| < draft-ietf-ippm-ioam-data-11.txt | draft-ietf-ippm-ioam-data-12.txt > | |||
|---|---|---|---|---|
| ippm F. Brockners, Ed. | ippm F. Brockners, Ed. | |||
| Internet-Draft S. Bhandari, Ed. | Internet-Draft Cisco | |||
| Intended status: Standards Track Cisco | Intended status: Standards Track S. Bhandari, Ed. | |||
| Expires: May 26, 2021 T. Mizrahi, Ed. | Expires: August 25, 2021 Thoughtspot | |||
| T. Mizrahi, Ed. | ||||
| Huawei | Huawei | |||
| November 22, 2020 | February 21, 2021 | |||
| Data Fields for In-situ OAM | Data Fields for In-situ OAM | |||
| draft-ietf-ippm-ioam-data-11 | draft-ietf-ippm-ioam-data-12 | |||
| Abstract | Abstract | |||
| In-situ Operations, Administration, and Maintenance (IOAM) records | In-situ Operations, Administration, and Maintenance (IOAM) records | |||
| operational and telemetry information in the packet while the packet | operational and telemetry information in the packet while the packet | |||
| traverses a path between two points in the network. This document | traverses a path between two points in the network. This document | |||
| discusses the data fields and associated data types for in-situ OAM. | discusses the data fields and associated data types for in-situ OAM. | |||
| In-situ OAM data fields can be encapsulated into a variety of | In-situ OAM data fields can be encapsulated into a variety of | |||
| protocols such as NSH, Segment Routing, Geneve, IPv6 (via extension | protocols such as NSH, Segment Routing, Geneve, IPv6 (via extension | |||
| header), or IPv4. In-situ OAM can be used to complement OAM | header), or IPv4. In-situ OAM can be used to complement OAM | |||
| skipping to change at page 1, line 39 ¶ | skipping to change at page 1, line 40 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on May 26, 2021. | This Internet-Draft will expire on August 25, 2021. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2020 IETF Trust and the persons identified as the | Copyright (c) 2021 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| skipping to change at page 2, line 20 ¶ | skipping to change at page 2, line 21 ¶ | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 3. Conventions . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 3. Conventions . . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 4. Scope, Applicability, and Assumptions . . . . . . . . . . . . 5 | 4. Scope, Applicability, and Assumptions . . . . . . . . . . . . 5 | |||
| 5. IOAM Data-Fields, Types, Nodes . . . . . . . . . . . . . . . 6 | 5. IOAM Data-Fields, Types, Nodes . . . . . . . . . . . . . . . 6 | |||
| 5.1. IOAM Data-Fields and Option-Types . . . . . . . . . . . . 6 | 5.1. IOAM Data-Fields and Option-Types . . . . . . . . . . . . 6 | |||
| 5.2. IOAM-Domains and types of IOAM Nodes . . . . . . . . . . 7 | 5.2. IOAM-Domains and types of IOAM Nodes . . . . . . . . . . 7 | |||
| 5.3. IOAM-Namespaces . . . . . . . . . . . . . . . . . . . . . 8 | 5.3. IOAM-Namespaces . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 5.4. IOAM Trace Option-Types . . . . . . . . . . . . . . . . . 10 | 5.4. IOAM Trace Option-Types . . . . . . . . . . . . . . . . . 11 | |||
| 5.4.1. Pre-allocated and Incremental Trace Option-Types . . 13 | 5.4.1. Pre-allocated and Incremental Trace Option-Types . . 13 | |||
| 5.4.2. IOAM node data fields and associated formats . . . . 17 | 5.4.2. IOAM node data fields and associated formats . . . . 17 | |||
| 5.4.2.1. Hop_Lim and node_id short format . . . . . . . . 18 | 5.4.2.1. Hop_Lim and node_id short format . . . . . . . . 18 | |||
| 5.4.2.2. ingress_if_id and egress_if_id . . . . . . . . . 18 | 5.4.2.2. ingress_if_id and egress_if_id . . . . . . . . . 18 | |||
