Re: [Detnet] Last Call Comment: <draft-ietf-detnet-ip-05.txt>- ICMP support, e.g., ping and traceroute

"Black, David" <David.Black@dell.com> Fri, 17 April 2020 23:50 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7CA563A0A87; Fri, 17 Apr 2020 16:50:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com header.b=ABKDsYz9; dkim=pass (1024-bit key) header.d=dell.onmicrosoft.com header.b=ai3ZAMp7
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uIgb_740MMG0; Fri, 17 Apr 2020 16:50:57 -0700 (PDT)
Received: from mx0b-00154904.pphosted.com (mx0b-00154904.pphosted.com [148.163.137.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A59F13A0A8B; Fri, 17 Apr 2020 16:50:56 -0700 (PDT)
Received: from pps.filterd (m0170395.ppops.net [127.0.0.1]) by mx0b-00154904.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 03HNdQ1P023911; Fri, 17 Apr 2020 19:50:50 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=smtpout1; bh=+6a6m6xkBop9jhAkfIrotbYuKNE26ztYhkbuscZXk1A=; b=ABKDsYz9y1Ucv/W0uHxkPQzMwu4WvbaM7TPh3o+LINEQcGyRc2yt3ypH0xWZmF9QAqmM STE4usgFGXZUCB8mUpY+VLCfv2mmvPZKH2ANeLgZJN4++ho2jBCLH/dEc7VIboDHoNoo UDD3jNON5Roc6FF7Pnjp7oUMCOD+jXht8GUWgiLDmH63DTH2rvVeVpmtwF/RaCVM/sl2 d9JM+L/elSSadOKncb6bF8b3ZqoPWn5XbTbLKuiWA5RNCLvNhpq8UbtYska1HcxKUd5S ZbfTEa6DFHR8IwP4WFTJYCHSqueqp/Db1M8vzEkEGQTn86r4lTrNUhaFEchsTAYGhTmR 6g==
Received: from mx0a-00154901.pphosted.com (mx0a-00154901.pphosted.com [67.231.149.39]) by mx0b-00154904.pphosted.com with ESMTP id 30dn8v2uu2-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 17 Apr 2020 19:50:50 -0400
Received: from pps.filterd (m0142693.ppops.net [127.0.0.1]) by mx0a-00154901.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 03HNoER4122594; Fri, 17 Apr 2020 19:50:49 -0400
Received: from nam04-sn1-obe.outbound.protection.outlook.com (mail-sn1nam04lp2054.outbound.protection.outlook.com [104.47.44.54]) by mx0a-00154901.pphosted.com with ESMTP id 30dn8cngn6-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 17 Apr 2020 19:50:49 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FsjXA54LWMKLYElbSjlXxMA6fVtYAXLloTGccE1jTxo5wrSouzwz4bvtqmPy/2nXdTVwtl58J89JrPXahL/MtiZ+EjFu1ZV/Biir/LcgKfID08gYNJVG5iLORPdrH4v6ewre4HTe+RcFK3ZIHL1HVrrUpchYVw1+xWDxy/OO5D06BYC3098t9WV+mCt/5awIiEPa5ShZlObHfJypmp8WH+aAJj4/PGEMc3aKfjFwRxP7lyMxEZPPJkPYMZuvZ+RnqCpLU/lO1dw3+KH4FRfQmalw2Vt1yf+5iKveUpwHVoWqF7W9OAyWcvz3jHXK8QAGlvewrk1T+hzgQAhtkvK38g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+6a6m6xkBop9jhAkfIrotbYuKNE26ztYhkbuscZXk1A=; b=Onee/htEjajnR1RSoaCkliLWOjFKr0CC1G+XqfZ4aznkoh2pEWDLrMLA1JLHfXLKrTZ34YICiiYcVehn+s0+3p08uDhnKfjb7/leQZaxMUyFUBKH/wzA1CVbUFdJqNwOROHdkL+IOddUDYyqf2ZdmY35empgCzU2x/GmV+VtytAnJaMAZetN9Itnl7/Rn/j6m8UOLw4zWMZWgmdtP0vmhC0A5uGiPjQIs6odGG57Vb626eUSsL8bTdF6XJM8LVQgg33rw4ImX+MSdfb+g8VAFxQ9CLG6oUAFQRw96vF8p/JHE+3a2Upt/4ZVYLJMv97+3Lb0bruzyYqqg1fGuLmK+A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Dell.onmicrosoft.com; s=selector1-Dell-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+6a6m6xkBop9jhAkfIrotbYuKNE26ztYhkbuscZXk1A=; b=ai3ZAMp7i4VHH4r29aR/gh+dW/PVu08BvvFXgc3jbaWXpELoj7Suz/JX+xoFncnumzqEBPZFDlnkUHC1TYlhOMcNFETB6Nye8S87Xbfk/5UG+D0xNkIURLIafzzJrAyXFzsuFFsRR26sJeZo78OtYDe1II5ix2KPlnLm2OO7BXY=
