what this was referring to.  Also, isn’t this TLV optional?
2021-06-02
11 Roman Danyliw [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw
2021-06-02
11 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2021-06-02
11 Francesca Palombini
[Ballot comment]
Thank you for the work on this document. A couple of minor comments below.

Francesca

1. -----

FP: I believe the document could …
[Ballot comment]
Thank you for the work on this document. A couple of minor comments below.

Francesca

1. -----

FP: I believe the document could use a sentence in the terminology pointing the reader to references that describe the terminology used (such as "Custumer Edge", "locator block", "function F", "controller", "END.X", "SegmentsLeft") - No need to transcribe each term, but it would add clarity to state "The reader is expected to be familiar with terms and concepts from .... "

2. -----

FP: Additionally, I think it would make sense to have RFC 8986 as normative reference.

3. -----

  When N receives a packet whose IPv6 DA is S and S is a local SID, the
  line S01 of the pseudo-code associated with the SID S, as defined in
  section 4.3.1.1 of [RFC8754], is appended as follows for the O-flag
  processing.

FP: suggestion to rephrase so that S01.1 becomes the subject "S01.1 is appended to the line S01 ... "

4. -----

  The processing node SHOULD rate-limit the number of packets punted to
  the OAM process to a configurable rate.  This is to avoid hitting any

FP: Should this document define a default to this rate? Or is this defined somewhere else?

5. -----

      2001:db8:B:2:C31:: is a PSP SID, node N4 executes the SID like any
      other data packet with DA = 2001:db8:B:2:C31:: and removes the

FP: (Section 3.1.2) s/N4/N2

6. -----

  2001:db8:B:7:DT999::.  2001:db8:B:7:DT999:: is a USP SID.  N1, N4,

FP: Please define (or reference where it is defined) USP SID

7. -----

  Controller N100 with the help from nodes N1, N4, N7 and implements a
  hybrid OAM mechanism using the O-flag as follows:

FP: "and" seems quite out of place.

8. -----

      Node N4 performs the standard SRv6 SID and SRH processing on the
      original packet P1.  Specifically, it executes the VPN SID

FP: (Section 3.3) s/N4/N7
2021-06-02
11 Francesca Palombini [Ballot Position Update] New position, No Objection, has been recorded for Francesca Palombini
2021-06-02
11 Éric Vyncke
[Ballot comment]
Top posting: thank you for the quick fix on my two DISCUSS points (I told you there were easy to fix). I also …
[Ballot comment]
Top posting: thank you for the quick fix on my two DISCUSS points (I told you there were easy to fix). I also like the added text to address Martin Duke's DISCUSS point.  I kept the non-blocking COMMENT points below.
----

Thank you for the work put into this document. It is comforting (even if not surprising) that the simple "good old" ping/traceroute work on a SRv6 network ;-)

Thanks to Carlos Bernardos for his INT-REVIEW at
https://datatracker.ietf.org/doc/review-ietf-6man-spring-srv6-oam-10-intdir-telechat-bernardos-2021-05-28/

Thanks to Ole Trøan for his shepherd document even if I regret the lack of justification for 'standards track'. Especially, because the abstract is mainly about ping/traceroute, hence should be informational but the O-flag is indeed standard track. So, all in all, this is OK.

Please find below some non-blocking COMMENT points (but replies would be appreciated), and one nit.

I hope that this helps to improve the document,

Regards,

-éric

== COMMENTS ==

Is there any reason not to follow RFC 5952 about IPv6 address representation? I.e., not using uppercase ;-) (you may use uppercase for the 'variable' such as k). I understand that changing the case is a long and cumbersome endeavor... This comment is of course non-blocking.

About the O-flag, as this I-D is about OAM, I would have expected that the document specifies some operational recommendations, e.g., collecting statistics about O-flag processing: packet count, requests ignored, ...

-- Section 1 --
In the first sentence, is it RFC 8402 or RFC 8754 ?

-- Section 1.3 --
I was about to raise a DISCUSS on this one... the abstract and introduction is about SRv6 and this section uses network programming example with END.X. Suggest to either modify abstract / introduction to mention RFC 8986 or simplify the example by not using END.X (e.g., not mentioning END.X as the plain SRH adj-sid behavior is END.X -- no need IMHO to introduce the network programming nomenclature).

-- Section 2.1 --
Not important and feel free to ignore, but, while telemetry operation is important for OAM, OAM is broader than plain "telemetry data collect and export" (IMHO). I would have preferred the use of 'telemetry marking' for example. But, I guess it is too late to change the O-flag into a T-flag ;-)

In "packet header", is the layer-2 header included ? IPFIX can export layer-2 information, hence my question. Perhaps better to use "IP header" here ?

-- Section 2.1.1 --
I was again about the raise a DISCUSS on this point, S01.1 appears to be applicable to SRH/RFC 8754 while the text about PSP is clearly about net-pgm/RFC 8986. How can we reconciliate this ?

Finally, in the case of PSP, should the normative pseudo-code be changed by introducing another 'if' in the pseudo-code ?

-- Section 3.1.1 --
The figure 2 seems to have an incoherent 'screen shot' as 2001:db8:A:5:: is used as the ping target but the output of the ping displays "B5::". What did I miss ?

The node N4 is assumed to "performs the standard SRH processing" but later it needs to process a "PSP SID", which is not standard SRH RFC but in the net-pgm one.

-- Section 3.2.1 --
I wonder whether "These ICMPv6 responses are IP routed." is really useful here as plain IP routing will be applied (or do you mean no using SRH in the reply?).

The example uses "DA" while I would expect that this would be the "SA" of the received ICMP messages. But, this is cosmetic.

