Skip to main content

Echo Request/Reply for Enabled In Situ OAM (IOAM) Capabilities
draft-ietf-ippm-ioam-conf-state-10

Revision differences

Document history

Date Rev. By Action
2024-01-26
10 Gunter Van de Velde Request closed, assignment withdrawn: Shwetha Bhandari Last Call OPSDIR review
2024-01-26
10 Gunter Van de Velde Closed request for Last Call review by OPSDIR with state 'Overtaken by Events': Cleaning up stale OPSDIR queue
2023-04-06
10 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2023-03-06
10 (System) RFC Editor state changed to AUTH48
2023-01-09
10 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2022-12-13
10 Donald Eastlake Request for Last Call review by RTGDIR Completed: Has Issues. Reviewer: Donald Eastlake.
2022-12-07
10 Luc André Burdet Request for Last Call review by RTGDIR is assigned to Donald Eastlake
2022-12-07
10 Luc André Burdet Request for Last Call review by RTGDIR is assigned to Donald Eastlake
2022-12-07
10 Luc André Burdet Assignment of request for Last Call review by RTGDIR to Ron Bonica was marked no-response
2022-11-28
10 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2022-11-28
10 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2022-11-28
10 (System) IANA Action state changed to In Progress from Waiting on Authors
2022-11-24
10 (System) IANA Action state changed to Waiting on Authors from In Progress
2022-11-24
10 (System) IANA Action state changed to In Progress from Waiting on Authors
2022-11-23
10 (System) IANA Action state changed to Waiting on Authors from In Progress
2022-11-23
10 (System) RFC Editor state changed to EDIT
2022-11-23
10 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2022-11-23
10 (System) Announcement was received by RFC Editor
2022-11-22
10 (System) IANA Action state changed to In Progress
2022-11-22
10 Cindy Morgan IESG has approved the document
2022-11-22
10 Cindy Morgan Closed "Approve" ballot
2022-11-22
10 Cindy Morgan Ballot approval text was generated
2022-11-22
10 Martin Duke IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2022-11-22
10 Martin Duke IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2022-11-21
10 Xiao Min New version available: draft-ietf-ippm-ioam-conf-state-10.txt
2022-11-21
10 Xiao Min New version accepted (logged-in submitter: Xiao Min)
2022-11-21
10 Xiao Min Uploaded new revision
2022-11-21
09 John Scudder
[Ballot comment]
Thanks for the revisions. I have one further comment that occurred to me
in looking at the revised text:

        …
[Ballot comment]
Thanks for the revisions. I have one further comment that occurred to me
in looking at the revised text:

                                                Note that since the
  Default-Namespace-ID of 0x0000 is mandated to appear first in the
  list, if it appears any trailing 0x0000 octets must therefore be
  padding and MUST be disregarded.
 
it seems to me it can be tightened up a little more, as in

  Since the Default-Namespace-ID of 0x0000 is mandated to appear first in
  the list, any other occurrences of 0x0000 MUST be disregarded.
 
That is, unless you want to mandate some kind of error response to
0x0000 appearing in a non-first, non-trailing position.
2022-11-21
09 John Scudder [Ballot Position Update] Position for John Scudder has been changed to No Objection from Discuss
2022-11-09
09 Xiao Min New version available: draft-ietf-ippm-ioam-conf-state-09.txt
2022-11-09
09 Xiao Min New version accepted (logged-in submitter: Xiao Min)
2022-11-09
09 Xiao Min Uploaded new revision
2022-11-07
08 Roman Danyliw [Ballot comment]
Thank you to Chris Lonvick for the SECDIR review.

Thank you for addressing my DISCUSS and COMMENT feedback.
2022-11-07
08 Roman Danyliw [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss
2022-11-07
08 Murray Kucherawy
[Ballot comment]
I think the two IANA registries being created in this document are under-specified.  I suggest enumerating the fields in each entry, describing what …
[Ballot comment]
I think the two IANA registries being created in this document are under-specified.  I suggest enumerating the fields in each entry, describing what they're for, and what their valid values are, before providing the initial values.  As it stands, IANA has to read other parts of the document to infer valid values for the first column in both cases.

I also concur with Lars' point about the limited set of available values in each registry, but I see the latest version dealt with that.
2022-11-07
08 Murray Kucherawy [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy
2022-11-06
08 Robert Wilton [Ballot comment]
Discuss cleared.
2022-11-06
08 Robert Wilton [Ballot Position Update] Position for Robert Wilton has been changed to No Objection from Discuss
2022-11-06
08 (System) Removed all action holders (IESG state changed)
2022-11-06
08 (System) Sub state has been changed to AD Followup from Revised ID Needed
2022-11-06
08 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2022-11-06
08 Xiao Min New version available: draft-ietf-ippm-ioam-conf-state-08.txt
2022-11-06
08 Xiao Min New version accepted (logged-in submitter: Xiao Min)
2022-11-06
08 Xiao Min Uploaded new revision
2022-11-06
07 Martin Duke Changed action holders to Xiao Min, Greg Mirsky, Lei Bo
2022-10-27
07 (System) Changed action holders to Martin Duke, Xiao Min, Greg Mirsky, Lei Bo (IESG state changed)
2022-10-27
07 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2022-10-27
07 Warren Kumari
[Ballot comment]
Thank you for your reply, addressing my DISCUSS (https://mailarchive.ietf.org/arch/msg/ippm/93f6B7Xb3zwj-WVqhe_ygbhAjKk/)

I am still concerned about what feels like an increase in things …
[Ballot comment]
Thank you for your reply, addressing my DISCUSS (https://mailarchive.ietf.org/arch/msg/ippm/93f6B7Xb3zwj-WVqhe_ygbhAjKk/)

I am still concerned about what feels like an increase in things like filtering requirements in documents, and what is actually implementable on network devices - see https://mailarchive.ietf.org/arch/msg/ippm/1qNDrh-AiYY4a17KEqn2bEWNfLI/ for more background. I understand that it is not feasible to stop developing new protocols until all routers support $whatever, but it is still a topic which causes my discomfort.

However, this is a larger issue than just this document, and so I've cleared my DISCUSS and changed to NoObjection...

Thank you again for addressing my ballot, and doing it so quickly.
2022-10-27
07 Warren Kumari [Ballot Position Update] Position for Warren Kumari has been changed to No Objection from Discuss
2022-10-27
07 Zaheduzzaman Sarker [Ballot comment]
I support Roman's and John's Discuss.
2022-10-27
07 Zaheduzzaman Sarker [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker
2022-10-27
07 Erik Kline
[Ballot comment]
# Internet AD comments for draft-ietf-ippm-ioam-conf-state-07
CC @ekline

I support John's request for clarification.

## Comments

### S3.1

* "MUST send an echo …
[Ballot comment]
# Internet AD comments for draft-ietf-ippm-ioam-conf-state-07
CC @ekline

I support John's request for clarification.

## Comments

### S3.1

* "MUST send an echo reply without IOAM capabilities or no echo reply"

  I think I understand the intent, and overall I think this text is likely
  to not be an issue in practice.  But I'll note that anything "MUST" where
  ICMP is concerned may not exactly be enforceable.

## Nits

### S2.2

* Maybe consider adding DEX to this list (it's also fully expanded on first
  use in S1, but it might be nice for ease of reference).

### S3.1, S3.2

* /depends on the specific environment it is applied at/ ->
  /depends on the specific deployment environment/ maybe?
2022-10-27
07 Erik Kline [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline
2022-10-27
07 Robert Wilton
[Ballot discuss]
Hi,

I support Roman and Warren's discuss, and again, I have a similar, but slightly separate concern:

(1) p 14, sec 6.  Security …
[Ballot discuss]
Hi,

I support Roman and Warren's discuss, and again, I have a similar, but slightly separate concern:

(1) p 14, sec 6.  Security Considerations

  To protect against unauthorized sources using echo request messages
  to obtain IOAM Capabilities information, it is RECOMMENDED that
  implementations provide a means of checking the source addresses of
  echo request messages against an access list before accepting the
  message.

I'm concerned that performing a source address filtering isn't necessarily that secure, compared with use NETCONF or RESTCONF that can provide AAA access controls.  Hence, I think that the security considerations should REQUIRE that IOAM daemons do not respond to these capability requests unless explicitly configured to do so, specifically to avoid implementations potentially leaking information if they are not aware of this functionality (e.g., if it was enabled by default).
2022-10-27
07 Robert Wilton
[Ballot comment]
(2) p 2, sec 1.  Introduction

  *  When NETCONF/YANG is used in this scenario, each IOAM
      encapsulating node (including …
[Ballot comment]
(2) p 2, sec 1.  Introduction

  *  When NETCONF/YANG is used in this scenario, each IOAM
      encapsulating node (including the host when it takes the role of
      an IOAM encapsulating node) needs to implement a NETCONF Client,
      each IOAM transit and IOAM decapsulating node (including the host
      when it takes the role of an IOAM decapsulating node) needs to
      implement a NETCONF Server, the complexity can be an issue.
      Furthermore, each IOAM encapsulating node needs to establish
      NETCONF Connection with each IOAM transit and IOAM decapsulating
      node, the scalability can be an issue.