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by MN2PR19MB3120.namprd19.prod.outlook.com (2603:10b6:208:136::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2921.27; Fri, 17 Apr 2020 23:31:45 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::8d12:8a24:ccb2:b2bd]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::8d12:8a24:ccb2:b2bd%3]) with mapi id 15.20.2921.027; Fri, 17 Apr 2020 23:31:45 +0000
From: "Black, David" <David.Black@dell.com>
To: Lou Berger <lberger@labn.net>, Balázs Varga A <balazs.a.varga=40ericsson.com@dmarc.ietf.org>, "last-call@ietf.org" <last-call@ietf.org>
CC: Ethan Grossman <eagros@dolby.com>, "detnet@ietf.org" <detnet@ietf.org>, "draft-ietf-detnet-ip@ietf.org" <draft-ietf-detnet-ip@ietf.org>, "db3546@att.com" <db3546@att.com>, "detnet-chairs@ietf.org" <detnet-chairs@ietf.org>, "Black, David" <David.Black@dell.com>
Thread-Topic: [Detnet] Last Call Comment: <draft-ietf-detnet-ip-05.txt>- ICMP support, e.g., ping and traceroute
Thread-Index: AdX4f74xaLvyZ0nYTdKRx42LO3rhwgCkPayAADb1xZAGMwZHgAAAaYCAABT/jbA=
Date: Fri, 17 Apr 2020 23:31:45 +0000
Message-ID: <MN2PR19MB4045DA11CAB42F8B0D2F056483D90@MN2PR19MB4045.namprd19.prod.outlook.com>
References: <MN2PR19MB40455C099129FBA59A76724F83FD0@MN2PR19MB4045.namprd19.prod.outlook.com> <89a3eb9d-876b-3a5f-ab14-a04f51cced03@labn.net> <MN2PR19MB40450E761FEB74E27661245583F60@MN2PR19MB4045.namprd19.prod.outlook.com> <AM6PR0702MB36070B07B0C7215DF1C52FD4ACD90@AM6PR0702MB3607.eurprd07.prod.outlook.com> <5537e2f3-2968-e324-b620-4edccb297a29@labn.net>
In-Reply-To: <5537e2f3-2968-e324-b620-4edccb297a29@labn.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Enabled=True; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Owner=david.black@emc.com; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SetDate=2020-04-17T23:17:03.8429952Z; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Name=External Public; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Application=Microsoft Azure Information Protection; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Extended_MSFT_Method=Manual; aiplabel=External Public
x-originating-ip: [72.74.71.221]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ba052e87-6986-4dc6-7654-08d7e3277dff
x-ms-traffictypediagnostic: MN2PR19MB3120:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <MN2PR19MB3120C2243AED1AF69CDD004583D90@MN2PR19MB3120.namprd19.prod.outlook.com>
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0376ECF4DD
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR19MB4045.namprd19.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(10009020)(4636009)(376002)(136003)(396003)(366004)(39860400002)(346002)(478600001)(5660300002)(2906002)(316002)(107886003)(81156014)(966005)(53546011)(6506007)(8676002)(55016002)(71200400001)(8936002)(7696005)(110136005)(786003)(54906003)(186003)(66476007)(9686003)(33656002)(26005)(30864003)(66556008)(52536014)(76116006)(64756008)(66946007)(66574012)(66446008)(86362001)(4326008); DIR:OUT; SFP:1101;