-- Section 3.2.2 --
What is a "classic IPv6 node" ? I guess it is a 'non SRv6-capable node' => to be added in the terminology section ?

-- Section 3.3 --
"The local OAM process sends a full or partial copy" it really smells like a postcard OAM while IPFIX can be used to send aggregated data, which is also very useful. All in all, if this is a local send to another process, then worth mentioning it.

== NITS ==

-- Section 1.3 --
As figure 1 uses a double border for SRv6-capable nodes, let's mention it in the text.
2021-06-02
11 Éric Vyncke [Ballot Position Update] Position for Éric Vyncke has been changed to No Objection from Discuss
2021-06-02
11 Warren Kumari [Ballot comment]
Thank to Dan for his OpsDir review.
2021-06-02
11 Warren Kumari [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari
2021-06-02
11 Martin Duke
[Ballot comment]
Thank you for addressing the TSVART comments (and to Magnus for the review) and my DISCUSS.

I see that some of the contributors …
[Ballot comment]
Thank you for addressing the TSVART comments (and to Magnus for the review) and my DISCUSS.

I see that some of the contributors are in common, but this would appear to have substantial overlap with https://datatracker.ietf.org/doc/draft-ietf-ippm-ioam-direct-export/.
2021-06-02
11 Martin Duke [Ballot Position Update] Position for Martin Duke has been changed to No Objection from Discuss
2021-06-02
11 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2021-06-02
11 Zafar Ali New version available: draft-ietf-6man-spring-srv6-oam-11.txt
2021-06-02
11 (System) New version accepted (logged-in submitter: Zafar Ali)
2021-06-02
11 Zafar Ali Uploaded new revision
2021-06-01
10 Éric Vyncke
[Ballot discuss]
Thank you for the work put into this document. It is comforting (even if not surprising) that the simple "good old" ping/traceroute work …
[Ballot discuss]
Thank you for the work put into this document. It is comforting (even if not surprising) that the simple "good old" ping/traceroute work on a SRv6 network ;-)

Thanks to Carlos Bernardos for his INT-REVIEW at
https://datatracker.ietf.org/doc/review-ietf-6man-spring-srv6-oam-10-intdir-telechat-bernardos-2021-05-28/

Thanks to Ole Trøan for his shepherd document even if I regret the lack of justification for 'standards track'. Especially, because the abstract is mainly about ping/traceroute, hence should be informational but the O-flag is indeed standard track. So, all in all, this is OK.

Please find below two blocking but trivial DISCUSS points, some non-blocking COMMENT points (but replies would be appreciated), and one nit.

I hope that this helps to improve the document,

Regards,

-éric

== DISCUSS ==

-- Section 2.1 --
As "a penultimate segment SHOULD NOT be a Penultimate Segment Pop (PSP) SID" is normative, then the network programming RFC 8986 should be a normative reference. Trivial to fix.

-- Section 9.2 --
Trivial to fix, RFC 8174 should be normative.
2021-06-01
10 Éric Vyncke
[Ballot comment]
== COMMENTS ==

Is there any reason not to follow RFC 5952 about IPv6 address representation? I.e., not using uppercase ;-) (you may …
[Ballot comment]
== COMMENTS ==

Is there any reason not to follow RFC 5952 about IPv6 address representation? I.e., not using uppercase ;-) (you may use uppercase for the 'variable' such as k). I understand that changing the case is a long and cumbersome endeavor... This comment is of course non-blocking.

About the O-flag, as this I-D is about OAM, I would have expected that the document specifies some operational recommendations, e.g., collecting statistics about O-flag processing: packet count, requests ignored, ...

-- Section 1 --
In the first sentence, is it RFC 8402 or RFC 8754 ?

-- Section 1.3 --
I was about to raise a DISCUSS on this one... the abstract and introduction is about SRv6 and this section uses network programming example with END.X. Suggest to either modify abstract / introduction to mention RFC 8986 or simplify the example by not using END.X (e.g., not mentioning END.X as the plain SRH adj-sid behavior is END.X -- no need IMHO to introduce the network programming nomenclature).

-- Section 2.1 --
Not important and feel free to ignore, but, while telemetry operation is important for OAM, OAM is broader than plain "telemetry data collect and export" (IMHO). I would have preferred the use of 'telemetry marking' for example. But, I guess it is too late to change the O-flag into a T-flag ;-)

In "packet header", is the layer-2 header included ? IPFIX can export layer-2 information, hence my question. Perhaps better to use "IP header" here ?

-- Section 2.1.1 --
I was again about the raise a DISCUSS on this point, S01.1 appears to be applicable to SRH/RFC 8754 while the text about PSP is clearly about net-pgm/RFC 8986. How can we reconciliate this ?

Finally, in the case of PSP, should the normative pseudo-code be changed by introducing another 'if' in the pseudo-code ?

-- Section 3.1.1 --
The figure 2 seems to have an incoherent 'screen shot' as 2001:db8:A:5:: is used as the ping target but the output of the ping displays "B5::". What did I miss ?

The node N4 is assumed to "performs the standard SRH processing" but later it needs to process a "PSP SID", which is not standard SRH RFC but in the net-pgm one.

-- Section 3.2.1 --
I wonder whether "These ICMPv6 responses are IP routed." is really useful here as plain IP routing will be applied (or do you mean no using SRH in the reply?).

The example uses "DA" while I would expect that this would be the "SA" of the received ICMP messages. But, this is cosmetic.

-- Section 3.2.2 --
What is a "classic IPv6 node" ? I guess it is a 'non SRv6-capable node' => to be added in the terminology section ?

-- Section 3.3 --
"The local OAM process sends a full or partial copy" it really smells like a postcard OAM while IPFIX can be used to send aggregated data, which is also very useful. All in all, if this is a local send to another process, then worth mentioning it.

