Skip to main content

Service Function Chaining (SFC) Operations, Administration, and Maintenance (OAM) Framework
draft-ietf-sfc-oam-framework-15

Revision differences

Document history

Date Rev. By Action
2020-10-07
15 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2020-09-28
15 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2020-07-17
15 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2020-07-07
15 (System) IANA Action state changed to No IANA Actions from In Progress
2020-07-07
15 (System) RFC Editor state changed to EDIT
2020-07-07
15 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2020-07-07
15 (System) Announcement was received by RFC Editor
2020-07-07
15 (System) IANA Action state changed to In Progress
2020-07-07
15 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2020-07-07
15 Amy Vezza IESG has approved the document
2020-07-07
15 Amy Vezza Closed "Approve" ballot
2020-07-07
15 Martin Vigoureux IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2020-07-07
15 Martin Vigoureux Ballot approval text was generated
2020-07-05
15 Alissa Cooper [Ballot comment]
Thanks for addressing my DISCUSS and COMMENT.
2020-07-05
15 Alissa Cooper [Ballot Position Update] Position for Alissa Cooper has been changed to No Objection from Discuss
2020-06-18
15 Jean Mahoney Closed request for Last Call review by GENART with state 'Overtaken by Events'
2020-06-11
15 Jean Mahoney Assignment of request for Last Call review by GENART to Suhas Nandakumar was marked no-response
2020-06-04
15 Min Ye Request closed, assignment withdrawn: Michael Richardson Last Call RTGDIR review
2020-06-04
15 Min Ye Closed request for Last Call review by RTGDIR with state 'Withdrawn'
2020-05-25
15 Nagendra Nainar New version available: draft-ietf-sfc-oam-framework-15.txt
2020-05-25
15 (System) New version accepted (logged-in submitter: Nagendra Nainar)
2020-05-25
15 Nagendra Nainar Uploaded new revision
2020-05-23
14 (System) Sub state has been changed to AD Followup from Revised ID Needed
2020-05-23
14 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2020-05-23
14 Nagendra Nainar New version available: draft-ietf-sfc-oam-framework-14.txt
2020-05-23
14 (System) New version approved
2020-05-23
14 (System) Request for posting confirmation emailed to previous authors: Anoop Ghanwani , Nagendra Nainar , Sam Aldrin , Ramki Krishnan , Carlos Pignataro
2020-05-23
14 Nagendra Nainar Uploaded new revision
2020-05-07
13 Murray Kucherawy
[Ballot comment]
Thank you for engaging my DISCUSS question about Section 3.1.1.  I don't feel it was fully resolved, but I also don't feel there's …
[Ballot comment]
Thank you for engaging my DISCUSS question about Section 3.1.1.  I don't feel it was fully resolved, but I also don't feel there's anything to be gained by pressing my point further.

My original comments:

I think this is pretty well done.  I had little trouble following it and this is my first foray into the realm of SFC.

I find myself almost suggesting that you don't need the BCP 14 boilerplate or its language at all in this document.  You barely use it, and it might not even be needed in the places you do have it especially since this is a framework document and not a protocol document.

Finally, lots of editorial stuff:

Section 2:
* “In Figure 1, the service layer element such as …” -- s/element/elements/
* “The underlay network may comprise of …” -- s/comprise/consist/, or alternatively, s/comprise of/comprise/
* “... nodes but not shown …” -- remove “but”, or s/but/but these/

Section 3, all three numbered list entries:
* “... applicable at this component includes …” -- s/includes/include/

Section 3.1.1:
OLD:
"SF availability is an aspect that raises an interesting question -- How to determine that a service function is available?."
NEW:
"SF availability is an aspect that raises an interesting question: How does one determine that a service function is available?"

* “... the packet did indeed get the got expected service.”  -- remove “got”
* This section uses both “a SF” and “an SF”.  I don’t know which one is grammatically correct, but we should find out and use that. Or, if both are, pick one and be consistent.

Section 3.2.1:
* “An SFC could be comprised of …” -- either remove “of”, or use “composed of”

Section 3.3:
* Either capitalize “Classifier” generally, or not at all.

Section 3.4:
* What constitutes an availability check of the underlay network?  You discussed this in 3.1.1, but not here.  If this is covered in Section 4.1, a forward reference would be helpful here.

Section 3.5:
* “... and are mostly transparent …” -- s/are/is/; “network” is singular
* What constitutes an availability check of the overlay network?

Section 4:
* “...for more than one SFC components.”  -- use “component”, or change “more than one” to “multiple”

Section 4.1:
* “Verify any packet re-ordering and corruption.” -- perhaps “detect” would be better than “verify” here

Section 4.2:
* “Ability to provision continuity check …” -- put an “a” before “continuity”
* “... supported by continuity function are as follows:” -- s/function/functions/

Section 4.3:
* “... from every transit devices …” -- s/devices/device/
* “Ability to trigger action from …” -- s/action/an action/

Section 5.1:
* I would quote “ping” and “trace”.
* “Table 3 below is not exhaustive” -- needs a period at the end
* Table 3 needs a bit of tidying in terms of alignment.

Section 6.1:
* “... network layer must mark the packet …” -- why isn’t that a MUST?

Section 6.2:
* “... skipping an SF might have implication …” -- s/implication/implications/
* “Any SFC-aware node that initiates an OAM packet must set …” -- why isn’t that a MUST?

Section 6.3:
* “... indicates it as OAM packet …” -- s/as/as an/

Section 6.4.1:
* “[RFC0792] and [RFC4443] describes …” -- s/describes/describe/
* “... verify the availability of SF or SFC.” -- s/SF/an SF/
* “... can generate ICMP echo …” -- s/ICMP/an ICMP/
* “... from last SFF and thereby …” -- add comma after “SFF”
* “Alternately, …  Alernatively, … ” -- use “Alternatively” for the first one, and “or” for the second, all in one sentence

Section 6.4.2:
* “[RFC5880] defines Bidirectional …” -- s/defines/defines the/
* “... to perform continuity function …” -- “functions”, or “the continuity function”
* “... value as last SFF …” -- s/last/the last/
* “... with relevant DIAG code.” -- s/with/with the/  (or “a”)

Section 6.4.3:
* “... transported using NSH header.” -- s/using/using the/

Section 6.4.4:
* “... is implemented in Open Daylight and available.”  -- s/and/and is/

Section 7:
* Table 4 needs some work on spacing consistency.