Isn't it quite likely that the network devices in question has already implement NETCONF servers, and hence really the additional code would only be NETCONF client code.  There is also a separate option that RESTCONF could be used instead of NETCONF, which is a somewhat lighter protocol.  I believe that one big advantage to using NETCONF over these loopback mechanisms is that they are properly secure, and NACM can be used to limit access to the IOAM capabilities to only those devices/individuals which should be allowed to access the data.

Regards,
Rob
2022-10-27
07 Robert Wilton [Ballot Position Update] New position, Discuss, has been recorded for Robert Wilton
2022-10-26
07 John Scudder
[Ballot comment]
# John Scudder, RTG AD, comments for draft-ietf-ippm-ioam-conf-state-07
CC @jgscudder

## COMMENTS

### Section 1

```
  Fate sharing is a common requirement …
[Ballot comment]
# John Scudder, RTG AD, comments for draft-ietf-ippm-ioam-conf-state-07
CC @jgscudder

## COMMENTS

### Section 1

```
  Fate sharing is a common requirement for all kinds of active OAM
  packets, echo request is among them, in this document that means echo
  request is required to traverse a path of IOAM data packet.  This
  requirement can be achieved by, e.g., applying same explicit path or
  ECMP processing to both echo request and IOAM data packet.
```

Explicit path, yes, but it's known that you can't simply expect to "apply same ECMP processing" to two quite distinct packets, without carefully arranging for that to happen. If this is a requirement (and the paragraph says it is) then I think it's necessary to be clearer about how it's to be achieved.

### Section 3.1, Default-Namespace-ID

```
              A list of IOAM Namespace-IDs (one or more Namespace-IDs)
  MUST be included in this container in the echo request, and if
  present, the Default-Namespace-ID 0x0000 MUST be placed at the
  begining of the list of IOAM Namespace-IDs.  The IOAM encapsulating
  node requests only the enabled IOAM capabilities that match one of
  the Namespace-IDs.  The Namespace-ID has the same definition as
  what's specified in Section 4.3 of [RFC9197].
```

- You specify that if present 0x0000 must be placed at the beginning of the list. Is there any other sorting requirement on the list, or is that the only mandated ordering?

- It wasn't clear to me from a quick perusal of RFC 9197 §4.3 whether a request carrying 0x0000 would elicit replies for all Namespace-IDs (since 0x0000 matches everything) or if it would elicit replies only for capabilities that have no configured non-default namespace, or are explicitly configured with namespace 0x0000. Can you either clarify this in the text, or if you think it's clear from the reference, help me understand what makes it clear?

- If the first guess above is correct (0x0000 elicits replies for all Namespace-IDs) then it would seem that if the list contains 0x0000, it's pointless to include anything else in the list, and that might be worth pointing out in the text.

- If the first guess above is correct, that would also prompt comments on the use of Namespace-ID field in Sections 3.2.x, but we can address that if needed.

### Section 3.1, container format, padding

```
  The IOAM Capabilities Query Container has a container header that is
  used to identify the type and optionally length of the container
  payload, and the container payload (List of IOAM Namespace-IDs) is
  zero-padded to align to a 4-octet boundary.

  The length, structure, and definition of the IOAM Capabilities Query
  Container Header depends on the specific environment it is applied
  at.
```

I regret I'm not sufficiently familiar with all the different bearer protocols you're envisioning embedding this container in. So I'll just ask,

- Why is the length of the payload said to be optional, when it's a (presumably variable-length) list? Does this relate to a bearer protocol where the length of the list is inferred some other way, or what?

- The specification that the payload is zero-padded to 4-octet alignment carries some implications. Let's explore these with an example. Suppose we want to signal a single Namespace-ID, 0x0001. Then presumably the payload has to be 0x0001 0x0000, once the mandated pad bytes are added. Is the receiver supposed to know that it ignores the 0x0000 value (which is otherwise the Default-Namespace-ID) because it comes at the end of the list, not the beginning as the previous paragraph required? If so, this seems worth calling out. If not, how is the receiver supposed to know where payload ends and padding begins?

### Section 3.2, container format, padding

Similar questions to those above apply to:

```
  The IOAM Capabilities Response Container has a container header that
  is used to identify the type and optionally length of the container
  payload, and the container payload (List of IOAM Capabilities
  Objects) is zero-padded to align to a 4-octet boundary.
```

That is, considering you've disclaimed defining specifics about the semantics of the header, how is the recipient of one of these things supposed to know how to ignore the zero-padding?

I do see that all the objects you've defined in this document are a multiple of four bytes long (if we assume their unspecified headers are a multiple of four byte long, that is!) so no padding would ever be required for a payload consisting only of these objects, and thus my question wouldn't apply. But if that's the answer to my question, then the final clause I quote above (about zero-padding) should just be removed.

### Section 3.2, object format, padding

```
  Similar to the container, each object has an object header that is
  used to identify the type and length of the object payload, and the
  object payload is zero-padded to align to a 4-octet boundary.
```

Similar to the above, in some cases there will be a need to know how to separate payload from padding. In all the objects you defined in Sections 3.2.x this is unnecessary (*if* you assume the unspecified header is 4-octet aligned itself) since you've carefully specified them so that they don't require padding.

It might be more straightforward to just mandate that future object specifications have a length that is a multiple of four octets, as all of your current ones do. That defers the question of what to do about variable payloads to the specification of the -- notional? -- object that has such a payload.

### Section 4

You talk about TTL in the first paragraph. Do you mean "TTL or Hop Limit"?

### Section 6, integrity protection

You talk about integrity protection in passing. Let's assume a deployment hasn't enabled any kind of integrity protection. Have you done any analysis of what kind of mischief an attacker could cause by inserting incorrect capabilities in a forged response?

### Section 6, MBZ fields

You suggest checking the must-be-zero reserved fields and reporting an exception if they aren't zero. Often, such reserved fields are expected to be extended in future, and indeed this is what you indicate in this spec too. I guess since the packets terminate at the recipient of the reply, it's not terribly harmful to police that these be zero, but it would likely create an awfully noisy set of exceptions in the case of a partially rolled-out extension. Is this really a good recommendation? The more usual practice is of the form "must be zero on Tx, must be ignored on Rx".

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues.

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments
2022-10-26
07 John Scudder Ballot comment text updated for John Scudder
2022-10-26
07 John Scudder
[Ballot comment]
# John Scudder, RTG AD, comments for draft-ietf-ippm-ioam-conf-state-07
CC @jgscudder

## COMMENTS

### Section 1

```
  Fate sharing is a common requirement …
[Ballot comment]
# John Scudder, RTG AD, comments for draft-ietf-ippm-ioam-conf-state-07
CC @jgscudder

## COMMENTS

### Section 1

```
  Fate sharing is a common requirement for all kinds of active OAM
  packets, echo request is among them, in this document that means echo
  request is required to traverse a path of IOAM data packet.  This
  requirement can be achieved by, e.g., applying same explicit path or
  ECMP processing to both echo request and IOAM data packet.
```

Explicit path, yes, but it's known that you can't simply expect to "apply same ECMP processing" to two quite distinct packets, without carefully arranging for that to happen. If this is a requirement (and the paragraph says it is) then I think it's necessary to be clearer about how it's to be achieved.

### Section 3.1, Default-Namespace-ID

```
              A list of IOAM Namespace-IDs (one or more Namespace-IDs)
  MUST be included in this container in the echo request, and if
  present, the Default-Namespace-ID 0x0000 MUST be placed at the
  begining of the list of IOAM Namespace-IDs.  The IOAM encapsulating
  node requests only the enabled IOAM capabilities that match one of
  the Namespace-IDs.  The Namespace-ID has the same definition as
  what's specified in Section 4.3 of [RFC9197].
```

- You specify that if present 0x0000 must be placed at the beginning of the list. Is there any other sorting requirement on the list, or is that the only mandated ordering?

- It wasn't clear to me from a quick perusal of RFC 9197 §4.3 whether a request carrying 0x0000 would elicit replies for all Namespace-IDs (since 0x0000 matches everything) or if it would elicit replies only for capabilities that have no configured non-default namespace, or are explicitly configured with namespace 0x0000. Can you either clarify this in the text, or if you think it's clear from the reference, help me understand what makes it clear?

- If the first guess above is correct (0x0000 elicits replies for all Namespace-IDs) then it would seem that if the list contains 0x0000, it's pointless to include anything else in the list, and that might be worth pointing out in the text.

- If the first guess above is correct, that would also prompt comments on the use of Namespace-ID field in Sections 3.2.x, but we can address that if needed.

### Section 3.1, container format, padding

```
  The IOAM Capabilities Query Container has a container header that is
  used to identify the type and optionally length of the container
  payload, and the container payload (List of IOAM Namespace-IDs) is
  zero-padded to align to a 4-octet boundary.

  The length, structure, and definition of the IOAM Capabilities Query
  Container Header depends on the specific environment it is applied
  at.
```

I regret I'm not sufficiently familiar with all the different bearer protocols you're envisioning embedding this container in. So I'll just ask,

- Why is the length of the payload said to be optional, when it's a (presumably variable-length) list? Does this relate to a bearer protocol where the length of the list is inferred some other way, or what?