== NITS ==

-- Section 1.3 --
As figure 1 uses a double border for SRv6-capable nodes, let's mention it in the text.
2021-06-01
10 Éric Vyncke [Ballot Position Update] New position, Discuss, has been recorded for Éric Vyncke
2021-06-01
10 Alvaro Retana
[Ballot comment]
Just a couple of minor comments -- no need to reply.

(1) §3.3: The mention of/comparison with draft-ietf-ippm-ioam-data seems unnecessary.

(2) rfc8174 should …
[Ballot comment]
Just a couple of minor comments -- no need to reply.

(1) §3.3: The mention of/comparison with draft-ietf-ippm-ioam-data seems unnecessary.

(2) rfc8174 should be a Normative reference.
2021-06-01
10 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2021-06-01
10 Martin Vigoureux
[Ballot comment]
Hi,

I'm only reporting few nits that I think I have found. I may have a couple of questions later.


      …
[Ballot comment]
Hi,

I'm only reporting few nits that I think I have found. I may have a couple of questions later.


      TC: Traffic Class.
this is apparently not used in the document.
Also, IGP, OSPF and ISIS are in fact well-known abbreviations.

I find this:
  The information elements include parts of the packet header and/or
  parts of the packet payload for flow identification.
Slightly in contradiction with:
  This document does not specify the data elements that need to be
  exported

  If a node supports the O-flag, it can optionally advertise its
  potential via control plane protocol(s).
Should an Informative reference, for example to draft-ietf-idr-bgpls-srv6-ext, be added here?

The traceroute examples (Fig 3 and 4) don't seem to follow the 2001:db8:i:j:in:: convention.

In 3.1.2 and 3.2.2
  node N4 executes the SID
I think it is N2


s/2001:db8::A:k::/128/2001:db8:A:k::/128/

s/B5::/2001:db8:A:5::/

s/2001:db8:4:5::52::/2001:db8:4:5:52::/

s/node 5/node N5/ (twice)
s/node 3/node N3/
2021-06-01
10 Martin Vigoureux Ballot comment text updated for Martin Vigoureux
2021-06-01
10 Martin Vigoureux
[Ballot comment]
Hi,

I'm only reporting few nits that I think I have found. I may have a couple of questions later.


      …
[Ballot comment]
Hi,

I'm only reporting few nits that I think I have found. I may have a couple of questions later.


      TC: Traffic Class.
this is apparently not used in the document.
Also, IGP, OSPF and ISIS are in fact well-known abbreviations.

I find this:
  The information elements include parts of the packet header and/or
  parts of the packet payload for flow identification.
Slightly in contradiction with:
  This document does not specify the data elements that need to be
  exported

  If a node supports the O-flag, it can optionally advertise its
  potential via control plane protocol(s).
Should a Informative reference, for example to draft-ietf-idr-bgpls-srv6-ext, be added here?

The traceroute examples (Fig 3 and 4) don't seem to follow the 2001:db8:i:j:in:: convention.

In 3.1.2 and 3.2.2
  node N4 executes the SID
I think it is N2


s/2001:db8::A:k::/128/2001:db8:A:k::/128/

s/B5::/2001:db8:A:5::/

s/2001:db8:4:5::52::/2001:db8:4:5:52::/

s/node 5/node N5/ (twice)
s/node 3/node N3/
2021-06-01
10 Martin Vigoureux [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux
2021-05-28
10 Carlos Jesús Bernardos Request for Telechat review by INTDIR Completed: Ready with Nits. Reviewer: Carlos Bernardos. Sent review to list.
2021-05-27
10 Tero Kivinen Request for Telechat review by SECDIR is assigned to Dan Harkins
2021-05-27
10 Tero Kivinen Request for Telechat review by SECDIR is assigned to Dan Harkins
2021-05-26
10 Lars Eggert
[Ballot comment]
Section 3.3, paragraph 3, nit:
-    The illustration is different than the In-situ OAM defined in [I.D-
-          …
[Ballot comment]
Section 3.3, paragraph 3, nit:
-    The illustration is different than the In-situ OAM defined in [I.D-
-                                                                    --
-    draft-ietf-ippm-ioam-data].  This is because In-situ OAM records
-    ------
+    The illustration is different than the In-situ OAM defined in [I-D.
+                                                                    ++
+    ietf-ippm-ioam-data].  This is because In-situ OAM records

Section 3.3, paragraph 3, nit:
-    traverses a path between two points in the network [I.D-draft-ietf-
-                                                          --------
+    traverses a path between two points in the network [I-D.ietf-
+                                                        ++

Matt Joras flagged these broken references to draft-ietf-ippm-ioam-data
in his GenART review; I guess they were not fixed in -10 after all?

-------------------------------------------------------------------------------

All comments below are about very minor potential issues that you may choose to
address in some way - or ignore - as you see fit. Some were flagged by
automated tools (via https://github.com/larseggert/ietf-reviewtool), so there
will likely be some false positives. There is no need to let me know what you
did with these suggestions.

Section 3.2.1, paragraph 3, nit:
-    via an arbitrary segment list , it needs to initiate
+    via an arbitrary segment list , it needs to initiate a
+                                                                    ++

Section 1.3, paragraph 13, nit:
> convenient. * (payload) represents the the payload of the packet. 2. OAM Mech
>                                    ^^^^^^^
Maybe you need to remove one determiner so that only "the" or "the" is left.

Section 3.2.2, paragraph 5, nit:
> rates a hybrid OAM mechanism using the the O-flag. Without loss of the genera
>                                    ^^^^^^^
Maybe you need to remove one determiner so that only "the" or "the" is left.