| 5.4.2.3. timestamp seconds . . . . . . . . . . . . . . . . 19 | 5.4.2.3. timestamp seconds . . . . . . . . . . . . . . . . 19 | |||
| 5.4.2.4. timestamp subseconds . . . . . . . . . . . . . . 19 | 5.4.2.4. timestamp subseconds . . . . . . . . . . . . . . 19 | |||
| 5.4.2.5. transit delay . . . . . . . . . . . . . . . . . . 19 | 5.4.2.5. transit delay . . . . . . . . . . . . . . . . . . 19 | |||
| 5.4.2.6. namespace specific data . . . . . . . . . . . . . 20 | 5.4.2.6. namespace specific data . . . . . . . . . . . . . 20 | |||
| 5.4.2.7. queue depth . . . . . . . . . . . . . . . . . . . 20 | 5.4.2.7. queue depth . . . . . . . . . . . . . . . . . . . 20 | |||
| 5.4.2.8. Checksum Complement . . . . . . . . . . . . . . . 20 | 5.4.2.8. Checksum Complement . . . . . . . . . . . . . . . 20 | |||
| skipping to change at page 3, line 12 ¶ | skipping to change at page 3, line 13 ¶ | |||
| 8.5. IOAM POT-Flags Registry . . . . . . . . . . . . . . . . . 37 | 8.5. IOAM POT-Flags Registry . . . . . . . . . . . . . . . . . 37 | |||
| 8.6. IOAM E2E-Type Registry . . . . . . . . . . . . . . . . . 37 | 8.6. IOAM E2E-Type Registry . . . . . . . . . . . . . . . . . 37 | |||
| 8.7. IOAM Namespace-ID Registry . . . . . . . . . . . . . . . 37 | 8.7. IOAM Namespace-ID Registry . . . . . . . . . . . . . . . 37 | |||
| 9. Management and Deployment Considerations . . . . . . . . . . 38 | 9. Management and Deployment Considerations . . . . . . . . . . 38 | |||
| 10. Security Considerations . . . . . . . . . . . . . . . . . . . 38 | 10. Security Considerations . . . . . . . . . . . . . . . . . . . 38 | |||
| 11. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 40 | 11. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 40 | |||
| 12. References . . . . . . . . . . . . . . . . . . . . . . . . . 40 | 12. References . . . . . . . . . . . . . . . . . . . . . . . . . 40 | |||
| 12.1. Normative References . . . . . . . . . . . . . . . . . . 40 | 12.1. Normative References . . . . . . . . . . . . . . . . . . 40 | |||
| 12.2. Informative References . . . . . . . . . . . . . . . . . 41 | 12.2. Informative References . . . . . . . . . . . . . . . . . 41 | |||
| Contributors' Addresses . . . . . . . . . . . . . . . . . . . . . 43 | Contributors' Addresses . . . . . . . . . . . . . . . . . . . . . 43 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 44 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 45 | |||
| 1. Introduction | 1. Introduction | |||
| This document defines data fields for "in-situ" Operations, | This document defines data fields for "in-situ" Operations, | |||
| Administration, and Maintenance (IOAM). In-situ OAM records OAM | Administration, and Maintenance (IOAM). In-situ OAM records OAM | |||
| information within the packet while the packet traverses a particular | information within the packet while the packet traverses a particular | |||
| network domain. The term "in-situ" refers to the fact that the OAM | network domain. The term "in-situ" refers to the fact that the OAM | |||
| data is added to the data packets rather than being sent within | data is added to the data packets rather than being sent within | |||
| packets specifically dedicated to OAM. IOAM is to complement | packets specifically dedicated to OAM. IOAM is to complement | |||
| mechanisms such as Ping or Traceroute. In terms of "active" or | mechanisms such as Ping or Traceroute. In terms of "active" or | |||
| skipping to change at page 4, line 50 ¶ | skipping to change at page 5, line 4 ¶ | |||
| OAM: Operations, Administration, and Maintenance | OAM: Operations, Administration, and Maintenance | |||
| PMTU Path MTU | PMTU Path MTU | |||
| POT: Proof of Transit | POT: Proof of Transit | |||
| SFC: Service Function Chain | SFC: Service Function Chain | |||
| SID: Segment Identifier | SID: Segment Identifier | |||