- The specification that the payload is zero-padded to 4-octet alignment carries some implications. Let's explore these with an example. Suppose we want to signal a single Namespace-ID, 0x0001. Then presumably the payload has to be 0x0001 0x0000, once the mandated pad bytes are added. Is the receiver supposed to know that it ignores the 0x0000 value (which is otherwise the Default-Namespace-ID) because it comes at the end of the list, not the beginning as the previous paragraph required? If so, this seems worth calling out. If not, how is the receiver supposed to know where payload ends and padding begins?

### Section 3.2, container format, padding

Similar questions to those above apply to:

```
  The IOAM Capabilities Response Container has a container header that
  is used to identify the type and optionally length of the container
  payload, and the container payload (List of IOAM Capabilities
  Objects) is zero-padded to align to a 4-octet boundary.
```

That is, considering you've disclaimed defining specifics about the semantics of the header, how is the recipient of one of these things supposed to know how to ignore the zero-padding?

I do see that all the objects you've defined in this document are a multiple of four bytes long (if we assume their unspecified headers are a multiple of four byte long, that is!) so no padding would ever be required for a payload consisting only of these objects, and thus my question wouldn't apply. But if that's the answer to my question, then the final clause I quote above (about zero-padding) should just be removed.

### Section 3.2, object format, padding

```
  Similar to the container, each object has an object header that is
  used to identify the type and length of the object payload, and the
  object payload is zero-padded to align to a 4-octet boundary.
```

Similar to the above, in some cases there will be a need to know how to separate payload from padding. In all the objects you defined in Sections 3.2.x this is unnecessary (*if* you assume the unspecified header is 4-octet aligned itself) since you've carefully specified them so that they don't require padding.

It might be more straightforward to just mandate that future object specifications have a length that is a multiple of four octets, as all of your current ones do. That defers the question of what to do about variable payloads to the specification of the -- notional? -- object that has such a payload.

### Section 4

You talk about TTL in the first paragraph. Do you mean "TTL or Hop Limit"?

### Section 6

- You talk about integrity protection in passing. Let's assume a deployment hasn't enabled any kind of integrity protection. Have you done any analysis of what kind of mischief an attacker could cause by inserting incorrect capabilities in a forged response?

- You suggest checking the must-be-zero reserved fields and reporting an exception if they aren't zero. Often, such reserved fields are expected to be extended in future, and indeed this is what you indicate in this spec too. I guess since the packets terminate at the recipient of the reply, it's not terribly harmful to police that these be zero, but it would likely create an awfully noisy set of exceptions in the case of a partially rolled-out extension. Is this really a good recommendation? The more usual practice is of the form "must be zero on Tx, must be ignored on Rx".

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues.

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments
2022-10-26
07 John Scudder Ballot comment text updated for John Scudder
2022-10-26
07 John Scudder
[Ballot comment]
# John Scudder, RTG AD, comments for draft-ietf-ippm-ioam-conf-state-07
CC @jgscudder

## COMMENTS

### Section 1

```
  Fate sharing is a common requirement …
[Ballot comment]
# John Scudder, RTG AD, comments for draft-ietf-ippm-ioam-conf-state-07
CC @jgscudder

## COMMENTS

### Section 1

```
  Fate sharing is a common requirement for all kinds of active OAM
  packets, echo request is among them, in this document that means echo
  request is required to traverse a path of IOAM data packet.  This
  requirement can be achieved by, e.g., applying same explicit path or
  ECMP processing to both echo request and IOAM data packet.
```

Explicit path, yes, but it's known that you can't simply expect to "apply same ECMP processing" to two quite distinct packets, without carefully arranging for that to happen. If this is a requirement (and the paragraph says it is) then I think it's necessary to be clearer about how it's to be achieved.

### Section 3.1, Default-Namespace-ID

```
              A list of IOAM Namespace-IDs (one or more Namespace-IDs)
  MUST be included in this container in the echo request, and if
  present, the Default-Namespace-ID 0x0000 MUST be placed at the
  begining of the list of IOAM Namespace-IDs.  The IOAM encapsulating
  node requests only the enabled IOAM capabilities that match one of
  the Namespace-IDs.  The Namespace-ID has the same definition as
  what's specified in Section 4.3 of [RFC9197].
```

- You specify that if present 0x0000 must be placed at the beginning of the list. Is there any other sorting requirement on the list, or is that the only mandated ordering?

- It wasn't clear to me from a quick perusal of RFC 9197 §4.3 whether a request carrying 0x0000 would elicit replies for all Namespace-IDs (since 0x0000 matches everything) or if it would elicit replies only for capabilities that have no configured non-default namespace, or are explicitly configured with namespace 0x0000. Can you either clarify this in the text, or if you think it's clear from the reference, help me understand what makes it clear?

- If the first guess above is correct (0x0000 elicits replies for all Namespace-IDs) then it would seem that if the list contains 0x0000, it's pointless to include anything else in the list, and that might be worth pointing out in the text.

- If the first guess above is correct, that would also prompt comments on the use of Namespace-ID field in Sections 3.2.x, but we can address that if needed.

### Section 3.1, container format, padding

```
  The IOAM Capabilities Query Container has a container header that is
  used to identify the type and optionally length of the container
  payload, and the container payload (List of IOAM Namespace-IDs) is
  zero-padded to align to a 4-octet boundary.

  The length, structure, and definition of the IOAM Capabilities Query
  Container Header depends on the specific environment it is applied
  at.
```

I regret I'm not sufficiently familiar with all the different bearer protocols you're envisioning embedding this container in. So I'll just ask,

- Why is the length of the payload said to be optional, when it's a (presumably variable-length) list? Does this relate to a bearer protocol where the length of the list is inferred some other way, or what?

- The specification that the payload is zero-padded to 4-octet alignment carries some implications. Let's explore these with an example. Suppose the payload is a single Namespace-ID, 0x0001. Then presumably the payload has to be 0x0001 0x0000, once the mandated pad bytes are added. Is the receiver supposed to know that it ignores the 0x0000 value (which is otherwise the Default-Namespace-ID) because it comes at the end of the list, not the beginning as the previous paragraph required? If so, this seems worth calling out. If not, how is the receiver supposed to know where payload ends and padding begins?

### Section 3.2, container format, padding

Similar questions to those above apply to:

```
  The IOAM Capabilities Response Container has a container header that
  is used to identify the type and optionally length of the container
  payload, and the container payload (List of IOAM Capabilities
  Objects) is zero-padded to align to a 4-octet boundary.
```

That is, considering you've disclaimed defining specifics about the semantics of the header, how is the recipient of one of these things supposed to know how to ignore the zero-padding?

I do see that all the objects you've defined in this document are a multiple of four bytes long (if we assume their unspecified headers are a multiple of four byte long, that is!) so no padding would ever be required for a payload consisting only of these objects, and thus my question wouldn't apply. But if that's the answer to my question, then the final clause I quote above (about zero-padding) should just be removed.

### Section 3.2, object format, padding