Document references draft-gandhi-spring-stamp-srpm-04, but -06 is the latest
available revision.

Document references draft-ietf-ippm-ioam-data-11, but -12 is the latest
available revision.

Document references draft-matsushima-spring-srv6-deployment-status-10, but -11
is the latest available revision.
2021-05-26
10 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert
2021-05-24
10 Martin Duke
[Ballot discuss]
I would like to clarify that when the pseudocode says "Send the copied packet, along with a timestamp to the OAM process for …
[Ballot discuss]
I would like to clarify that when the pseudocode says "Send the copied packet, along with a timestamp to the OAM process for telemetry data collection and export," that this "process" is colocated on the router, and that this process further digests the data so that there is much less than 1 packet going out of the box per O-bit packet processed.

If there is a case where each O-bit packet generates an entire packet going off the router to a controller or external OAM process, there are extremely unfortunate corner cases that are not sufficiently mitigated by rate-limiting.
2021-05-24
10 Martin Duke
[Ballot comment]
Thank you for addressing the TSVART comments (and to Magnus for the review)

I see that some of the contributors are in common, …
[Ballot comment]
Thank you for addressing the TSVART comments (and to Magnus for the review)

I see that some of the contributors are in common, but this would appear to have substantial overlap with https://datatracker.ietf.org/doc/draft-ietf-ippm-ioam-direct-export/.
2021-05-24
10 Martin Duke [Ballot Position Update] New position, Discuss, has been recorded for Martin Duke
2021-05-23
10 Carlos Jesús Bernardos Request for Telechat review by INTDIR is assigned to Carlos Bernardos
2021-05-23
10 Carlos Jesús Bernardos Request for Telechat review by INTDIR is assigned to Carlos Bernardos
2021-05-22
10 Éric Vyncke Requested Telechat review by INTDIR
2021-05-21
10 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2021-05-21
10 Amy Vezza Placed on agenda for telechat - 2021-06-03
2021-05-21
10 Erik Kline Ballot has been issued
2021-05-21
10 Erik Kline [Ballot Position Update] New position, Yes, has been recorded for Erik Kline
2021-05-21
10 Erik Kline Created "Approve" ballot
2021-05-21
10 Erik Kline IESG state changed to IESG Evaluation from Waiting for Writeup
2021-05-21
10 Erik Kline Ballot writeup was changed
2021-04-15
10 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Dan Harkins. Submission of review completed at an earlier date.
2021-04-09
10 Dan Romascanu Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Dan Romascanu. Sent review to list.
2021-04-08
10 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2021-04-08
10 Zafar Ali New version available: draft-ietf-6man-spring-srv6-oam-10.txt
2021-04-08
10 (System) New version accepted (logged-in submitter: Zafar Ali)
2021-04-08
10 Zafar Ali Uploaded new revision
2021-04-08
10 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Dan Harkins.
2021-03-26
09 Min Ye Request for Last Call review by RTGDIR Completed: Has Issues. Reviewer: Stig Venaas.
2021-03-22
09 (System) IESG state changed to Waiting for Writeup from In Last Call
2021-03-19
09 (System) IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed
2021-03-19
09 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-6man-spring-srv6-oam-09. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-6man-spring-srv6-oam-09. If any part of this review is inaccurate, please let us know.

The IANA Functions Operator understands that, upon approval of this document, there is a single action which we must complete.

In the Segment Routing Header Flags registry on the Internet Protocol Version 6 (IPv6) Parameters registry page located at:

https://www.iana.org/assignments/ipv6-parameters/

a new registration is to be made as follows:

Bit: [ TBD-at-Registration ]
Description: O-flag
Reference: [ RFC-to-be ]

IANA notes that the authors have requested bit 2 for this registration.

The IANA Functions Operator understands that this is the only action required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed.

Thank you,

Sabrina Tanamal
Senior IANA Services Specialist
2021-03-19
09 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Dan Romascanu
2021-03-19
09 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Dan Romascanu
2021-03-18
09 Magnus Westerlund Request for Last Call review by TSVART Completed: Ready with Issues. Reviewer: Magnus Westerlund.
2021-03-15
09 Min Ye Request for Last Call review by RTGDIR is assigned to Stig Venaas
2021-03-15
09 Min Ye Request for Last Call review by RTGDIR is assigned to Stig Venaas
2021-03-12
09 Matt Joras Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Matt Joras. Sent review to list.
2021-03-12
09 Jean Mahoney Request for Last Call review by GENART is assigned to Matt Joras
2021-03-12
09 Jean Mahoney Request for Last Call review by GENART is assigned to Matt Joras
2021-03-11
09 Tero Kivinen Request for Last Call review by SECDIR is assigned to Dan Harkins
2021-03-11
09 Tero Kivinen Request for Last Call review by SECDIR is assigned to Dan Harkins
2021-03-09
09 Magnus Westerlund
Closed request for Last Call review by TSVART with state 'Overtaken by Events': Don't know if this is a bug, as the review request got …
Closed request for Last Call review by TSVART with state 'Overtaken by Events': Don't know if this is a bug, as the review request got duplicated when Colin rejected it.
2021-03-09
09 Magnus Westerlund Request for Last Call review by TSVART is assigned to Magnus Westerlund
2021-03-09
09 Magnus Westerlund Request for Last Call review by TSVART is assigned to Magnus Westerlund
2021-03-09
09 Colin Perkins Assignment of request for Last Call review by TSVART to Colin Perkins was rejected
2021-03-09
09 Magnus Westerlund Request for Last Call review by TSVART is assigned to Colin Perkins
2021-03-09
09 Magnus Westerlund Request for Last Call review by TSVART is assigned to Colin Perkins
2021-03-08
09 Alvaro Retana Requested Last Call review by RTGDIR
2021-03-08
09 Cindy Morgan IANA Review state changed to IANA - Review Needed
2021-03-08
09 Cindy Morgan
The following Last Call announcement was sent out (ends 2021-03-22):