| SR: Segment Routing | SR: Segment Routing | |||
| VXLAN-GPE: Virtual eXtensible Local Area Network, Generic Protocol | VXLAN-GPE: Virtual eXtensible Local Area Network, Generic Protocol | |||
| Extension [I-D.ietf-nvo3-vxlan-gpe] | Extension [I-D.ietf-nvo3-vxlan-gpe] | |||
| 4. Scope, Applicability, and Assumptions | 4. Scope, Applicability, and Assumptions | |||
| IOAM deployment assumes a set of constraints, requirements, and | IOAM deployment assumes a set of constraints, requirements, and | |||
| guiding principles which are described in this section. | guiding principles which are described in this section. | |||
| Scope: This document defines the data fields and associated data | Scope: This document defines the data fields and associated data | |||
| types for in-situ OAM. The in-situ OAM data field can be | types for in-situ OAM. The in-situ OAM data field can be | |||
| encapsulated in a variety of protocols, including NSH, Segment | encapsulated in a variety of protocols, including NSH, Segment | |||
| Routing, Geneve, IPv6, or IPv4. Specification details for these | Routing, Geneve, IPv6, or IPv4. Specification details for these | |||
| different protocols are outside the scope of this document. | different protocols are outside the scope of this document. It is | |||
| expected that each such encapsulation will be defined in the relevant | ||||
| working group in the IETF. | ||||
| Deployment domain (or scope) of in-situ OAM deployment: IOAM is a | Deployment domain (or scope) of in-situ OAM deployment: IOAM is a | |||
| network domain focused feature, with "network domain" being a set of | network domain focused feature, with "network domain" being a set of | |||
| network devices or entities within a single administration. For | network devices or entities within a single administration. For | |||
| example, a network domain can include an enterprise campus using | example, a network domain can include an enterprise campus using | |||
| physical connections between devices or an overlay network using | physical connections between devices or an overlay network using | |||
| virtual connections / tunnels for connectivity between said devices. | virtual connections / tunnels for connectivity between said devices. | |||
| A network domain is defined by its perimeter or edge. Designers of | A network domain is defined by its perimeter or edge. Designers of | |||
| protocol encapsulations for IOAM specify mechanisms to ensure that | protocol encapsulations for IOAM specify mechanisms to ensure that | |||
| IOAM data stays within an IOAM domain. In addition, the operator of | IOAM data stays within an IOAM domain. In addition, the operator of | |||
| skipping to change at page 22, line 46 ¶ | skipping to change at page 22, line 46 ¶ | |||
| 5.4.2.12. buffer occupancy | 5.4.2.12. buffer occupancy | |||
| The "buffer occupancy" field is a 4-octet unsigned integer field. | The "buffer occupancy" field is a 4-octet unsigned integer field. | |||
| This field indicates the current status of the occupancy of the | This field indicates the current status of the occupancy of the | |||
| common buffer pool used by a set of queues. The units of this field | common buffer pool used by a set of queues. The units of this field | |||
| are implementation specific. Hence, the units are interpreted within | are implementation specific. Hence, the units are interpreted within | |||
| the context of an IOAM-Namespace and/or node-id if used. The authors | the context of an IOAM-Namespace and/or node-id if used. The authors | |||
| acknowledge that in some operational cases there is a need for the | acknowledge that in some operational cases there is a need for the | |||