```
  Similar to the container, each object has an object header that is
  used to identify the type and length of the object payload, and the
  object payload is zero-padded to align to a 4-octet boundary.
```

Similar to the above, in some cases there will be a need to know how to separate payload from padding. In all the objects you defined in Sections 3.2.x this is unnecessary (*if* you assume the unspecified header is 4-octet aligned itself) since you've carefully specified them so that they don't require padding.

It might be more straightforward to just mandate that future object specifications have a length that is a multiple of four octets, as all of your current ones do. That defers the question of what to do about variable payloads to the specification of the -- notional? -- object that has such a payload.

### Section 4

You talk about TTL in the first paragraph. Do you mean "TTL or Hop Limit"?

### Section 6

- You talk about integrity protection in passing. Let's assume a deployment hasn't enabled any kind of integrity protection. Have you done any analysis of what kind of mischief an attacker could cause by inserting incorrect capabilities in a forged response?

- You suggest checking the must-be-zero reserved fields and reporting an exception if they aren't zero. Often, such reserved fields are expected to be extended in future, and indeed this is what you indicate in this spec too. I guess since the packets terminate at the recipient of the reply, it's not terribly harmful to police that these be zero, but it would likely create an awfully noisy set of exceptions in the case of a partially rolled-out extension. Is this really a good recommendation? The more usual practice is of the form "must be zero on Tx, must be ignored on Rx".

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues.

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments
2022-10-26
07 John Scudder Ballot comment text updated for John Scudder
2022-10-26
07 John Scudder
[Ballot discuss]
### Clarity about scope of the document

As I understand it, this document isn't intended to be an implementable protocol specification on its …
[Ballot discuss]
### Clarity about scope of the document

As I understand it, this document isn't intended to be an implementable protocol specification on its own; rather, "specification details for these different echo request/reply protocols are outside the scope of this document".

If this approach is to be followed there are some changes needed. Below I provide some suggested text -- please know that I'm just supplying this as a straw man to illustrate my thinking; while you're welcome to use the text I've provided, I don't necessarily expect that.

The Abstract says that "This document describes an extension to the echo request/reply mechanisms". It does not. Here's an example of how it might be changed to be clearer.

OLD:
  This document describes an extension to the echo request/reply
  mechanisms used in IPv6 (including Segment Routing with IPv6 data
  plane (SRv6)), MPLS (including Segment Routing with MPLS data plane
  (SR-MPLS)), Service Function Chain (SFC) and Bit Index Explicit
  Replication (BIER) environments, which can be used within the In situ
  Operations, Administration, and Maintenance (IOAM) domain, allowing
  the IOAM encapsulating node to discover the enabled IOAM capabilities
  of each IOAM transit and IOAM decapsulating node.

NEW:
  There is a need to extend echo request/reply mechanisms used in IPv6
  (including Segment Routing with IPv6 data plane (SRv6)), MPLS
  (including Segment Routing with MPLS data plane (SR-MPLS)), Service
  Function Chain (SFC) and Bit Index Explicit Replication (BIER)
  environments, for use within the In situ Operations, Administration,
  and Maintenance (IOAM) domain, allowing the IOAM encapsulating node
  to discover the enabled IOAM capabilities of each IOAM transit and
  IOAM decapsulating node.

  Although this document does not itself specify the necessary
  extensions, it specifies formats and objects that can be used in such
  specifications, and provides guidelines and requirements for their
  development.

I think the Introduction also needs to be cleaned up. Saying that "specification details... are outside the scope" undersells the scope of what's needed. For example, maybe these changes would work in the Introduction:

OLD:
  This document describes an extension to the echo request/reply
  mechanisms used in IPv6 (including SRv6), MPLS (including SR-MPLS),
  SFC and BIER environments, which can be used within the IOAM domain,
  allowing the IOAM encapsulating node to discover the enabled IOAM
  capabilities of each IOAM transit and IOAM decapsulating node.

NEW:
  This document specifies formats and objects that can be used in the
  extension of echo request/reply mechanisms used in IPv6 (including
  SRv6), MPLS (including SR-MPLS), SFC and BIER environments, which can
  be used within the IOAM domain, allowing the IOAM encapsulating node
  to discover the enabled IOAM capabilities of each IOAM transit and
  IOAM decapsulating node.

OLD:
  Note that specification details for these different echo request/
  reply protocols are outside the scope of this document.  It is
  expected that each such protocol extension would be specified by an
  RFC and jointly designed by the working group that develops or
  maintains the echo request/reply protocol and the IETF IP Performance
  Measurement (IPPM) Working Group.

NEW:
  It is expected that the specification of the instantiation of each of
  these extensions will be done in the form of an RFC jointly designed
  by the working group that develops or maintains the echo
  request/reply protocol and the IETF IP Performance Measurement (IPPM)
  Working Group.
 
### Clarity of formats

Because this document is specifying things (or trying to) in absence of any concrete instantiation, it's difficult for me to evaluate if the formats as specified are complete and unambiguous. For now I've left my detailed discussion of this in my COMMENT section, and am optimistic that we can sort it out. However, I'm putting a placeholder here in case that problem turns out to be thornier than hoped.
2022-10-26
07 John Scudder Ballot discuss text updated for John Scudder
2022-10-26
07 John Scudder
[Ballot discuss]
### Clarity about scope of the document

As I understand it, this document isn't intended to be an implementable protocol specification on its …
[Ballot discuss]
### Clarity about scope of the document

As I understand it, this document isn't intended to be an implementable protocol specification on its own; rather, "specification details for these different echo request/reply protocols are outside the scope of this document".

If this approach is to be followed there are some changes needed. Below I provide some suggested text -- please know that I'm just supplying this as a straw man to illustrate my thinking; while you're welcome to use the text I've provided, I don't necessarily expect that.

The Abstract says that "This document describes an extension to the echo request/reply mechanisms". It does not. Here's an example of how it might be changed to be clearer.

OLD:
  This document describes an extension to the echo request/reply
  mechanisms used in IPv6 (including Segment Routing with IPv6 data
  plane (SRv6)), MPLS (including Segment Routing with MPLS data plane
  (SR-MPLS)), Service Function Chain (SFC) and Bit Index Explicit
  Replication (BIER) environments, which can be used within the In situ
  Operations, Administration, and Maintenance (IOAM) domain, allowing
  the IOAM encapsulating node to discover the enabled IOAM capabilities
  of each IOAM transit and IOAM decapsulating node.

NEW:
  There is a need to extend echo request/reply mechanisms used in IPv6
  (including Segment Routing with IPv6 data plane (SRv6)), MPLS
  (including Segment Routing with MPLS data plane (SR-MPLS)), Service
  Function Chain (SFC) and Bit Index Explicit Replication (BIER)
  environments, for use within the In situ Operations, Administration,
  and Maintenance (IOAM) domain, allowing the IOAM encapsulating node
  to discover the enabled IOAM capabilities of each IOAM transit and
  IOAM decapsulating node.

  Although this document does not itself specify the necessary
  extensions, it specifies formats and objects that can be used in such
  specifications, and provides guidelines and requirements for their
  development.

I think the Introduction also needs to be cleaned up. Saying that "specification details... are outside the scope" undersells the scope of what's needed. For example, maybe these changes would work in the Introduction:

OLD:
  This document describes an extension to the echo request/reply
  mechanisms used in IPv6 (including SRv6), MPLS (including SR-MPLS),
  SFC and BIER environments, which can be used within the IOAM domain,
  allowing the IOAM encapsulating node to discover the enabled IOAM
  capabilities of each IOAM transit and IOAM decapsulating node.

NEW:
  This document specifies formats and objects that can be used in the
  extension of echo request/reply mechanisms used in IPv6 (including
  SRv6), MPLS (including SR-MPLS), SFC and BIER environments, which can
  be used within the IOAM domain, allowing the IOAM encapsulating node
  to discover the enabled IOAM capabilities of each IOAM transit and
  IOAM decapsulating node.

OLD:
  Note that specification details for these different echo request/
  reply protocols are outside the scope of this document.  It is
  expected that each such protocol extension would be specified by an
  RFC and jointly designed by the working group that develops or
  maintains the echo request/reply protocol and the IETF IP Performance
  Measurement (IPPM) Working Group.

NEW:
  It is expected that the specification of the instantiation of each of
  these extensions will be done in the form of an RFC jointly designed
  by the working group that develops or maintains the echo
  request/reply protocol and the IETF IP Performance Measurement (IPPM)
  Working Group.
 
### Clarity of formats

Because this document is specifying things (or trying to) in absence of any concrete instantiation, it's very difficult for me to evaluate if the formats as specified are complete and unambiguous. For now I've left my detailed discussion of this in my COMMENT section, and am optimistic that we can sort it out. However, I'm putting a placeholder here in case that problem turns out to be thornier than hoped.
2022-10-26
07 John Scudder Ballot discuss text updated for John Scudder
2022-10-26
07 John Scudder
[Ballot discuss]
### Clarity about scope of the document

As I understand it, this document isn't intended to be an implementable protocol specification on its …
[Ballot discuss]
### Clarity about scope of the document

As I understand it, this document isn't intended to be an implementable protocol specification on its own; rather, "specification details for these different echo request/reply protocols are outside the scope of this document".

I'm not crazy about this approach, but if it's to be followed there are some changes needed. Below I provide some suggested text -- please know that I'm just supplying this as a straw man to illustrate my thinking; while you're welcome to use the text I've provided, I don't necessarily expect that.

The Abstract says that "This document describes an extension to the echo request/reply mechanisms". It does not. Here's an example of how it might be changed to be clearer.

OLD:
  This document describes an extension to the echo request/reply
  mechanisms used in IPv6 (including Segment Routing with IPv6 data
  plane (SRv6)), MPLS (including Segment Routing with MPLS data plane
  (SR-MPLS)), Service Function Chain (SFC) and Bit Index Explicit
  Replication (BIER) environments, which can be used within the In situ
  Operations, Administration, and Maintenance (IOAM) domain, allowing
  the IOAM encapsulating node to discover the enabled IOAM capabilities
  of each IOAM transit and IOAM decapsulating node.

NEW:
  There is a need to extend echo request/reply mechanisms used in IPv6
  (including Segment Routing with IPv6 data plane (SRv6)), MPLS
  (including Segment Routing with MPLS data plane (SR-MPLS)), Service
  Function Chain (SFC) and Bit Index Explicit Replication (BIER)
  environments, for use within the In situ Operations, Administration,
  and Maintenance (IOAM) domain, allowing the IOAM encapsulating node
  to discover the enabled IOAM capabilities of each IOAM transit and
  IOAM decapsulating node.

  Although this document does not itself specify the necessary
  extensions, it specifies formats and objects that can be used in such
  specifications, and provides guidelines and requirements for their
  development.

I think the Introduction also needs to be cleaned up. Saying that "specification details... are outside the scope" undersells the scope of what's needed. For example, maybe these changes would work in the Introduction:

OLD:
  This document describes an extension to the echo request/reply
  mechanisms used in IPv6 (including SRv6), MPLS (including SR-MPLS),
  SFC and BIER environments, which can be used within the IOAM domain,
  allowing the IOAM encapsulating node to discover the enabled IOAM
  capabilities of each IOAM transit and IOAM decapsulating node.

NEW:
  This document specifies formats and objects that can be used in the
  extension of echo request/reply mechanisms used in IPv6 (including
  SRv6), MPLS (including SR-MPLS), SFC and BIER environments, which can
  be used within the IOAM domain, allowing the IOAM encapsulating node
  to discover the enabled IOAM capabilities of each IOAM transit and
  IOAM decapsulating node.

OLD:
  Note that specification details for these different echo request/
  reply protocols are outside the scope of this document.  It is
  expected that each such protocol extension would be specified by an
  RFC and jointly designed by the working group that develops or
  maintains the echo request/reply protocol and the IETF IP Performance
  Measurement (IPPM) Working Group.

NEW:
  It is expected that the specification of the instantiation of each of
  these extensions will be done in the form of an RFC jointly designed
  by the working group that develops or maintains the echo
  request/reply protocol and the IETF IP Performance Measurement (IPPM)
  Working Group.
 
### Clarity of formats

Because this document is specifying things (or trying to) in absence of any concrete instantiation, it's very difficult for me to evaluate if the formats as specified are complete and unambiguous. For now I've left my detailed discussion of this in my COMMENT section, and am optimistic that we can sort it out. However, I'm putting a placeholder here in case that problem turns out to be thornier than hoped.
2022-10-26
07 John Scudder
[Ballot comment]
# John Scudder, RTG AD, comments for draft-ietf-ippm-ioam-conf-state-07
CC @jgscudder

## COMMENTS

### Section 1