From: The IESG
To: IETF-Announce
CC: 6man-chairs@ietf.org, =?utf-8?q?Ole_Tr=C3=B8an?= , draft-ietf-6man-spring-srv6-oam@ietf.org, ek.ietf@gmail.com, ipv6@ietf.org …
The following Last Call announcement was sent out (ends 2021-03-22):

From: The IESG
To: IETF-Announce
CC: 6man-chairs@ietf.org, =?utf-8?q?Ole_Tr=C3=B8an?= , draft-ietf-6man-spring-srv6-oam@ietf.org, ek.ietf@gmail.com, ipv6@ietf.org, ot@cisco.com
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Operations, Administration, and Maintenance (OAM) in Segment Routing Networks with IPv6 Data plane (SRv6)) to Proposed Standard


The IESG has received a request from the IPv6 Maintenance WG (6man) to
consider the following document: - 'Operations, Administration, and
Maintenance (OAM) in Segment Routing
  Networks with IPv6 Data plane (SRv6)'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2021-03-22. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  This document describes how the existing IPv6 mechanisms for ping and
  traceroute can be used in an SRv6 network.  The document also
  specifies the OAM flag in the Segment Routing Header (SRH) for
  performing controllable and predictable flow sampling from segment
  endpoints.  In addition, the document describes how a centralized
  monitoring system performs a path continuity check between any nodes
  within an SRv6 domain.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-6man-spring-srv6-oam/



No IPR declarations have been submitted directly on this I-D.




2021-03-08
09 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2021-03-08
09 Cindy Morgan Last call announcement was generated
2021-03-07
09 Erik Kline Last call was requested
2021-03-07
09 Erik Kline Last call announcement was generated
2021-03-07
09 Erik Kline Ballot approval text was generated
2021-03-07
09 Erik Kline Ballot writeup was generated
2021-03-07
09 (System) Changed action holders to Erik Kline (IESG state changed)
2021-03-07
09 Erik Kline IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2021-02-19
09 (System) Sub state has been changed to AD Followup from Revised ID Needed
2021-02-19
09 Zafar Ali New version available: draft-ietf-6man-spring-srv6-oam-09.txt
2021-02-19
09 (System) New version accepted (logged-in submitter: Zafar Ali)
2021-02-19
09 Zafar Ali Uploaded new revision
2021-01-30
08 Erik Kline
[[ comments ]]

[ section 1.1 ]

* Someone on the IESG will most definitely request that you use the exact
  text from 8174 …
[[ comments ]]

[ section 1.1 ]

* Someone on the IESG will most definitely request that you use the exact
  text from 8174 section 2:

  The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
  NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
  "MAY", and "OPTIONAL" in this document are to be interpreted as
  described in BCP 14 [RFC2119] [RFC8174] when, and only when, they
  appear in all capitals, as shown here.

[ section 1.3 ]

* In the final paragraph, the definition of SRH[SL] is described but the
  examples use SRH(1), SRH(2) (i.e. []s versus ()s).  I think the examples
  should be SRH[2], SRH[0], as so on.

[ sections 3.1.1, 3.1.2 ]

* In the final bullet point I think would be good to explicitly note that
  the Echo Reply return path is not informed by the SRH in the Echo Request.

  Specifically, the return path is not necessarily the reverse unless an
  implementation at N5 is somehow configured to construct an SRH on the
  echo reply by inspection of the SRH in the echo request
  (which I suppose someone could do, but...).

[ sections 3.2.1, 3.2.2 ]

* It's probably good to explicitly state that the ICMPv6 time exceeded
  message does not automatically follow the reverse of the SRH in the
  traceroute UDP packet.

* Also in 3.2.2, "Time to Live exceeded in Transit" should be
  "Hop limit exceeded in transit" (RFC 4443 section 3.3 code 0), I think?

[ section 3.3 ]

* I might recommend not using VPN number 100, since 100 is also use for the
  node that is the controller. The two have nothing to do with one another,
  but it might help a reader to keep them separate if the VPN number was not
  a number used elsewhere, like 222 or even 101 or something.


[[ questions ]]

[ section 2.1.1 ]

* Is the important behaviour that the ingress use USP or rather that it
  MUST NOT use a PSP (because the header with the O-flag will have been
  removed)?  In other words, and the flag be used with a USD?


[[ nits ]]

[ section 1 ]

* "This includes illustrations to pinging" ->
  "This includes illustrations of pinging", I think

* "document specifies O-flag -> "document specifies the O-flag"

[ section 2.1.1 ]

* "elements that needs to be exported" -> "elements that need to be exported"

* "control plan" -> "control plane"

[ section 3.3 ]

* "node N1 also send" -> "node N1 also sends"
2021-01-30
08 Erik Kline IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2020-11-15
08 Erik Kline IESG state changed to AD Evaluation from Publication Requested
2020-11-09
08 Ole Trøan
Writeup for:

Operations, Administration, and Maintenance (OAM) in Segment Routing Networks with IPv6 Data plane (SRv6)
draft-ietf-6man-spring-srv6-oam

(1) What type of RFC is being requested …
Writeup for:

Operations, Administration, and Maintenance (OAM) in Segment Routing Networks with IPv6 Data plane (SRv6)
draft-ietf-6man-spring-srv6-oam

(1) What type of RFC is being requested (BCP, Proposed Standard, Internet
Standard, Informational, Experimental, or Historic)? Why is this the
proper type of RFC? Is this type of RFC indicated in the title page
header? 