received-spf: None (protection.outlook.com: dell.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: ZseHhnGrEB+/iaM+LCTKfSdBqmySFzmhpEsQoc6yVagCXYvizKhNRdnfoM3E8LqNcOXN1sL2FwIeXGhqsz/nVBjpgGy9ErAcOY2MCedSFECtVYP1vqkMaACVUM3vVkNtRapnYNVCMSLMrwSTaRcFELe3E2iMHUtHZJRjXevaWqwrqTAupWcCAFE+gU8AEKE2Y2+y5zrppi8qripirJPsHXeYwJoOhdMueY7YE988r9wjjJneC4VZIk6NorABh3+ym8ZzyciDTuh74PmAmEk6EPw4JClgu1VZrOdo5OEQllAZZuLvAEZ69mflUkWTjz4jsTkjpu0bJqaheZEHJOz5+ETY3LOAPShLOXve2/6ApCQQVyZT/AZp6MVuvHG1bdJriJ1OCQXnlb8O5itmhgcMS7SED5c4/Qc95YvO71kTmS5H0QvEGswv1J25UbCNmPkfp7RQ23nURYmBVHEi5Es0eUnh6l/p2geHdQ73KysmpT8=
x-ms-exchange-antispam-messagedata: Dv16sXTkIOJzwTClH17+x0Ogg1j2B0Px9dj1pyxstskpA7g1pz5g3mZ7yD/hgzEE3if61lD1+JTPSpKH4ekCgneH1l2NUCAIwRe27KXLGAaBXhzyCUZcbLd5p1ZVvVhVEe3BHCNsBxvsw4ZdH8af1w==
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ba052e87-6986-4dc6-7654-08d7e3277dff
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Apr 2020 23:31:45.0898 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: SXjYzbeG9rm+MnTnvhI7E+dLEAwvCnddtn4K6ZTMITxHpseOEIM9/Y19r8QNpXV92HJvjJIycJHi3pM1A54OqQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR19MB3120
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.138, 18.0.676 definitions=2020-04-17_11:2020-04-17, 2020-04-17 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 bulkscore=0 clxscore=1011 priorityscore=1501 impostorscore=0 suspectscore=0 phishscore=0 mlxlogscore=999 spamscore=0 mlxscore=0 lowpriorityscore=0 malwarescore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2003020000 definitions=main-2004170173
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 adultscore=0 mlxlogscore=999 priorityscore=1501 impostorscore=0 mlxscore=0 spamscore=0 lowpriorityscore=0 clxscore=1015 bulkscore=0 phishscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2003020000 definitions=main-2004170171
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/wVA93y2cO2nt9ddFcDaTw-eHKK8>
Subject: Re: [Detnet] Last Call Comment: <draft-ietf-detnet-ip-05.txt>- ICMP support, e.g., ping and traceroute
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Apr 2020 23:51:00 -0000

Lou and Balazs,

This looks good.

Coincidentally, after reading the initial proposed text, my initial reaction was along the same lines as Lou's - I was concerned that the "MUST" to support all ICMP types could be misinterpreted as requiring DetNet to forward ICMP packets with types that need to be prohibited for other potentially unrelated reasons.   Lou's suggested rephrase to state that ICMP type is not part of the DetNet flow definition deals with that in a fine fashion, so please do pick up that change ... and I do see that it is in the pull, along with text to indicate that it's fine to use tuples that are smaller than 5-tuples and 6-tuples.