```
  Fate sharing is a common requirement …
[Ballot comment]
# John Scudder, RTG AD, comments for draft-ietf-ippm-ioam-conf-state-07
CC @jgscudder

## COMMENTS

### Section 1

```
  Fate sharing is a common requirement for all kinds of active OAM
  packets, echo request is among them, in this document that means echo
  request is required to traverse a path of IOAM data packet.  This
  requirement can be achieved by, e.g., applying same explicit path or
  ECMP processing to both echo request and IOAM data packet.
```

Explicit path, yes, but it's known that you can't simply expect to "apply same ECMP processing" to two quite distinct packets, absent very carefully arranging for that to happen. If this is a requirement (and the paragraph says it is) then I think it's necessary to be clearer about how it's to be achieved.

### Section 3.1, Default-Namespace-ID

```
              A list of IOAM Namespace-IDs (one or more Namespace-IDs)
  MUST be included in this container in the echo request, and if
  present, the Default-Namespace-ID 0x0000 MUST be placed at the
  begining of the list of IOAM Namespace-IDs.  The IOAM encapsulating
  node requests only the enabled IOAM capabilities that match one of
  the Namespace-IDs.  The Namespace-ID has the same definition as
  what's specified in Section 4.3 of [RFC9197].
```

- You specify that if present 0x0000 must be placed at the beginning of the list. Is there any other sorting requirement on the list, or is that the only mandated ordering?

- It wasn't clear to me from a quick perusal of RFC 9197 §4.3 whether a request carrying 0x0000 would elicit replies for all Namespace-IDs (since 0x0000 matches everything) or if it would elicit replies only for capabilities that have no configured non-default namespace, or are explicitly configured with namespace 0x0000. Can you either clarify this in the text, or if you think it's clear from the reference, help me understand what makes it clear?

- If the first guess above is correct (0x0000 elicits replies for all Namespace-IDs) then it would seem that if the list contains 0x0000, it's pointless to include anything else in the list, and that might be worth pointing out in the text.

- If the first guess above is correct, that would also prompt comments on the use of Namespace-ID field in Sections 3.2.x, but we can address that if needed.

### Section 3.1, container format, padding

```
  The IOAM Capabilities Query Container has a container header that is
  used to identify the type and optionally length of the container
  payload, and the container payload (List of IOAM Namespace-IDs) is
  zero-padded to align to a 4-octet boundary.

  The length, structure, and definition of the IOAM Capabilities Query
  Container Header depends on the specific environment it is applied
  at.
```

I regret I'm not sufficiently familiar with all the different bearer protocols you're envisioning embedding this container in. So I'll just ask,

- Why is the length of the payload said to be optional, when it's a (presumably variable-length) list? Does this relate to a bearer protocol where the length of the list is inferred some other way, or what?

- The specification that the payload is zero-padded to 4-octet alignment carries some implications. Let's explore these with an example. Suppose the payload is a single Namespace-ID, 0x0001. Then presumably the payload has to be 0x0001 0x0000, once the mandated pad bytes are added. Is the receiver supposed to know that it ignores the 0x0000 value (which is otherwise the Default-Namespace-ID) because it comes at the end of the list, not the beginning as the previous paragraph required? If so, this seems worth calling out. If not, how is the receiver supposed to know where payload ends and padding begins?

### Section 3.2, container format, padding

Similar questions to those above apply to:

```
  The IOAM Capabilities Response Container has a container header that
  is used to identify the type and optionally length of the container
  payload, and the container payload (List of IOAM Capabilities
  Objects) is zero-padded to align to a 4-octet boundary.
```

That is, considering you've disclaimed defining specifics about the semantics of the header, how is the recipient of one of these things supposed to know how to ignore the zero-padding?

I do see that all the objects you've defined in this document are a multiple of four bytes long (if we assume their unspecified headers are a multiple of four byte long, that is!) so no padding would ever be required for a payload consisting only of these objects, and thus my question wouldn't apply. But if that's the answer to my question, then the final clause I quote above (about zero-padding) should just be removed.

### Section 3.2, object format, padding

```
  Similar to the container, each object has an object header that is
  used to identify the type and length of the object payload, and the
  object payload is zero-padded to align to a 4-octet boundary.
```

Similar to the above, in some cases there will be a need to know how to separate payload from padding. In all the objects you defined in Sections 3.2.x this is unnecessary (*if* you assume the unspecified header is 4-octet aligned itself) since you've carefully specified them so that they don't require padding.

It might be more straightforward to just mandate that future object specifications have a length that is a multiple of four octets, as all of your current ones do. That defers the question of what to do about variable payloads to the specification of the -- notional? -- object that has such a payload.

### Section 4

You talk about TTL in the first paragraph. Do you mean "TTL or Hop Limit"?

### Section 6

- You talk about integrity protection in passing. Let's assume a deployment hasn't enabled any kind of integrity protection. Have you done any analysis of what kind of mischief an attacker could cause by inserting incorrect capabilities in a forged response?

- You suggest checking the must-be-zero reserved fields and reporting an exception if they aren't zero. Often, such reserved fields are expected to be extended in future, and indeed this is what you indicate in this spec too. I guess since the packets terminate at the recipient of the reply, it's not terribly harmful to police that these be zero, but it would likely create an awfully noisy set of exceptions in the case of a partially rolled-out extension. Is this really a good recommendation? The more usual practice is of the form "must be zero on Tx, must be ignored on Rx".

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues.

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments
2022-10-26
07 John Scudder [Ballot Position Update] New position, Discuss, has been recorded for John Scudder
2022-10-26
07 Warren Kumari
[Ballot discuss]
Thank you very much for writing this document.
Please see: https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/


My concerns are closely related to Roman's DISCUSS point:

The document says: …
[Ballot discuss]
Thank you very much for writing this document.
Please see: https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/


My concerns are closely related to Roman's DISCUSS point:

The document says: "A deployment can increase security by using border filtering of incoming and outgoing echo requests/replies."

I'm unclear why this is just a "can increase security", and not something much much stronger -- but, also, I'm unclear how exactly an operator would be expected to filter these. The Abstract says: "This document describes an extension to the echo request/reply mechanisms used in [...]", but from what I can tell, it is more "here are some containers that you could use in some other protocols".

It seems like, instead of only relying on the network for filtering (which doesn't yet seem to be implemented), the:
"To protect against unauthorized sources using echo request messages to obtain IOAM Capabilities information, it is RECOMMENDED that implementations provide a means of checking the source addresses of echo request messages against an access list before accepting the message."
should be made stronger. Implementations need to be created to understand IOAM, and so requiring that they have the capability to only accept configured source addresses seems simple.
2022-10-26
07 Warren Kumari [Ballot Position Update] New position, Discuss, has been recorded for Warren Kumari
2022-10-26
07 Lars Eggert
[Ballot comment]
# GEN AD review of draft-ietf-ippm-ioam-conf-state-07

CC @larseggert

Thanks to Gyan S. Mishra for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/wA_8u8-xjQ7sl29P3Qul3W_U_aw …
[Ballot comment]
# GEN AD review of draft-ietf-ippm-ioam-conf-state-07

CC @larseggert

Thanks to Gyan S. Mishra for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/wA_8u8-xjQ7sl29P3Qul3W_U_aw).