Section 8:
* “... are applicable for this document.” -- s/are/is/, as “consideration” is singular
* “The OAM information from service layer …” -- s/from/from the/
* “... service function paths etc.” -- s/paths etc./paths, etc./
* “... information from SFC layer raises a need for careful security considerations” -- s/from/from the/, and the sentence is missing a period
* “... SFC and SF OAM may provide mechanism …” -- s/mechanism/mechanisms/
* “... the OAM solution for SF component should …” -- s/component/components/
2020-05-07
13 Murray Kucherawy [Ballot Position Update] Position for Murray Kucherawy has been changed to No Objection from Discuss
2020-05-07
13 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2020-05-07
13 Alvaro Retana
[Ballot comment]
I support Murray's DISCUSS.

I appreciate the fact that "More specifics on the mechanism to characterize SF-specific OAM to validate the service offering …
[Ballot comment]
I support Murray's DISCUSS.

I appreciate the fact that "More specifics on the mechanism to characterize SF-specific OAM to validate the service offering are outside the scope of this document." (§3.1.1)

The issue I want to point out, which I believe is a significant omission in this document, is the lack of mention in §4 and §5 of the validation of the service offering as an SFC OAM function or in the gap analysis.  IOW, the availability of the SF from the point of view of its ability to provide the service is pointed out as important in §3.1.1, but there is no further consideration later in the document. 


[I believe that this issue borders on a DISCUSS -- and while I would really like to see further consideration in the text, I decided to trust that the authors and the responsible AD will take care of it.]
2020-05-07
13 Alvaro Retana Ballot comment text updated for Alvaro Retana
2020-05-07
13 Alvaro Retana
[Ballot comment]
I support Murray's DISCUSS.

I appreciate the fact that "More specifics on the mechanism to characterize SF-specific OAM to validate the service offering …
[Ballot comment]
I support Murray's DISCUSS.

I appreciate the fact that "More specifics on the mechanism to characterize SF-specific OAM to validate the service offering are outside the scope of this document." (§3.1.1)

The issue I want to point out, which I believe is a significant omission in this document, is the lack of mention in §4 and §5 of the validation of the service offering as an SFC OAM function or in the gap analysis.  IOW, the availability of the SF from the point of view of its ability to provide the service is pointed out as important in §3.1.1, but there is no further consideration later in the document. 


I believe that this issue borders on a DISCUSS -- and while I would really like to see further consideration in the text, I decided to trust that the authors and the responsible AD will take care of it.
2020-05-07
13 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2020-05-07
13 Alissa Cooper
[Ballot discuss]
Table 3 has "None" in all the cells corresponding to SF and SFC OAM functions. But then Sections 6.4.1 through 6.4.4 discuss several …
[Ballot discuss]
Table 3 has "None" in all the cells corresponding to SF and SFC OAM functions. But then Sections 6.4.1 through 6.4.4 discuss several tools that can be used to provide some of these functions. I understand that the text about the table says "Table 3 below is not exhaustive," but still it seems misleading to say "None" in the table when there are, in fact, tools available that are discussed just a few paragraphs later.
2020-05-07
13 Alissa Cooper
[Ballot comment]
Section 4.1: "Verify the policy of an SFC or SF." --> This seems a little vague. What about the policy is meant to …
[Ballot comment]
Section 4.1: "Verify the policy of an SFC or SF." --> This seems a little vague. What about the policy is meant to be verified?

Section 6: The title of this section threw me off. I would suggest putting Section 6.1, 6.2, and 6.3 into one section about "Operational Aspects of SFC OAM at the Service Layer" and then starting a new Section 7 about "Candidate SFC OAM Tools" that begins with the current Section 6.4 text.

Section 6.1: The normative language seems out of place here.
2020-05-07
13 Alissa Cooper [Ballot Position Update] New position, Discuss, has been recorded for Alissa Cooper
2020-05-07
13 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund
2020-05-07
13 Robert Wilton
[Ballot comment]
I found this document to be pretty easy to read and understand, so thank you for your work in this area.

I have …
[Ballot comment]
I found this document to be pretty easy to read and understand, so thank you for your work in this area.

I have a few comments, that may have already been raised by other reviewers:

2.  SFC Layering Model

  While Figure 1 depicts an example where SFs are enabled as virtual
  entities, the SFC architecture does not make any assumptions on how
  the SFC data plane elements are deployed.  The SFC architecture is
  flexible and accommodates physical or virtual entity deployment.  SFC
  OAM accounts for this flexibility and accordingly it is applicable
  whether SFC data plane elements are deployed directly on physical
  hardware, as one or more Virtual Machines, or any combination
  thereof.
 
Would "SF data plane elements" be more clear than "SFC data plane elements"?

3.  SFC OAM Components

  3.  Classifier component: OAM functions applicable at this component
      includes testing the validity of the classification rules and
      detecting any incoherence among the rules installed in different
      classifiers.
     
It was not entirely clear to me what is meant by different classifiers, so possibly this could be elaborated slightly.

4.3.  Trace Functions

"TTL" is used in various places.  Does that need to be listed in the acronyms? 

6.2.  OAM Packet Processing and Forwarding Semantic

  Upon receiving an OAM packet, SFC-aware SFs may choose to discard the
  packet if it does not support OAM functionality or if the local
  policy prevents them from processing the OAM packet.  When an SF
  supports OAM functionality, it is desirable to process the packet and
  provide an appropriate response to allow end-to-end verification.  To
  limit performance impact due to OAM, SFC-aware SFs should rate limit
  the number of OAM packets processed.
 
Doesn't this mean that SFC is potentially altering the thing being measured?  Wouldn't it be better instead to rate limit the number of OAM packets that are being generated in the first place?

6.1.  SFC OAM Packet Marker

  The SFC OAM function described in Section 4 performed at the service
  layer or overlay network layer must mark the packet as an OAM packet
  so that relevant nodes can differentiate an OAM packet from data
  packets.  The base header defined in Section 2.2 of [RFC8300] assigns
  a bit to indicate OAM packets.  When NSH encapsulation is used at the
  service layer, the O bit must be set to differentiate the OAM packet.
  Any other overlay encapsulations used at the service layer must have
  a way to mark the packet as OAM packet.
 
"must be set" => "MUST be set" & "must have a way" => "MUST have a way"?

But I question whether these should be musts at all.  E.g. by setting an OAM bit you allow the intermediate functions to potentially modify their behaviour, making it harder to know that the thing under test isn't changing its behaviour because it is being tested.  E.g. could another choice be to use some reserved address space to simulate flows without requiring the packets to be explicitly marked?