  Proposed Standard

  The header indicates "Standards Track"


(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections: 

Technical Summary:

  This document describes how the existing IPv6 mechanisms for ping and
  traceroute can be used in an SRv6 network.  The document also
  specifies the OAM flag in the Segment Routing Header (SRH) for
  performing controllable and predictable flow sampling from segment
  endpoints.  In addition, the document describes how a centralized
  monitoring system performs a path continuity check between any nodes
  within an SRv6 domain.
 
Working Group Summary:

  The document went through the normal 6man process of discussion,
  presentation at several 6man sessions, adoption call, further
  discussion and refinement, working group last, and updated to resolve
  issues raised.  It is ready to progress to the IESG.

Document Quality:

  Several working group members did reviews, issues raised in these
  reviews were resolved in the latest version of the document.


Personnel:

Who is the Document Shepherd? Who is the Responsible Area Director?

  Ole Troan is Document Shepherd
  Erik Kline is the Responsible Area Director


(3) Briefly describe the review of this document that was performed by
the Document Shepherd. If this version of the document is not ready for
publication, please explain why the document is being forwarded to the
IESG. 

  The Document Shepherd reviewed the document and thinks it is ready to
  advance to the IESG.


(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed? 

  No concerns, the document is ready for advancement.

  While we think there is a fair amount of overlap, good to have some
  additional review in IPPM and Spring w.g.s.


(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that took
place. 

  No.


(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the IESG
should be aware of? For example, perhaps he or she is uncomfortable with
certain parts of the document, or has concerns whether there really is a
need for it. In any event, if the WG has discussed those issues and has
indicated that it still wishes to advance the document, detail those
concerns here. 

  No issues or concerns.


(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why?

  Yes, all authors have confirmed this.


(8) Has an IPR disclosure been filed that references this document? If
so, summarize any WG discussion and conclusion regarding the IPR
disclosures. 

  No IPR disclosures have been made.

(9) How solid is the WG consensus behind this document? Does it represent
the strong concurrence of a few individuals, with others being silent, or
does the WG as a whole understand and agree with it? 

  There is good support in the working group from the people who are
  interested in this technology.


(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarize the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.) 

  No appeals have been threatened.


(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough. 

  The only IDnits issues appear to be problems in the tool.


(12) Describe how the document meets any required formal review criteria,
such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. 

  N/A


(13) Have all references within this document been identified as either
normative or informative?

  Yes


(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion? 

  All normative references are published RFCs.


(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in the
Last Call procedure. 

  No downward normative references.


(16) Will publication of this document change the status of any existing
RFCs? Are those RFCs listed on the title page header, listed in the
abstract, and discussed in the introduction? If the RFCs are not listed
in the Abstract and Introduction, explain why, and point to the part of
the document where the relationship of this document to the other RFCs is
discussed. If this information is not in the document, explain why the WG
considers it unnecessary. 

  No, N/A


(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA
registries. Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a detailed
specification of the initial contents for the registry, that allocations
procedures for future registrations are defined, and a reasonable name
for the new registry has been suggested (see RFC 8126).

  The draft requests requests that IANA allocate the following registrations
  in the "Segment Routing Header Flags" sub-registry for the "Internet
  Protocol Version 6 (IPv6) Parameters" registry maintained by IANA:


            +-------+------------------------------+---------------+
            | Bit  | Description                  | Reference    |
            +=======+==============================+===============+
            | 2    | O-flag                      | This document |
            +-------+------------------------------+---------------+


(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find useful
in selecting the IANA Experts for these new registries. 

  N/A


(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, YANG modules,
etc.

  N/A

(20) If the document contains a YANG module, has the module been checked
with any of the recommended validation tools
(https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and
formatting validation? If there are any resulting errors or warnings,
what is the justification for not fixing them at this time? Does the YANG
module comply with the Network Management Datastore Architecture (NMDA)
as specified in RFC8342?

  N/A

2020-11-09
08 Ole Trøan Responsible AD changed to Erik Kline
2020-11-09
08 Ole Trøan IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2020-11-09
08 Ole Trøan IESG state changed to Publication Requested from I-D Exists
2020-11-09
08 Ole Trøan IESG process started in state Publication Requested
2020-11-08
08 Bob Hinden
Writeup for:

Operations, Administration, and Maintenance (OAM) in Segment Routing Networks with IPv6 Data plane (SRv6)
draft-ietf-6man-spring-srv6-oam

(1) What type of RFC is being requested …
Writeup for:

Operations, Administration, and Maintenance (OAM) in Segment Routing Networks with IPv6 Data plane (SRv6)
draft-ietf-6man-spring-srv6-oam

(1) What type of RFC is being requested (BCP, Proposed Standard, Internet
Standard, Informational, Experimental, or Historic)? Why is this the
proper type of RFC? Is this type of RFC indicated in the title page
header? 

  Proposed Standard

  The header indicates "Standards Track"


(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections: 

Technical Summary:

  This document describes how the existing IPv6 mechanisms for ping and
  traceroute can be used in an SRv6 network.  The document also
  specifies the OAM flag in the Segment Routing Header (SRH) for
  performing controllable and predictable flow sampling from segment
  endpoints.  In addition, the document describes how a centralized
  monitoring system performs a path continuity check between any nodes
  within an SRv6 domain.
 
Working Group Summary:

  The document went through the normal 6man process of discussion,
  presentation at several 6man sessions, adoption call, further
  discussion and refinement, working group last, and updated to resolve
  issues raised.  It is ready to progress to the IESG.

Document Quality:

  Several working group members did reviews, issues raised in these
  reviews were resolved in the latest version of the document.


Personnel:

Who is the Document Shepherd? Who is the Responsible Area Director?

