[Detnet] AD Review of draft-ietf-detnet-mpls-over-ip-preof-07

Roman Danyliw <rdd@cert.org> Fri, 27 October 2023 21:05 UTC

Return-Path: <rdd@cert.org>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B0EE1C14CE31 for <detnet@ietfa.amsl.com>; Fri, 27 Oct 2023 14:05:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id piZfiKdmr0sl for <detnet@ietfa.amsl.com>; Fri, 27 Oct 2023 14:05:17 -0700 (PDT)
Received: from USG02-CY1-obe.outbound.protection.office365.us (mail-cy1usg02on0137.outbound.protection.office365.us [23.103.209.137]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CB0D6C14CE2C for <detnet@ietf.org>; Fri, 27 Oct 2023 14:05:17 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=n++TOqJcuM4V+n0oHq20NYLC8d1s5sFvhCFZG2klz1/GGxlE2d4kiGi6p3SRSP5M8FYDeSUUNu16dNHvKuF02rumiqu2IWTZ9erldCbYhyDikXNF1ngi690CR+A9gywxgMf4FA0AM25mBiuhIX9jM2tfYSDHaGXoffNRxT4iu2OXo5CjWn1zTci0g+GilhcWx8iks5pgA8Arz2SioBhcsI8L1t0RO0YJK0SwflE/8v7SuS5Ntx+yvzPqWHh75l4dzcb3u5ZchTNG6tWvVnhkbb39Wzp8FgaztCx0pDVO02iYljnte3/UZORhAgpBtF/MkoOMPs0njVG3SUZbnU5vQg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=k1jk+qbWS2GN0BqpDl990xgl5mK6ocDc16dXG3ZRhoY=; b=wRX6nGLPXgqA9J0xGhrXWr8Di/1MMXS8Mcus6xqt289WQFyxtElRD6Ryv3m9uClwxjTSnMspSnpZPWedT/ti0Ru1X/wtFuTQd/SU7LEKLR/QrRw/lcve8NBIBUw5o8qJR3tbv790hCVkWdE/773qygPqKEH4Y5Bv1GCudd1p7j9NVrKclZXPPFP49tL1SMDzdZ0fIjwUaLFwCPXnPtTluCRPs3gkcrBfFpc8FmJWgfYx5Ik2pggESTMJOSSS5MFSgONa7kbZKkBC3zaTs23B1cIL78OQnkpIMPMn4IKmxy+mTvj7UU/BkSX6KixBNeyzodDSORMt+hWmCCmcwjYOEg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cert.org; dmarc=pass action=none header.from=cert.org; dkim=pass header.d=cert.org; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=k1jk+qbWS2GN0BqpDl990xgl5mK6ocDc16dXG3ZRhoY=; b=V/9o1nsQYe+riAvc/WpwNlnUHJJBo3+KsN2RAc/KRmcvm2Vb3DzOtnd8Xe4CgMLTd8JV2eTbJGfGmJIEJM3XXZtfqcDWYTQGmCdmCv0DB/IziHZ6M8Z1HP2QIEdQkcywicENJ1j1+8891JgZ536sHs9h+i0PGj9dKsk3PiVRViA=
Received: from BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:168::11) by BN2P110MB1729.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:16b::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6863.51; Fri, 27 Oct 2023 21:05:15 +0000
Received: from BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM ([fe80::44ae:335c:4fd2:ea74]) by BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM ([fe80::44ae:335c:4fd2:ea74%6]) with mapi id 15.20.6863.051; Fri, 27 Oct 2023 21:05:15 +0000
From: Roman Danyliw <rdd@cert.org>
To: "detnet@ietf.org" <detnet@ietf.org>
Thread-Topic: AD Review of draft-ietf-detnet-mpls-over-ip-preof-07
Thread-Index: AdoJGDiIzzQbfm+URkyylkkxIPBmnw==
Date: Fri, 27 Oct 2023 21:05:15 +0000
Message-ID: <BN2P110MB1107404798D0C8B39A0F5B8ADCDCA@BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cert.org;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN2P110MB1107:EE_|BN2P110MB1729:EE_
x-ms-office365-filtering-correlation-id: e1f2a11a-c591-4a0e-beda-08dbd7306ae7
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230031)(366004)(396003)(136003)(39830400003)(230922051799003)(451199024)(186009)(1800799009)(64100799003)(55016003)(2906002)(41300700001)(38100700002)(66476007)(66446008)(66556008)(66946007)(64756008)(76116006)(122000001)(508600001)(71200400001)(4743002)(6916009)(6506007)(9686003)(83380400001)(82960400001)(52536014)(5660300002)(86362001)(33656002)(8676002)(8936002)(26005)(7696005)(38070700009)(41320700001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: a0k/rhY+I2ZDzNT0ZLF6JIYPzqzDCWAHXRp9gAqPoT4Jt+V77QxQhPAjzNwgAWy2H5PnqE0kZmnGJzPr0H4WofDHjFR4yedfhjF8l2nXI00sk7z0+2wn8w+KdvBoiXQ+CDlfn5EYFdBBPST4P+dXBsYvfCBAgHNr7huKe8uWpnWFJ3J+eB713bRpK4cdRCj6LQaJDZCL3RCgIBu0GPoe9NSG4a3pGb7Pc9Wudd3j8396XQ074EweKeJXv3UvonrtSbwlCq6gOHx8609ZN2xkWL30qqunglrEMni3vMkeVNeOawBxcU4s0n8aRz3rNiem+fEsB7Vis6P4NUCPz0J3jnHKrCoGfySj5zv+7r6m+CwOf3WfKUahDi7Lc22vjnFtjygg/tiOd57VgdqRyslpVUBvIuXOPl5Oy+oT7N5VBg4=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cert.org
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: e1f2a11a-c591-4a0e-beda-08dbd7306ae7
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Oct 2023 21:05:15.4726 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 95a9dce2-04f2-4043-995d-1ec3861911c6
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN2P110MB1729
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/uOfa3pPOQmUqk1LGktfSxqdDwe4>
Subject: [Detnet] AD Review of draft-ietf-detnet-mpls-over-ip-preof-07
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Oct 2023 21:05:22 -0000