7.  Manageability Considerations

                  Table 4: OAM Tool GAP Analysis
  +----------------+--------------+-------------+--------+-------------+
  | Layer          |Configuration |Orchestration|Topology|Notification |
  +----------------+--------------+-------------+--------+-------------+
  | Underlay N/w  |CLI, NETCONF  | CLI, NETCONF|SNMP    |SNMP, Syslog,|
  |                |              |            |        |NETCONF      |
  +----------------+--------------+-------------+--------+-------------+
  | Overlay N/w    |CLI, NETCONF  | CLI, NETCONF|SNMP    |SNMP, Syslog |
  |                |              |            |        |NETCONF      |
  +----------------+--------------+-------------+--------+-------------+
  | Classifier    | CLI, NETCONF | CLI, NETCONF| None  | None        |
  +----------------+--------------+-------------+--------+-------------+
  | SF            |CLI, NETCONF  | CLI, NETCONF| None  | None        |
  +----------------+--------------+-------------+--------+-------------+
  | SFC            |CLI, NETCONF  | CLI, NETCONF| None  | None        |
  +----------------+--------------+-------------+--------+-------------+
 
It would probably be useful for YANG to be listed here as well under configuration and Orchestration.  RESTCONF or gNMI could potentially also be listed, although I note that this table is not intended to be exhaustive.

There is also a base YANG topology model, RFC 8345, and other extensions being defined, at least for Overlay and Underlay networks.  Would they be appropriate for the topology column?

Regards,
Rob
2020-05-07
13 Robert Wilton [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton
2020-05-06
13 Erik Kline
[Ballot comment]
[[ nits ]]

Several minor grammar tweaks, which others have identified, and hopefully can
be fixed in these final stages of publication. A …
[Ballot comment]
[[ nits ]]

Several minor grammar tweaks, which others have identified, and hopefully can
be fixed in these final stages of publication. A few of them I did mention
below.

[ section 2 ]
* The first paragraph describing Figure 1 has a few grammar bugs. May I suggest
  something to the effect of:

  In Figure 1, the service layer elements such as classifier and SF are
  depicted as virtual machines that are interconnected using an overlay
  network.  The underlay network may comprise multiple intermediate nodes
  not shown in the figure that provide underlay connectivity between the
  service layer elements.

[ section 3.1.1 ]
* s/the got/the/

* The 2nd to last paragraph could use a simplifying rewrite. The conversational
  tone I think impedes the direct, clear transmission of intended meaning.

* "The SF availability can be performed": does this refer to the *measurement*
  of SF availability?

[ section 3.2.1 ]
* s/comprised of/composed of/

[ section 7 ]
* Do 6.4.1 and/or 6.4.4 suffice to perform topology exploration of the SFC?
2020-05-06
13 Erik Kline [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline
2020-05-06
13 Benjamin Kaduk
[Ballot comment]
Section 2

I'm not sure that I understand why a node in the underlay network (the
"VM2" one) doesn't line up with a …
[Ballot comment]
Section 2

I'm not sure that I understand why a node in the underlay network (the
"VM2" one) doesn't line up with a node in the link layer, in Figure 1.

Section 3

      classifiers, controllers, other service nodes).  Testing an SF
      may not be restricted to connectivity to the SF, but also whether

nit(?) perhaps "may be more expansive than just checking connectivity to
the SF", to avoid questions about what the "not" binds to.

  3.  Classifier component: OAM functions applicable at this component
      includes testing the validity of the classification rules and
      detecting any incoherence among the rules installed in different
      classifiers.

It seems important to include both positive and negative tests of
classification functionality (i.e., that traffic that should not match
in fact does not match).  Section 3.3 might be a good place to mention
this.

Section 3.1.1

  service function is available?.  On one end of the spectrum, one
  might argue that an SF is sufficiently available if the service node
  (physical or virtual) hosting the SF is available and is functional.
  On the other end of the spectrum, one might argue that the SF's
  availability can only be concluded if the packet, after passing

I agree with the other reviewers that the first "end" of the spectrum
seems surprising.

  firewall).  The cost of this approach is that the OAM mechanism for
  some SF will need to be continuously modified in order to "keep up"
  with new functionality being introduced: lack of extendibility.

nit: the grammar doesn't seem right around "lack of extendibility"
(also, is "extendibility" preferred or "extensibility"?).

  The SF availability can be performed using a generalized approach
  (i.e., an adequate granularity to provide a basic SF service).  More

nit: I think it's an availability *check* that can be performed.

Section 3.2.2

Mandating the ability to measure every arbitrary segment of SFs within
an SFC seems like it might be over-constraining.

Section 4

  to perform OAM functionality at different layers.  In order to apply
  such OAM functions at the service layer, they need to be enhanced to
  operate a single SF/SFF to multiple SFs/SFFs in an SFC and also in
  multiple SFCs.

I don't understand what "operate a single SFF to multiple SFs/SFFs"
means.

Section 4.1

  o  Verify any packet re-ordering and corruption.

nit: this wording doesn't really make sense.  Do we want to verify the
absence of such things, or that it is within configured tolerances, or
something else?  Just noting any occurrences and verifying that the
noted occurrences are as noted doesn't seem useful...

  o  Verify the policy of an SFC or SF.

nit: similarly, is this to verify the configuration, or to verify that
operation matches the expected configuration?

Section 4.2

  Continuity is a model where OAM messages are sent periodically to
  validate or verify the reachability to a given SF within an SFC or

nit: while it's "connectivity to", I think it's "reachability of".

  o  Notifying the detected failures to other OAM functions or
      applications to take appropriate action.

nit: the subject of a notification is the entity receiving notification,
not the content of the notification.  So "notifying other OAM functions
or applications of the detected failures so they can take appropriate
action", or "Sending notifications of the detected failures to other
[...]".

Section 4.4

  delay [RFC7679] is important.  In order to measure one-way delay,
  time synchronization MUST be supported by means such as NTP, PTP,
  GPS, etc.

I think (informational) references are in order for these.  (PTP is not
listed as "well-known" at
https://www.rfc-editor.org/materials/abbrev.expansion.txt , though the
other two are.)

  One-way delay variation [RFC3393] could also be calculated by sending
  OAM packets and measuring the jitter between the packets passing
  through an SFC.

Looking at jitter between (measurement) packets to ascertain delay
variation seems to require foreknowledge of the (e.g., periodic) pacing
of the initial packet transmission.  If, on the other hand, the idea is
to look at the jitter across the measured delay of each packet, then
that works fine (but that's not what the current text says).

  o  Ability to measure the packet loss [RFC7680] within an SF or an
      SFP bound to a given SFC.

nit(?): packet loss "within an SF" (as opposed to between two SFs) is
not something I would have expected to need measuring, on first thought.
Though on further reflection it is less surprising; still, I wanted to
check that this is indeed as intended.

Section 5.2

  As shown in Table 3, there are no standards-based tools available for
  the verification of SFs and SFCs.

Some note about "at the time of this writing" or similar seems advised;
otherwise this statement is unlikely to age well.