  Ole Troan is Document Shepherd
  Erik Kline is the Responsible Area Director


(3) Briefly describe the review of this document that was performed by
the Document Shepherd. If this version of the document is not ready for
publication, please explain why the document is being forwarded to the
IESG. 

  The Document Shepherd reviewed the document and thinks it is ready to
  advance to the IESG.


(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed? 

  No concerns, the document is ready for advancement.

  While we think there is a fair amount of overlap, good to have some
  additional review in IPPM and Spring w.g.s.


(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that took
place. 

  No.


(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the IESG
should be aware of? For example, perhaps he or she is uncomfortable with
certain parts of the document, or has concerns whether there really is a
need for it. In any event, if the WG has discussed those issues and has
indicated that it still wishes to advance the document, detail those
concerns here. 

  No issues or concerns.


(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why?

  Yes, all authors have confirmed this.


(8) Has an IPR disclosure been filed that references this document? If
so, summarize any WG discussion and conclusion regarding the IPR
disclosures. 

  No IPR disclosures have been made.

(9) How solid is the WG consensus behind this document? Does it represent
the strong concurrence of a few individuals, with others being silent, or
does the WG as a whole understand and agree with it? 

  There is good support in the working group from the people who are
  interested in this technology.


(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarize the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.) 

  No appeals have been threatened.


(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough. 

  The only IDnits issues appear to be problems in the tool.


(12) Describe how the document meets any required formal review criteria,
such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. 

  N/A


(13) Have all references within this document been identified as either
normative or informative?

  Yes


(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion? 

  All normative references are published RFCs.


(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in the
Last Call procedure. 

  No downward normative references.


(16) Will publication of this document change the status of any existing
RFCs? Are those RFCs listed on the title page header, listed in the
abstract, and discussed in the introduction? If the RFCs are not listed
in the Abstract and Introduction, explain why, and point to the part of
the document where the relationship of this document to the other RFCs is
discussed. If this information is not in the document, explain why the WG
considers it unnecessary. 

  No, N/A


(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA
registries. Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a detailed
specification of the initial contents for the registry, that allocations
procedures for future registrations are defined, and a reasonable name
for the new registry has been suggested (see RFC 8126).

  The draft requests requests that IANA allocate the following registrations
  in the "Segment Routing Header Flags" sub-registry for the "Internet
  Protocol Version 6 (IPv6) Parameters" registry maintained by IANA:


            +-------+------------------------------+---------------+
            | Bit  | Description                  | Reference    |
            +=======+==============================+===============+
            | 2    | O-flag                      | This document |
            +-------+------------------------------+---------------+


(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find useful
in selecting the IANA Experts for these new registries. 

  N/A


(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, YANG modules,
etc.

  N/A

(20) If the document contains a YANG module, has the module been checked
with any of the recommended validation tools
(https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and
formatting validation? If there are any resulting errors or warnings,
what is the justification for not fixing them at this time? Does the YANG
module comply with the Network Management Datastore Architecture (NMDA)
as specified in RFC8342?

  N/A

2020-11-04
08 Bob Hinden
Writeup for:

Operations, Administration, and Maintenance (OAM) in Segment Routing Networks with IPv6 Data plane (SRv6)
draft-ietf-6man-spring-srv6-oam

(1) What type of RFC is being requested …
Writeup for:

Operations, Administration, and Maintenance (OAM) in Segment Routing Networks with IPv6 Data plane (SRv6)
draft-ietf-6man-spring-srv6-oam

(1) What type of RFC is being requested (BCP, Proposed Standard, Internet
Standard, Informational, Experimental, or Historic)? Why is this the
proper type of RFC? Is this type of RFC indicated in the title page
header? 

  Proposed Standard

  The header indicates "Standards Track"


(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections: 

Technical Summary:

  This document describes how the existing IPv6 mechanisms for ping and
  traceroute can be used in an SRv6 network.  The document also
  specifies the OAM flag in the Segment Routing Header (SRH) for
  performing controllable and predictable flow sampling from segment
  endpoints.  In addition, the document describes how a centralized
  monitoring system performs a path continuity check between any nodes
  within an SRv6 domain.
 
Working Group Summary:

  The document went through the normal 6man process of discussion,
  presentation at several 6man sessions, adoption call, further
  discussion and refinement, working group last, and updated to resolve
  issues raised.  It is ready to progress to the IESG.

Document Quality:

  Several working group members did reviews, issues raised in these
  reviews were resolved in the latest version of the document.


Personnel:

Who is the Document Shepherd? Who is the Responsible Area Director?

  Ole Troan is Document Shepherd
  Erik Kline is the Responsible Area Director


(3) Briefly describe the review of this document that was performed by
the Document Shepherd. If this version of the document is not ready for
publication, please explain why the document is being forwarded to the
IESG. 

  The Document Shepherd reviewed the document and thinks it is ready to
  advance to the IESG.


(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed? 

  No concerns, the document is ready for advancement.


(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that took
place. 

  No.


(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the IESG
should be aware of? For example, perhaps he or she is uncomfortable with
certain parts of the document, or has concerns whether there really is a
need for it. In any event, if the WG has discussed those issues and has
indicated that it still wishes to advance the document, detail those
concerns here. 

  No issues or concerns.


(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why?

  Yes, all authors have confirmed this.


(8) Has an IPR disclosure been filed that references this document? If
so, summarize any WG discussion and conclusion regarding the IPR
disclosures. 

  No IPR disclosures have been made.

(9) How solid is the WG consensus behind this document? Does it represent
the strong concurrence of a few individuals, with others being silent, or
does the WG as a whole understand and agree with it? 

  There is good support in the working group from the people who are
  interested in this technology.


(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarize the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.) 