| units to be consistent across a packet path through the network, | units to be consistent across a packet path through the network, | |||
| hence RECOMMEND the implementations to use standard units such as | hence it is RECOMMENDED for implementations to use standard units | |||
| Bytes. | such as Bytes. | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | buffer occupancy | | | buffer occupancy | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| 5.4.2.13. Opaque State Snapshot | 5.4.2.13. Opaque State Snapshot | |||
| The "Opaque State Snapshot" is a variable length field and follows | The "Opaque State Snapshot" is a variable length field and follows | |||
| the fixed length IOAM-Data-Fields defined above. It allows the | the fixed length IOAM-Data-Fields defined above. It allows the | |||
| skipping to change at page 38, line 8 ¶ | skipping to change at page 38, line 8 ¶ | |||
| 8.7. IOAM Namespace-ID Registry | 8.7. IOAM Namespace-ID Registry | |||
| IANA is requested to set up an "IOAM Namespace-ID Registry", | IANA is requested to set up an "IOAM Namespace-ID Registry", | |||
| containing 16-bit values. The meaning of Bit 0 is defined in this | containing 16-bit values. The meaning of Bit 0 is defined in this | |||
| document. IANA is requested to reserve the values 0x0001 to 0x7FFF | document. IANA is requested to reserve the values 0x0001 to 0x7FFF | |||
| for private use (managed by operators), as specified in Section 5.3 | for private use (managed by operators), as specified in Section 5.3 | |||
| of the current document. Registry entries for the values 0x8000 to | of the current document. Registry entries for the values 0x8000 to | |||
| 0xFFFF are to be assigned via the "Expert Review" policy defined in | 0xFFFF are to be assigned via the "Expert Review" policy defined in | |||
| [RFC8126]. Upon a new allocation request, the responsible AD will | [RFC8126]. Upon a new allocation request, the responsible AD will | |||
| appoint a designated expert, who will review the allocation request. | appoint a designated expert, who will review the allocation request. | |||
| The expert will post the request on the IPPM mailing list, and | The expert will post the request on the mailing list of the IPPM | |||
| possibly on other relevant mailing lists, to allow for community | working group in the IETF (ippm@ietf.org), and possibly on other | |||
| feedback. Based on the review, the expert will either approve or | relevant mailing lists, to allow for community feedback. Based on | |||
| deny the request. The intention is that any allocation will be | the review, the expert will either approve or deny the request. The | |||
| accompanied by a published RFC. But in order to allow for the | intention is that any allocation will be accompanied by a published | |||
| allocation of values prior to the RFC being approved for publication, | RFC. But in order to allow for the allocation of values prior to the | |||
| the designated expert can approve allocations once it seems clear | RFC being approved for publication, the designated expert can approve | |||
| that an RFC will be published. | allocations once it seems clear that an RFC will be published. | |||
| 0: default namespace (known to all IOAM nodes) | 0: default namespace (known to all IOAM nodes) | |||
| 0x0001 - 0x7FFF: reserved for private use | 0x0001 - 0x7FFF: reserved for private use | |||
| 0x8000 - 0xFFFF: unassigned | 0x8000 - 0xFFFF: unassigned | |||
| 9. Management and Deployment Considerations | 9. Management and Deployment Considerations | |||
| This document defines the structure and use of IOAM data fields. | This document defines the structure and use of IOAM data fields. | |||
| skipping to change at page 39, line 35 ¶ | skipping to change at page 39, line 35 ¶ | |||
