Re: [Detnet] on signaling the packet treatment vs. the flow/OAM

Tianran Zhou <zhoutianran@huawei.com> Fri, 29 July 2022 00:50 UTC

Return-Path: <zhoutianran@huawei.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A5E3DC15C513 for <detnet@ietfa.amsl.com>; Thu, 28 Jul 2022 17:50:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.209
X-Spam-Level:
X-Spam-Status: No, score=-4.209 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Svz2O0uRGv5x for <detnet@ietfa.amsl.com>; Thu, 28 Jul 2022 17:49:59 -0700 (PDT)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA557C157B5E for <detnet@ietf.org>; Thu, 28 Jul 2022 17:49:58 -0700 (PDT)
Received: from fraeml711-chm.china.huawei.com (unknown [172.18.147.200]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4Lv84d6ZXxz682Wq for <detnet@ietf.org>; Fri, 29 Jul 2022 08:47:45 +0800 (CST)
Received: from kwepemi100010.china.huawei.com (7.221.188.54) by fraeml711-chm.china.huawei.com (10.206.15.60) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Fri, 29 Jul 2022 02:49:54 +0200
Received: from kwepemi500009.china.huawei.com (7.221.188.199) by kwepemi100010.china.huawei.com (7.221.188.54) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Fri, 29 Jul 2022 08:49:53 +0800
Received: from kwepemi500009.china.huawei.com ([7.221.188.199]) by kwepemi500009.china.huawei.com ([7.221.188.199]) with mapi id 15.01.2375.024; Fri, 29 Jul 2022 08:49:53 +0800
From: Tianran Zhou <zhoutianran@huawei.com>
To: Greg Mirsky <gregimirsky@gmail.com>, "Pascal Thubert (pthubert)" <pthubert@cisco.com>
CC: "Black, David" <David.Black=40dell.com@dmarc.ietf.org>, "detnet@ietf.org" <detnet@ietf.org>, "Black, David" <David.Black@dell.com>
Thread-Topic: [Detnet] on signaling the packet treatment vs. the flow/OAM
Thread-Index: AdiiuN+AifH1GufmQaWO7tvTMHi/9gAA/19wAACuFFL//4PTgP//PHhw
Date: Fri, 29 Jul 2022 00:49:53 +0000
Message-ID: <fa5f417ba88641ccb9e7b5e3fc810eef@huawei.com>
References: <CO1PR11MB488192B11EF759264FB05614D8969@CO1PR11MB4881.namprd11.prod.outlook.com> <DM6PR19MB40422DD5B4BB7F0095AB87D583969@DM6PR19MB4042.namprd19.prod.outlook.com> <D7BF068C-3873-4A66-A39D-8FD8168C9C47@cisco.com> <CA+RyBmVXXqr_A5ch3W8ThAGS3UPvtC_M3j+Tdo5yTf=P27y1JA@mail.gmail.com>
In-Reply-To: <CA+RyBmVXXqr_A5ch3W8ThAGS3UPvtC_M3j+Tdo5yTf=P27y1JA@mail.gmail.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.112.40.195]
Content-Type: multipart/alternative; boundary="_000_fa5f417ba88641ccb9e7b5e3fc810eefhuaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/wPWi6fHHGzEjk1IYUVYJKjZnf-Y>
Subject: Re: [Detnet] on signaling the packet treatment vs. the flow/OAM
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jul 2022 00:50:02 -0000

We need to see the use cases that hop by hop OAM is applied.
In most cases, active OAM is used edge to edge. So there is no need for intermediate nodes to process. And OAM over UDP has least dependency on the intermediate nodes, hence easy to deploy.
If indeed there are requirements for hop by hop processing, I would agree with Pascal, tag over UDP is not a good idea.
In addition to active OAM, there are also passive and hybrid ways that we can apply.

Best,
Tianran
From: detnet [mailto:detnet-bounces@ietf.org] On Behalf Of Greg Mirsky
Sent: Friday, July 29, 2022 4:57 AM
To: Pascal Thubert (pthubert) <pthubert@cisco.com>
Cc: Black, David <David.Black=40dell.com@dmarc.ietf.org>; detnet@ietf.org; Black, David <David.Black@dell.com>
Subject: Re: [Detnet] on signaling the packet treatment vs. the flow/OAM

Hi Pascal and David,
thank you for a great discussion. I fully agree with David that active OAM must share fate with the monitored DetNet flow. Thus, all elements of IPv6 encapsulation that impact the treatment of a packet in the data path MUST be identical across the DetNet flow and corresponding active OAM. Where it gets tricky, in my opinion, is IPv6 HbH EH(s). I think that we need to look closely at which HbH EHs used by the particular DetNet flow MUST also be applied to the OAM test packets. It seems like we can do that analysis in, for example, the OAM Considerations section.