Thanks, --David

> -----Original Message-----
> From: Lou Berger <lberger@labn.net>
> Sent: Friday, April 17, 2020 9:16 AM
> To: Balázs Varga A; Black, David; last-call@ietf.org
> Cc: Ethan Grossman; detnet@ietf.org; draft-ietf-detnet-ip@ietf.org;
> db3546@att.com; detnet-chairs@ietf.org
> Subject: Re: [Detnet] Last Call Comment: <draft-ietf-detnet-ip-05.txt>- ICMP
> support, e.g., ping and traceroute
> 
> 
> [EXTERNAL EMAIL]
> 
> Hi,
> 
> David -- looks like I missed your response to my message.  My apologies.
> 
> Balázs -- Thanks for the changes and agree that it is a good adjustment
> to address David's changes.  One more suggestion to allow for a possible
> future definition that allows for type-specific flows - if anyone
> decides that such is a good thing:
> 
>      s/All ICMP types MUST be supported/Note that ICMP type is not
> included in the flow definition/
> 
> Lou
> 
> On 4/17/2020 9:03 AM, Balázs Varga A wrote:
> > Hi David,
> >
> > Thanks for the comment. I am working on the update of the document.
> >
> > In order to fix your comment I propose to add a new paragraph in Section
> > 3. after your referred text dealing with 6-tuple.
> > NEW
> >      For some of the protocols 5-tuples and 6-tuples cannot be used because
> >      the port information is not available (e.g., ICMP, IPSec ESP). Same can
> >      be valid for flow aggregates. In such cases using smaller tuples are
> >      appropriate, e.g., a 3-tuple (2 IP addresses, IP protocol) or even a
> >      2-tuple (all IP traffic between two IP addresses).
> > END
> >
> > Furthermore to change text in Section 5.1.2 (adding ICMP):
> > OLD
> >     Implementations of this document MUST support DetNet flow
> >     identification based on header information identified in this
> >     section.  Support for TCP, UDP and IPsec flows is defined. Future
> >     documents are expected to define support for other protocols.
> > NEW
> >     Implementations of this document MUST support DetNet flow
> >     identification based on header information identified in this
> >     section.  Support for TCP, UDP, ICMP and IPsec flows is defined. Future
> >     documents are expected to define support for other protocols.
> > END
> >
> > And finally adding a new subsection before current 5.1.2.2.
> > NEW
> >      5.1.2.2 ICMP
> >          DetNet flow identification for ICMP is achieved based on the
> >          protocol's header. All ICMP types MUST be supported.
> > END
> >
> > Do they address your comments?
> >
> > Cheers
> > Bala'zs
> >
> >
> > -----Original Message-----
> > From: Black, David <David.Black@dell.com>
> > Sent: Tuesday, March 17, 2020 1:39 AM
> > To: Lou Berger <lberger@labn.net>; last-call@ietf.org
> > Cc: Ethan Grossman <eagros@dolby.com>; detnet@ietf.org; draft-ietf-detnet-
> ip@ietf.org; db3546@att.com; detnet-chairs@ietf.org; Black, David
> <David.Black@dell.com>
> > Subject: RE: Last Call Comment: <draft-ietf-detnet-ip-05.txt>- ICMP support,
> e.g., ping and traceroute
> >
> > Hi Lou,
> >
> >> Umm, what makes you say ICMP isn't supported?  The current text has
> >> what you are asking for:
> >>
> >> https://tools.ietf.org/html/draft-ietf-detnet-ip-05#section-5.1.1.3
> >> (which is also summarized in section 6)
> >>
> >> There's additional information that can be specified when the next
> >> protocol is UDP/TCP/IPsec, but ICMP is perfectly valid in the current
> >> flow definition.
> > I stand corrected - the current draft's requirement for ICMP support is "MAY"
> - that requirement ought to be a "MUST" now to ensure that ping and
> traceroute will work for all DetNet implementations.