## Comments

### Section 5.1, paragraph 3
```
    0b01 - 0b11 are available for assignment via RFC Required process as
    per [RFC8126].
```
Since there are only three codepoints remaining, would a stricter assignment
policy not make sense?

### Section 5.2, paragraph 3
```
    0b11 is available for assignment via RFC Required process as per
    [RFC8126].
```
Since there is only a single codepoint remaining, would a stricter assignment
policy not make sense?

## Nits

All comments below are about very minor potential issues that you may choose to
address in some way - or ignore - as you see fit. Some were flagged by
automated tools (via https://github.com/larseggert/ietf-reviewtool), so there
will likely be some false positives. There is no need to let me know what you
did with these suggestions.

### Typos

#### Section 3.1, paragraph 4
```
-    begining of the list of IOAM Namespace-IDs.  The IOAM encapsulating
+    beginning of the list of IOAM Namespace-IDs.  The IOAM encapsulating
+        +
```

#### Section 6, paragraph 9
```
-    Except for what's described above, the securiy issues discussed in
+    Except for what's described above, the security issues discussed in
+                                                +
```

### Grammar/style

#### Section 3.2.2, paragraph 9
```
C9197]. This document defines SoP as follow: 0b00 means 64-bit "PktID" and 6
                                  ^^^^^^^^^
```
Did you mean "as follows"?

#### Section 3.2.6, paragraph 1
```
th TTL equal to 2 to reach the second nearest node, which also may be an IOAM
                              ^^^^^^^^^^^^^^
```
It appears that a hyphen is missing.

#### Section 4, paragraph 1
```
s per [RFC8126]. The subsequent sub-sections detail the registries herein co
                                ^^^^^^^^^^^^
```
This word is normally spelled as one.

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues. Review generated by the [`ietf-reviewtool`][IRT].

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments
[IRT]: https://github.com/larseggert/ietf-reviewtool
2022-10-26
07 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert
2022-10-25
07 Roman Danyliw
[Ballot discuss]
Section 6.

  A deployment can increase security by using border filtering of
  incoming and outgoing echo requests/replies.

Thanks for calling out …
[Ballot discuss]
Section 6.

  A deployment can increase security by using border filtering of
  incoming and outgoing echo requests/replies.

Thanks for calling out the security impact of echo request/replies.  Since the cited RFC9197 reminds the reader that a “network operator is expected to enforce policies that prevent IOAM traffic from leaking outside of the IOAM-Domain”, why is this guidance not mandatory?

Would the following text be more appropriate?

NEW
A deployment MUST ensure that border filtering drops inbound echo requests with a IOAM Capabilities Container Header from outside of the domain, and drops outbound echo request/replies with IOAM Capabilities Headers leaving the domain.
2022-10-25
07 Roman Danyliw [Ballot comment]
Thank you to Chris Lonvick for the SECDIR review.

Section 3.1.  Typo. s/begining/beginning/

Section 6.  Typo. s/securiy/security/
2022-10-25
07 Roman Danyliw [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw
2022-10-25
07 Paul Wouters
[Ballot comment]
Thanks to Chris Lonvick for the SecDir review. He raised a few points that are worth addressing: https://datatracker.ietf.org/doc/review-ietf-ippm-ioam-conf-state-05-secdir-lc-lonvick-2022-09-30/


  Reserved field is reserved …
[Ballot comment]
Thanks to Chris Lonvick for the SecDir review. He raised a few points that are worth addressing: https://datatracker.ietf.org/doc/review-ietf-ippm-ioam-conf-state-05-secdir-lc-lonvick-2022-09-30/


  Reserved field is reserved for future use and MUST be set to zero.

Can this be extended to say "and MUST be ignored when non-zero" ? There is more than one of these.


Why is the SoP field specified as two bits from a reserved field, when it only uses one bit? Why not just take one bit from the reserved field?
2022-10-25
07 Paul Wouters [Ballot Position Update] New position, No Objection, has been recorded for Paul Wouters
2022-10-25
07 Alvaro Retana
[Ballot comment]

The Abstract (and the corresponding text in the Introduction) is misleading:

  This document describes an extension to the echo request/reply
  mechanisms …
[Ballot comment]

The Abstract (and the corresponding text in the Introduction) is misleading:

  This document describes an extension to the echo request/reply
  mechanisms used in IPv6 (including Segment Routing with IPv6 data
  plane (SRv6)), MPLS (including Segment Routing with MPLS data plane
  (SR-MPLS)), Service Function Chain (SFC) and Bit Index Explicit
  Replication (BIER) environments, which can be used within the In situ
  Operations, Administration, and Maintenance (IOAM) domain, allowing
  the IOAM encapsulating node to discover the enabled IOAM capabilities
  of each IOAM transit and IOAM decapsulating node.

This document describes an extension that *could be used* as mentioned above, but it doesn't specify "an extension to the echo request/reply mechanisms used in..."  Please clarify that the document describes a generic format.

The Introduction later clarifies that "specification details for these different echo request/reply protocols are outside the scope of this document".  However, if the mentioned applications are expected to be the users of this specification, the corresponding WGs (6man, spring, mpls, sfc, and bier) should have been consulted.  I couldn't find anything in the archives to show interaction.
2022-10-25
07 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2022-10-24
07 Éric Vyncke
[Ballot comment]

# Éric Vyncke, INT AD, comments for draft-ietf-ippm-ioam-conf-state-07
CC @evyncke

Thank you for the work put into this document.

Please find below some …
[Ballot comment]

# Éric Vyncke, INT AD, comments for draft-ietf-ippm-ioam-conf-state-07
CC @evyncke

Thank you for the work put into this document.

Please find below some non-blocking COMMENT points (but replies would be appreciated even if only for my own education).

Special thanks to Marcus Ihlar for the shepherd's detailed write-up including the WG consensus and the justification of the intended status.

I hope that this review helps to improve the document,

Regards,

-éric

## COMMENTS

### Abstract

This is a very long sentence... Consider shortening it.

The `echo request/reply mechanisms used in IPv6 ...` would benefit of being qualified (perhaps with 'generic' or 'specified' ?).

### Section 1

The IPv6 node information query, while sent over ICMPv6, is not really an 'echo/request' exchange, hence the title of this RFC is not really adequate. I have no suggestion though.

### Section 2.2

When defining "TTL" please also add that this is the hop-limit field in the IPv6 header (which has no TTL field).

### Section 3.2.1 and other sections including 3.2.6 "Must be zero"

Please do not forget to specify the receiver's behavior when receiving reserved bits that are no all 0.

### Section 3.2.3

Explaining what "SoP" is would ease the reading.


## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues.

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments
2022-10-24
07 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2022-10-20
07 (System) IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2022-10-19
07 Martin Duke Placed on agenda for telechat - 2022-10-27
2022-10-19
07 Martin Duke Ballot has been issued
2022-10-19
07 Martin Duke [Ballot Position Update] New position, Yes, has been recorded for Martin Duke
2022-10-19
07 Martin Duke Created "Approve" ballot
2022-10-19
07 Martin Duke IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup
2022-10-11
07 (System) Changed action holders to Martin Duke (IESG state changed)
2022-10-11
07 (System) Sub state has been changed to AD Followup from Revised ID Needed
2022-10-11
07 Xiao Min New version available: draft-ietf-ippm-ioam-conf-state-07.txt
2022-10-11
07 Xiao Min New version accepted (logged-in submitter: Xiao Min)
2022-10-11
07 Xiao Min Uploaded new revision
2022-10-10
06 Martin Duke Awaiting response to the GENART review.
2022-10-10
06 (System) Changed action holders to Martin Duke, Xiao Min, Greg Mirsky, Lei Bo (IESG state changed)
2022-10-10
06 Martin Duke IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for Writeup
2022-10-10
06 Martin Duke Ballot writeup was changed
2022-10-10
06 Gyan Mishra Request for Last Call review by GENART Completed: Ready with Issues. Reviewer: Gyan Mishra. Sent review to list.
2022-10-08
06 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2022-10-08
06 Xiao Min New version available: draft-ietf-ippm-ioam-conf-state-06.txt
2022-10-08
06 Xiao Min New version accepted (logged-in submitter: Xiao Min)
2022-10-08
06 Xiao Min Uploaded new revision
2022-10-06
05 (System) IESG state changed to Waiting for Writeup from In Last Call
2022-10-05
05 (System) IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed
2022-10-05
05 David Dong
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-ippm-ioam-conf-state-05. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-ippm-ioam-conf-state-05. If any part of this review is inaccurate, please let us know.

The IANA Services Operator understands that, upon approval of this document, there are three actions which we must complete.