| synchronization protocols then any attack on the time protocol | synchronization protocols then any attack on the time protocol | |||
| [RFC7384] can compromise the integrity of the timestamp-related data | [RFC7384] can compromise the integrity of the timestamp-related data | |||
| fields. | fields. | |||
| At the management plane, attacks can be set up by misconfiguring or | At the management plane, attacks can be set up by misconfiguring or | |||
| by maliciously configuring IOAM-enabled nodes in a way that enables | by maliciously configuring IOAM-enabled nodes in a way that enables | |||
| other attacks. Thus, IOAM configuration has to be secured in a way | other attacks. Thus, IOAM configuration has to be secured in a way | |||
| that authenticates authorized users and verifies the integrity of | that authenticates authorized users and verifies the integrity of | |||
| configuration procedures. | configuration procedures. | |||
| Solutions to ensure the integrity of IOAM data fields are outside the | ||||
| scope of this document. [I-D.brockners-ippm-ioam-data-integrity] | ||||
| discusses several methods to ensure the integrity of IOAM data fields | ||||
| for those deployments that have a need to protect the integrity of | ||||
| IOAM data fields. | ||||
| The current document does not define a specific IOAM encapsulation. | The current document does not define a specific IOAM encapsulation. | |||
| It has to be noted that some IOAM encapsulation types can introduce | It has to be noted that some IOAM encapsulation types can introduce | |||
| specific security considerations. A specification that defines an | specific security considerations. A specification that defines an | |||
| IOAM encapsulation is expected to address the respective | IOAM encapsulation is expected to address the respective | |||
| encapsulation-specific security considerations. | encapsulation-specific security considerations. | |||
| Notably, in most cases IOAM is expected to be deployed in specific | Notably, in most cases IOAM is expected to be deployed in specific | |||
| network domains, thus confining the potential attack vectors to | network domains, thus confining the potential attack vectors to | |||
| within the network domain. A limited administrative domain provides | within the network domain. A limited administrative domain provides | |||
| the operator with the means to select, monitor, and control the | the operator with the means to select, monitor, and control the | |||
| skipping to change at page 40, line 14 ¶ | skipping to change at page 40, line 18 ¶ | |||
| The security considerations of a system that deploys IOAM, much like | The security considerations of a system that deploys IOAM, much like | |||
| any system, has to be reviewed on a per-deployment-scenario basis, | any system, has to be reviewed on a per-deployment-scenario basis, | |||
| based on a systems-specific threat analysis, which can lead to | based on a systems-specific threat analysis, which can lead to | |||
| specific security solutions that are beyond the scope of the current | specific security solutions that are beyond the scope of the current | |||
| document. Specifically, in an IOAM deployment that is not confined | document. Specifically, in an IOAM deployment that is not confined | |||
| to a single LAN, but spans multiple inter-connected sites (for | to a single LAN, but spans multiple inter-connected sites (for | |||
| example, using an overlay network), the inter-site links can be | example, using an overlay network), the inter-site links can be | |||
| secured (e.g., by IPsec) in order to avoid external threats. | secured (e.g., by IPsec) in order to avoid external threats. | |||