> >
> > The details of why ICMP support is a "MAY" requirement in the current draft
> begin with the summary in Section 6 (this is the IPv4 text; the IPv6 text is
> analogous):
> >
> >     o  IPv4 protocol field.  A limited set of values is allowed, and the
> >        ability to ignore this field, e.g., via configuration of the value
> >        zero (0), is desirable.
> >
> > So, what is that "limited set of values"?  Section 5.1.1.3 says:
> >
> >     Implementations of this document MUST support DetNet flow
> >     identification based on the IPv4 Protocol field when processing IPv4
> >     packets, and the IPv6 Next Header Field when processing IPv6 packets.
> >     An implementation MUST support flow identification based on the next
> >     protocol values defined in Section 5.1.2.  Other, non-zero values,
> >     MUST be used for flow identification.  Implementations SHOULD allow
> >     for these fields to be ignored for a specific DetNet flow.
> >
> > Moving to Section 5.1.2, the text that defines the required next protocol
> values is:
> >
> >     Implementations of this document MUST support DetNet flow
> >     identification based on header information identified in this
> >     section.  Support for TCP, UDP and IPsec flows is defined. Future
> >     documents are expected to define support for other protocols.
> >
> > ICMP is not listed, so this falls back to Section 5.1.1.3 where ICMP is included
> in: "Other, non-zero values, MUST be used for flow identification."  That text
> doesn't say which non-zero values, effectively leaving the choice to
> implementers.   That's a truck-sized loophole ... looking at the IANA registry
> (https://www.iana.org/assignments/protocol-numbers/protocol-
> numbers.xhtml#protocol-numbers-1), an implementer could select 12 (PUP)
> and 16 (Chaos) and claim to have met that requirement :-).
> >
> > The upshot is that ICMP is sufficiently important that support for it ought to
> be a MUST requirement now, not left as something for a future document to
> do, potentially stranding implementations whose implementers didn't think of
> ICMP until it was too late.
> >
> > Once ICMP is mandatory, the next consideration is whether that support in
> flow identification is all-or-nothing across ICMP types vs. whether DetNet flow
> identification ought to be able to select specific ICMP types.   There are about a
> dozen currently defined valid ICMP types
> (https://www.iana.org/assignments/icmp-parameters/icmp-
> parameters.xhtml#icmp-parameters-types), some of which can be used to
> cause mischief.  OTOH, a DetNet network is a tightly controlled environment,
> so it may suffice to simply require all-or-nothing support for ICMP types in
> DetNet flow identification and rely on other controls to prevent mischief.  A
> good and carefully thought out decision needs to be made on this topic, as it
> may affect implementation hardware.
> >
> > Beyond that, Section 3 focuses on 6-tuple identification:
> >
> >     The DetNet IP data plane primarily uses "6-tuple" based flow
> >     identification, where 6-tuple refers to information carried in IP and
> >     higher layer protocol headers.  The 6-tuple referred to in this
> >     document is the same as that defined in [RFC3290].  Specifically
> >     6-tuple is (destination address, source address, IP protocol, source
> >     port, destination port, and differentiated services (DiffServ) code
> >     point (DSCP).  General background on the use of IP headers, and
> >     5-tuples, to identify flows and support Quality of Service (QoS) can
> >     be found in [RFC3670].  [RFC7657] also provides useful background on
> >     the delivery of DiffServ and "tuple" based flow identification.  Note
> >     that a 6-tuple is composed of a 5-tuple plus the addition of a DSCP
> >     component.
> >
> >     The DetNet IP data plane also allows for optional matching on the
> >     IPv6 flow label field, as defined in [RFC8200].
> >
> > This is where I initially went astray in writing up the comment - Section 3 also
> ought to point out that smaller tuples are fine, e.g., a 3-tuple (2 IP addresses, IP
> protocol) or even a 2-tuple (all IP traffic between two IP addresses) are both
> possible and reasonable under the right circumstances.  In addition, ICMP is
> one of two protocols for which 5-tuples and 6-tuples cannot be used because
> the port information is not available - the other protocol is IPsec ESP, which
> encrypts the transport header that contains the ports.   All of this would be very
> helpful to summarize in Section 3.