WDYT?

Regards,
Greg

On Thu, Jul 28, 2022 at 4:21 PM Pascal Thubert (pthubert) <pthubert@cisco.com<mailto:pthubert@cisco.com>> wrote:
Great point David,

If one places an ECMP hash in a DetNet network he would better do that consciously because the interaction with the DetNet service plane might be tricky.

The idea along a DetNet path is that there’s no such surprise as an unexpected balancer.

Adding a UDP layer just to obfuscate the inner traffic against such unexpected activity looks like an overkill to me.

The service layer tightly controls its distribution. All nodes comply to DetNet. If DetNet says that the fate will depend on the tag, so it will be.

Regards,

Pascal

> Le 28 juil. 2022 à 22:12, Black, David <David.Black=40dell.com@dmarc.ietf.org<mailto:40dell.com@dmarc.ietf.org>> a écrit :
>
> Hi Pascal,
>
> I'm not Greg, but nonetheless ...
>
> One can certainly tag packets with IPv6 hbh headers, but there's still a concern for active OAM where the OAM traffic is a different flow that needs to fate-share with the traffic flow of interest.  Getting that fate-sharing to work in the presence of flow spreading measures (e.g., ECMP hashes) is possible, but subtle, and dependent on what the data plane is doing for flow spreading (e.g., hash inputs, number of hash buckets).  UDP encapsulating all the traffic that needs to share fate is independent of all that, and hence I'd characterize it as a more robust mechanism to ensure fate sharing ... at the cost of the encapsulation and consequences thereof (another instance of "no free lunch").
>
> Thanks, --David
>
> -----Original Message-----
> From: detnet <detnet-bounces@ietf.org<mailto:detnet-bounces@ietf.org>> On Behalf Of Pascal Thubert (pthubert)
> Sent: Thursday, July 28, 2022 3:48 PM
> To: gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>
> Cc: detnet@ietf.org<mailto:detnet@ietf.org>
> Subject: [Detnet] on signaling the packet treatment vs. the flow/OAM
>
>
> [EXTERNAL EMAIL]
>
> Hello Greg:
>
> My point at the mike was that IPv6 allows you to tag packets with L3 information (e.g., DetNet, but also routing topology / VRF for RPL, and all those things SRv6 does) related to packet treatment without impacting the upper layer information (UDP ports and all above UDP).
>
>
> It's actually cool to leave upper layer do and signal their stuff and have DetNet signal its own stuff independently.
> This way we can tag all sorts of packets for the same treatment, whether they are UDP or not, whether they are an app flow or OAM, etc...
>
> The way to do that in IPv6 is Extension Headers. This is the essence of the proposal in https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/draft-pthubert-detnet-ipv6-hbh-07__;!!LpKI!g764fAu3jINFXJra3JMCgLbYlGpnPnE5hkPRXlDq4G-_KTqxk9KMGMi3dTHijBEertf03WLsnoSG9kuqrjmdT9EpGukcymj4$<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-pthubert-detnet-ipv6-hbh-07__;!!LpKI!g764fAu3jINFXJra3JMCgLbYlGpnPnE5hkPRXlDq4G-_KTqxk9KMGMi3dTHijBEertf03WLsnoSG9kuqrjmdT9EpGukcymj4$> [datatracker[.]ietf[.]org] which was done with OAM (and flow aggregation) in mind.
>
> As it goes, the more we look at enhanced DetNet, the more tagging we will need. DetNet should own and control the tags it operates own. The mapping flow->tag is an ingress edge problem, just like tagging a VLAN is in .1Q... Your OAM packet should be whatever OAM wants IoT to be, and the ingress policy should apply the tag the DetNet network needs.
>
> Arguable, you could use UDP encaps as a tag. But is that the best tag? It's far in the packet (see the discussion on how far ASICs look in the packets) and heavy with information we do not need (the checksum is a MUST in IPv6, do we have enough ports?, etc...). It's like taking a truck to bring your loved one around the Cuomo lake. Works but maybe not the best idea.
>
> All the best,
>
> Pascal
>
>
>
>
>
> _______________________________________________
> detnet mailing list
> detnet@ietf.org<mailto:detnet@ietf.org>
> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/detnet__;!!LpKI!g764fAu3jINFXJra3JMCgLbYlGpnPnE5hkPRXlDq4G-_KTqxk9KMGMi3dTHijBEertf03WLsnoSG9kuqrjmdT9EpGgoSXTG4$<https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/detnet__;!!LpKI!g764fAu3jINFXJra3JMCgLbYlGpnPnE5hkPRXlDq4G-_KTqxk9KMGMi3dTHijBEertf03WLsnoSG9kuqrjmdT9EpGgoSXTG4$> [ietf[.]org]