Section 6.2

  An SFF may choose not to forward the OAM packet to an SF if the SF
  does not support OAM or if the policy does not allow to forward OAM
  packet to an SF.  The SFF may choose to skip the SF, modify the
  header and forward to next SFC node in the chain.  It should be noted
  that skipping an SF might have implication on some OAM functions
  (e.g. the delay measurement may not be accurate).  The method by

This behavior was initially surprising to me, and "might have
implication on" feels like weaker text than is merited.  While I can
perhaps imagine that not forwarding an OAM packet to an SF that will
choke on it instead of doing something useful, it seems like it's rather
divergent from the OAM expectations to silently bypass a given SF and is
quite likely to affect the accuracy of the resulting OAM results.

  process OAM packets is outside the scope of this document.  It could
  be a configuration parameter instructed by the controller or it can
  be done by dynamic negotiation between the SF and SFF.

(Is there an existing mechanism for dynamic negotation between SF and
SFF?)

Section 6.3

  As described in Section 4, there are different OAM functions that may
  require different OAM solutions.  While the presence of the OAM
  marker in the overlay header (e.g., O bit in the NSH header)
  indicates it as OAM packet, it is not sufficient to indicate what OAM
  function the packet is intended for.  The Next Protocol field in NSH
  header may be used to indicate what OAM function is intended to or
  what toolset is used.

Elsewhere in the document we make reference to what would be required of
a non-NSH encapsulation header; is it appropriate to also do so here?

Section 6.4.2

  BFD or S-BFD could be leveraged to perform continuity function for SF
  or SFC.  An initiator could generate a BFD control packet and set the
  "Your Discriminator" value as last SFF in the control packet.  Upon

nit: I think this "your discriminator" would be the address or
identifier of the last SFF, not just "the last SFF" itself, right?
Or be set "to indicate" the last SFF, or similar.
(Also occurs a few sentences later.)

  with relevant DIAG code.  The TTL field in the NSH header could be
  used to perform partial SFC availability.  For example, the initiator

nit: availability checks/checking

Section 6.4.4

  [I-D.penno-sfc-trace] defines a protocol that checks for path
  liveliness and traces the service hops in any SFP.  Section 3 of
  [I-D.penno-sfc-trace] defines the SFC trace packet format while
  Sections 4 and 5 of [I-D.penno-sfc-trace] defines the behavior of SF
  and SFF respectively.  While [I-D.penno-sfc-trace] has expired, the
  proposal is implemented in Open Daylight and available.

Why is draft-penno-sfc-trace not progressing towards publication?

Section 7

I think this table really needs more lead-in to what it's communicating.

  As depicted in Table 4, information and data models are needed for
  configuration, manageability and orchestration for SFC.  With

I don't see where that is actually indicated by the table.

Section 8

OAM information (though most usefully as summary statistics), if leaked,
could also be used by an attacker to gauge the efficacy of an ongoing
attack.

  Any security consideration defined in [RFC7665] and [RFC8300] are
  applicable for this document.

The rest of the document implies that NSH is not mandatory, so I'd
suggest rewording this reference to clarify what from RFC 8300 is (or is
not) applicable to the whole of the document.

  The mapping and the rules information at the classifier component may
  reveal the traffic rules and the traffic mapped to the SFC.  The SFC
  information collected at an SFC component may reveal the SF
  associated within each chain and this information together with

nit: s/the SF/the SFs/

  To address the above concerns, SFC and SF OAM may provide mechanism
  for:

(1) The crucial missing word that Roman notes is indeed crucial!
(2) Can we say something stronger than "may"?

  The documents proposing the OAM solution for any service layer
  components should consider some form of message filtering to prevent
  leaking any internal service layer information outside the
  administrative domain.

"should consider" is fairly weak guidance; would "should provide" be
appropriate?

Also, is it worth mentioning that this filtering would include dropping
OAM-marked messages from outside the domain (at least by default)?

Section 12.1

The only citation to RFC 8300 that appears to require a normative
reference is the bit in the security considerations that I noted was
unclear about its scope of applicability.

Section 12.2

RFC 6291 is a BCP, so we should probably cite it as such.  Also, given
its content, perhaps it ought to be normative?
2020-05-06
13 Benjamin Kaduk [Ballot Position Update] New position, No Objection, has been recorded for Benjamin Kaduk
2020-05-06
13 Roman Danyliw
[Ballot comment]
** Section 1.  Per “OAM controllers are assumed to be within the same administrative domain as the target SFC enabled domain”, is there …
[Ballot comment]
** Section 1.  Per “OAM controllers are assumed to be within the same administrative domain as the target SFC enabled domain”, is there a circumstance where the OAM controller would be working across administrative domains?  Can this statement be made stronger – “OAM controller MUST be within the same administrative …”

** Section 2.  Example technologies for the underlay (i.e., IP MPLS) and link (i.e., POS DWDM) layers are provided.  It might help readability to provide such examples for the overlay network layer too.

** Section 3.0.  “Testing an SF may not be restricted to connectivity to the SF, but also whether the SF is providing its intended service.  Refer to Section 3.1.1 for a more detailed discussion.”  Section 3.1.1 appears to discuss availability but not validation practices to ensure “the SF is providing its intended service”.  Is providing the intended service as simple as the service being up? Or does it include confirmation that functionally the right service is happening?

** Section 3.4. Typo. s/and so/so/

** Section 3.5.  Per “The overlay network establishes the service plane between the SFC components and are mostly transparent to the SFC data plane elements.”, in what way is the overlay network not transparent?

** Section 5.1.  Per “Tools like ping and trace …” and “BFD is another tool …”, what  specific instances of ping and trace are you referencing?  Or is this generically saying ping = Section 6.4.1, trace = Section 6.4.4 and BFD = Section 6.4.2?

** Section 5.1.  I initially found the contents of this table confusing.  The paragraph introducing this table refers to “ping” and “trace” as tools.  However, E-OAM, IPPM, etc. which are also noted in this table don’t seem easily categories by the “tool” designation.

** Section 6.4.3.  Is there a reason that In-Situ OAM is mentioned here but not in Section 5.1?

** Section 8.  Per “The sensitivity of the information from SFC layer raises a need for careful security considerations”, what are these concerns?  It also isn’t clear what information is being mentioned.

** Section 8.  (I’m not calling this a DISCUSS since this is a trivial editorial fix but it MUST be done before publication) Per “To address the above concerns, SFC and SF OAM may provide mechanism for:
  o  Misuse of the OAM channel for denial-of-services, …”

A crucial missing word here as in – s/provide mechanisms for:/provide mechanisms for mitigating:/

** Section 8. Per “To address the above concerns, SFC and SF OAM may provide mechanism for:

  o  Leakage of OAM packets across SFC instances, and
  o  Leakage of SFC information beyond the SFC domain.”