| IOAM deployment considerations, including approaches to mitigate the | ||||
| above discussed threads and potential attacks are outside the scope | ||||
| of this document. IOAM deployment considerations are discussed in | ||||
| [I-D.brockners-opsawg-ioam-deployment]. | ||||
| 11. Acknowledgements | 11. Acknowledgements | |||
| The authors would like to thank Eric Vyncke, Nalini Elkins, Srihari | The authors would like to thank Eric Vyncke, Nalini Elkins, Srihari | |||
| Raghavan, Ranganathan T S, Karthik Babu Harichandra Babu, Akshaya | Raghavan, Ranganathan T S, Karthik Babu Harichandra Babu, Akshaya | |||
| Nadahalli, LJ Wobker, Erik Nordmark, Vengada Prasad Govindan, Andrew | Nadahalli, LJ Wobker, Erik Nordmark, Vengada Prasad Govindan, Andrew | |||
| Yourtchenko, Aviv Kfir, Tianran Zhou and Zhenbin (Robin) for the | Yourtchenko, Aviv Kfir, Tianran Zhou, Zhenbin (Robin) and Greg Mirsky | |||
| comments and advice. | for the comments and advice. | |||
| This document leverages and builds on top of several concepts | This document leverages and builds on top of several concepts | |||
| described in [I-D.kitamura-ipv6-record-route]. The authors would | described in [I-D.kitamura-ipv6-record-route]. The authors would | |||
| like to acknowledge the work done by the author Hiroshi Kitamura and | like to acknowledge the work done by the author Hiroshi Kitamura and | |||
| people involved in writing it. | people involved in writing it. | |||
| The authors would like to gracefully acknowledge useful review and | The authors would like to gracefully acknowledge useful review and | |||
| insightful comments received from Joe Clarke, Al Morton, Tom Herbert, | insightful comments received from Joe Clarke, Al Morton, Tom Herbert, | |||
| Haoyu Song, Mickey Spiegel and Barak Gafni. | Haoyu Song, Mickey Spiegel and Barak Gafni. | |||
| skipping to change at page 41, line 22 ¶ | skipping to change at page 41, line 29 ¶ | |||
| Specification", RFC 5905, DOI 10.17487/RFC5905, June 2010, | Specification", RFC 5905, DOI 10.17487/RFC5905, June 2010, | |||
| <https://www.rfc-editor.org/info/rfc5905>. | <https://www.rfc-editor.org/info/rfc5905>. | |||
| [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for | [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for | |||
| Writing an IANA Considerations Section in RFCs", BCP 26, | Writing an IANA Considerations Section in RFCs", BCP 26, | |||
| RFC 8126, DOI 10.17487/RFC8126, June 2017, | RFC 8126, DOI 10.17487/RFC8126, June 2017, | |||
| <https://www.rfc-editor.org/info/rfc8126>. | <https://www.rfc-editor.org/info/rfc8126>. | |||
| 12.2. Informative References | 12.2. Informative References | |||
| [I-D.brockners-ippm-ioam-data-integrity] | ||||
| Brockners, F., Bhandari, S., and T. Mizrahi, "Integrity of | ||||
| In-situ OAM Data Fields", draft-brockners-ippm-ioam-data- | ||||
| integrity-00 (work in progress), January 2021. | ||||
| [I-D.brockners-opsawg-ioam-deployment] | [I-D.brockners-opsawg-ioam-deployment] | |||
| Brockners, F., Bhandari, S., and d. | Brockners, F., Bhandari, S., and d. | |||
| daniel.bernier@bell.ca, "In-situ OAM Deployment", draft- | daniel.bernier@bell.ca, "In-situ OAM Deployment", draft- | |||
| brockners-opsawg-ioam-deployment-02 (work in progress), | brockners-opsawg-ioam-deployment-02 (work in progress), | |||
| September 2020. | September 2020. | |||
| [I-D.ietf-nvo3-geneve] | [I-D.ietf-nvo3-geneve] | |||
| Gross, J., Ganga, I., and T. Sridhar, "Geneve: Generic | Gross, J., Ganga, I., and T. Sridhar, "Geneve: Generic | |||
| Network Virtualization Encapsulation", draft-ietf- | Network Virtualization Encapsulation", draft-ietf- | |||
| nvo3-geneve-16 (work in progress), March 2020. | nvo3-geneve-16 (work in progress), March 2020. | |||