  No appeals have been threatened.


(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough. 

  The only IDnits issues appear to be problems in the tool.


(12) Describe how the document meets any required formal review criteria,
such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. 

  N/A


(13) Have all references within this document been identified as either
normative or informative?

  Yes


(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion? 

  All normative references are published RFCs.


(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in the
Last Call procedure. 

  No downward normative references.


(16) Will publication of this document change the status of any existing
RFCs? Are those RFCs listed on the title page header, listed in the
abstract, and discussed in the introduction? If the RFCs are not listed
in the Abstract and Introduction, explain why, and point to the part of
the document where the relationship of this document to the other RFCs is
discussed. If this information is not in the document, explain why the WG
considers it unnecessary. 

  No, N/A


(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA
registries. Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a detailed
specification of the initial contents for the registry, that allocations
procedures for future registrations are defined, and a reasonable name
for the new registry has been suggested (see RFC 8126).

  The draft requests requests that IANA allocate the following registrations
  in the "Segment Routing Header Flags" sub-registry for the "Internet
  Protocol Version 6 (IPv6) Parameters" registry maintained by IANA:


            +-------+------------------------------+---------------+
            | Bit  | Description                  | Reference    |
            +=======+==============================+===============+
            | 2    | O-flag                      | This document |
            +-------+------------------------------+---------------+


(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find useful
in selecting the IANA Experts for these new registries. 

  N/A


(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, YANG modules,
etc.

  N/A

(20) If the document contains a YANG module, has the module been checked
with any of the recommended validation tools
(https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and
formatting validation? If there are any resulting errors or warnings,
what is the justification for not fixing them at this time? Does the YANG
module comply with the Network Management Datastore Architecture (NMDA)
as specified in RFC8342?

  N/A

2020-10-30
08 Zafar Ali New version available: draft-ietf-6man-spring-srv6-oam-08.txt
2020-10-30
08 (System) New version accepted (logged-in submitter: Zafar Ali)
2020-10-30
08 Zafar Ali Uploaded new revision
2020-07-28
07 Ole Trøan Notification list changed to =?utf-8?q?Ole_Tr=C3=B8an?= <ot@cisco.com>
2020-07-28
07 Ole Trøan Document shepherd changed to Ole Trøan
2020-07-28
07 Ole Trøan IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2020-07-26
07 Zafar Ali New version available: draft-ietf-6man-spring-srv6-oam-07.txt
2020-07-26
07 (System) New version approved
2020-07-26
07 (System) Request for posting confirmation emailed to previous authors: Mach Chen , Daniel Voyer , Zafar Ali , Satoru Matsushima , Clarence Filsfils
2020-07-26
07 Zafar Ali Uploaded new revision
2020-07-13
06 Zafar Ali New version available: draft-ietf-6man-spring-srv6-oam-06.txt
2020-07-13
06 (System) New version approved
2020-07-13
06 (System) Request for posting confirmation emailed to previous authors: Zafar Ali , Daniel Voyer , Satoru Matsushima , Clarence Filsfils , Mach Chen
2020-07-13
06 Zafar Ali Uploaded new revision
2020-06-12
05 Zafar Ali New version available: draft-ietf-6man-spring-srv6-oam-05.txt
2020-06-12
05 (System) New version approved
2020-06-12
05 (System) Request for posting confirmation emailed to previous authors: Clarence Filsfils , Satoru Matsushima , Mach Chen , Zafar Ali , Daniel Voyer
2020-06-12
05 Zafar Ali Uploaded new revision
2020-03-30
04 Zafar Ali New version available: draft-ietf-6man-spring-srv6-oam-04.txt
2020-03-30
04 (System) New version approved
2020-03-30
04 (System) Request for posting confirmation emailed to previous authors: Clarence Filsfils , Daniel Voyer , Mach Chen , Zafar Ali , Satoru Matsushima
2020-03-30
04 Zafar Ali Uploaded new revision
2020-01-09
03 Bob Hinden IETF WG state changed to In WG Last Call from WG Document
2019-12-18
03 Zafar Ali New version available: draft-ietf-6man-spring-srv6-oam-03.txt
2019-12-18
03 (System) New version approved
2019-12-18
03 (System) Request for posting confirmation emailed to previous authors: Mach Chen , Zafar Ali , Daniel Voyer , Satoru Matsushima , Clarence Filsfils
2019-12-18
03 Zafar Ali Uploaded new revision
2019-11-20
02 Zafar Ali New version available: draft-ietf-6man-spring-srv6-oam-02.txt
2019-11-20
02 (System) New version approved
2019-11-20
02 (System) Request for posting confirmation emailed to previous authors: Mach Chen , Zafar Ali , Daniel Voyer , Satoru Matsushima , Clarence Filsfils
2019-11-20
02 Zafar Ali Uploaded new revision
2019-11-03
01 Zafar Ali New version available: draft-ietf-6man-spring-srv6-oam-01.txt
2019-11-03
01 (System) New version accepted (logged-in submitter: Zafar Ali)
2019-11-03
01 Zafar Ali Uploaded new revision
2019-08-29
00 Ole Trøan This document now replaces draft-ali-6man-spring-srv6-oam instead of None
2019-08-08
00 Bob Hinden Changed consensus to Yes from Unknown
2019-08-08
00 Bob Hinden Intended Status changed to Proposed Standard from None
2019-08-08
00 Zafar Ali New version available: draft-ietf-6man-spring-srv6-oam-00.txt
2019-08-08
00 (System) WG -00 approved
2019-08-08
00 Zafar Ali Set submitter to "Zafar Ali ", replaces to (none) and sent approval email to group chairs: 6man-chairs@ietf.org
2019-08-08
00 Zafar Ali Uploaded new revision