Dear Authors,
thank you for a well-written document that is a pleasure to read. I believe
that it is ready to progress. However, I have one general observation to
make. Although IETF documents are required to include an analysis of the
existing and any new security threats, and requested IANA actions, there's
no formal requirement to have a text that considers how the defined
mechanisms affect existing OAM tools, point to any existing gaps that have
been identified and need further work. As a suggestion, it seems that
because p2mp SR policies are different from well-known p2p use cases,
perhaps this document needs some additional text that points to the
OAM-related aspects, specific to p2mp SR policies, e.g., echo request/reply
(a.k.a. ping and traceroute), BFD, performance monitoring. WDYT?

Regards,
Greg

On Mon, Apr 22, 2024 at 4:37 AM Michael McBride <
michael.mcbr...@futurewei.com> wrote:

> Hello good people,
>
>
>
> Today begins a two week wglc for
> https://datatracker.ietf.org/doc/html/draft-ietf-pim-sr-p2mp-policy-08.
> The related (normative) replication segment draft has now been published as
> a standards track RFC. The poll in the Brisbane pim room was 3 in favor and
> 0 against. Please respond with your opinions on the advancement of this
> draft.
>
>
>
> Thanks,
>
> mike
>
>
>
>
>
>
>
>
> _______________________________________________
> spring mailing list
> spring@ietf.org
> https://www.ietf.org/mailman/listinfo/spring
>
_______________________________________________
spring mailing list
spring@ietf.org
https://www.ietf.org/mailman/listinfo/spring

Reply via email to