-- the text above mentions the risk of risk of SFC evasion but this isn’t mentioned here

-- the two bullets here seem appropriate and needed OAM activities but they don’t follow from the text above (as explicitly promised by the text “to address the above …”)

** Section 8.  What is the different between the guidance:
-- “… SRC and SF OAM may provide mechanism to [mitigate]: … leakage of SFC information beyond the SFC domain”
-- “The documents proposing the OAM solution for any service layer component should consider some form of message filtering to prevent leaking any internal service layer information outside the administrative domain”

To me they are saying the same thing, except the second item explicitly notes message filtering.
2020-05-06
13 Roman Danyliw [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw
2020-05-06
13 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2020-05-06
13 Éric Vyncke
[Ballot comment]
Thank you for the work put into this document. The document is easy to read; BTW, I found that its content is more …
[Ballot comment]
Thank you for the work put into this document. The document is easy to read; BTW, I found that its content is more about the justifications / requirements for an OAM system and tools descriptions than about for a framework description.

The core of the document appears to be section 6: this should probably be reflected in the abstract and introduction

Please address the comments raised in the Internet directorate review by Carlos Bernardos:
https://mailarchive.ietf.org/arch/msg/int-dir/TgQulH7hytGPNxdAPWcSgkTx1IM 

Please find below a couple on non-blocking COMMENTs. I would really appreciate a reply to all these COMMENTs.

I hope that this helps to improve the document,

Regards,

-éric

== COMMENTS ==

I would not refer to BCP 14 (RFC 8174) as this is an architectural/framework document (informational) and not a protocol specification.

It seems that most of the described tools are about synthetic traffic. Is there any other means to do OAM in SFC (not that I have any suggestion...)?.

-- Section 1 --
About "to be applied to packets and/or frames", for me packets are layer-3 PDUs and frames are layer-2 PDUs. While I am not familiar with SFC, I could envision SFC being applied to transport or application layers PDUs. So, why restricting the use of this document to layers 2 and 3 only ?

-- Section 2 --
Is there a reason why all 'virtual links' are not mentioned in this section? I.e., SR-IOv network, tun/tap, ...

Similar question about why limiting the example of VM and not including containers ?

-- Section 3 --
The word "performance" is often used in the document but it is not described in depth though: is it about the SF CPU/memory or 'client traffic' latency & throughput ? Section 4 partially addresses my question but not completely; also, adding forward pointers to section 4 would be nice.

-- Section 4.3 --
Please bear with my ignorance of SFC world... but, if a SF is doing proxying / rewriting the application message, how useful is an end-to-end PMTUd check? As there are two stitched TCP connections ?

The overall assumption of this section is that all SF are pure layer-3, leaving the IP header intact so that ECMP & TTL checks can be done. Is it always the case ?

Section 5.2 addresses the above points, but, I suggest that section 4.3 to be restricted to ' link-layer OAM'

-- Section 6.4.1 --
"TTL field in NSH header to 63", not familiar with NSH, but, if there is a TTL field in NSH, then it could be useful to point to the RFC & section describing it. Esp in a section whose title is "ICMP" (referring obviously to the IP header).

-- Section 8 --
In this security section, I wonder whether the trace tool deserves a paragraph or two as if trusted while being forgeable/spoofed, then operators could trust a SFC which is "owned" and not reliable (i.e., with a bypass of some security SF). Trusting the security AD to raise a DISCUSS if they think it is a DISCUSS.

== NITS ==

-- section 6.3 --
Is it really required to re-specify the use of bit O in NSH ?

-- Section 6.4.1 --
Sigh... using the IPv4 terminology of TTL...
2020-05-06
13 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2020-05-05
13 Murray Kucherawy
[Ballot discuss]
I think this is pretty well done.  I had little trouble following it and this is my first foray into the realm of …
[Ballot discuss]
I think this is pretty well done.  I had little trouble following it and this is my first foray into the realm of SFC.

One item I'd like to discuss though.  From Section 3.1.1:

“On one end of the spectrum, one might argue that an SF is sufficiently available if the service node (physical or virtual) hosting the SF is available and is functional.  On the other end of the spectrum, one might argue that the SF's availability can only be concluded if the packet, after passing through the SF, was examined and it was verified that the packet did indeed get the expected service.”

I found this a bit surprising, especially given the critical nature of many SF functions.  Why would it ever be the case that, say, “well, the hypervisor says the VM is up, so the SF is up” is a safe conclusion?  For such a critical component, I would expect only some more complete test is necessary to conclude availability of the SF.  Shouldn't we at least be pushing implementers toward the latter end of that spectrum?
2020-05-05
13 Murray Kucherawy
[Ballot comment]
I find myself almost suggesting that you don't need the BCP 14 boilerplate or its language at all in this document.  You barely …
[Ballot comment]
I find myself almost suggesting that you don't need the BCP 14 boilerplate or its language at all in this document.  You barely use it, and it might not even be needed in the places you do have it especially since this is a framework document and not a protocol document.

Finally, lots of editorial stuff:

Section 2:
* “In Figure 1, the service layer element such as …” -- s/element/elements/
* “The underlay network may comprise of …” -- s/comprise/consist/, or alternatively, s/comprise of/comprise/
* “... nodes but not shown …” -- remove “but”, or s/but/but these/

Section 3, all three numbered list entries:
* “... applicable at this component includes …” -- s/includes/include/

Section 3.1.1:
OLD:
"SF availability is an aspect that raises an interesting question -- How to determine that a service function is available?."
NEW:
"SF availability is an aspect that raises an interesting question: How does one determine that a service function is available?"

* “... the packet did indeed get the got expected service.”  -- remove “got”
* This section uses both “a SF” and “an SF”.  I don’t know which one is grammatically correct, but we should find out and use that. Or, if both are, pick one and be consistent.

Section 3.2.1:
* “An SFC could be comprised of …” -- either remove “of”, or use “composed of”

Section 3.3:
* Either capitalize “Classifier” generally, or not at all.

Section 3.4:
* What constitutes an availability check of the underlay network?  You discussed this in 3.1.1, but not here.  If this is covered in Section 4.1, a forward reference would be helpful here.

Section 3.5:
* “... and are mostly transparent …” -- s/are/is/; “network” is singular
* What constitutes an availability check of the overlay network?

Section 4:
* “...for more than one SFC components.”  -- use “component”, or change “more than one” to “multiple”

Section 4.1:
* “Verify any packet re-ordering and corruption.” -- perhaps “detect” would be better than “verify” here

Section 4.2:
* “Ability to provision continuity check …” -- put an “a” before “continuity”
* “... supported by continuity function are as follows:” -- s/function/functions/

Section 4.3:
* “... from every transit devices …” -- s/devices/device/
* “Ability to trigger action from …” -- s/action/an action/

Section 5.1:
* I would quote “ping” and “trace”.
* “Table 3 below is not exhaustive” -- needs a period at the end
* Table 3 needs a bit of tidying in terms of alignment.