Hi!

I performed an AD review of draft-ietf-detnet-mpls-over-ip-preof-07 stepping in as the responsible AD to help load-balance the PubReq queue.  Thanks for the document.

Begging your patience not being a RTG AD, I have difficulty understanding the basic encapsulation semantics being proposed.  I tried following the references, but wasn’t able to understand how to construct the basic encapsulation.  See below:

** Section 4.2.  Figure 3 is describing an encapsulation header built on fields and processes based on [RFC8964] and [RFC9025].  The UDP payload appears to be an S-Label + dCW + Detnet payload.  Section 4.2.1 of RFC8964 describes the d-CW format and semantics. Section 4.2.2 of RFC8964 has significant text describing S-Labels, but where is the very basic description: how many bits is it?  What are the semantics?

** Section 4.4. 
-- No objection to this text.  However, this behavior seems like an expansion of the PREOF scope I understand the document be.  Is there narrative text that can bridge how aggregation is a building block for replication, elimination and ordering?  I could perhaps speculate on replication and elimination. Less so on ordering.

-- I’m missing a basic understanding of layering.  How do I know the header in UDP is “S-Label + dCW” vs. “A-Label + dCW + S-Label + dCW”?

** Section 5.
   The minimum set of information for the configuration of the DetNet
   service sub-layer is summarized as follows:

   *  App-flow identification information.

How do I specify that?

...
   *  PREOF + related Service-ID(s).

Does that mean to have PREOF “information” for configuration?  Does that mean choosing the algorithms?

** Section 6.
   There are no new DetNet related security considerations introduced by
   this solution.

Please cite by reference which security considerations apply.

** Idnits reports:

  == Unused Reference: 'RFC2119' is defined on line 427, but no explicit
     reference was found in the text

  == Unused Reference: 'RFC8174' is defined on line 432, but no explicit
     reference was found in the text

Regards,
Roman