> >
> >> The IP OAM document is coming.  In hallway discussion we even talked
> >> about how to make ICMP/BFD/etc follow the same paths as other specific
> >> flow rules.  There is a nascent document on this,
> >> draft-mirsky-detnet-ip-oam, although it is certainly lagging behind
> >> the MPLS oam document.  FWIW I'm hoping for there to be more who wish
> >> to contribute on the IP OAM document - hint, hint, hint...
> > Greg twisted my arm (gently), so I've signed on to help with that IP OAM
> draft.
> >
> > Thanks, --David
> >
> >> -----Original Message-----
> >> From: Lou Berger <lberger@labn.net>
> >> Sent: Sunday, March 15, 2020 5:29 PM
> >> To: Black, David; last-call@ietf.org
> >> Cc: Ethan Grossman; detnet@ietf.org; draft-ietf-detnet-ip@ietf.org;
> >> db3546@att.com; detnet-chairs@ietf.org
> >> Subject: Re: Last Call Comment: <draft-ietf-detnet-ip-05.txt>- ICMP
> >> support, e.g., ping and traceroute
> >>
> >>
> >> [EXTERNAL EMAIL]
> >>
> >> Hi David,
> >>
> >> See below.
> >>
> >> On 3/12/2020 11:06 AM, Black, David wrote:
> >>> Comment: As specified in the current draft, the DetNet IP data plane
> >>> does not
> >> support ping, traceroute, and any other mechanism or tool that is
> >> based on ICMP.  This is because ICMP does not use ports, so ICMP
> >> traffic cannot be described by either a 5-tuple or a 6-tuple, and hence ICMP
> traffic cannot be
> >> part of a DetNet flow that is described by a 5-tuple or 6-tuple.   The draft
> needs
> >> to be revised to either:
> >>> 	- enable ICMP to be used with the DetNet IP data plane (ICMP would
> >> use a 3-tuple, two IP addresses and the protocol number for ICMP); or
> >>> 	- document and justify a deliberate design decision that ICMP (and
> >> hence ICMP-based tools) cannot be used with the DetNet IP data plane.
> >>> The former course of action (enable ICMP with the DetNet IP data
> >>> plane) is
> >> strongly suggested, e.g., in order to enable use of ping and
> >> traceroute with the DetNet IP data plane.
> >>
> >> Umm, what makes you say ICMP isn't supported?  The current text has
> >> what you are asking for:
> >>
> >> https://tools.ietf.org/html/draft-ietf-detnet-ip-05#section-5.1.1.3
> >> (which is also summarized in section 6)
> >>
> >> There's additional information that can be specified when the next
> >> protocol is UDP/TCP/IPsec, but ICMP is perfectly valid in the current
> >> flow definition.
> >>
> >>> Background: In discussion at the Singapore detnet WG meeting, OAM
> >>> was
> >> characterized as something that would be added to the DetNet data
> >> planes later, with the (at least implied) assertion that there
> >> shouldn't be anything in the data planes that blocks OAM
> >> functionality.  That does appear to be the case for the MPLS data plane, but
> the IP data plane appears to differ.
> >>
> >> The IP OAM document is coming.  In hallway discussion we even talked
> >> about how to make ICMP/BFD/etc follow the same paths as other specific
> >> flow rules.  There is a nascent document on this,
> >> draft-mirsky-detnet-ip-oam, although it is certainly lagging behind
> >> the MPLS oam document.  FWIW I'm hoping for there to be more who wish
> >> to contribute on the IP OAM document - hint, hint, hint...
> >>
> >>> Later than might have been ideal, I've discussed DetNet IP OAM with
> >>> Greg
> >> Mirsky via email - our initial take from that discussion is that most
> >> OAM for the DetNet IP data plane can be accomplished over UDP, with the
> notable
> >> exception of tools such as ping and traceroute that use ICMP.   For ping and
> >> traceroute to work with DetNet, the ICMP packets that are used have to
> >> pass through the DetNet data plane at DetNet nodes, otherwise these
> >> tools may erroneously report no connectivity problems with the
> >> ordinary (non-DetNet) data plane when DetNet IP data plane connectivity is
> broken and vice-versa.