Section 6.1:
* “... network layer must mark the packet …” -- why isn’t that a MUST?

Section 6.2:
* “... skipping an SF might have implication …” -- s/implication/implications/
* “Any SFC-aware node that initiates an OAM packet must set …” -- why isn’t that a MUST?

Section 6.3:
* “... indicates it as OAM packet …” -- s/as/as an/

Section 6.4.1:
* “[RFC0792] and [RFC4443] describes …” -- s/describes/describe/
* “... verify the availability of SF or SFC.” -- s/SF/an SF/
* “... can generate ICMP echo …” -- s/ICMP/an ICMP/
* “... from last SFF and thereby …” -- add comma after “SFF”
* “Alternately, …  Alernatively, … ” -- use “Alternatively” for the first one, and “or” for the second, all in one sentence

Section 6.4.2:
* “[RFC5880] defines Bidirectional …” -- s/defines/defines the/
* “... to perform continuity function …” -- “functions”, or “the continuity function”
* “... value as last SFF …” -- s/last/the last/
* “... with relevant DIAG code.” -- s/with/with the/  (or “a”)

Section 6.4.3:
* “... transported using NSH header.” -- s/using/using the/

Section 6.4.4:
* “... is implemented in Open Daylight and available.”  -- s/and/and is/

Section 7:
* Table 4 needs some work on spacing consistency.

Section 8:
* “... are applicable for this document.” -- s/are/is/, as “consideration” is singular
* “The OAM information from service layer …” -- s/from/from the/
* “... service function paths etc.” -- s/paths etc./paths, etc./
* “... information from SFC layer raises a need for careful security considerations” -- s/from/from the/, and the sentence is missing a period
* “... SFC and SF OAM may provide mechanism …” -- s/mechanism/mechanisms/
* “... the OAM solution for SF component should …” -- s/component/components/
2020-05-05
13 Murray Kucherawy [Ballot Position Update] New position, Discuss, has been recorded for Murray Kucherawy
2020-05-05
13 Barry Leiba [Ballot comment]
Please use the new BCP 14 boilerplate exactly as in RFC 8174.
2020-05-05
13 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2020-05-05
13 Tim Chown Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Tim Chown. Sent review to list.
2020-05-04
13 Martin Duke
[Ballot comment]
Please address the issues in the (detailed!) Tsvarea review, in particular the bits from section 4 that incorrectly describe the work coming out …
[Ballot comment]
Please address the issues in the (detailed!) Tsvarea review, in particular the bits from section 4 that incorrectly describe the work coming out of IPPM.

Additional nits:

Sec 3.1.1: s/extendibility/extensibility

Sec 3.1.2: there are also “hybrid” methods like IOAM that do not fit the active and passive definitions neatly.

4.1 s/packet to be of variable length packet size/packet to be of variable length

4.1 you are probably not trying to “verify” packet reordering and corruption! I suggest “detect” instead.

6.3 s/is intended to/is intended

6.3 s/in NSH header/in the NSH header

6.4.1 s/describes/describe

6.4.1 s/incrementing the ttl/incrementing ttl

6.4.3 s/using NSH header/using the NSH header

8. s/Any security consideration/Any security considerations

8. Missing period at end of second paragraph

8. s/mechanism/mechanisms
2020-05-04
13 Martin Duke [Ballot Position Update] New position, No Objection, has been recorded for Martin Duke
2020-05-04
13 Frank Brockners Request for Telechat review by TSVART Completed: Ready with Nits. Reviewer: Frank Brockners. Sent review to list.
2020-05-04
13 Carlos Jesús Bernardos Request for Telechat review by INTDIR Completed: Ready with Nits. Reviewer: Carlos Bernardos. Sent review to list.
2020-04-23
13 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Tirumaleswar Reddy.K.
2020-04-22
13 Wesley Eddy Request for Telechat review by TSVART is assigned to Frank Brockners
2020-04-22
13 Wesley Eddy Request for Telechat review by TSVART is assigned to Frank Brockners
2020-04-22
13 Carlos Jesús Bernardos Request for Telechat review by INTDIR is assigned to Carlos Bernardos
2020-04-22
13 Carlos Jesús Bernardos Request for Telechat review by INTDIR is assigned to Carlos Bernardos
2020-04-21
13 Éric Vyncke Requested Telechat review by INTDIR
2020-04-20
13 Martin Duke Requested Telechat review by TSVART
2020-04-20
13 (System) IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2020-04-20
13 Cindy Morgan Placed on agenda for telechat - 2020-05-07
2020-04-20
13 Martin Vigoureux IESG state changed to IESG Evaluation from Waiting for Writeup
2020-04-20
13 Martin Vigoureux Ballot has been issued
2020-04-20
13 Martin Vigoureux [Ballot Position Update] New position, Yes, has been recorded for Martin Vigoureux
2020-04-20
13 Martin Vigoureux Created "Approve" ballot
2020-04-20
13 Martin Vigoureux Ballot writeup was changed
2020-04-20
13 Martin Vigoureux Ballot writeup was changed
2020-04-14
13 Nagendra Nainar New version available: draft-ietf-sfc-oam-framework-13.txt
2020-04-14
13 (System) New version approved
2020-04-14
13 (System) Request for posting confirmation emailed to previous authors: Nagendra Kumar , Sam Aldrin , Carlos Pignataro , Anoop Ghanwani , Ramki Krishnan
2020-04-14
13 Nagendra Nainar Uploaded new revision
2020-04-10
12 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2020-04-10
12 Nagendra Nainar New version available: draft-ietf-sfc-oam-framework-12.txt
2020-04-10
12 (System) New version approved
2020-04-10
12 (System) Request for posting confirmation emailed to previous authors: Sam Aldrin , Anoop Ghanwani , Ramki Krishnan , Carlos Pignataro , Nagendra Kumar
2020-04-10
12 Nagendra Nainar Uploaded new revision
2020-04-09
11 (System) IESG state changed to Waiting for Writeup from In Last Call
2020-04-06
11 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2020-04-06
11 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-sfc-oam-framework-11, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-sfc-oam-framework-11, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