First a new registry page is to be created called the In-Situ OAM (IOAM) Capabilities Parameters registry page. The page will be created on the IANA Protocol Registries page at:

https://www.iana.org/protocols

NOTE: In accordance with current practice, IANA prefers to leave the
string \u201cParameters\u201d out of the name of a new registry grouping, unless
doing so will cause confusion. Please let us know if there will be any
issues with using the term \u201cIn-Situ OAM (IOAM) Capabilities\u201d instead of \u201cIn-Situ OAM (IOAM) Capabilities Parameters.\u201d

Second, a new registry is to be created called the IOAM SoP Capability registry. The new registry will be located on the newly created In-Situ OAM (IOAM) Capabilities Parameters registry page. Values in the registry range from 0b00 to 0b11. The registration rule for the new registry is RFC Required as defined in RFC 8126. There is a single initial registration in the new registry as follows:

SoP Description Reference
---- ------------------------------------------- -------------
0b00 64-bit "PktID" and 64-bit "Cumulative" data [ RFC-to-be ]

Third, a new registry is to be created called the IOAM TSF Capability registry. The new registry will be located on the newly created In-Situ OAM (IOAM) Capabilities Parameters registry page. Values in the registry range from 0b00 to 0b11. The registration rule for the new registry is RFC Required as defined in RFC 8126. There are three initial registrations in the new registry as follows:

TSF Description Reference
---- ------------------------------ -------------
0b00 PTP Truncated Timestamp Format [ RFC-to-be ]
0b01 NTP 64-bit Timestamp Format [ RFC-to-be ]
0b10 POSIX-based Timestamp Format [ RFC-to-be ]
0b11 Unassigned

The IANA Services Operator understands that these three actions are the only ones required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed.

For definitions of IANA review states, please see:

https://datatracker.ietf.org/help/state/draft/iana-review

Thank you,

David Dong
IANA Services Specialist
2022-09-30
05 Chris Lonvick Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Chris Lonvick. Sent review to list.
2022-09-29
05 Jean Mahoney Request for Last Call review by GENART is assigned to Gyan Mishra
2022-09-29
05 Jean Mahoney Request for Last Call review by GENART is assigned to Gyan Mishra
2022-09-28
05 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Shwetha Bhandari
2022-09-28
05 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Shwetha Bhandari
2022-09-23
05 Luc André Burdet Request for Last Call review by RTGDIR is assigned to Ron Bonica
2022-09-23
05 Luc André Burdet Request for Last Call review by RTGDIR is assigned to Ron Bonica
2022-09-23
05 Tero Kivinen Request for Last Call review by SECDIR is assigned to Chris Lonvick
2022-09-23
05 Tero Kivinen Request for Last Call review by SECDIR is assigned to Chris Lonvick
2022-09-23
05 Alvaro Retana Requested Last Call review by RTGDIR
2022-09-22
05 Cindy Morgan IANA Review state changed to IANA - Review Needed
2022-09-22
05 Cindy Morgan
The following Last Call announcement was sent out (ends 2022-10-06):

From: The IESG
To: IETF-Announce
CC: draft-ietf-ippm-ioam-conf-state@ietf.org, ippm-chairs@ietf.org, ippm@ietf.org, marcus.ihlar@ericsson.com, martin.h.duke@gmail.com …
The following Last Call announcement was sent out (ends 2022-10-06):

From: The IESG
To: IETF-Announce
CC: draft-ietf-ippm-ioam-conf-state@ietf.org, ippm-chairs@ietf.org, ippm@ietf.org, marcus.ihlar@ericsson.com, martin.h.duke@gmail.com
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Echo Request/Reply for Enabled In-situ OAM Capabilities) to Proposed Standard


The IESG has received a request from the IP Performance Measurement WG (ippm)
to consider the following document: - 'Echo Request/Reply for Enabled In-situ
OAM Capabilities'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2022-10-06. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  This document describes an extension to the echo request/reply
  mechanisms used in IPv6 (including Segment Routing with IPv6 data
  plane (SRv6)), MPLS (including Segment Routing with MPLS data plane
  (SR-MPLS)), Service Function Chain (SFC) and Bit Index Explicit
  Replication (BIER) environments, which can be used within the In situ
  Operations, Administration, and Maintenance (IOAM) domain, allowing
  the IOAM encapsulating node to discover the enabled IOAM capabilities
  of each IOAM transit and IOAM decapsulating node.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-ippm-ioam-conf-state/


The following IPR Declarations may be related to this I-D:

  https://datatracker.ietf.org/ipr/3531/





2022-09-22
05 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2022-09-22
05 Martin Duke Last call was requested
2022-09-22
05 Martin Duke Last call announcement was generated
2022-09-22
05 Martin Duke Ballot approval text was generated
2022-09-22
05 Martin Duke Ballot writeup was generated
2022-09-22
05 Martin Duke IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2022-09-21
05 (System) Changed action holders to Martin Duke (IESG state changed)
2022-09-21
05 (System) Sub state has been changed to AD Followup from Revised ID Needed
2022-09-21
05 Xiao Min New version available: draft-ietf-ippm-ioam-conf-state-05.txt
2022-09-21
05 Xiao Min New version accepted (logged-in submitter: Xiao Min)
2022-09-21
05 Xiao Min Uploaded new revision
2022-08-01
04 Martin Duke Sent review comments to the authors.
2022-08-01
04 (System) Changed action holders to Martin Duke, Xiao Min, Greg Mirsky, Lei Bo (IESG state changed)
2022-08-01
04 Martin Duke IESG state changed to AD Evaluation::Revised I-D Needed from Publication Requested
2022-07-06
04 Xiao Min New version available: draft-ietf-ippm-ioam-conf-state-04.txt
2022-07-06
04 Xiao Min New version accepted (logged-in submitter: Xiao Min)
2022-07-06
04 Xiao Min Uploaded new revision
2022-07-04
03 Marcus Ihlar
# Document Shepherd Writeup

*This version is dated 8 April 2022.*

Thank you for your service as a document shepherd. Among the responsibilities is
answering …
# Document Shepherd Writeup

*This version is dated 8 April 2022.*

Thank you for your service as a document shepherd. Among the responsibilities is
answering the questions in this writeup to give helpful context to Last Call and
Internet Engineering Steering Group ([IESG][1]) reviewers, and your diligence in
completing it, is appreciated. The full role of the shepherd is further
described in [RFC 4858][2], and informally. You will need the cooperation of
authors to complete these checks.

Note that some numbered items contain multiple related questions; please be sure
to answer all of them.

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

  The WG consensus represents the strong concurrence of a few individuals, with
  others being silent. 

2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

  The strongest criticism has been related to not being fully aligned with
  the data model described in: draft-ietf-ippm-ioam-yang. There have been
  disagreements on the usefulness of this feature (why is there a need for
  IOAM capability discovery within a limited domain?).

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

    No.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

  There are no current implementations known to the shepherd or the authors.
  ZTE and China Telecom have expressed that they intend to implement the
  solution described in the document. 

### Additional Reviews

5. Does this document need review from other IETF working groups or external
  organizations? Have those reviews occurred?
 
  No

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.
 
  n/a

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?
 
  n/a

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

  n/a

### Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

  The document is needed (as expressed by some WG members) and technically
  sound. There is room for improvement of the language in the document, but
  overall it's ready to progress.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. Do any such issues remain that would merit specific
    attention from subsequent reviews?

11. What type of RFC publication is being requested on the IETF stream (Best
    Current Practice, Proposed Standard, Internet Standard, Informational,
    Experimental, or Historic)? Why is this the proper type of RFC? Do all
    Datatracker state attributes correctly reflect this intent?

    Proposed standard as it builds upon other IOAM standards such as RFC 9197.
    The datatracker state attributes reflect this intent.

12. Has the interested community confirmed that any and all appropriate IPR
    disclosures required by [BCP 78][7] and [BCP 79][8] have been filed? If not,
    explain why. If yes, summarize any discussion and conclusion regarding the
    intellectual property rights (IPR) disclosures, including links to relevant
    emails.

    There is a single IPR [13] relating to IOAM in general. The authors have
    confirmed that they are not aware of any additional IPRs.

13. Has each Author or Contributor confirmed their willingness to be listed as
    such? If the number of Authors/Editors on the front page is greater than 5,
    please provide a justification.

    Yes.

14. Identify any remaining I-D nits in this document. (See [the idnits tool][9]
    and the checkbox items found in Guidelines to Authors of Internet-Drafts).
    Simply running the idnits tool is not enough; please review the entire
    guidelines document.

    The abstract consists of several abbreviations, none of them expanded.

    Section 3:
    References to ioam-data (RFC 9197) point to the wrong section numbers:
    IOAM-Trace-Type field is defined in section 4.4 of RFC 9197.
    Namespace-ID field is defined in section 4.3 of RFC 9197.
    IOAM-POT-Type field is defined in section 4.5 of RFC 9197.
    IOAM-E2E-Type field is defined in section 4.6 of RFC 9197.

    ID nits output:

    Outdated reference: draft-ietf-ippm-ioam-data has been published as RFC
    9197


    Outdated reference: A later version (-09) exists of
    draft-ietf-ippm-ioam-direct-export-07

    Outdated reference: A later version (-19) exists of draft-ietf-sfc-multi-layer-oam-18

    Outdated reference: A later version (-01) exists of draft-xiao-6man-icmpv6-ioam-conf-state-00

15. Should any informative references be normative or vice-versa?

    No.

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?
   
    n/a

17. Are there any normative downward references (see [RFC 3967][10],
    [BCP 97][11])? If so, list them.

    No.