| skipping to change at page 42, line 50 ¶ | skipping to change at page 43, line 19 ¶ | |||
| [RFC8300] Quinn, P., Ed., Elzur, U., Ed., and C. Pignataro, Ed., | [RFC8300] Quinn, P., Ed., Elzur, U., Ed., and C. Pignataro, Ed., | |||
| "Network Service Header (NSH)", RFC 8300, | "Network Service Header (NSH)", RFC 8300, | |||
| DOI 10.17487/RFC8300, January 2018, | DOI 10.17487/RFC8300, January 2018, | |||
| <https://www.rfc-editor.org/info/rfc8300>. | <https://www.rfc-editor.org/info/rfc8300>. | |||
| [RFC8877] Mizrahi, T., Fabini, J., and A. Morton, "Guidelines for | [RFC8877] Mizrahi, T., Fabini, J., and A. Morton, "Guidelines for | |||
| Defining Packet Timestamps", RFC 8877, | Defining Packet Timestamps", RFC 8877, | |||
| DOI 10.17487/RFC8877, September 2020, | DOI 10.17487/RFC8877, September 2020, | |||
| <https://www.rfc-editor.org/info/rfc8877>. | <https://www.rfc-editor.org/info/rfc8877>. | |||
| [SSS] Wikipedia, "Shamir's Secret Sharing", | [SSS] "Shamir's Secret Sharing", | |||
| <https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing>. | <https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing>. | |||
| Contributors' Addresses | Contributors' Addresses | |||
| Carlos Pignataro | Carlos Pignataro | |||
| Cisco Systems, Inc. | Cisco Systems, Inc. | |||
| 7200-11 Kit Creek Road | 7200-11 Kit Creek Road | |||
| Research Triangle Park, NC 27709 | Research Triangle Park, NC 27709 | |||
| United States | United States | |||
| skipping to change at page 43, line 24 ¶ | skipping to change at page 43, line 41 ¶ | |||
| Mickey Spiegel | Mickey Spiegel | |||
| Barefoot Networks, an Intel company | Barefoot Networks, an Intel company | |||
| 4750 Patrick Henry Drive | 4750 Patrick Henry Drive | |||
| Santa Clara, CA 95054 | Santa Clara, CA 95054 | |||
| US | US | |||
| Email: mickey.spiegel@intel.com | Email: mickey.spiegel@intel.com | |||
| Barak Gafni | Barak Gafni | |||
| Mellanox Technologies, Inc. | Nvidia | |||
| 350 Oakmead Parkway, Suite 100 | 350 Oakmead Parkway, Suite 100 | |||
| Sunnyvale, CA 94085 | Sunnyvale, CA 94085 | |||
| U.S.A. | U.S.A. | |||
| Email: gbarak@mellanox.com | Email: gbarak@nvidia.com | |||
| Jennifer Lemon | Jennifer Lemon | |||
| Broadcom | Broadcom | |||
| 270 Innovation Drive | 270 Innovation Drive | |||
| San Jose, CA 95134 | San Jose, CA 95134 | |||
| US | US | |||
| Email: jennifer.lemon@broadcom.com | Email: jennifer.lemon@broadcom.com | |||
| Hannes Gredler | Hannes Gredler | |||
| skipping to change at page 45, line 4 ¶ | skipping to change at page 45, line 21 ¶ | |||
| Authors' Addresses | Authors' Addresses | |||
| Frank Brockners (editor) | Frank Brockners (editor) | |||
| Cisco Systems, Inc. | Cisco Systems, Inc. | |||
| Hansaallee 249, 3rd Floor | Hansaallee 249, 3rd Floor | |||
| DUESSELDORF, NORDRHEIN-WESTFALEN 40549 | DUESSELDORF, NORDRHEIN-WESTFALEN 40549 | |||
| Germany | Germany | |||
| Email: fbrockne@cisco.com | Email: fbrockne@cisco.com | |||
| Shwetha Bhandari (editor) | Shwetha Bhandari (editor) | |||
| Cisco Systems, Inc. | Thoughtspot | |||
| Cessna Business Park, Sarjapura Marathalli Outer Ring Road | 3rd Floor, Indiqube Orion, 24th Main Rd, Garden Layout, HSR Layout | |||
| Bangalore, KARNATAKA 560 087 | Bangalore, KARNATAKA 560 102 | |||
| India | India | |||
| Email: shwethab@cisco.com | Email: shwetha.bhandari@thoughtspot.com | |||
| Tal Mizrahi (editor) | Tal Mizrahi (editor) | |||
| Huawei | Huawei | |||
| 8-2 Matam | 8-2 Matam | |||
| Haifa 3190501 | Haifa 3190501 | |||
| Israel | Israel | |||
| Email: tal.mizrahi.phd@gmail.com | Email: tal.mizrahi.phd@gmail.com | |||
| End of changes. 22 change blocks. | ||||
| 30 lines changed or deleted | 50 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||