Thank you,

Sabrina Tanamal
Senior IANA Services Specialist
2020-04-03
11 Tero Kivinen Request for Last Call review by SECDIR is assigned to Tirumaleswar Reddy.K
2020-04-03
11 Tero Kivinen Request for Last Call review by SECDIR is assigned to Tirumaleswar Reddy.K
2020-03-31
11 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Tim Chown
2020-03-31
11 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Tim Chown
2020-03-29
11 Min Ye Request for Last Call review by RTGDIR is assigned to Michael Richardson
2020-03-29
11 Min Ye Request for Last Call review by RTGDIR is assigned to Michael Richardson
2020-03-27
11 Jean Mahoney Request for Last Call review by GENART is assigned to Suhas Nandakumar
2020-03-27
11 Jean Mahoney Request for Last Call review by GENART is assigned to Suhas Nandakumar
2020-03-26
11 Cindy Morgan IANA Review state changed to IANA - Review Needed
2020-03-26
11 Cindy Morgan
The following Last Call announcement was sent out (ends 2020-04-09):

From: The IESG
To: IETF-Announce
CC: draft-ietf-sfc-oam-framework@ietf.org, Tal Mizrahi , martin.vigoureux@nokia.com, tal.mizrahi.phd@gmail.com, …
The following Last Call announcement was sent out (ends 2020-04-09):

From: The IESG
To: IETF-Announce
CC: draft-ietf-sfc-oam-framework@ietf.org, Tal Mizrahi , martin.vigoureux@nokia.com, tal.mizrahi.phd@gmail.com, sfc-chairs@ietf.org, sfc@ietf.org
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Service Function Chaining (SFC) Operations, Administration and Maintenance (OAM) Framework) to Informational RFC


The IESG has received a request from the Service Function Chaining WG (sfc)
to consider the following document: - 'Service Function Chaining (SFC)
Operations, Administration and
  Maintenance (OAM) Framework'
  as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2020-04-09. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  This document provides a reference framework for Operations,
  Administration and Maintenance (OAM) for Service Function Chaining
  (SFC).





The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-sfc-oam-framework/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-sfc-oam-framework/ballot/

The following IPR Declarations may be related to this I-D:

  https://datatracker.ietf.org/ipr/3440/
  https://datatracker.ietf.org/ipr/3121/





2020-03-26
11 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2020-03-26
11 Martin Vigoureux Requested Last Call review by RTGDIR
2020-03-26
11 Martin Vigoureux Last call was requested
2020-03-26
11 Martin Vigoureux Ballot approval text was generated
2020-03-26
11 Martin Vigoureux Ballot writeup was generated
2020-03-26
11 Martin Vigoureux IESG state changed to Last Call Requested from AD Evaluation
2020-03-26
11 Martin Vigoureux Last call announcement was generated
2020-03-26
11 Martin Vigoureux Changed consensus to Yes from Unknown
2020-02-27
11 Martin Vigoureux IESG state changed to AD Evaluation from Publication Requested
2019-12-16
11 Tal Mizrahi
Note: This shepherd writeup follows the Essay Style Document Writeup Template (https://www.ietf.org/chairs/document-writeups/essay-style-document-writeup/).


1. Summary

The document shepherd is Tal Mizrahi, and the responsible …
Note: This shepherd writeup follows the Essay Style Document Writeup Template (https://www.ietf.org/chairs/document-writeups/essay-style-document-writeup/).


1. Summary

The document shepherd is Tal Mizrahi, and the responsible area director is Martin Vigoureux.

This document describes a framework for Operations, Administration and Maintenance (OAM) in the context of Service Function Chains (SFC).

The intended status of this document is informational, as it defines a framework for OAM in the context of SFC, but does not define new protocols or tools.


2. Review and Consensus

The draft was first submitted in July 2014, and gained wide support for working group adoption. It was adopted in August 2015. The work on this document was somewhat hibernated for a couple of years, and gained momentum again in 2019 during working group last call. Several working group members reviewed the draft and expressed their support in WG last call. Several comments were discussed thoroughly on the mailing list, followed by the WG chairs' decision that consensus has been reached (https://mailarchive.ietf.org/arch/browse/sfc/?q=draft-ietf-sfc-oam-framework). The discussion included some terminology issues (including terms such as availability and liveness), followed by a few iterations in which the document was tuned to address the issues. Other comments were raised regarding the scope of the document; whether it is applicable only to NSH or more generally to SFC, and whether the gap analysis is sufficient. Although one reviewer was not satisfied with the result (https://mailarchive.ietf.org/arch/msg/sfc/5uu3mc64VmK8-Gg9ApgVfGxc4ic), the authors worked iteratively to resolve the vast majority of the issues.

The current version of the draft seems to have resolved the important issues, and has the rough consensus of the working group.


3. Intellectual Property

Two IPR disclosures have been reported for this document. The two disclosures are available in the Datatracker (https://datatracker.ietf.org/ipr/search/?id=draft-ietf-sfc-oam-framework&submit=draft).
- 3440 Huawei Technologies Co.,Ltd's Statement about IPR related to draft-ietf-sfc-oam-framework
- 3121 Orange's Statement about IPR related to draft-ietf-sfc-oam-framework

An IPR poll was performed after working group last call and all the authors confirmed that they are not aware of any further IPRs.


4. Other Points

The draft does not include any requests from IANA.
2019-12-16
11 Tal Mizrahi Responsible AD changed to Martin Vigoureux
2019-12-16
11 Tal Mizrahi IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2019-12-16
11 Tal Mizrahi IESG state changed to Publication Requested from I-D Exists
2019-12-16
11 Tal Mizrahi IESG process started in state Publication Requested
2019-12-16
11 Tal Mizrahi Intended Status changed to Informational from None
2019-12-16
11 Tal Mizrahi
Note: This shepherd writeup follows the Essay Style Document Writeup Template (https://www.ietf.org/chairs/document-writeups/essay-style-document-writeup/).


1. Summary

The document shepherd is Tal Mizrahi, and the responsible …
Note: This shepherd writeup follows the Essay Style Document Writeup Template (https://www.ietf.org/chairs/document-writeups/essay-style-document-writeup/).


1. Summary

The document shepherd is Tal Mizrahi, and the responsible area director is Martin Vigoureux.

This document describes a framework for Operations, Administration and Maintenance (OAM) in the context of Service Function Chains (SFC).

The intended status of this document is informational, as it defines a framework for OAM in the context of SFC, but does not define new protocols or tools.


2. Review and Consensus

The draft was first submitted in July 2014, and gained wide support for working group adoption. It was adopted in August 2015. The work on this document was somewhat hibernated for a couple of years, and gained momentum again in 2019 during working group last call. Several working group members reviewed the draft and expressed their support in WG last call. Several comments were discussed thoroughly on the mailing list, followed by the WG chairs' decision that consensus has been reached (https://mailarchive.ietf.org/arch/browse/sfc/?q=draft-ietf-sfc-oam-framework). The discussion included some terminology issues (including terms such as availability and liveness), followed by a few iterations in which the document was tuned to address the issues. Other comments were raised regarding the scope of the document; whether it is applicable only to NSH or more generally to SFC, and whether the gap analysis is sufficient. Although one reviewer was not satisfied with the result (https://mailarchive.ietf.org/arch/msg/sfc/5uu3mc64VmK8-Gg9ApgVfGxc4ic), the authors worked iteratively to resolve the vast majority of the issues.