18. Are there normative references to documents that are not ready for
    advancement or are otherwise in an unclear state? If they exist, what is the
    plan for their completion?

    There is a normative reference to I-D.ietf-ippm-ioam-direct-export which is
    currently under IESG evaluation.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

    n/a

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][12]).

    Contains a request for a new registry group with an appropriate name: 
    "In-Situ OAM (IOAM) Capabilities Parameters".

    Two registries are proposed for the group:

    IOAM SoP Capability Registry
    IOAM TSF Capability Registry

    Both registries have descriptive names and short descriptions with
    references to relevant technical content.

    There's a small nit in section 5.2 which states that the registry
    defines three code points. It actually defines four, and assigns
    three.

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

    n/a

[1]: https://www.ietf.org/about/groups/iesg/
[2]: https://www.rfc-editor.org/rfc/rfc4858.html
[3]: https://www.rfc-editor.org/rfc/rfc7942.html
[4]: https://trac.ietf.org/trac/ops/wiki/yang-review-tools
[5]: https://www.rfc-editor.org/rfc/rfc8342.html
[6]: https://trac.ietf.org/trac/iesg/wiki/ExpertTopics
[7]: https://www.rfc-editor.org/info/bcp78
[8]: https://www.rfc-editor.org/info/bcp79
[9]: https://www.ietf.org/tools/idnits/
[10]: https://www.rfc-editor.org/rfc/rfc3967.html
[11]: https://www.rfc-editor.org/info/bcp97
[12]: https://www.rfc-editor.org/rfc/rfc8126.html

[13]: https://datatracker.ietf.org/ipr/3531/


2022-07-04
03 Marcus Ihlar Responsible AD changed to Martin Duke
2022-07-04
03 Marcus Ihlar IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2022-07-04
03 Marcus Ihlar IESG state changed to Publication Requested from I-D Exists
2022-07-04
03 Marcus Ihlar IESG process started in state Publication Requested
2022-07-04
03 Marcus Ihlar
# Document Shepherd Writeup

*This version is dated 8 April 2022.*

Thank you for your service as a document shepherd. Among the responsibilities is
answering …
# Document Shepherd Writeup

*This version is dated 8 April 2022.*

Thank you for your service as a document shepherd. Among the responsibilities is
answering the questions in this writeup to give helpful context to Last Call and
Internet Engineering Steering Group ([IESG][1]) reviewers, and your diligence in
completing it, is appreciated. The full role of the shepherd is further
described in [RFC 4858][2], and informally. You will need the cooperation of
authors to complete these checks.

Note that some numbered items contain multiple related questions; please be sure
to answer all of them.

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

  The WG consensus represents the strong concurrence of a few individuals, with
  others being silent. 

2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

  The strongest criticism has been related to not being fully aligned with
  the data model described in: draft-ietf-ippm-ioam-yang. There have been
  disagreements on the usefulness of this feature (why is there a need for
  IOAM capability discovery within a limited domain?).

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

    No.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

  There are no current implementations known to the shepherd or the authors.
  ZTE and China Telecom have expressed that they intend to implement the
  solution described in the document. 

### Additional Reviews

5. Does this document need review from other IETF working groups or external
  organizations? Have those reviews occurred?
 
  No

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.
 
  n/a

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?
 
  n/a

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

  n/a

### Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

  The document is needed (as expressed by some WG members) and technically
  sound. There is room for improvement of the language in the document, but
  overall it's ready to progress.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. Do any such issues remain that would merit specific
    attention from subsequent reviews?

11. What type of RFC publication is being requested on the IETF stream (Best
    Current Practice, Proposed Standard, Internet Standard, Informational,
    Experimental, or Historic)? Why is this the proper type of RFC? Do all
    Datatracker state attributes correctly reflect this intent?

    Proposed standard as it builds upon other IOAM standards such as RFC 9197.
    The datatracker state attributes reflect this intent.

12. Has the interested community confirmed that any and all appropriate IPR
    disclosures required by [BCP 78][7] and [BCP 79][8] have been filed? If not,
    explain why. If yes, summarize any discussion and conclusion regarding the
    intellectual property rights (IPR) disclosures, including links to relevant
    emails.

    There is a single IPR [13] relating to IOAM in general. The authors have
    confirmed that they are not aware of any additional IPRs.

13. Has each Author or Contributor confirmed their willingness to be listed as
    such? If the number of Authors/Editors on the front page is greater than 5,
    please provide a justification.

    Yes.

14. Identify any remaining I-D nits in this document. (See [the idnits tool][9]
    and the checkbox items found in Guidelines to Authors of Internet-Drafts).
    Simply running the idnits tool is not enough; please review the entire
    guidelines document.

    The abstract consists of several abbreviations, none of them expanded.

    Section 3:
    References to ioam-data (RFC 9197) point to the wrong section numbers:
    IOAM-Trace-Type field is defined in section 4.4 of RFC 9197.
    Namespace-ID field is defined in section 4.3 of RFC 9197.
    IOAM-POT-Type field is defined in section 4.5 of RFC 9197.
    IOAM-E2E-Type field is defined in section 4.6 of RFC 9197.

    ID nits output:

    Outdated reference: draft-ietf-ippm-ioam-data has been published as RFC
    9197


    Outdated reference: A later version (-09) exists of
    draft-ietf-ippm-ioam-direct-export-07

    Outdated reference: A later version (-19) exists of draft-ietf-sfc-multi-layer-oam-18

    Outdated reference: A later version (-01) exists of draft-xiao-6man-icmpv6-ioam-conf-state-00

15. Should any informative references be normative or vice-versa?

    No.

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?
   
    n/a

17. Are there any normative downward references (see [RFC 3967][10],
    [BCP 97][11])? If so, list them.

    No.

18. Are there normative references to documents that are not ready for
    advancement or are otherwise in an unclear state? If they exist, what is the
    plan for their completion?

    There is a normative reference to I-D.ietf-ippm-ioam-direct-export which is
    currently under IESG evaluation.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

    n/a

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][12]).

    Contains a request for a new registry group with an appropriate name: 
    "In-Situ OAM (IOAM) Capabilities Parameters".

    Two registries are proposed for the group:

    IOAM SoP Capability Registry
    IOAM TSF Capability Registry

    Both registries have descriptive names and short descriptions with
    references to relevant technical content.

    There's a small nit in section 5.2 which states that the registry
    defines three code points. It actually defines four, and assigns
    three.

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

    n/a

[1]: https://www.ietf.org/about/groups/iesg/
[2]: https://www.rfc-editor.org/rfc/rfc4858.html
[3]: https://www.rfc-editor.org/rfc/rfc7942.html
[4]: https://trac.ietf.org/trac/ops/wiki/yang-review-tools
[5]: https://www.rfc-editor.org/rfc/rfc8342.html
[6]: https://trac.ietf.org/trac/iesg/wiki/ExpertTopics
[7]: https://www.rfc-editor.org/info/bcp78
[8]: https://www.rfc-editor.org/info/bcp79
[9]: https://www.ietf.org/tools/idnits/
[10]: https://www.rfc-editor.org/rfc/rfc3967.html
[11]: https://www.rfc-editor.org/info/bcp97
[12]: https://www.rfc-editor.org/rfc/rfc8126.html

[13]: https://datatracker.ietf.org/ipr/3531/


2022-05-24
03 Tommy Pauly Changed consensus to Yes from Unknown
2022-05-24
03 Tommy Pauly Intended Status changed to Proposed Standard from None
2022-05-24
03 Tommy Pauly Notification list changed to marcus.ihlar@ericsson.com because the document shepherd was set
2022-05-24
03 Tommy Pauly Document shepherd changed to Marcus Ihlar
2022-04-13
03 Marcus Ihlar IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2022-03-29
03 Marcus Ihlar IETF WG state changed to In WG Last Call from WG Document
2022-01-26
03 Xiao Min New version available: draft-ietf-ippm-ioam-conf-state-03.txt
2022-01-26
03 (System) New version accepted (logged-in submitter: Xiao Min)
2022-01-26
03 Xiao Min Uploaded new revision
2021-12-09
02 Xiao Min New version available: draft-ietf-ippm-ioam-conf-state-02.txt
2021-12-09
02 (System) New version accepted (logged-in submitter: Xiao Min)
2021-12-09
02 Xiao Min Uploaded new revision
2021-10-24
01 Xiao Min New version available: draft-ietf-ippm-ioam-conf-state-01.txt
2021-10-24
01 (System) New version accepted (logged-in submitter: Xiao Min)
2021-10-24
01 Xiao Min Uploaded new revision
2021-07-25
00 Tommy Pauly This document now replaces draft-xiao-ippm-ioam-conf-state instead of None
2021-07-25
00 Xiao Min New version available: draft-ietf-ippm-ioam-conf-state-00.txt
2021-07-25
00 (System) WG -00 approved
2021-07-25
00 Xiao Min Set submitter to "Xiao Min ", replaces to draft-xiao-ippm-ioam-conf-state and sent approval email to group chairs: ippm-chairs@ietf.org
2021-07-25
00 Xiao Min Uploaded new revision