> >>
> >> Right -- and this can be done as part of the flow rules setup that is
> >> outside the scope of this document.
> >>
> >>> Sorry to bring this up at a late stage in the process, but better late than
> never.
> >> Not at all, this has been discussed but has yet to make it in WG
> >> documents, so is 100% fair game.  The intent is for the current
> >> documents to support the future OAM work.  It would have been optimal
> >> for the OAM documents to be done now, but their not as contributions
> >> in this area have lagged behind the more general data plane work.
> >> Again, contributions in this are would be hugely welcomed!
> >>
> >>
> >>> I also spotted an editorial oversight in Section 4.3.1:
> >>>
> >>> OLD
> >>>      Class of Service (CoS) for DetNet flows carried in IPv6 is provided
> >>>      using the standard differentiated services code point (DSCP) field
> >>>      [RFC2474] and related mechanisms.
> >>> NEW
> >>>
> >>>      Class of Service (CoS) for DetNet flows carried in IPv4 and IPv6 is
> provided
> >>>      using the standard differentiated services code point (DSCP) field
> >>>      [RFC2474] and related mechanisms.
> >>>
> >>> The authors deserve some sort of recognition here, as the far more
> >>> typical
> >> variant of this oversight is to omit IPv6 :-)
> >>
> >> Thanks ;-)
> >>
> >> Lou
> >>
> >> (as contributor)
> >>
> >>> Thanks, --David
> >>>
> >>>> -----Original Message-----
> >>>> From: IETF-Announce <ietf-announce-bounces@ietf.org> On Behalf Of
> >>>> The
> >> IESG
> >>>> Sent: Friday, February 28, 2020 3:59 PM
> >>>> To: IETF-Announce
> >>>> Cc: Ethan Grossman; detnet@ietf.org; draft-ietf-detnet-ip@ietf.org;
> >>>> db3546@att.com; detnet-chairs@ietf.org
> >>>> Subject: Last Call: <draft-ietf-detnet-ip-05.txt> (DetNet Data
> >>>> Plane: IP) to Proposed Standard
> >>>>
> >>>>
> >>>> [EXTERNAL EMAIL]
> >>>>
> >>>>
> >>>> The IESG has received a request from the Deterministic Networking
> >>>> WG
> >>>> (detnet)
> >>>> to consider the following document: - 'DetNet Data Plane: IP'
> >>>>     <draft-ietf-detnet-ip-05.txt> as Proposed Standard
> >>>>
> >>>> The IESG plans to make a decision in the next few weeks, and
> >>>> solicits final comments on this action. Please send substantive
> >>>> comments to the last-call@ietf.org mailing lists by 2020-03-13.
> >>>> Exceptionally, comments may be sent to iesg@ietf.org instead. In
> >>>> either case, please retain the beginning of the Subject line to allow
> automated sorting.
> >>>>
> >>>> Abstract
> >>>>
> >>>>
> >>>>      This document specifies the Deterministic Networking data plane when
> >>>>      operating in an IP packet switched network.
> >>>>
> >>>>
> >>>>
> >>>>
> >>>> The file can be obtained via
> >>>> https://datatracker.ietf.org/doc/draft-ietf-detnet-ip/
> >>>>
> >>>> IESG discussion can be tracked via
> >>>> https://datatracker.ietf.org/doc/draft-ietf-detnet-ip/ballot/
> >>>>
> >>>>
> >>>> No IPR declarations have been submitted directly on this I-D.
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>> _______________________________________________
> >>>> IETF-Announce mailing list
> >>>> IETF-Announce@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/ietf-announce
> > _______________________________________________
> > detnet mailing list
> > detnet@ietf.org
> > https://www.ietf.org/mailman/listinfo/detnet