The current version of the draft seems to have resolved the important issues, and has the rough consensus of the working group.


3. Intellectual Property

Two IPR disclosures have been reported for this document. The two disclosures are available in the Datatracker (https://datatracker.ietf.org/ipr/search/?id=draft-ietf-sfc-oam-framework&submit=draft).
- 3440 Huawei Technologies Co.,Ltd's Statement about IPR related to draft-ietf-sfc-oam-framework
- 3121 Orange's Statement about IPR related to draft-ietf-sfc-oam-framework

An IPR poll was performed after working group last call and all the authors confirmed that they are not aware of any further IPRs.


4. Other Points

The draft does not include any requests from IANA.
2019-09-19
11 Nagendra Nainar New version available: draft-ietf-sfc-oam-framework-11.txt
2019-09-19
11 (System) New version approved
2019-09-19
11 (System) Request for posting confirmation emailed to previous authors: Sam Aldrin , Carlos Pignataro , Ramki Krishnan , Anoop Ghanwani , Nagendra Kumar
2019-09-19
11 Nagendra Nainar Uploaded new revision
2019-07-25
10 Nagendra Nainar New version available: draft-ietf-sfc-oam-framework-10.txt
2019-07-25
10 (System) New version approved
2019-07-25
10 (System) Request for posting confirmation emailed to previous authors: Sam Aldrin , Carlos Pignataro , Ramki Krishnan , Anoop Ghanwani , Nagendra Kumar
2019-07-25
10 Nagendra Nainar Uploaded new revision
2019-07-23
09 Jim Guichard Notification list changed to Tal Mizrahi <tal.mizrahi.phd@gmail.com>
2019-07-23
09 Jim Guichard Document shepherd changed to Tal Mizrahi
2019-07-23
09 Jim Guichard IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2019-06-27
09 Nagendra Nainar New version available: draft-ietf-sfc-oam-framework-09.txt
2019-06-27
09 (System) New version approved
2019-06-27
09 (System) Request for posting confirmation emailed to previous authors: Sam Aldrin , Carlos Pignataro , Ramki Krishnan , Anoop Ghanwani , Nagendra Kumar
2019-06-27
09 Nagendra Nainar Uploaded new revision
2019-06-25
08 Nagendra Nainar New version available: draft-ietf-sfc-oam-framework-08.txt
2019-06-25
08 (System) New version approved
2019-06-25
08 (System)
Request for posting confirmation emailed to previous authors: sfc-chairs@ietf.org, Nagendra Kumar , Sam Aldrin , Carlos Pignataro , Nobo Akiya , Anoop Ghanwani , …
Request for posting confirmation emailed to previous authors: sfc-chairs@ietf.org, Nagendra Kumar , Sam Aldrin , Carlos Pignataro , Nobo Akiya , Anoop Ghanwani , Ramki Krishnan
2019-06-25
08 Nagendra Nainar Uploaded new revision
2019-06-18
07 Nagendra Nainar New version available: draft-ietf-sfc-oam-framework-07.txt
2019-06-18
07 (System) New version approved
2019-06-18
07 (System) Request for posting confirmation emailed to previous authors: Nagendra Kumar , Sam Aldrin , Carlos Pignataro , Nobo Akiya , Anoop Ghanwani , Ramki Krishnan
2019-06-18
07 Nagendra Nainar Uploaded new revision
2019-05-28
06 Jim Guichard IETF WG state changed to In WG Last Call from WG Document
2019-03-25
06 Nagendra Nainar New version available: draft-ietf-sfc-oam-framework-06.txt
2019-03-25
06 (System) New version approved
2019-03-25
06 (System) Request for posting confirmation emailed to previous authors: Nagendra Kumar , Sam Aldrin , Carlos Pignataro , Nobo Akiya , Anoop Ghanwani , Ramki Krishnan
2019-03-25
06 Nagendra Nainar Uploaded new revision
2019-03-09
05 (System) Document has expired
2019-02-28
Jenny Bui Posted related IPR disclosure: Huawei Technologies Co.,Ltd's Statement about IPR related to draft-ietf-sfc-oam-framework
2018-09-05
05 Nagendra Nainar New version available: draft-ietf-sfc-oam-framework-05.txt
2018-09-05
05 (System) New version approved
2018-09-05
05 (System) Request for posting confirmation emailed to previous authors: Nagendra Kumar , Sam Aldrin , Carlos Pignataro , Nobo Akiya , Anoop Ghanwani , Ramki Krishnan
2018-09-05
05 Nagendra Nainar Uploaded new revision
2018-03-05
04 Nagendra Nainar New version available: draft-ietf-sfc-oam-framework-04.txt
2018-03-05
04 (System) New version approved
2018-03-05
04 (System) Request for posting confirmation emailed to previous authors: Ram Krishnan , Nagendra Kumar , Sam Aldrin , Carlos Pignataro , Nobo Akiya , Anoop Ghanwani
2018-03-05
04 Nagendra Nainar Uploaded new revision
2017-12-14
Jasmine Magallanes Posted related IPR disclosure: Orange's Statement about IPR related to draft-ietf-sfc-oam-framework
2017-09-07
03 Nagendra Nainar New version available: draft-ietf-sfc-oam-framework-03.txt
2017-09-07
03 (System) New version approved
2017-09-07
03 (System) Request for posting confirmation emailed to previous authors: Ram Krishnan , Nagendra Kumar , Sam Aldrin , Carlos Pignataro , Nobo Akiya , Anoop Ghanwani
2017-09-07
03 Nagendra Nainar Uploaded new revision
2017-07-03
02 Nagendra Nainar New version available: draft-ietf-sfc-oam-framework-02.txt
2017-07-03
02 (System) New version approved
2017-07-03
02 (System) Request for posting confirmation emailed to previous authors: Ram Krishnan , sfc-chairs@ietf.org, Sam Aldrin , Carlos Pignataro , Nobo Akiya , Anoop Ghanwani
2017-07-03
02 Nagendra Nainar Uploaded new revision
2016-02-18
01 Anoop Ghanwani New version available: draft-ietf-sfc-oam-framework-01.txt
2015-08-19
00 Jim Guichard This document now replaces draft-aldrin-sfc-oam-framework instead of None
2015-08-17
00 Anoop Ghanwani New version available: draft-ietf-sfc-oam-framework-00.txt