Huaimo:

I apologize for the late response to your resolution.

I was out sick last week.  Unfortunately, the pollution from wild fires in 
Wisconsin and Canada is creating difficulties for my respiratory system.  It 
makes me thankful that this type of wild fires occur once in 30+ years.  
California seems to have these issues every year.

The text in the abstract and introduction has improved.  I do not have any more 
issues with these sections.

The additions to sections 4.1 and 4.2 covered the issues I raised.  Thanks for 
the edits. Error handling for packets are difficult to write.  I will review 
these again in the next version as a final check.

The new security section is greatly improved.

My major issue is not address in sections 3.1 and 3.2.   Thank you for letting 
me know the steps are correct.  It now becomes an editorial issue.  It took me 
a great deal of time to figure out the steps.  I think a format like the steps 
to make this text readable and save you time in the long-run.

I’m available to chat on Tuesday 8/22 from 9:30-11:00am.  Would you like to 
chat real-time on how to fix these issues?

Sue

Your comment on the mechanisms
Mechanisms:
The mechanisms provide steps that are unclear and are not easily aligned with
the example. The mechanism section contains the following: - description of
figure 1 - step 1: a normal path set-up (PEA) - step 2: a backup pat set-up
(PEB)
    step 2a: PEB announcement to PEA with PEB
    step 2b: PEA processes the announcement and sends forwarding behavior to PEB
    step 2c: PEB processes forwarding based on Mirror SID into table
    step 2d: processing of anycast that links PEA/PEB to compute LFA with SIDs
- step 3: Steps in fail-over in failure scenario
   step 3a: failure detected via BFD
   step 3b: send IPv6 packet with an encapsulated packet (H.Encaps) at PL1
   step 3c: decapsulate IPv6 packet with End.M (a variant of End.DT6)
- step 4: Handle processing and forwarding a PEB

If these are the correct steps, then the example in section 3.2.
If these are not the correct steps, you confirm the reading is difficult.
[HC]: These steps are correct.

From: Huaimo Chen <[email protected]>
Sent: Κυριακή, 13 Αυγούστου 2023 11:33 μμ
To: [email protected]; Susan Hares <[email protected]>
Cc: [email protected]; [email protected]
Subject: Re: Opsdir early review of draft-ietf-rtgwg-srv6-egress-protection-09

Hi Sue, Thank you very much for your valuable comments. My responses are inline 
below with [HC]. Best Regards, Huaimo  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌ 
 ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌
External ([email protected]<mailto:[email protected]>)
  Report This 
Email<https://protection.inkyphishfence.com/report?id=bmV0b3JnMTA1ODY5MTIvc2hhcmVzQG5kemguY29tL2JhOGIyMTQ5MWIyNjA5MzA2ODI3MTVlZDFlYzUyYzdmLzE2OTE5ODM5NjMuMDQ=#key=bb66d0f14cb20414f7a8f092bf6d64c6>
  
FAQ<https://www.godaddy.com/help/report-email-with-advanced-email-security-40813>
  GoDaddy Advanced Email Security, Powered by 
INKY<https://www.inky.com/protection-by-inky>

Hi Sue,

    Thank you very much for your valuable comments.
    My responses are inline below with [HC].

Best Regards,
Huaimo
________________________________
From: Susan Hares via Datatracker <[email protected]<mailto:[email protected]>>
Sent: Tuesday, August 8, 2023 8:51 AM
To: [email protected]<mailto:[email protected]> 
<[email protected]<mailto:[email protected]>>
Cc: 
[email protected]<mailto:[email protected]>
 
<[email protected]<mailto:[email protected]>>;
 [email protected]<mailto:[email protected]> <[email protected]<mailto:[email protected]>>
Subject: Opsdir early review of draft-ietf-rtgwg-srv6-egress-protection-09

Reviewer: Susan Hares
Review result: Has Issues

This is an OPS-DIR review of draft-ietf-rtgwg-srv6-egress-protection-09.
This review should be taken as an early review just as other reviews.

Status: Serious Issues + editorial issues
Why: The text describes mechanisms, ISIS sub-TLVs, OSPF sub-TLVs, and security
issues. Each of these sections has problems that need to be fixed before WG LC.

What should the authors do:
I'll happily work with the authors to correct the text. The text in version 09
does not provide a clear way for interoperable implementations. I will also
review -12 to check if these issues have been resolved.

Mechanisms:
The mechanisms provide steps that are unclear and are not easily aligned with
the example. The mechanism section contains the following: - description of
figure 1 - step 1: a normal path set-up (PEA) - step 2: a backup pat set-up
(PEB)
    step 2a: PEB announcement to PEA with PEB
    step 2b: PEA processes the announcement and sends forwarding behavior to PEB
    step 2c: PEB processes forwarding based on Mirror SID into table
    step 2d: processing of anycast that links PEA/PEB to compute LFA with SIDs
- step 3: Steps in fail-over in failure scenario
   step 3a: failure detected via BFD
   step 3b: send IPv6 packet with an encapsulated packet (H.Encaps) at PL1
   step 3c: decapsulate IPv6 packet with End.M (a variant of End.DT6)
- step 4: Handle processing and forwarding a PEB

If these are the correct steps, then the example in section 3.2.
If these are not the correct steps, you confirm the reading is difficult.
[HC]: These steps are correct.

Extensions to IS-IS.
The following fields need to be given a range.
Section 4.1
For figure 3 description, please correct the following:
a) length: Please give a valid range.
[HC]: Added some text specifying the range of the length.

b) Flags: Normally a reserved value has a default setting (all zeros?) for
transmit,
       and ignore upon reception.
[HC]: Changed Flags to Reserved and added some text like below:
        MUST be set to zero on transmission and ignored on receipt.

c) SRv6 Endpoint Function: Please give valid range.
[HC]: Used normative language specifying the value of SRv6 Endpoint
        Function and added the description about exceptional handling.

d) SID: 16 octets (please give valid ranges.  For example, is SID 0 valid?)
[HC]: Added some text about SID.

for Figure 4, please valid ranges for length field.

Section 4.2
For figure 5, please correct the following:
length: Please give the valid range.
[HC]: Added some text specifying the range of the length.

flags: Normally a reserved value has a default setting (all zeros?) for
transmit,
       and ignore upon reception.
[HC]: Changed Flags to Reserved and added some text like below:
        MUST be set to zero on transmission and ignored on receipt.

SRv6 Endpoint Function: Please give valid range.
[HC]: Used normative language specifying the value of SRv6 Endpoint
        Function and added the description about exceptional handling.

SID: 16 octets (please give valid ranges.  For example, is SID 0 v
[HC]: Added some text about SID.

The Security Considerations section should provide reasons why this mechanism
to provide re-routing does not provide a potential threat.  It may work in a
walled garden, but it is not clear there are "no extra security issues."
[HC]: This section is updated.

_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg

Reply via email to